know, protect, empower. don’t learn malware.€¦ · know, protect, empower don’t learn malware...

22
aramis by aizoOn Know, Protect, Empower. Don’t learn malware.

Upload: others

Post on 18-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

aramis by aizoOn

Know, Protect, Empower. Don’t learn malware.

Page 2: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

aramisKnow, Protect, Empower. Don’t learn Malware

• Executive Summary

• Market considerations

• Problem with current offering

• Aramis and its 4 pillars

• Details

• Conclusions: Know, Protect, Empower!

Page 3: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

Executive summary

▌ The quantity and sophistication of malware requires a new and more effective approach to threat detection and determination.

▌ aizoOn has joined two independent fields of intense academic and applied research, one on the use of Bayesian network analysis to determine risk profiles, the second on pre-attentive communication to alert a person’s intuition.

▌ aramis is a cloud based, artificial intelligence solution, enabling organizations to reduce dwell time to one day (industry average 205 days) in detecting and determining the cyber threat.

▌ aramis is available as a platform for organizations with skilled security analysts, or as a service for those companies that focus on a different core business.

3

Page 4: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

Cyber: war and crimes

▌ Inexpensive malware is freely available on the internet for all to grab and use to develop more sophisticated attacks.

▌ Individuals, organized crime and rogue nations have three distinct advantages:

▌ Huge number of attacks from near and far, from friends and foes

▌ Lack of judicial ability to pursue criminals, domestically and internationally

▌ Encryption technology, privacy legislation and social networks combined

▌ Fear of organizations in sharing attacks because of brand and penalty damages

▌ Element of surprise when devising new forms of attacks▌ $425bln lost annually the damage to global economy.▌ Data Theft is being replaced by Physical Disruption on infrastructures, machines, plants.

4

Page 5: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

The attackers’key success factors

5

▌ Current defensive technologies and procedures are just partly effective

▌ The importance of security awareness is often underestimated

▌ Motivated attackers have a high likelihood of breaching

▌ Criminals often manage to escape justice

▌ Effective attacking tools and techniques are economically viable

Page 6: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

Malware is affordable

6

DET

ECTI

ON

DIF

FIC

ULTY

High ProfileAPT

95% of attacksare SPECIFIC

to the organization

BUDGET to MAKEUSD 100K – x M

ComerciallyAdvanced Malware

BUDGET to MAKEor BUY

USD 10K – 100K

Cheap Malware

BUDGET to BUYUSD 100 – 10K

Any company can afford this gap!

Page 7: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

aizoOn experience

“ “We are very proud of our "fake malware”

– that currently comprises about 20 different "base" versions –

because it was able to avoid the anti-apt detection

with a success rate of 98%.

Danilo Massa - aizoOn CyberSec Leader

We have been asked multiple times to produce «fake malware» to TEST the EFFECTIVENESS of corporate ANTI-APTSOLUTIONS.

Whereas the most basic samples are usually detected, the more COMPLEX ONES ELUDE DETECTION almost every time.

Advanced MALWARE IS PACKED WITH FEATURES designed to elude detection and operate silently.

7

Page 8: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

Market offering has problems

8

PROBLEM Targeted Attacks andAPTs are sophisticated,rapidly evolvingand hard to detect.

Targeted Attacks andAPTs are sometimesdiscovered after days,when it’s already toolate.

Understandingtargeted Attacks andAPTs, requires a deep,specific knowledge oftechnology andmalware.

SOLUTION aramis does not rely onsignatures;it highlights thepresence of targetedattacks and APTs withintuitive, pre-attentivegraphics

aramis’ proprietarylogic is designed toreduce to hours the«dwell time» passingfrom the infection tothe malwareidentification anderadication.

Detection process doesnot require technology-specific or malwareknowledge.The key factor is theknowledge of yourenvironment.

