SlideShare ist ein Scribd-Unternehmen logo
1 von 47
Downloaden Sie, um offline zu lesen
OpenSOC 
The Open Security Operations Center 
 
for 
Analyzing 1.2 Million Network Packets per Second in 
Real Time 
James Sirota, 
Big Data Architect 
Cisco Security Solutions Practice 
jsirota@cisco.com 
Sheetal Dolas 
Principal Architect 
Hortonworks 
sheetal@hortonworks.com 
June 3, 2014
2 
Over Next Few Minutes 
§ Problem Statement  Business Case for OpenSOC 
§ Solution Architecture and Design 
§ Best Practices and Lessons Learned 
§ Q  A
3 
Business Case
“There's now a growing sense of fatalism: 
It's no longer if or when you get hacked, 
but the assumption is that you've already 
4 
been hacked, 
with a focus on minimizing the damage.” 
Source: Dark Reading / Security’s New 
Reality: Assume The Worst
5 
Breaches Happen in Hours… 
But Go Undetected for Months or Even Years 
Source: 2013 Data Breach Investigations Report 
Seconds 
Minutes 
Hours 
Days 
Weeks 
Months 
Years 
Initial Attack to Initial 
Compromise 
10% 
75% 
12% 
2% 
0% 
1% 
1% 
Initial Compromise to 
Data Exfiltration 
8% 
38% 
14% 
25% 
8% 
8% 
0% 
Initial Compromise to 
Discovery 
0% 
0% 
2% 
13% 
29% 
54% 
2% 
Discovery to 
Containment/ 
Restoration 
0% 
1% 
9% 
32% 
38% 
17% 
4% 
Timespan of events by percent of breaches 
In 60% of  
breaches, data  
is stolen in hours 
54% of breaches 
are not discovered for 
months
6 
Cisco Global Cloud Index 
Source: 2014 Cisco Global Cloud Index
7 
Introducing OpenSOC 
Intersection of Big Data and Security Analytics 
Scalable Compute 
Multi Petabyte Storage 
Interactive Query 
Real-Time Search 
Unstructured Data 
Scalable Stream Processing 
Data Access Control 
OpenSOC 
Real-Time Alerts 
Anomaly Detection 
Data Correlation 
Rules and Reports 
Predictive Modeling 
UI and Applications 
Big Data 
Platform 
Hadoop 
Elastic 
Search
8 
OpenSOC Journey 
Sept 2013 
First Prototype 
Dec 2013 
Hortonworks 
joins the 
project 
March 2014 
Platform 
development 
finished 
Sept 2014 
General 
Availability 
May 2014 
CR Work off 
April 2014 
First beta test 
at customer 
site
9 
Solution Architecture  
Design
10 
OpenSOC Conceptual Architecture 
Raw Network Stream 
Network Metadata 
Stream 
Netflow 
Syslog 
Raw Application Logs 
Other Streaming 
Telemetry 
Applications + Analyst Tools 
HBase Hive 
Raw Packet 
Store 
Long-Term 
Store 
Elastic Search 
Real-Time 
Index 
Network 
Packet Mining 
and PCAP 
Reconstruction 
Log Mining 
and Analytics 
Big Data 
Exploration, 
Predictive 
Modeling 
Threat Intelligence 
Parse + Format 
Enrich 
Alert 
Feeds 
Enrichment Data
11 
Key Functional Capabilities 
§ Raw Network Packet Capture, Store, Traffic Reconstruction 
§ Telemetry Ingest, Enrichment and Real-Time Rules-Based Alerts 
§ Real-Time Telemetry Search and Cross-Telemetry Matching 
§ Automated Reports, Anomaly Detection and Anomaly Alerts 
§ Rich Analytics Apps and Integration with Existing Analytics Tools
12 
The OpenSOC Advantage 
§ Fully-Backed by Cisco and Used Internally for Multiple 
Customers 
§ Free, Open Source and Apache Licensed 
§ Built on Highly-Scalable and Proven Platforms (Hadoop, Kafka, Storm) 
§ Extensible and Pluggable Design 
§ Flexible Deployment Model (On-Premise or Cloud) 
§ Centralize your processes, people and data
13 
OpenSOC Deployment at Cisco 
Hardware footprint (40u) 
§ 14 Data Nodes (UCS C240 M3) 
§ 3 Cluster Control Nodes (UCS C220 M3) 
§ 2 ESX Hypervisor Hosts (UCS C220 M3) 
§ 1 PCAP Processor (UCS C220 M3 + 
Napatech NIC) 
§ 2 SourceFire Threat alert processors 
§ 1 Anue Network Traffic splitter 
§ 1 Router 
§ 1 48 Port 10GE Switch 
Software Stack 
§ HDP 2.1 
§ Kafka 0.8 
§ Elastic Search 1.1 
§ MySQL 5.5
14 
OpenSOC - Stitching Things Together 
Source Systems 
Data Collection 
Messaging System 
Real Time Processing 
Storage 
Access 
Kafka 
Storm 
B Topic 
N Topic 
Elastic Search 
Index 
Web Services 
Search 
PCAP 
Reconstruction 
HBase 
PCAP Table 
Analytic 
Tools 
R / Python 
Power Pivot 
Tableau 
Hive 
Raw Data 
ORC 
Passive 
Tap 
PCAP Topic 
DPI Topic 
A Topic 
Telemetry 
Sources 
Syslog 
HTTP 
File System 
Other 
Flume 
Agent A 
Agent B 
Agent N 
A Topology 
B Topology 
N Topology 
PCAP 
Traffic 
Replicator 
PCAP Topology 
DPI Topology
15 
OpenSOC - Stitching Things Together 
Source Systems 
Data Collection 
Messaging System 
Real Time Processing 
Storage 
Access 
Kafka 
Storm 
B Topic 
N Topic 
Elastic Search 
Index 
Web Services 
Search 
PCAP 
Reconstruction 
HBase 
PCAP Table 
Analytic 
Tools 
R / Python 
Power Pivot 
Tableau 
Hive 
Raw Data 
ORC 
Passive 
Tap 
PCAP Topic 
DPI Topic 
A Topic 
Telemetry 
Sources 
Syslog 
HTTP 
File System 
Other 
Flume 
Agent A 
Agent B 
Agent N 
PCAP Topology 
DPI Topology 
A Topology 
B Topology 
N Topology 
PCAP 
Traffic 
Replicator 
Deeper 
Look
16 
