PREVENTING THE THREATS OF TOMORROW AND BEYOND
Jonathan Kaftzan
VP Product marketing & innovation
PREVENTING THE THREATS OF TOMORROW AND BEYOND Jonathan Kaftzan VP - - PowerPoint PPT Presentation
PREVENTING THE THREATS OF TOMORROW AND BEYOND Jonathan Kaftzan VP Product marketing & innovation Is Prevention Possible? 2 Private and confidential FROM PREVENTION TO DETECTIONAND BACK Prevention An Antivir virus us: Polymor
PREVENTING THE THREATS OF TOMORROW AND BEYOND
Jonathan Kaftzan
VP Product marketing & innovation
Private and confidential
2
Private and confidential
FROM PREVENTION TO DETECTION…AND BACK
1990 2000 2010 2015
Detection Prevention
An Anti-malwa alware re Effect ectiven veness ess
An Antivir virus us: Signatures- based An Antivir virus us: Static Heuristics Sandboxin
Solut utio ions ns Behavior vioral al An Analysi sis, s, An Anti-Expl xploi
ts Detect ection ion & Resp sponse
Threat Hunting Mach achin ine e Learni ning ng Static Analysis Encr crypte ted Payload ads Polymor
ic Code An Anti-Sandb andbox
Techni nique ues, s, Exploit
New At Attack ck ve vecto tors s & surface aces Met etam amor
hic c Code, Filel eles ess “needle in a haystack” new atta tack ck ve vecto tors s and surface aces
Deep Lear arnin ning g
Static & Dynamic Analysis
To date
Private and confidential
4
FROM HUMAN BRAIN TO DEEP LEARNING
Artificial Intelligence Machine learning Deep learning
1950 1980 2010
Deep learning is the area of artificial intelligence where the real magic is happening right now.
WHEN SCIENCE FICTION
Virtual assistants Healthcare Diagnosis Face recognition Personal recommendations
Private and confidential
6
THE BIGGEST IMPROVEMENT IN ARTI TIFICI FICIAL AL INTE TELL LLIG IGENCE ENCE
AND NOW, DEEP LEARNING IS ALSO TRANSFORMING CYBERSECURITY
Deep learning has accomplished groundbreaking success in every field it has been applied improvement in face recognition
improvement in voice recognition
improvement in text analysis
DEEP LEARNING, DEEP IMPACT
TRAINING THE BRAIN
DETECTION OF THE UNKNOWN
BECOMES AN INSTINCT
Private and confidential
DEEP LEARNING Vs. MACHINE LEARNING:
NO FEATURE ENGINEERING
Manual feature Engineering
Machine learning
Vector of features Raw data
0.5 1.8
2.3 . . . N Deep learning
Raw data
Machine learning Deep learning
Private and confidential
DEEP LEARNING Vs. MACHINE LEARNING:
NO FEATURE ENGINEERING
Only
2.5%-5%
Feature engineering Domain expert Linear model Limited files type covered (PE) Autonomous, intuitive & Automated
100%
Of available raw data Zero time to support any new file types Non-linear model: Context & correlation between data
Machine learning Deep learning
Private and confidential
DEEP LEARNING Vs. MACHINE LEARNING:
NO FEATURE ENGINEERING
Accuracy with unknown
False positives Accuracy with unknown False positives
Machine learning Deep learning
Private and confidential
13
NON-LINEAR VS LINEAR CORRELATION
AP API I hooki
g Dll ll injection Preve event t access ess to regi gistry try key by drive vers rs Malw lware e keylog loggers ers Malw lware e spyware re Malw lware e AP APT
Private and confidential
14
NON-LINEAR VS LINEAR CORRELATION
Mach chine e Lear earning: g: Linear ear corr rrel elati tions Mach chine e le learni rning Deep ep Lear earning: g: Non-li linea ear r corr rrel elati tions AP API I hooki
g Dll ll injection Preve event t access ess to regi gistry try key by drive vers rs Malw lware e keylog loggers ers Malw lware e spyware re Malw lware e AP APT
Private and confidential
An Antivi virus s softw tware
15
NON-LINEAR VS LINEAR CORRELATION
Linear ear corr rrel elati tions (Mach chine e le learn rning) g) Non-li linea ear r corr rrel elati tions (Deep ep Lear earning) g) AP API I hooki
g Dll ll injection Preve event t access ess to regi gistry try key by drive vers rs Malw lware e keylog loggers ers Malw lware e spyware re Malw lware e AP APT
Private and confidential
16
EFFECT OF MORE NEURONS LAYERS
3 hidden neuron layers 6 hidden neurons layers 20 hidden neurons layers
Malicious Benign
Private and confidential
24 hours
Deep Instinct neural network
Nvidia GPUs
Third party public sources Darknet Home Made Malware Mutated Malware
Data sample: hundreds of millions
Supervised & unsupervised training Lightweight agent: <150MB, <1% CPU Run on any CPU Only two updates a year
THE DEEP LEARNING PROCESS FROM TRAINING TO PREDICTION
Private and confidential
Milliseconds
No Tradeoffs: Highest detection rates, lowest false positive
Malicious Benign
*. macho *.dll *macro *.ppt
*.exe *.pdf
*.doc *.dll
*.doc *. APK
*.ppt *.exe *. SWF
*.RTF
Connectionless protection Autonomous on-device prevention
THE DEEP LEARNING PROCESS FROM TRAINING TO PREDICTION
DEEP LEARNING BY
Private and confidential
Management Console
Deployment, Brain & Policy Update
PC Laptop Workstation Server Mobile Tablet
D-Clients Deep Instinct Neural Network
Real-time Prevention Technology: >99% detection, <0.001% false positive Any Device, OS and network (1-2 updates a year, 150MB , <1% CPU) Zero Risk: No need to rip and replace Proprietary Deep Learning Framework Management console: On prem or cloud
WHAT IS THE SOLUTION?
