SlideShare ist ein Scribd-Unternehmen logo
1 von 47
TOTEM: Threat Observation, Tracking, and Evaluation Model John J. Gerber CISSP, GCFA, GCIH, GISP, GSNA   “ A totem is any supposed entity that watches over or assists a group of people, such as a family, clan, or tribe .” -- Merriam-Webster
TOTEM : Basic Idea ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is TOTEM? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Totemism  :  system of belief in which humans are said to have kinship or a mystical relationship with a spirit-being, such as an animal or plant. The entity, or totem, is thought to interact with a given kin group or an individual and to serve as their emblem or symbol.” --   Encyclopædia Britannica
Who Are You Guys? We are like dwarfs standing upon the shoulders of giants, and so able to see more and see farther than the ancients .  –  Bernard of Chartres     Setting an example is not the main means of influencing another, it is the only means.   –   Albert Einstein    
“ Danger ,  Will Robinson !” According to a May 6th  Wall Street Journal article , the Pentagon confirmed that it detected 360 million attempts to penetrate its networks in 2008, which is up from six million in 2006.     The Department of Defense also disclosed that it had spent $100 million in the past six months repairing damage from these cyber attacks.
“ Danger ,  Will Robinson !” (04/09/2009)   Electricity Grid in U.S. Penetrated By Spies  reported in  The Wall Street Journal .  Under the Bush administration, Congress approved  $17 billion  in secret funds to protect government networks. (05/09/2009)   FAA's Web Security Audit: 3,857 Vulnerabilities  security audit of the Web applications found 763 high risk, 504 medium risk, and 2,590 low risk vulnerabilities.  (04/21/2009)  Computer Spies Breach Fighter-Jet Project   reported in  The Wall Street Journal . Cyber spies have stolen  tens of terabytes  of design data on the US's most expensive costliest weapons system -- the $300 billion Joint Strike Fighter project. (05/2009)  Inspector General report sent to the FAA  - Last year, hackers took control of FAA  critical network servers  and could have shut them down, which would have seriously disrupted the agency's mission-support network. (05/20/2009)  NARA suffers data breach  reported in  Federal Computer Week  - the missing drive contains  1T of data  with "more than 100,000 Social Security numbers (including Al Gore’s daughter), contact information (including addresses) for various Clinton administration officials, Secret Service and White House operating procedures, event logs, social gathering logs, political records and other highly sensitive information.  A Few Other Recent Government Occurrences
It is a Dangerous World “ IDSs have  failed  to provide value relative to its costs and will be obsolete by 2005.”  --  Richard  Stiennon , Gartner Analyst, 06/03 http://taosecurity.blogspot.com
It is a Dangerous World "The worldwide wireless LAN (WLAN) intrusion prevention system (IPS) market is on pace to reach $168 million in 2008, a  41 percent   increase  from 2007 revenue of $119 million, according to Gartner, Inc." -- Gartner Press Release, 09/18/2008 http://taosecurity.blogspot.com
Detection ,[object Object],[object Object],[object Object],[object Object]
ANL Federated IDS Data Sharing Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ANL Federated IDS Data Sharing Model (2)
ANL Federated IDS Data Sharing Model (3)
ANL Federated IDS Data Sharing Model (4)
Violent Felons in Large Urban Counties A majority (56%) of violent felons had a prior conviction record. Thirty-eight percent had a prior felony conviction and 15% had a previous conviction for a violent felony.
The More Sources the Better? ,[object Object],[object Object],[object Object]
Cooperative Protection Program (CPP) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trust Management ,[object Object],[object Object],[object Object],[object Object]
Trust and Reputation Modeling Techniques ,[object Object],[object Object],[object Object],[object Object]
Dilbert and Albert Einstein
CAMNEP: System Architecture System developed by Martin Rehak.
CAMNEP: System Architecture System developed by Martin Rehak. ,[object Object],[object Object],[object Object],[object Object]