PCAP Topology 
Real Time Processing 
Storage 
Storm 
Hive 
Raw Data 
ORC 
Elastic Search 
Index 
HBase 
PCAP Table 
Kafka 
Spout 
Parser 
Bolt 
HDFS 
Bolt 
ES 
Bolt 
HBase 
Bolt
17 
DPI Topology  Telemetry Enrichment 
Real Time Processing 
Storage 
Storm 
Hive 
Raw Data 
ORC 
Elastic Search 
Index 
HBase 
PCAP Table 
Kafka 
Spout 
Parser 
Bolt 
GEO 
Enrich 
Whois 
Enrich 
CIF 
Enrich 
HDFS 
Bolt 
ES 
Bolt
18 
Enrichments 
{! 
“msg_key1”: “msg value1”,! 
“src_ip”: “10.20.30.40”,! 
“dest_ip”: “20.30.40.50”,! 
“domain”: “mydomain.com”! 
}! 
Parser 
Bolt 
GEO 
Enrich 
RAW 
Message 
whois:[ {! 
OrgId:CISCOS,! 
Parent:NET-144-0-0-0-0,! 
OrgAbuseName:Cisco Systems Inc,! 
RegDate:1991-01-171991-01-17,! 
OrgName:Cisco Systems,! 
Address:170 West Tasman Drive,! 
NetType:Direct Assignment! 
} ],! 
“cif”:”Yes”! 
Who 
Is 
Enrich 
geo:[ {region:CA,! 
postalCode:95134,! 
areaCode:408,! 
metroCode:807,! 
longitude:-121.946,! 
latitude:37.425,! 
locId:4522,! 
city:San Jose,! 
country:US! 
}]! 
CIF 
Enrich 
Enriched 
Message 
Cache 
MySQL 
Geo Lite Data 
Cache 
HBase 
Who Is Data 
Cache 
HBase 
CIF Data
19 
Applications: Telemetry Matching and DPI 
Step1: Search 
Step2: Match 
Step3: Analyze 
Step4: Build PCAP
20 
Integration with Analytics Tools 
Dashboards 
Reports
21 
Best Practices  
and 
Lessons Learned
22 
Journey Towards Highly 
Scalable Application
23 
Kafka Tuning
24 
This is where we began
25 
Some code optimizations and increased parallelism
26 
Kafka Tuning 
§ Is Disk I/O heavy 
§ Kafka 0.8+ supports replication and JBOD 
§ Better performance compared to RAID 
§ Parallelism is largely driven by number of disks and partitions per topic 
§ Key configuration parameters: 
§ num.io.threads - Keep it at least equal to number of disks provided to Kafka 
§ num.network.threads - adjust it based on number of concurrent producers, 
consumers and replication factor
27 
After Kafka Tuning
28 
Bottleneck Isolation, Resource Profiling, Load 
Balancing
29 
HBase Tuning
30 
This is where we began
31 
Row Key Design 
§ Row Key design is critical (gets or scans or both?) 
§ Keys with IP Addresses 
§ Standard IP addresses have only two variations of the first character : 1  2 
§ Minimum key length will be 7 characters and max 15 with a typical average of 12 
§ Subnet range scans become difficult – range of 90 to 220 excludes 112 
§ IP converted to hex (10.20.30.40 = 0a141e28) 
§ gives 16 variations of first key character 
§ consistently 8 character key 
§ Easy to search for subnet ranges
32 
Experiments with Row Key
33 
Region Splits 
§ Know your data 
§ Auto split under high workload can result into hotspots and split storms 
§ Understand your data and presplit the regions 
§ Identify how many regions a RS can have to perform optimally. Use the formula 
below 
(RS memory)*(total memstore fraction)/((memstore size)*(# column families))!
34 
With Region Pre-Splits
35 
Know Your Application 
§ Enable Micro Batching (client side buffer) 
§ Smart shuffle/grouping in storm 
§ Understand your data and situationally exploit various WAL options 
§ Watch for many minor compactions 
§ For heavy ‘write’ workload Increase hbase.hstore.blockingStoreFiles (we 
used 200)
36 
And Finally
37 
Kafka Spout
38 
Kafka Spout 
§ Parallelism is controlled by number of partitions per topic 
§ Set Kafka spout parallelism equal to number of partitions in topic 
§ Other key parameters that drive performance 
§ fetchSizeBytes! 
§ bufferSizeBytes!
39 
Mysteriously Missing Data
40 
Mysteriously Missing Data Root Cause 
§ A bug in Kafka spout that used to miss out some partitions and 
loose data 
§ It is now fixed and available from Hortonworks repository ( 
http://repo.hortonworks.com/content/repositories/releases/org/apache/ 
storm/storm-Kafka )
41 
Storm
42 
Storm 
§ Every small thing counts at scale 
§ Even simple string operations can slowdown throughput when executed on 
millions of Tuples
43 
Storm 
§ Error handling is critical 
§ Poorly handled errors can lead to topology failure and eventually loss of 
data (or data duplication)
44 
Storm 
§ Tune  Scale individual spout and bolts before performance 
testing/tuning entire topology 
§ Write your own simple data generator spouts and no-op bolts 
§ Making as many things configurable as possible helps a lot
45 
Lessons Learned 
§ When it comes to Hadoop…partner up 
§ Separate the hype from the opportunity 
§ Start small then scale up 
§ Design Iteratively 
§ It doesn’t work unless you have proven it at scale 
§ Keep an eye on ROI
46 
Looking for Community Partners 
Cisco + Hortonworks + Community Support for OpenSOC 
How can you contribute? 
§ Technology Partner Program – contribute developers to join 
the Cisco and Hortonworks team
Thank you! 
We are hiring: 
jsirota@cisco.com 
sheetal@hortonworks.com

