Masquerading Malicious DNS Traffic Bayesian Inference, Rainier, - - PowerPoint PPT Presentation

masquerading malicious dns traffic
SMART_READER_LITE
LIVE PREVIEW

Masquerading Malicious DNS Traffic Bayesian Inference, Rainier, - - PowerPoint PPT Presentation

Masquerading Malicious DNS Traffic Bayesian Inference, Rainier, Spark David Rodriguez March 28, 2019 The Outline Masquerading Time Series Rainier Anomaly DNS Modeling + Detection Traffic Spark The Outline Masquerading Time Series


slide-1
SLIDE 1

David Rodriguez March 28, 2019

Bayesian Inference, Rainier, Spark

Masquerading Malicious DNS Traffic

slide-2
SLIDE 2

Rainier + Spark Time Series Modeling Anomaly Detection Masquerading DNS Traffic

The Outline

slide-3
SLIDE 3

Rainier + Spark Time Series Modeling Anomaly Detection Masquerading DNS Traffic

The Outline

slide-4
SLIDE 4

Cisco Umbrella DNS Resolution

slide-5
SLIDE 5

Part 1 DNS Resolution

Web Server IP Address Mail Server Many More DNS Records 180 Billion Per Day Cisco Umbrella

slide-6
SLIDE 6

Part 1 Protection 101

Phishing Compromised Account Malvertising Ransomware Worms Virus

slide-7
SLIDE 7

Part 1 Definition

Masquerading Traffic = Masquerading Users +

Compromised Websites

slide-8
SLIDE 8

Part 1 Masquerading Users

PDF Viewer Text Editor Browsing Internet Email SSH Keys

slide-9
SLIDE 9

Part 1 Compromised Websites

Compromised Server Malicious Webpage Backdoor Vulnerability Typical Visitors Phished Browser Redirect

slide-10
SLIDE 10

Part 1 Masquerading DNS Traffic

Atypical Vistor Typical Vistor DNS Traffic

slide-11
SLIDE 11

Part 1 Emotet Campaign

Phishing Email User Click Links or Opens Attachments to Email Links or Macros Make DNS Requests Malware Downloaded Emotet Runs Code in Process and Registers Computer with C2 Server Masquerading Traffic

slide-12
SLIDE 12

Part 1 Emotet Campaign

slide-13
SLIDE 13

Rainier + Spark Time Series Modeling Anomaly Detection Masquerading DNS Traffic

The Outline

slide-14
SLIDE 14

Part 2 Time-Series Analysis

Expected Non-Zero Volume Expected Zero Volume Extreme Outliers

slide-15
SLIDE 15

Part 2 Time-Series Analysis

Probability of Demand Expected Demand when non-zero

slide-16
SLIDE 16

Part 2 Croston’s Method

Spark Volume Pipeline Spark Table Join Spark Historical Table Spark Table Note : Trended Data Store

slide-17
SLIDE 17

Part 2 Bayesian Approach X Y

Probability Distribution Probability of Demand Expected Demand when non-zero

slide-18
SLIDE 18

Part 2 Bayesian Approach

1 2 3 4 5 6 7 8 9 Zero Distribution Non-Zero Distribution Outliers Outliers

slide-19
SLIDE 19

Part 2 Mixture Models

slide-20
SLIDE 20

Part 2 Discrete Models

slide-21
SLIDE 21

Part 2 Continuous Models

slide-22
SLIDE 22

Rainier + Spark Time Series Modeling Anomaly Detection Masquerading DNS Traffic

The Outline

slide-23
SLIDE 23

Part 3 MCMC Methods

Observations Proposed Distribution Sampling From Distribution Rejection

  • f

Samples

slide-24
SLIDE 24

Part 3 MCMC Methods

slide-25
SLIDE 25

Part 3 Rainier ~ README

Depending on your background, you might think of Rainier as aspiring to be either: “Stan, but on the JVM”

  • r

“Tensorflow, but for small data”.

slide-26
SLIDE 26

Part 3 Rainier Methods

slide-27
SLIDE 27

Part 3 PyMC Methods

slide-28
SLIDE 28

Part 3 Rainier + Spark

JVM Rainier Spark

slide-29
SLIDE 29

Part 3 Rainier + Spark

Hourly Aggregations Daily Aggregations Rainier Simulations Spark Job 150 Million Paid-Level Domains Spark Job Spark Job Filtering Heuristics

slide-30
SLIDE 30
slide-31
SLIDE 31

Rainier + Spark Time Series Modeling Anomaly Detection Masquerading DNS Traffic

The Outline

slide-32
SLIDE 32

Part 4 Window Based

Window 1 Window 2

Rainier

Window 1 Window 2

Simulated Parameter Values Distribution Parameter Values Difference

slide-33
SLIDE 33

Part 4 Window Simulations

Week 1 Week 2 Week 3 Week 4

slide-34
SLIDE 34

Part 4 Outlier Window

slide-35
SLIDE 35

Part 4 Local Outlier to Global

slide-36
SLIDE 36

Closing Recap

Rainier + Spark Time Series Modeling Anomaly Detection Masquerading DNS Traffic

slide-37
SLIDE 37

Closing Glossed Over Details

Outliers Goodness

  • f

Fit

slide-38
SLIDE 38

A Review of Croston's method for intermittent demand forecasting

https://www.researchgate.net/publication/254044245_A_Review_of_Croston's_method_for_intermittent_demand_forecasting

Rainier

https://github.com/stripe/rainier

PyMC3

https://docs.pymc.io/

Emotet

https://www.us-cert.gov/ncas/alerts/TA18-201A

Bokeh Plots

https://bokeh.pydata.org/en/latest/

Twitter Chill

https://github.com/twitter/chill

Closing References

slide-39
SLIDE 39

Website

davidrdgz.github.io

Github

@davidrdgz

Twitter

@davidrdgz

Email

davrodr3 at cisco.com

Closing Contact