CAMNEP: Multi-Source Trustfulness Integration
CAMNEP: Agent Specific Clusters
CAMNEP: Reporting
CAMNEP: Conclusions
Risk NIST publication  SP 800-30:  Risk Management Guide for Information Technology Systems . In the text we read: " Risk  is a function of the likelihood of a given  threat-source 's exercising a particular potential  vulnerability , and the resulting impact of that adverse event on the organization. To determine the likelihood of a future adverse event, threats to an IT system must be analyzed in conjunction with the potential vulnerabilities and the controls in place for the IT system.“ " Vulnerability : A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system's security policy."
Topological Vulnerability Analysis (TVA) Approach Steven Noel, Matthew Elder, Sushil Jajodia, Pramod Kalapa, Scott O'Hare, Kenneth Prole Basic idea : analyze and visualize vulnerability dependencies and attack paths for understanding overall security posture. Populate through automated network discovery, asset management, and vulnerability reporting technology.
Operating with Limited Data Seeing the forest through the trees.
Creating TOTEM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TOTEM: What is the Point? How does one effectively distinguish false positives from actual threats? The answer may only be visible by looking at multiple sources with different levels of trust and doing a little aggregation and anomaly detection.  Our goal is to create attack road maps with weights/prioritizations in order to manage the possible risks.
TOTEM Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating TOTEM: Federated Model   The devil is in the details ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Shared by the Federated IDS Data Sharing Model   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Blacklists Provide Information # watchlist.security.org.my, contact mel@hackinthebox.org # ip/net, source, comment, name, last update (GMT+8) 202.99.11.99, http://www.dshield.org/ipsascii.html, Dshield: Top IPs, dshield-top-ips, 2009/05/13 95.215.76.0/22, www.spamhaus.org/drop/drop.lasso, Spamhaus Block List, spamhaus, 2009/05/13 114.80.67.30, www.emergingthreats.net/rules/bleeding-rbn.rules, ET RBN, rbn, 2009/05/13  122.1.21.148, www.emergingthreats.net/rules/bleeding-compromised.rules, ET, compromised, # domain type original_reference-why_it_was_listed note--pound sign=comment # notice notice duplication is not permitted 00.devoid.us malware  www.cyber-ta.org/malware-analysis/DNS.Cumulative.Summary  20090321 scan4lux.info fake_antivirus www.malwaredomainlist.com/update.php 20090505 junglemix.in phishing isc.sans.org/diary.html?storyid=6328 20090505 Wed May 13 07:59:03 CDT 2009 99.254.50.139 99.248.26.177 99.245.29.38 99.234.219.183
Other Blacklists Provide Information (2) Top 10 Blacklist Providers Using 266 IPs from malware. Using 235 IPs from rbn. Using 172 IPs from coolwebsearch and spamhaus. Using 55 IPs from rogue. Using 23 IPs from malspam. Using 20 IPs from dshield-top-blocks. Using 15 IPs from exploit and sql_injection. Using 13 IPs from spyware and trojan. Using 11 IPs from rogue_antivirus. Using 10 IPs from botnet. Total Blacklisted IPs Downloaded : 1214 Blacklisted IPs Added Today : 39
Sample Reports: Blacklist ,[object Object],[object Object],[object Object]
Sample Reports: Blacklist (2)
Signature Based Information Can be Useful In respect to Snort, we have been looking at trend information for awhile.
Sample Reports: Blacklist (3)
Sample Reports: Shuns ,[object Object],[object Object]
Sample Reports: Shuns (2)
Sample Reports: Shuns (3)
Sample Reports: Shuns (4)
There is a great deal of work yet to be done.  Some key areas to develop will be: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Comments ,[object Object],[object Object],[object Object]
Comments ,[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Know Your Enemy: Verizon Data Breach Report
Know Your Enemy: Verizon Data Breach ReportKnow Your Enemy: Verizon Data Breach Report
Know Your Enemy: Verizon Data Breach Reportbmonday
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...EMC
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in aiSrajalTiwari1
 