Weitere ähnliche Inhalte

Was ist angesagt?

Incident response-in-the-cloud
Incident response-in-the-cloudIncident response-in-the-cloud
Incident response-in-the-cloudPriyanka Aash
 
Apache metron meetup presentation at capital one
Apache metron meetup presentation at capital oneApache metron meetup presentation at capital one
Apache metron meetup presentation at capital onegvetticaden
 
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-days
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-daysHow Automated Vulnerability Analysis Discovered Hundreds of Android 0-days
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-daysPriyanka Aash
 
What's New in StealthWatch v6.5
What's New in StealthWatch v6.5 What's New in StealthWatch v6.5
What's New in StealthWatch v6.5 Lancope, Inc.
 
Insider Threat Visualization - HITB 2007, Kuala Lumpur
Insider Threat Visualization - HITB 2007, Kuala LumpurInsider Threat Visualization - HITB 2007, Kuala Lumpur
Insider Threat Visualization - HITB 2007, Kuala LumpurRaffael Marty
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information SecurityShannon Cuthbertson
 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber AnalyticsNovetta
 
Splunking configfiles 20211208_daniel_wilson
Splunking configfiles 20211208_daniel_wilsonSplunking configfiles 20211208_daniel_wilson
Splunking configfiles 20211208_daniel_wilsonBecky Burwell
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowLancope, Inc.
 
DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010Affan Basalamah
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkSqrrl
 
Parrot Drones Hijacking
Parrot Drones HijackingParrot Drones Hijacking
Parrot Drones HijackingPriyanka Aash
 
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk
 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinPriyanka Aash
 
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detectionThreat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detectionPriyanka Aash
 
Splunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk
 
Soc 2030-socs-are-broken-lets-fix- them
Soc 2030-socs-are-broken-lets-fix- themSoc 2030-socs-are-broken-lets-fix- them
Soc 2030-socs-are-broken-lets-fix- themPriyanka Aash
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsRod Soto
 

Was ist angesagt? (19)

Incident response-in-the-cloud
Incident response-in-the-cloudIncident response-in-the-cloud
Incident response-in-the-cloud
 
