SlideShare ist ein Scribd-Unternehmen logo
1 von 22
ENRICH. ENABLE. #ISC2Summits
Botprobe - Reducing Network
Threat Intelligence Big Data
adrian.winckles@anglia.ac.uk
2
project background
PhD: “a botnet needle in a virtual haystack”
- a mechanism to capture botnet communication traffic in
virtualised environments such as Cloud Service Providers.
why?
•cloud providers are building block for IoT
•a great hosting platform for botnets
interesting built environment:
•tenant isolation, data privacy
•internal infrastructure is an attack surface
2
3
packet capture
3
vSwitch
x
CORE
SWITCH
CORE
SWITCH
EDGE
SWITCH
EDGE
SWITCH
if you want to capture network
traffic for threat detection:
use wireshark
4
packet capture
4
CORE
SWITCH
CORE
SWITCH
EDGE
SWITCH
EDGE
SWITCH
A B
Third Party
Capture Probe
RSPAN
VLAN
EDGE
SWITCH
C
Third
Party
Managed
SOC
5
packet capture
Three drawbacks in this
scenario:
1) port mirroring doubles
network bandwidth volumes
2) assumes the monitored
devices support mirroring
3) big fat pipe to send
traffic to a 3rd
party SOC
5CORE
SWITCH
CORE
SWITCH
EDGE
SWITCH
EDGE
SWITCH
A B
Third Party
Capture Probe
RSPAN
VLAN
EDGE
SWITCH
C
Third
Party
Managed
SOC
6
history lesson
1980’s
Simple Network Management Protocol (SNMP)
• MIB information is limited, so use syslog
• Syslog is unstructured
1990’s
• 1991 – IETF proposed packet aggregation into flows
• 1993 – Disbanded due to lack of interest
• 1996 – Cisco patented NetFlow
• continued…
6
7
history lesson
1996 – Cisco patented NetFlow
flow aggregates similar traffic based on an attributes tuple:
e.g. 5 field flow tuple: { sIP, dIP, sPort, dPort, protocol }
PCAP is a phone call
flow is the phone bill (who, when, how long)
7
8
flow export architecture
8
Network
Packets
Probe Collector Storage Analysis
NetFlow /
IPFIX
Aggregated
Flow
DBMS
Query
9
history lesson
1996 – Cisco patented NetFlow
2002 – NetFlow v5
2004 – NetFlow v9
NetFlow was designed for application to network management,
but has limitations when applied to threat detection:
•NFv5 has 18 fixed fields (only 10 useful!)
•header information ONLY
•transport layer is UDP only
•no support for: MPLS, IPv6, VLANs, MAC addresses
•[typically 1:50 sampling rates]
Cisco NFv9 supports (most) of these, but is proprietary.
9
10
IP Flow Information eXport
2013 – IPFIX the flow export standard (RFC7011 - RFC7015)
IPFIX IS A FLOW EXPORT PROTOCOL IN ITS OWN RIGHT (not NFv10)
»Standards-based: vendor neutrality
»Extensible: NFv5 – fixed template: 18 fields
NFv9 - 79 fields (104 if Cisco)
IPFIX - 433 Information Elements (IANA)
»EEs create your own bespoke Enterprise Elements
»Security: security by design
»Future-proof: supports IPv6, MPLS and multi-cast
10
11
botprobe template
11
10.0.2.29
210.222.39.8
53542
80
6
184785
187029
7
8
4951234579
192.168.0.1
6542876452
404 Not Found
192.168.0.1
srcIPv4 (8) 0 Bytes (4)
dstIPv4 (12) 1 Bytes (4)
Template ID (302) Field Count (19)
srcPort (7) 4 Bytes (2)
dstPort (11) 5 Bytes (2)
packetTotal (2) 25 Bytes (8)
flowEndMS (154) 21 Bytes (8)
flowStartMS (153) 20 Bytes (8)
proto (4) 6 Bytes (1)
initTCPFlag (6) 29 Bytes (1)
tcpSeqNos (184) 37 Bytes (4)
collectorIPv4 (211) 80 Bytes (4)
Template Records
16_flowKeyHash Bytes (1)
125_ircTextMessage variable
112_httpGet variable
123_httpResponse variable
1_dnsARecord Bytes (1)
6_dnsSOARecord Bytes (4)
162_smtpHello variable
41_sslName variable
10.0.2.29
210.222.39.8
53542
80
6
184785
187029
7
8
4951234579
192.168.0.1
6557765411
302 Found
192.168.0.1
10.0.2.29
210.222.39.8
53542
80
6
184785
187029
7
8
4951234579
192.168.0.1
2557373211
POST /?ptrxcz_FP
200 OK
0_sIP (8)
1_dIP (12)
4_sPort (7)
5_dPort (11)
25_packets (2)
21_eTimeMS (154)
20_sTimeMS (153)
6_protocol (4)
29_iFlags (6)
37_tcpSeq (184)
80_collector (211)
12
botprobe performance
12
IPFIX
PCAP
DATAVOLUME
TB
MB
97%Reduction
pcap botprobe
data volumes: 99.4 MB 3.0 MB
load/analysis: 172.5 sec 0.2 sec
13
botnet detection
13
repeated 30 botnet experiments:
»97% less capture data volume
»faster capture
»no change to algorithm feeds
14
ipfix v pcap
14
PCAP IPFIX so what?
SPAN mirroring Inline TAP
mirroring doubles network
bandwidth,
TAP is more efficient
dedicated
infrastructure
s/w probe on any
device
more control over data capture,
lower data volumes
plain Text
encryption, replay
protection
security by design,
can be sent over internet
unstructured data structured data easier search
TB data volumes MB data volumes 97% reduction data volumes
full packet: payload
L3/L7 templates-
capture
privacy, lawful inspection.
15
case studies
further IPFIX templates:
• botprobe : botnets
• smtpprobe : spam traffic
• httpprobe : malicious http streams
• iotprobe : malicious IoT traffic
• icsprobe : malicious Industrial Control Systems traffic
if an attribute is present in a packet [header or payload], we can capture
it.
15
16
ipfix capture
16
CORE
SWITCH
IPFIX
COLLECTOR
end
device
IPFIX
EXPORTER
IPFIX
IOT
sensor
IPFIX
EXPORTER
ICS
device
modbus
SWITCH
IPFIX
EXPORTER
IPFIX
EXPORTER
IPFIX
EXPORTER
• software probes
• end-point protection
• increased visibility
for fewer probes
• lower capture volumes
17
adaptive capture
17
machine learning genetic algorithms for real-
time template
adaption as traffic profiles change.
AI
97%
Less Data SOC
ANALYST
Network
Traffic
(PCAP
Stream)
Passive
Inline
Capture
A
B
E
A
B
C
D
E
A
B
C
D
E
A
D
T1 T2
18
threat detection
three key phases of a cyber attack:
 infection
 detection
 response
average time to detect a cyberattack is 205 days (Gartner, 2016)
the cost of a cyber attack is reputational, not just financial.
18
19
big data challenge
19
Network Big Data
20
big data challenge
20
97% reduction in threat
intel. data volumes
1)SOC team reacts faster
to cyberattacks
2) protecting business assets
and reputation
21
new opportunities
template extensibility + big data reduction =
• automated mitigation
• legal interception
• pre-event forensics
• pcap indexing [flow indexing]
• new detection algorithms [not just for botnets]
21
22
we need you…
if you are interested in collaboration,
We’d love to talk with you:
adrian.winckles@anglia.ac.uk
www.botprobe.co.uk
22

