Project Plan Detecting Security Threats from User Authentication - - PowerPoint PPT Presentation

project plan
SMART_READER_LITE
LIVE PREVIEW

Project Plan Detecting Security Threats from User Authentication - - PowerPoint PPT Presentation

Project Plan Detecting Security Threats from User Authentication Patterns The Capstone Experience Team Symantec Stephen Alfa Keerthana Kolisetty Robert Novak Abby Urbanski Xiaoyo Wu Department of Computer Science and Engineering Michigan


slide-1
SLIDE 1

From Students… …to Professionals

The Capstone Experience

Project Plan

Detecting Security Threats from User Authentication Patterns

Team Symantec

Stephen Alfa Keerthana Kolisetty Robert Novak Abby Urbanski Xiaoyo Wu Department of Computer Science and Engineering Michigan State University Spring 2018

slide-2
SLIDE 2

Functional Specifications

  • The goal of the project is to provide VIP

customers a Splunk add-on and an AWS AMI to visualize various operational and security trend information present in log data and analyze it in near real-time

  • Both applications should alert users when

suspicious or malicious activity is detected

  • Launching and deployment of both of those

applications should be frictionless

The Capstone Experience Team Symantec Project Plan Presentation 2

slide-3
SLIDE 3

Design Specifications

  • Create easy to read graphs and charts to

represent authentication data

  • Successful vs Failed
  • Device Types
  • Authentications over time
  • Create premade graphics and searches and

allow users to choose which ones to display.

  • Highlight patterns that could reveal suspicious
  • r malicious activity

The Capstone Experience Team Symantec Project Plan Presentation 3

slide-4
SLIDE 4

Process Flow

The Capstone Experience Team Symantec Project Plan Presentation 4

Installation of Splunk/ELK User puts in Certificate in Splunk/ELK UI User puts certificate in VIP Reference Client Splunk/ELK takes in log data file The log data is stored as a CSV/JSON file VIP Reference client pulls VIP log data pertaining to the certificate Security Dashboard is created in Splunk/ELK Operational Dashboard is created in Splunk/ELK

slide-5
SLIDE 5

Screen Mockup: Pie Chart Panel

The Capstone Experience Team Symantec Project Plan Presentation 5

slide-6
SLIDE 6

Screen Mockup: Bar Graph Panel

The Capstone Experience Team Symantec Project Plan Presentation 6

slide-7
SLIDE 7

Screen Mockup: Dashboard in Splunk

The Capstone Experience Team Symantec Project Plan Presentation 7

slide-8
SLIDE 8

Screen Mockup: Dashboard in ELK

The Capstone Experience Team Symantec Project Plan Presentation 8

slide-9
SLIDE 9

Technical Specifications

  • SOAP (Simple Object Access Protocol) API
  • Java
  • VIP Reporting Service Client (REST API)
  • JavaScript, HTML
  • SPL (Search Processing Language)

The Capstone Experience Team Symantec Project Plan Presentation 9

slide-10
SLIDE 10

System Architecture

The Capstone Experience 10 Team Symantec Project Plan Presentation

slide-11
SLIDE 11

System Components

  • Hardware Platforms

▪ Amazon Web Services

  • Amazon Machine Images

▪ Software Platforms / Technologies ▪ Splunk ▪ Elasticsearch, Logstash, Kibana (ELK)

The Capstone Experience Team Symantec Project Plan Presentation 11

slide-12
SLIDE 12

Risks

The Capstone Experience Team Symantec Project Plan Presentation 12

Risks

  • Ability to Detect suspicious patterns

▪ There is a wide range of threats to detect and want to avoid false flags ▪ Consult with experienced security advisor and identify possible threats

  • Test Data

▪ Real VIP data is necessary to identify accurate threat patterns ▪ Get MSU’s VIP data

  • Consistency between Splunk and ELK

▪ Making sure that functionality is consistent between both platforms ▪ Develop both applications concurrently

  • AWS Servers

▪ The possibility of deploying the ELK applications on the AWS server ▪ Use AWS documentation and use online resources

slide-13
SLIDE 13

Questions?

The Capstone Experience Team Symantec Project Plan Presentation 13

? ? ? ? ? ? ? ? ?