Apache metron meetup presentation at capital one
Apache metron meetup presentation at capital oneApache metron meetup presentation at capital one
Apache metron meetup presentation at capital one
 
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-days
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-daysHow Automated Vulnerability Analysis Discovered Hundreds of Android 0-days
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-days
 
What's New in StealthWatch v6.5
What's New in StealthWatch v6.5 What's New in StealthWatch v6.5
What's New in StealthWatch v6.5
 
Insider Threat Visualization - HITB 2007, Kuala Lumpur
Insider Threat Visualization - HITB 2007, Kuala LumpurInsider Threat Visualization - HITB 2007, Kuala Lumpur
Insider Threat Visualization - HITB 2007, Kuala Lumpur
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber Analytics
 
Splunking configfiles 20211208_daniel_wilson
Splunking configfiles 20211208_daniel_wilsonSplunking configfiles 20211208_daniel_wilson
Splunking configfiles 20211208_daniel_wilson
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
 
DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Parrot Drones Hijacking
Parrot Drones HijackingParrot Drones Hijacking
Parrot Drones Hijacking
 
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk Traffic
 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
 
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detectionThreat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detection
 
Splunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-On
 
Soc 2030-socs-are-broken-lets-fix- them
Soc 2030-socs-are-broken-lets-fix- themSoc 2030-socs-are-broken-lets-fix- them
Soc 2030-socs-are-broken-lets-fix- them
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
 

Andere mochten auch

Analyzing 1.2 Million Network Packets per Second in Real-time
Analyzing 1.2 Million Network Packets per Second in Real-timeAnalyzing 1.2 Million Network Packets per Second in Real-time
Analyzing 1.2 Million Network Packets per Second in Real-timeDataWorks Summit
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Design Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data AnalyticsDesign Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data AnalyticsDataWorks Summit
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
GISS2016_Getting Started
GISS2016_Getting StartedGISS2016_Getting Started
GISS2016_Getting StartedFran Viau
 
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...sandrahulvat
 
유전 알고리즘으로 패킷 필터링 규칙 만들기
유전 알고리즘으로 패킷 필터링 규칙 만들기유전 알고리즘으로 패킷 필터링 규칙 만들기
유전 알고리즘으로 패킷 필터링 규칙 만들기Hyunwoo Kim
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Apache Metron Meetup May 4, 2016 - Big data cybersecurity
Apache Metron Meetup May 4, 2016 - Big data cybersecurityApache Metron Meetup May 4, 2016 - Big data cybersecurity
Apache Metron Meetup May 4, 2016 - Big data cybersecurityHortonworks
 
Apache metron - An Introduction
Apache metron - An IntroductionApache metron - An Introduction
Apache metron - An IntroductionBaban Gaigole
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest Haydn Johnson
 
War on stealth cyber attacks phishing docusign apache metron
War on stealth cyber attacks phishing docusign apache metronWar on stealth cyber attacks phishing docusign apache metron
War on stealth cyber attacks phishing docusign apache metrongvetticaden
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOCSplunk
 
Hortonworks Data In Motion Webinar Series Pt. 2
Hortonworks Data In Motion Webinar Series Pt. 2Hortonworks Data In Motion Webinar Series Pt. 2
Hortonworks Data In Motion Webinar Series Pt. 2Hortonworks
 
Hortonworks Data in Motion Webinar Series - Part 1
Hortonworks Data in Motion Webinar Series - Part 1Hortonworks Data in Motion Webinar Series - Part 1
Hortonworks Data in Motion Webinar Series - Part 1Hortonworks
 
Design Patterns for Large-Scale Real-Time Learning
Design Patterns for Large-Scale Real-Time LearningDesign Patterns for Large-Scale Real-Time Learning
Design Patterns for Large-Scale Real-Time LearningSwiss Big Data User Group
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 

Andere mochten auch (20)

Analyzing 1.2 Million Network Packets per Second in Real-time
Analyzing 1.2 Million Network Packets per Second in Real-timeAnalyzing 1.2 Million Network Packets per Second in Real-time
Analyzing 1.2 Million Network Packets per Second in Real-time
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Design Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data AnalyticsDesign Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data Analytics
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Cisco OpenSOC
Cisco OpenSOCCisco OpenSOC
Cisco OpenSOC
 
GISS2016_Getting Started
GISS2016_Getting StartedGISS2016_Getting Started
GISS2016_Getting Started
 
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
 
유전 알고리즘으로 패킷 필터링 규칙 만들기
유전 알고리즘으로 패킷 필터링 규칙 만들기유전 알고리즘으로 패킷 필터링 규칙 만들기
유전 알고리즘으로 패킷 필터링 규칙 만들기
 
