network security monitoring with big data analytics - nguyễn minh Đức
DESCRIPTION
NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh ĐứcTRANSCRIPT
![Page 1: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/1.jpg)
NETWORK SECURITY MONITORING WITH BIG
DATA ANALYTICS
Nguyen Minh Duc
Security BootCamp 2014
Oct 2014
![Page 2: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/2.jpg)
![Page 3: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/3.jpg)
Sad but True
![Page 4: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/4.jpg)
Rules, signatures or not ?
![Page 5: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/5.jpg)
Rules, signatures or not ?
![Page 6: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/6.jpg)
Rules, signatures or not ?
![Page 7: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/7.jpg)
• Security Information and Event Management
Ok, we’ve already got a SIEM
![Page 8: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/8.jpg)
• Performance Limits Galore
• Data Variety Troubles
• Real-Time Correlation, Not Data Mining
• Analysis? Where Is That?
SIEM Challenges Today
Source: Gartner
![Page 9: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/9.jpg)
So we need a more powerful tool
Big Data
![Page 10: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/10.jpg)
Why Big Data ?
![Page 11: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/11.jpg)
Hadoop ecosystem
![Page 12: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/12.jpg)
Security analytics is the process of performing analysis on magnitudes of data, adding context to the information collected and then deriving answers and actionable knowledge
• Classification: Allows events to be grouped into like sets for context.• Correlation: Real-time & historical associations can be recognized, providing
context and relational understanding.• Clustering: Data point similarity detection across large collections provides a
straightforward, yet confident, way to derive true understanding of many events.• Affinity Grouping: Similar to clustering, but this can take the context of each data
point as it pertains to users, systems, attacks and their interactions. Provides excellent context between multiple, seemingly disparate, data points.
• Aggregation: Allows a high level view of large amounts of data, distilling often complex sets into simple numerical quantities, e.g. Did this bad event happen often enough in an hour to be of concern?
• Statistical Analysis: Provides methods for dealing with uncertainty within the data sets yielding a confidence for comprehension.
Security Analytics with Big Data
Source: HP
![Page 13: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/13.jpg)
• Behavior-based anomaly detection vs signature-based detection
Security Analytics with Big Data
![Page 14: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/14.jpg)
• Anomaly detection of user’s network resource access
Security Analytics with Big Data
![Page 15: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/15.jpg)
Build your own “next-gen” NSM?
![Page 16: NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức](https://reader031.vdocuments.mx/reader031/viewer/2022013107/547e6eb9b47959c0508b4b5b/html5/thumbnails/16.jpg)
Build your own “next-gen” NSM?