AJS 524 Enhance teaching - tutorialrank.com
AJS 524  Enhance teaching - tutorialrank.comAJS 524  Enhance teaching - tutorialrank.com
AJS 524 Enhance teaching - tutorialrank.comLeoTolstoy17
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical HackingIRJET Journal
 
AJS 524 Effective Communication/tutorialrank.com
 AJS 524 Effective Communication/tutorialrank.com AJS 524 Effective Communication/tutorialrank.com
AJS 524 Effective Communication/tutorialrank.comjonhson250
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicSarah Chandley
 
Cybercrime & global mapping
Cybercrime & global mappingCybercrime & global mapping
Cybercrime & global mappingFred Zimmerman
 
Malware analysis on android using supervised machine learning techniques
Malware analysis on android using supervised machine learning techniquesMalware analysis on android using supervised machine learning techniques
Malware analysis on android using supervised machine learning techniquesMd. Shohel Rana
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detectionijsrd.com
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber securityKhaled Al-Khalili
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security AwarenessDigit Oktavianto
 
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed ZuberMachine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed ZuberOWASP Delhi
 
Malware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesMalware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesArshadRaja786
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI JoAnna Cheshire
 
2010 report data security survey
2010 report  data security survey2010 report  data security survey
2010 report data security surveyCarlo Del Bo
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersInfosec
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)Pukhraj Singh
 
Making Trust Relationship For Peer To Peer System With Secure Protocol
Making Trust Relationship For Peer To Peer System With Secure  ProtocolMaking Trust Relationship For Peer To Peer System With Secure  Protocol
Making Trust Relationship For Peer To Peer System With Secure ProtocolIJMER
 

Was ist angesagt? (20)

Know Your Enemy: Verizon Data Breach Report
Know Your Enemy: Verizon Data Breach ReportKnow Your Enemy: Verizon Data Breach Report
Know Your Enemy: Verizon Data Breach Report
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
AJS 524 Enhance teaching - tutorialrank.com
AJS 524  Enhance teaching - tutorialrank.comAJS 524  Enhance teaching - tutorialrank.com
AJS 524 Enhance teaching - tutorialrank.com
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical Hacking
 
AJS 524 Effective Communication/tutorialrank.com
 AJS 524 Effective Communication/tutorialrank.com AJS 524 Effective Communication/tutorialrank.com
AJS 524 Effective Communication/tutorialrank.com
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
 
Cybercrime & global mapping
Cybercrime & global mappingCybercrime & global mapping
Cybercrime & global mapping
 
Malware analysis on android using supervised machine learning techniques
Malware analysis on android using supervised machine learning techniquesMalware analysis on android using supervised machine learning techniques
Malware analysis on android using supervised machine learning techniques
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
 
A0430104
A0430104A0430104
A0430104
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security Awareness
 
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed ZuberMachine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
 
Malware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesMalware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning Techniques
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI
 
2010 report data security survey
2010 report  data security survey2010 report  data security survey
2010 report data security survey
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
Making Trust Relationship For Peer To Peer System With Secure Protocol
Making Trust Relationship For Peer To Peer System With Secure  ProtocolMaking Trust Relationship For Peer To Peer System With Secure  Protocol
Making Trust Relationship For Peer To Peer System With Secure Protocol
 

Andere mochten auch

Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterpriseRafal Los
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsThreatConnect
 
Commodity malware means YOU
Commodity malware means YOUCommodity malware means YOU
Commodity malware means YOUMichael Gough
 
Contributing to the WordPress Codex
Contributing to the WordPress CodexContributing to the WordPress Codex
Contributing to the WordPress CodexLorelle VanFossen
 
放下
放下放下
放下nonnon
 
Spring 3 - Der dritte Frühling
Spring 3 - Der dritte FrühlingSpring 3 - Der dritte Frühling
Spring 3 - Der dritte FrühlingThorsten Kamann
 
Михаил Александров. Индуктивное моделирование.
Михаил Александров. Индуктивное моделирование.Михаил Александров. Индуктивное моделирование.
Михаил Александров. Индуктивное моделирование.Lidia Pivovarova
 