Tracing your security telemetry with Apache Metron
Tracing your security telemetry with Apache MetronTracing your security telemetry with Apache Metron
Tracing your security telemetry with Apache Metron
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Apache Metron Meetup May 4, 2016 - Big data cybersecurity
Apache Metron Meetup May 4, 2016 - Big data cybersecurityApache Metron Meetup May 4, 2016 - Big data cybersecurity
Apache Metron Meetup May 4, 2016 - Big data cybersecurity
 
Apache metron - An Introduction
Apache metron - An IntroductionApache metron - An Introduction
Apache metron - An Introduction
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
 
War on stealth cyber attacks phishing docusign apache metron
War on stealth cyber attacks phishing docusign apache metronWar on stealth cyber attacks phishing docusign apache metron
War on stealth cyber attacks phishing docusign apache metron
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOC
 
Hortonworks Data In Motion Webinar Series Pt. 2
Hortonworks Data In Motion Webinar Series Pt. 2Hortonworks Data In Motion Webinar Series Pt. 2
Hortonworks Data In Motion Webinar Series Pt. 2
 
Hortonworks Data in Motion Webinar Series - Part 1
Hortonworks Data in Motion Webinar Series - Part 1Hortonworks Data in Motion Webinar Series - Part 1
Hortonworks Data in Motion Webinar Series - Part 1
 
Design Patterns for Large-Scale Real-Time Learning
Design Patterns for Large-Scale Real-Time LearningDesign Patterns for Large-Scale Real-Time Learning
Design Patterns for Large-Scale Real-Time Learning
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 

Ähnlich wie Open Security Operations Center - OpenSOC

Spy hard, challenges of 100G deep packet inspection on x86 platform
Spy hard, challenges of 100G deep packet inspection on x86 platformSpy hard, challenges of 100G deep packet inspection on x86 platform
Spy hard, challenges of 100G deep packet inspection on x86 platformRedge Technologies
 
Tugdual Grall - Real World Use Cases: Hadoop and NoSQL in Production
Tugdual Grall - Real World Use Cases: Hadoop and NoSQL in ProductionTugdual Grall - Real World Use Cases: Hadoop and NoSQL in Production
Tugdual Grall - Real World Use Cases: Hadoop and NoSQL in ProductionCodemotion
 
Five Fabulous Sinks for Your Kafka Data. #3 will surprise you! (Rachel Pedres...
Five Fabulous Sinks for Your Kafka Data. #3 will surprise you! (Rachel Pedres...Five Fabulous Sinks for Your Kafka Data. #3 will surprise you! (Rachel Pedres...
Five Fabulous Sinks for Your Kafka Data. #3 will surprise you! (Rachel Pedres...confluent
 
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...confluent
 
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...confluent
 
Streaming Analytics with Spark, Kafka, Cassandra and Akka by Helena Edelson
Streaming Analytics with Spark, Kafka, Cassandra and Akka by Helena EdelsonStreaming Analytics with Spark, Kafka, Cassandra and Akka by Helena Edelson
Streaming Analytics with Spark, Kafka, Cassandra and Akka by Helena EdelsonSpark Summit
 
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietach
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietachPLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietach
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietachPROIDEA
 
Developing high frequency indicators using real time tick data on apache supe...
Developing high frequency indicators using real time tick data on apache supe...Developing high frequency indicators using real time tick data on apache supe...
Developing high frequency indicators using real time tick data on apache supe...Zekeriya Besiroglu
 
Smack Stack and Beyond—Building Fast Data Pipelines with Jorg Schad
Smack Stack and Beyond—Building Fast Data Pipelines with Jorg SchadSmack Stack and Beyond—Building Fast Data Pipelines with Jorg Schad
Smack Stack and Beyond—Building Fast Data Pipelines with Jorg SchadSpark Summit
 
Essential Data Engineering for Data Scientist
Essential Data Engineering for Data Scientist Essential Data Engineering for Data Scientist
Essential Data Engineering for Data Scientist SoftServe
 
Large-Scale Stream Processing in the Hadoop Ecosystem - Hadoop Summit 2016
Large-Scale Stream Processing in the Hadoop Ecosystem - Hadoop Summit 2016Large-Scale Stream Processing in the Hadoop Ecosystem - Hadoop Summit 2016
Large-Scale Stream Processing in the Hadoop Ecosystem - Hadoop Summit 2016Gyula Fóra
 
Large-Scale Stream Processing in the Hadoop Ecosystem
Large-Scale Stream Processing in the Hadoop Ecosystem Large-Scale Stream Processing in the Hadoop Ecosystem
Large-Scale Stream Processing in the Hadoop Ecosystem DataWorks Summit/Hadoop Summit
 
Workshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityRaffael Marty
 
Splunk app for stream
Splunk app for stream Splunk app for stream
Splunk app for stream csching
 