Page 9: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

Different approaches to the same problem

9

NETWORK TRAFFIC ANALYSIS

Style 1

NETWORK FORENSICS

Style 2

PAYLOAD ANALYSIS

Style 3

ENDPOINT BEHAVIOR ANALYSIS

Style 4

ENDPOINT FORENSICS

Style 5

REAL TIME / NEAR REAL TIME

POSTCOMPROMISE(DAYS / WEEKS)

NETWORK

PAYLOAD

ENDPOINT

TIMEW

HER

E TO

LOO

K

GARTNER (August 2013) - Five Styles of Advanced Threat Defense - "Lawrence Orans, Jeremy D'Hoinne"

Page 10: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

4 pillars for Aramis

Aramis is an advanced malware identification system designed to:

IDENTIFY THREATS inside a network by highlighting the deviations from its normal behavior

FOSTER HUMAN ANALYSIS using proprietary pre-attentive dashboards and graphics

TAKE ADVANTAGE OF SPECIFICALLY DESIGNED BAYESIAN analysis engines and advanced deterministic rules

COLLECT DATA PASSIVELYwithout altering the current network layout, therefore avoiding detection

10

Page 11: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

Aramis Architecture

11

ACS

ALS

ADS

aramisDistributed

Sensor

aramisDistributed

Sensor

aramisDistributed

Sensor

aramisCloudService

aramisLocalServer

Page 12: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

Aramis Workflow

12

COLLECT ENRICH CORRELATE VISUALIZE

Page 13: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

Bayesian network self-learning engine

13

▌ HTTP requests and replies

▌ FTP activity

▌ SSL sessions

▌ SSL certificates used

▌ SMTP traffic on a network

▌ DNS activity on a network

▌ Connections

▌ Network activity on non-standard ports

▌ Files transmitted over the network

▌ Unexpected protocol-level activity

Evaluate consistency in the network using ad hoc Bayesian network analysis. The consistency shows the level (between 0 and 100) of normality of the information in the data flow.

The Bayesian network analyze different dimensions: Single Event Consistency

Overall Consistency trend

Page 14: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

Pre-attentive

14

The aramis Risk Visualizer collates the information in pre-attentive

dashboards, because in certain cases a person can understand

and react faster than a computer.

aramis gives the analyst the right

tools to be aware of what is going on,

in real time

Page 15: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

Know, Protect, EmpowerDon’t learn Malware

15

KNOW

Detection process does not require vendor-specific or malware knowledge. The key factor is the knowledge of your

environment trends and behavior

PROTECT

Aramis proprietary logic is designed to reduce the “dwell time” passing from the

infection to the identification and eradication of malware to hours instead

of days or weeks

EMPOWER

Aramis does not rely on signature triggering; it highlights the presence of

malicious behavior, enabling the analyst to immediately identify and classify

threats by collating the data presented in the pre-attentive dashboards

Page 16: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

KNOWchange the game pay-off

PROBLEM

Attackers can choose organizations that are more easily compromised and provide

greater returns on “investments” aramis gives  you  a  fine-­grained  picture of  the  organization’s  current  risk  status  and  

addresses  your  protective efforts where  they  can  make  the  difference

SOLUTION

16

Page 17: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

PROBLEM

Targeted Attacks and APTs are sometimes discovered after many

days, when it’s already too late. aramis proprietary logic is designed to reduce to hours the “dwell time” passing

from the infection to the malware identification and eradication.

SOLUTION

PROTECTreact sooner

17

Page 18: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

EMPOWERrecognize, not just identify

PROBLEM

Targeted Attacks and APTs are sophisticated, rapidly evolving and hard

to detect. aramis does not rely on signature triggering,it highlights the presence

of targeted attacks and APTs to enable humanpre-attentiveand intuitive mind processes

to identify them by pure observation.

SOLUTION

Defense Innovation, Austin TX 1-3 December 2015 18

Page 19: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

Aramis in action: value & time

1 w 5 w

IMPLEMENTATION

Operation

We understand the complexity of your environment

You gain the valuePROOF OF VALUE

ü 30 daysü Basic configurationü Non bindingInve

stm

ent

bene

fit

6 w 9 w weeks

Page 20: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

Aramis in action: Platform vs. Service ?

• Easily scalable

• Maximum flexibility

• No training required

• Expert support from day one

• Service Level Agreements

• We provide the training

• Your data stays in your premises

• Develop critical skillsets

• Use your own hardwareVS.

Page 21: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

The classic friend / foe assessment

21

TraditionalDefensiveApproach

▌ One time assessment

▌ Assessing criteria fairly known to attackers

▌ Standardised approach

▌ Human knowledge and experience not crucial to the assessment

▌ Binary outcome

Page 22: Know, Protect, Empower. Don’t learn malware.€¦ · Know, Protect, Empower Don’t learn Malware 15 KNOW Detection process does not require vendor-specific or malware knowledge

The aramis approach

22

TraditionalDefensiveApproach

▌ Continuous assessment

▌ Passive, undetectable solution

▌ Custom, business-centric assessment criteria

▌ Human knowledge and experience key to decision

▌ Risk based results