Private and confidential
REALTIME PREVENTION by Deep Instinct
Time to prevent
20 ms
By D-Brain Time to Investigate
50 ms
By Deep Classification Time to Remediate & Contain
<1 minute
“…so much of the success of EDR-like features and investigation capabilities relies heavily on the skills and experience of the security administrators using the product day-to-day.”
Private and confidential
22
WE DO NOT
We do NOT use
Traditional machine learning Sandboxing (for detection) Signature Skilled & expensive SOC team Connectivity Frequent updates Wait for execution of attack
We do NOT require
Experts for features engineering
Private and confidential
Spora is first reported as a new ransomware family
Jan 10th 2017 23
THE VALUE OF THE DEEP INSTINCT PREDICTION MODEL
Spora Ransomware
First upload to VirusTotal
Feb 24th 2017 Feb 16th 2017
D-Client v1.9
Discovered and Prevented by the Deep Instinct client
endpoint
D-Client v1.9
Release day
45 days (at least) 37 days Created 10 Months earlier April 2016
Private and confidential
24
MYLOBOT: A NEW HIGHLY SOPHISTICATED NEVER- SEEN-BEFORE BOTNET
First detected and prevented on a live customer environment on May 2018 Malware vs. Malware Highly sophisticated botnet incorporates different malicious techniques
Private and confidential
25
MYLOBOT: A NEW HIGHLY SOPHISTICATED NEVER- SEEN-BEFORE BOTNET
Real-time prevention by deep learning cybersecurity
One month of extensive cyber expert analysis
First detected and prevented on a live customer environment on May 2018 Malware vs. Malware Highly sophisticated botnet incorporates different malicious techniques
Private and confidential
Com
e Vis isit it Us s at O t Our r Bo Boot
#552
Take ke th the e Test st / Answe swer r Cor
rectly ctly / Wi Win a Pr Priz ize
Private and confidential
jonathank@deepinstinct.com | www.linkedin.com/in/jkaftzan
Private and confidential
28
THE FIRST COMPANY TO APPLY DEEP LEARNING TO CYBERSECURITY
Unique prop
riet etary ry deep ep le learn rning g framework for cybersecurity Protected with 3 registered patents & 3 trademarks
INTELLECTUAL PROPERTY HIGHLY EXPERIENCE TEAM
90 full time employees Deep learning scientists, comprised of PhDs, MSCs, Cybersecurity veterans - Ex IDF and Israel intelligence Service
STRATEGIC INVESTORS
First-see seen, , Unkn known
Zero ro-da days, s, AP APTs, s, Ransomw somware e
THREAT PREVENTION PLATFORM
Private and confidential
PRE-EXECUTION
Prevent
POST EXECUTION
Deep static analysis
PE | Ransomware | PDF | Office | Macro | Fonts | TIFF | RTF | SWF | Mach-O | JAR
File reputation (D-cloud) Script control Automatic analysis
Malware classification | Attack timeline (process chain) | Offline sandboxing
Remediation
Whitelist/blacklist – Hash, Certificate, Folder | Import of list of indicators | File quarantine and restore | File delete | Terminate running process | Isolate device network
ON-EXECUTION
Detection & Response
Deep behavioral analysis
Code injection | Enhanced Ransomware | Metasploit's shellcodes *Virus – file infectors | *Worms | *Keyloggers | *Credentials dumping | *Banking trojans | *Spyware
DEEP INSTINCT’S MULTI LAYERED PROTECTION
* Roadmap