Realtime Detection of DDOS attacks using Apache Spark and MLLib
Realtime Detection of DDOS attacks using Apache Spark and MLLibRealtime Detection of DDOS attacks using Apache Spark and MLLib
Realtime Detection of DDOS attacks using Apache Spark and MLLibRyan Bosshart
 
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...Odinot Stanislas
 
SnappyData Toronto Meetup Nov 2017
SnappyData Toronto Meetup Nov 2017SnappyData Toronto Meetup Nov 2017
SnappyData Toronto Meetup Nov 2017SnappyData
 

Ähnlich wie Open Security Operations Center - OpenSOC (20)

Spy hard, challenges of 100G deep packet inspection on x86 platform
Spy hard, challenges of 100G deep packet inspection on x86 platformSpy hard, challenges of 100G deep packet inspection on x86 platform
Spy hard, challenges of 100G deep packet inspection on x86 platform
 
Tugdual Grall - Real World Use Cases: Hadoop and NoSQL in Production
Tugdual Grall - Real World Use Cases: Hadoop and NoSQL in ProductionTugdual Grall - Real World Use Cases: Hadoop and NoSQL in Production
Tugdual Grall - Real World Use Cases: Hadoop and NoSQL in Production
 
Five Fabulous Sinks for Your Kafka Data. #3 will surprise you! (Rachel Pedres...
Five Fabulous Sinks for Your Kafka Data. #3 will surprise you! (Rachel Pedres...Five Fabulous Sinks for Your Kafka Data. #3 will surprise you! (Rachel Pedres...
Five Fabulous Sinks for Your Kafka Data. #3 will surprise you! (Rachel Pedres...
 
Yahoo compares Storm and Spark
Yahoo compares Storm and SparkYahoo compares Storm and Spark
Yahoo compares Storm and Spark
 
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...
 
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...
 
Streaming Analytics with Spark, Kafka, Cassandra and Akka by Helena Edelson
Streaming Analytics with Spark, Kafka, Cassandra and Akka by Helena EdelsonStreaming Analytics with Spark, Kafka, Cassandra and Akka by Helena Edelson
Streaming Analytics with Spark, Kafka, Cassandra and Akka by Helena Edelson
 
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietach
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietachPLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietach
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietach
 
Developing high frequency indicators using real time tick data on apache supe...
Developing high frequency indicators using real time tick data on apache supe...Developing high frequency indicators using real time tick data on apache supe...
Developing high frequency indicators using real time tick data on apache supe...
 
Smack Stack and Beyond—Building Fast Data Pipelines with Jorg Schad
Smack Stack and Beyond—Building Fast Data Pipelines with Jorg SchadSmack Stack and Beyond—Building Fast Data Pipelines with Jorg Schad
Smack Stack and Beyond—Building Fast Data Pipelines with Jorg Schad
 
Essential Data Engineering for Data Scientist
Essential Data Engineering for Data Scientist Essential Data Engineering for Data Scientist
Essential Data Engineering for Data Scientist
 
Large-Scale Stream Processing in the Hadoop Ecosystem - Hadoop Summit 2016
Large-Scale Stream Processing in the Hadoop Ecosystem - Hadoop Summit 2016Large-Scale Stream Processing in the Hadoop Ecosystem - Hadoop Summit 2016
Large-Scale Stream Processing in the Hadoop Ecosystem - Hadoop Summit 2016
 
Large-Scale Stream Processing in the Hadoop Ecosystem
Large-Scale Stream Processing in the Hadoop Ecosystem Large-Scale Stream Processing in the Hadoop Ecosystem
Large-Scale Stream Processing in the Hadoop Ecosystem
 
Workshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for Security
 
Splunk app for stream
Splunk app for stream Splunk app for stream
Splunk app for stream
 
Kafka & Hadoop in Rakuten
Kafka & Hadoop in RakutenKafka & Hadoop in Rakuten
Kafka & Hadoop in Rakuten
 
Realtime Detection of DDOS attacks using Apache Spark and MLLib
Realtime Detection of DDOS attacks using Apache Spark and MLLibRealtime Detection of DDOS attacks using Apache Spark and MLLib
Realtime Detection of DDOS attacks using Apache Spark and MLLib
 
Ceph
CephCeph
Ceph
 
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
 
SnappyData Toronto Meetup Nov 2017
SnappyData Toronto Meetup Nov 2017SnappyData Toronto Meetup Nov 2017
SnappyData Toronto Meetup Nov 2017
 

Kürzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Open Security Operations Center - OpenSOC