Weitere ähnliche Inhalte

Was ist angesagt?

Using Batfish for Network Analysis
Using Batfish for Network AnalysisUsing Batfish for Network Analysis
Using Batfish for Network AnalysisJoel W. King
 
Introduction of IPv6NET in Tridentcom 2014
Introduction of IPv6NET in Tridentcom 2014Introduction of IPv6NET in Tridentcom 2014
Introduction of IPv6NET in Tridentcom 2014Marius Georgescu
 
Wireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerWireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerJim Gilsinn
 
LF_DPDK_Mellanox bifurcated driver model
LF_DPDK_Mellanox bifurcated driver modelLF_DPDK_Mellanox bifurcated driver model
LF_DPDK_Mellanox bifurcated driver modelLF_DPDK
 
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...Paris Open Source Summit
 
Fast i pv4 lookup using local memory
Fast i pv4 lookup using local memoryFast i pv4 lookup using local memory
Fast i pv4 lookup using local memoryVipin Varghese
 
Osnug meetup-tungsten fabric - overview.pptx
Osnug meetup-tungsten fabric - overview.pptxOsnug meetup-tungsten fabric - overview.pptx
Osnug meetup-tungsten fabric - overview.pptxM.Qasim Arham
 
Short Introduction to IPv6
Short Introduction to IPv6Short Introduction to IPv6
Short Introduction to IPv6Martin Schütte
 
NetBSD syslogd with IETF Syslog Protocols
NetBSD syslogd with IETF Syslog ProtocolsNetBSD syslogd with IETF Syslog Protocols
NetBSD syslogd with IETF Syslog ProtocolsMartin Schütte
 
LF_DPDK_DPDK as microservices in ZTE Paas
LF_DPDK_DPDK as microservices in  ZTE PaasLF_DPDK_DPDK as microservices in  ZTE Paas
LF_DPDK_DPDK as microservices in ZTE PaasLF_DPDK
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsLinaro
 
Kernel advantages for Istio realized with Cilium
Kernel advantages for Istio realized with CiliumKernel advantages for Istio realized with Cilium
Kernel advantages for Istio realized with CiliumCynthia Thomas
 