Web 2.0 for Financial Institutions
Web 2.0 for Financial InstitutionsWeb 2.0 for Financial Institutions
Web 2.0 for Financial InstitutionsEmprende Futuro
 
Quality Movie Ppt Version Sample
Quality Movie Ppt Version SampleQuality Movie Ppt Version Sample
Quality Movie Ppt Version SampleAndrew Schwartz
 
Implementing Strategy: Roadmaps to Releases
Implementing Strategy: Roadmaps to ReleasesImplementing Strategy: Roadmaps to Releases
Implementing Strategy: Roadmaps to ReleasesJon Gatrell
 
Aviaq P
Aviaq PAviaq P
Aviaq Peka
 
Letters from the open source trenches - Postgres community
Letters from the open source trenches - Postgres communityLetters from the open source trenches - Postgres community
Letters from the open source trenches - Postgres communitySelena Deckelmann
 
2009 Secure File Transfer Research
2009 Secure File Transfer Research2009 Secure File Transfer Research
2009 Secure File Transfer ResearchJon Gatrell
 
Breizh camp adobe flex et les mobiles
Breizh camp   adobe flex et les mobilesBreizh camp   adobe flex et les mobiles
Breizh camp adobe flex et les mobilesMichael Chaize
 
Text Pattern Formation For Information Extraction
Text Pattern Formation For Information ExtractionText Pattern Formation For Information Extraction
Text Pattern Formation For Information ExtractionLidia Pivovarova
 

Andere mochten auch (20)

Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterprise
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent Actors
 
Commodity malware means YOU
Commodity malware means YOUCommodity malware means YOU
Commodity malware means YOU
 
Contributing to the WordPress Codex
Contributing to the WordPress CodexContributing to the WordPress Codex
Contributing to the WordPress Codex
 
放下
放下放下
放下
 
Spring 3 - Der dritte Frühling
Spring 3 - Der dritte FrühlingSpring 3 - Der dritte Frühling
Spring 3 - Der dritte Frühling
 
Михаил Александров. Индуктивное моделирование.
Михаил Александров. Индуктивное моделирование.Михаил Александров. Индуктивное моделирование.
Михаил Александров. Индуктивное моделирование.
 
Web 2.0 for Financial Institutions
Web 2.0 for Financial InstitutionsWeb 2.0 for Financial Institutions
Web 2.0 for Financial Institutions
 
Teletreball
TeletreballTeletreball
Teletreball
 
4. open innov lifecycle
4. open innov lifecycle4. open innov lifecycle
4. open innov lifecycle
 
Quality Movie Ppt Version Sample
Quality Movie Ppt Version SampleQuality Movie Ppt Version Sample
Quality Movie Ppt Version Sample
 
Implementing Strategy: Roadmaps to Releases
Implementing Strategy: Roadmaps to ReleasesImplementing Strategy: Roadmaps to Releases
Implementing Strategy: Roadmaps to Releases
 
Aviaq P
Aviaq PAviaq P
Aviaq P
 
Letters from the open source trenches - Postgres community
Letters from the open source trenches - Postgres communityLetters from the open source trenches - Postgres community
Letters from the open source trenches - Postgres community
 
Boyarsky
BoyarskyBoyarsky
Boyarsky
 
2009 Secure File Transfer Research
2009 Secure File Transfer Research2009 Secure File Transfer Research
2009 Secure File Transfer Research
 
Breizh camp adobe flex et les mobiles
Breizh camp   adobe flex et les mobilesBreizh camp   adobe flex et les mobiles
Breizh camp adobe flex et les mobiles
 
Claude11
Claude11Claude11
Claude11
 
Italy Powepoint Country
Italy Powepoint CountryItaly Powepoint Country
Italy Powepoint Country
 
Text Pattern Formation For Information Extraction
Text Pattern Formation For Information ExtractionText Pattern Formation For Information Extraction
Text Pattern Formation For Information Extraction
 

Ähnlich wie TOTEM: Threat Observation, Tracking, and Evaluation Model

Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Enhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerEnhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerAmit Sheth
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecuritySaqib Chaudhry
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64Chema Alonso
 
Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docxrosemariebrayshaw
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligenceabhisheksinghcs
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2Shane Kite
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docxSUBHI7
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speedSreejith.D. Menon
 
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONSTATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONIJNSA Journal
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through CorrelationAnton Chuvakin
 
A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...csandit
 
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...cscpconf
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewdr_edw777
 
Cyber Security Models - CxT Group
Cyber Security Models - CxT GroupCyber Security Models - CxT Group
Cyber Security Models - CxT GroupCXT Group
 

Ähnlich wie TOTEM: Threat Observation, Tracking, and Evaluation Model (20)

Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Enhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerEnhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft Power
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docx
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligence
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speed
 
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONSTATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
 
C3602021025
C3602021025C3602021025
C3602021025
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through Correlation
 
A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...
 
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Cyber Security Models - CxT Group
Cyber Security Models - CxT GroupCyber Security Models - CxT Group
Cyber Security Models - CxT Group
 

Kürzlich hochgeladen

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

TOTEM: Threat Observation, Tracking, and Evaluation Model

  • 1. TOTEM: Threat Observation, Tracking, and Evaluation Model John J. Gerber CISSP, GCFA, GCIH, GISP, GSNA “ A totem is any supposed entity that watches over or assists a group of people, such as a family, clan, or tribe .” -- Merriam-Webster
  • 2.
  • 3.
  • 4. Who Are You Guys? We are like dwarfs standing upon the shoulders of giants, and so able to see more and see farther than the ancients .  – Bernard of Chartres     Setting an example is not the main means of influencing another, it is the only means. –  Albert Einstein    
  • 5. “ Danger , Will Robinson !” According to a May 6th Wall Street Journal article , the Pentagon confirmed that it detected 360 million attempts to penetrate its networks in 2008, which is up from six million in 2006.     The Department of Defense also disclosed that it had spent $100 million in the past six months repairing damage from these cyber attacks.
  • 6. “ Danger , Will Robinson !” (04/09/2009) Electricity Grid in U.S. Penetrated By Spies reported in The Wall Street Journal . Under the Bush administration, Congress approved $17 billion in secret funds to protect government networks. (05/09/2009) FAA's Web Security Audit: 3,857 Vulnerabilities security audit of the Web applications found 763 high risk, 504 medium risk, and 2,590 low risk vulnerabilities.  (04/21/2009) Computer Spies Breach Fighter-Jet Project reported in The Wall Street Journal . Cyber spies have stolen tens of terabytes of design data on the US's most expensive costliest weapons system -- the $300 billion Joint Strike Fighter project. (05/2009) Inspector General report sent to the FAA - Last year, hackers took control of FAA critical network servers and could have shut them down, which would have seriously disrupted the agency's mission-support network. (05/20/2009) NARA suffers data breach reported in Federal Computer Week - the missing drive contains 1T of data with "more than 100,000 Social Security numbers (including Al Gore’s daughter), contact information (including addresses) for various Clinton administration officials, Secret Service and White House operating procedures, event logs, social gathering logs, political records and other highly sensitive information. A Few Other Recent Government Occurrences
  • 7. It is a Dangerous World “ IDSs have failed to provide value relative to its costs and will be obsolete by 2005.”  -- Richard Stiennon , Gartner Analyst, 06/03 http://taosecurity.blogspot.com