  • 1. OpenSOC The Open Security Operations Center for Analyzing 1.2 Million Network Packets per Second in Real Time James Sirota, Big Data Architect Cisco Security Solutions Practice jsirota@cisco.com Sheetal Dolas Principal Architect Hortonworks sheetal@hortonworks.com June 3, 2014
  • 2. 2 Over Next Few Minutes § Problem Statement Business Case for OpenSOC § Solution Architecture and Design § Best Practices and Lessons Learned § Q A
  • 4. “There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption is that you've already 4 been hacked, with a focus on minimizing the damage.” Source: Dark Reading / Security’s New Reality: Assume The Worst
  • 5. 5 Breaches Happen in Hours… But Go Undetected for Months or Even Years Source: 2013 Data Breach Investigations Report Seconds Minutes Hours Days Weeks Months Years Initial Attack to Initial Compromise 10% 75% 12% 2% 0% 1% 1% Initial Compromise to Data Exfiltration 8% 38% 14% 25% 8% 8% 0% Initial Compromise to Discovery 0% 0% 2% 13% 29% 54% 2% Discovery to Containment/ Restoration 0% 1% 9% 32% 38% 17% 4% Timespan of events by percent of breaches In 60% of breaches, data is stolen in hours 54% of breaches are not discovered for months
  • 6. 6 Cisco Global Cloud Index Source: 2014 Cisco Global Cloud Index
  • 7. 7 Introducing OpenSOC Intersection of Big Data and Security Analytics Scalable Compute Multi Petabyte Storage Interactive Query Real-Time Search Unstructured Data Scalable Stream Processing Data Access Control OpenSOC Real-Time Alerts Anomaly Detection Data Correlation Rules and Reports Predictive Modeling UI and Applications Big Data Platform Hadoop Elastic Search
  • 8. 8 OpenSOC Journey Sept 2013 First Prototype Dec 2013 Hortonworks joins the project March 2014 Platform development finished Sept 2014 General Availability May 2014 CR Work off April 2014 First beta test at customer site
  • 10. 10 OpenSOC Conceptual Architecture Raw Network Stream Network Metadata Stream Netflow Syslog Raw Application Logs Other Streaming Telemetry Applications + Analyst Tools HBase Hive Raw Packet Store Long-Term Store Elastic Search Real-Time Index Network Packet Mining and PCAP Reconstruction Log Mining and Analytics Big Data Exploration, Predictive Modeling Threat Intelligence Parse + Format Enrich Alert Feeds Enrichment Data
  • 11. 11 Key Functional Capabilities § Raw Network Packet Capture, Store, Traffic Reconstruction § Telemetry Ingest, Enrichment and Real-Time Rules-Based Alerts § Real-Time Telemetry Search and Cross-Telemetry Matching § Automated Reports, Anomaly Detection and Anomaly Alerts § Rich Analytics Apps and Integration with Existing Analytics Tools
  • 12. 12 The OpenSOC Advantage § Fully-Backed by Cisco and Used Internally for Multiple Customers § Free, Open Source and Apache Licensed § Built on Highly-Scalable and Proven Platforms (Hadoop, Kafka, Storm) § Extensible and Pluggable Design § Flexible Deployment Model (On-Premise or Cloud) § Centralize your processes, people and data
  • 13. 13 OpenSOC Deployment at Cisco Hardware footprint (40u) § 14 Data Nodes (UCS C240 M3) § 3 Cluster Control Nodes (UCS C220 M3) § 2 ESX Hypervisor Hosts (UCS C220 M3) § 1 PCAP Processor (UCS C220 M3 + Napatech NIC) § 2 SourceFire Threat alert processors § 1 Anue Network Traffic splitter § 1 Router § 1 48 Port 10GE Switch Software Stack § HDP 2.1 § Kafka 0.8 § Elastic Search 1.1 § MySQL 5.5
  • 14. 14 OpenSOC - Stitching Things Together Source Systems Data Collection Messaging System Real Time Processing Storage Access Kafka Storm B Topic N Topic Elastic Search Index Web Services Search PCAP Reconstruction HBase PCAP Table Analytic Tools R / Python Power Pivot Tableau Hive Raw Data ORC Passive Tap PCAP Topic DPI Topic A Topic Telemetry Sources Syslog HTTP File System Other Flume Agent A Agent B Agent N A Topology B Topology N Topology PCAP Traffic Replicator PCAP Topology DPI Topology
  • 15. 15 OpenSOC - Stitching Things Together Source Systems Data Collection Messaging System Real Time Processing Storage Access Kafka Storm B Topic N Topic Elastic Search Index Web Services Search PCAP Reconstruction HBase PCAP Table Analytic Tools R / Python Power Pivot Tableau Hive Raw Data ORC Passive Tap PCAP Topic DPI Topic A Topic Telemetry Sources Syslog HTTP File System Other Flume Agent A Agent B Agent N PCAP Topology DPI Topology A Topology B Topology N Topology PCAP Traffic Replicator Deeper Look
  • 16. 16 PCAP Topology Real Time Processing Storage Storm Hive Raw Data ORC Elastic Search Index HBase PCAP Table Kafka Spout Parser Bolt HDFS Bolt ES Bolt HBase Bolt
  • 17. 17 DPI Topology Telemetry Enrichment Real Time Processing Storage Storm Hive Raw Data ORC Elastic Search Index HBase PCAP Table Kafka Spout Parser Bolt GEO Enrich Whois Enrich CIF Enrich HDFS Bolt ES Bolt
  • 18. 18 Enrichments {! “msg_key1”: “msg value1”,! “src_ip”: “10.20.30.40”,! “dest_ip”: “20.30.40.50”,! “domain”: “mydomain.com”! }! Parser Bolt GEO Enrich RAW Message whois:[ {! OrgId:CISCOS,! Parent:NET-144-0-0-0-0,! OrgAbuseName:Cisco Systems Inc,! RegDate:1991-01-171991-01-17,! OrgName:Cisco Systems,! Address:170 West Tasman Drive,! NetType:Direct Assignment! } ],! “cif”:”Yes”! Who Is Enrich geo:[ {region:CA,! postalCode:95134,! areaCode:408,! metroCode:807,! longitude:-121.946,! latitude:37.425,! locId:4522,! city:San Jose,! country:US! }]! CIF Enrich Enriched Message Cache MySQL Geo Lite Data Cache HBase Who Is Data Cache HBase CIF Data
  • 19. 19 Applications: Telemetry Matching and DPI Step1: Search Step2: Match Step3: Analyze Step4: Build PCAP
  • 20. 20 Integration with Analytics Tools Dashboards Reports
  • 21. 21 Best Practices and Lessons Learned
  • 22. 22 Journey Towards Highly Scalable Application
  • 24. 24 This is where we began
  • 25. 25 Some code optimizations and increased parallelism
  • 26. 26 Kafka Tuning § Is Disk I/O heavy § Kafka 0.8+ supports replication and JBOD § Better performance compared to RAID § Parallelism is largely driven by number of disks and partitions per topic § Key configuration parameters: § num.io.threads - Keep it at least equal to number of disks provided to Kafka § num.network.threads - adjust it based on number of concurrent producers, consumers and replication factor
  • 27. 27 After Kafka Tuning
  • 28. 28 Bottleneck Isolation, Resource Profiling, Load Balancing
  • 30. 30 This is where we began
  • 31. 31 Row Key Design § Row Key design is critical (gets or scans or both?) § Keys with IP Addresses § Standard IP addresses have only two variations of the first character : 1 2 § Minimum key length will be 7 characters and max 15 with a typical average of 12 § Subnet range scans become difficult – range of 90 to 220 excludes 112 § IP converted to hex (10.20.30.40 = 0a141e28) § gives 16 variations of first key character § consistently 8 character key § Easy to search for subnet ranges
  • 33. 33 Region Splits § Know your data § Auto split under high workload can result into hotspots and split storms § Understand your data and presplit the regions § Identify how many regions a RS can have to perform optimally. Use the formula below (RS memory)*(total memstore fraction)/((memstore size)*(# column families))!
  • 34. 34 With Region Pre-Splits
  • 35. 35 Know Your Application § Enable Micro Batching (client side buffer) § Smart shuffle/grouping in storm § Understand your data and situationally exploit various WAL options § Watch for many minor compactions § For heavy ‘write’ workload Increase hbase.hstore.blockingStoreFiles (we used 200)
  • 38. 38 Kafka Spout § Parallelism is controlled by number of partitions per topic § Set Kafka spout parallelism equal to number of partitions in topic § Other key parameters that drive performance § fetchSizeBytes! § bufferSizeBytes!
  • 40. 40 Mysteriously Missing Data Root Cause § A bug in Kafka spout that used to miss out some partitions and loose data § It is now fixed and available from Hortonworks repository ( http://repo.hortonworks.com/content/repositories/releases/org/apache/ storm/storm-Kafka )
  • 42. 42 Storm § Every small thing counts at scale § Even simple string operations can slowdown throughput when executed on millions of Tuples
  • 43. 43 Storm § Error handling is critical § Poorly handled errors can lead to topology failure and eventually loss of data (or data duplication)
  • 44. 44 Storm § Tune Scale individual spout and bolts before performance testing/tuning entire topology § Write your own simple data generator spouts and no-op bolts § Making as many things configurable as possible helps a lot
  • 45. 45 Lessons Learned § When it comes to Hadoop…partner up § Separate the hype from the opportunity § Start small then scale up § Design Iteratively § It doesn’t work unless you have proven it at scale § Keep an eye on ROI
  • 46. 46 Looking for Community Partners Cisco + Hortonworks + Community Support for OpenSOC How can you contribute? § Technology Partner Program – contribute developers to join the Cisco and Hortonworks team
  • 47. Thank you! We are hiring: jsirota@cisco.com sheetal@hortonworks.com