  • 8. It is a Dangerous World "The worldwide wireless LAN (WLAN) intrusion prevention system (IPS) market is on pace to reach $168 million in 2008, a 41 percent increase from 2007 revenue of $119 million, according to Gartner, Inc." -- Gartner Press Release, 09/18/2008 http://taosecurity.blogspot.com
  • 9.
  • 10.
  • 11. ANL Federated IDS Data Sharing Model (2)
  • 12. ANL Federated IDS Data Sharing Model (3)
  • 13. ANL Federated IDS Data Sharing Model (4)
  • 14. Violent Felons in Large Urban Counties A majority (56%) of violent felons had a prior conviction record. Thirty-eight percent had a prior felony conviction and 15% had a previous conviction for a violent felony.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Dilbert and Albert Einstein
  • 21. CAMNEP: System Architecture System developed by Martin Rehak.
  • 22.
  • 27. Risk NIST publication SP 800-30: Risk Management Guide for Information Technology Systems . In the text we read: " Risk is a function of the likelihood of a given threat-source 's exercising a particular potential vulnerability , and the resulting impact of that adverse event on the organization. To determine the likelihood of a future adverse event, threats to an IT system must be analyzed in conjunction with the potential vulnerabilities and the controls in place for the IT system.“ " Vulnerability : A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system's security policy."
  • 28. Topological Vulnerability Analysis (TVA) Approach Steven Noel, Matthew Elder, Sushil Jajodia, Pramod Kalapa, Scott O'Hare, Kenneth Prole Basic idea : analyze and visualize vulnerability dependencies and attack paths for understanding overall security posture. Populate through automated network discovery, asset management, and vulnerability reporting technology.
  • 29. Operating with Limited Data Seeing the forest through the trees.
  • 30.
  • 31. TOTEM: What is the Point? How does one effectively distinguish false positives from actual threats? The answer may only be visible by looking at multiple sources with different levels of trust and doing a little aggregation and anomaly detection.  Our goal is to create attack road maps with weights/prioritizations in order to manage the possible risks.
  • 32.
  • 33.
  • 34.
  • 35. Other Blacklists Provide Information # watchlist.security.org.my, contact mel@hackinthebox.org # ip/net, source, comment, name, last update (GMT+8) 202.99.11.99, http://www.dshield.org/ipsascii.html, Dshield: Top IPs, dshield-top-ips, 2009/05/13 95.215.76.0/22, www.spamhaus.org/drop/drop.lasso, Spamhaus Block List, spamhaus, 2009/05/13 114.80.67.30, www.emergingthreats.net/rules/bleeding-rbn.rules, ET RBN, rbn, 2009/05/13  122.1.21.148, www.emergingthreats.net/rules/bleeding-compromised.rules, ET, compromised, # domain type original_reference-why_it_was_listed note--pound sign=comment # notice notice duplication is not permitted 00.devoid.us malware www.cyber-ta.org/malware-analysis/DNS.Cumulative.Summary 20090321 scan4lux.info fake_antivirus www.malwaredomainlist.com/update.php 20090505 junglemix.in phishing isc.sans.org/diary.html?storyid=6328 20090505 Wed May 13 07:59:03 CDT 2009 99.254.50.139 99.248.26.177 99.245.29.38 99.234.219.183
  • 36. Other Blacklists Provide Information (2) Top 10 Blacklist Providers Using 266 IPs from malware. Using 235 IPs from rbn. Using 172 IPs from coolwebsearch and spamhaus. Using 55 IPs from rogue. Using 23 IPs from malspam. Using 20 IPs from dshield-top-blocks. Using 15 IPs from exploit and sql_injection. Using 13 IPs from spyware and trojan. Using 11 IPs from rogue_antivirus. Using 10 IPs from botnet. Total Blacklisted IPs Downloaded : 1214 Blacklisted IPs Added Today : 39
  • 37.
  • 39. Signature Based Information Can be Useful In respect to Snort, we have been looking at trend information for awhile.
  • 41.
  • 45.
  • 46.
  • 47.

Hinweis der Redaktion

  1. What is in a name? Entity that watches over = OS Totem Pole = OpenBSD (original): http://freebsd-image-gallery.netcode.pl/_bsd-daemon/BSD-newhead.jpg OpenBSD: Puffy as Tron: http://www.openbsd.org/images/tshirt-31.jpg Apple Mac OS X finder: http://images.apple.com/macosx/features/images/sidenav_finder_20071016.png FreeBSD: http://logo-contest.freebsd.org/result/ Tux: Dark Templar by Neohin: http://tux.crystalxp.net/en.id.6952-neoshin-dark-templar.html Windows Security: http://windowshelp.microsoft.com/Windows/en-AU/security.mspx