Graphical System On Chip with LabVIEW
Graphical System On Chip with LabVIEWGraphical System On Chip with LabVIEW
Graphical System On Chip with LabVIEWVincent Claes
 
LF_DPDK17_Abstract APIs for DPDK and ODP
LF_DPDK17_Abstract APIs for DPDK and ODPLF_DPDK17_Abstract APIs for DPDK and ODP
LF_DPDK17_Abstract APIs for DPDK and ODPLF_DPDK
 

Was ist angesagt? (20)

Using Batfish for Network Analysis
Using Batfish for Network AnalysisUsing Batfish for Network Analysis
Using Batfish for Network Analysis
 
Introduction of IPv6NET in Tridentcom 2014
Introduction of IPv6NET in Tridentcom 2014Introduction of IPv6NET in Tridentcom 2014
Introduction of IPv6NET in Tridentcom 2014
 
Qa
QaQa
Qa
 
Colt sp sec2014_appsec-nf-vfinal
Colt sp sec2014_appsec-nf-vfinalColt sp sec2014_appsec-nf-vfinal
Colt sp sec2014_appsec-nf-vfinal
 
Wireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerWireshark Network Protocol Analyzer
Wireshark Network Protocol Analyzer
 
Asfws2014 tproxy
Asfws2014 tproxyAsfws2014 tproxy
Asfws2014 tproxy
 
LF_DPDK_Mellanox bifurcated driver model
LF_DPDK_Mellanox bifurcated driver modelLF_DPDK_Mellanox bifurcated driver model
LF_DPDK_Mellanox bifurcated driver model
 
IPv6 Security
IPv6 SecurityIPv6 Security
IPv6 Security
 
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
 
Fast i pv4 lookup using local memory
Fast i pv4 lookup using local memoryFast i pv4 lookup using local memory
Fast i pv4 lookup using local memory
 
Osnug meetup-tungsten fabric - overview.pptx
Osnug meetup-tungsten fabric - overview.pptxOsnug meetup-tungsten fabric - overview.pptx
Osnug meetup-tungsten fabric - overview.pptx
 
Short Introduction to IPv6
Short Introduction to IPv6Short Introduction to IPv6
Short Introduction to IPv6
 
NetBSD syslogd with IETF Syslog Protocols
NetBSD syslogd with IETF Syslog ProtocolsNetBSD syslogd with IETF Syslog Protocols
NetBSD syslogd with IETF Syslog Protocols
 
LF_DPDK_DPDK as microservices in ZTE Paas
LF_DPDK_DPDK as microservices in  ZTE PaasLF_DPDK_DPDK as microservices in  ZTE Paas
LF_DPDK_DPDK as microservices in ZTE Paas
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T Systems
 
pps Matters
pps Matterspps Matters
pps Matters
 
Kernel advantages for Istio realized with Cilium
Kernel advantages for Istio realized with CiliumKernel advantages for Istio realized with Cilium
Kernel advantages for Istio realized with Cilium
 
SDN and NFV
SDN and NFVSDN and NFV
SDN and NFV
 
Graphical System On Chip with LabVIEW
Graphical System On Chip with LabVIEWGraphical System On Chip with LabVIEW
Graphical System On Chip with LabVIEW
 
LF_DPDK17_Abstract APIs for DPDK and ODP
LF_DPDK17_Abstract APIs for DPDK and ODPLF_DPDK17_Abstract APIs for DPDK and ODP
LF_DPDK17_Abstract APIs for DPDK and ODP
 

Ähnlich wie Botprobe - Reducing network threat intelligence big data

Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlowLancope, Inc.
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analyticsconfluent
 
Leverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage ThreatsLeverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage ThreatsCisco Canada
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfThomasGraf40
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDataWorks Summit
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataJames Sirota
 
Splunk app for stream
Splunk app for stream Splunk app for stream
Splunk app for stream csching
 
Meetup 4/2/2016 - Functionele en technische architectuur IoT
Meetup  4/2/2016 - Functionele en technische architectuur IoTMeetup  4/2/2016 - Functionele en technische architectuur IoT
Meetup 4/2/2016 - Functionele en technische architectuur IoTDigipolis Antwerpen
 
Protocol and Integration Challenges for SDN
Protocol and Integration Challenges for SDNProtocol and Integration Challenges for SDN
Protocol and Integration Challenges for SDNGerardo Pardo-Castellote
 
How to Implement SDN Technology in ITB
How to Implement SDN Technology in ITBHow to Implement SDN Technology in ITB
How to Implement SDN Technology in ITBSDNRG ITB
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools iSyaiful Ahdan
 
Scaling the Container Dataplane
Scaling the Container Dataplane Scaling the Container Dataplane
Scaling the Container Dataplane Michelle Holley
 
Model driven telemetry
Model driven telemetryModel driven telemetry
Model driven telemetryCisco Canada
 
Colt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-final
Colt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-finalColt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-final
Colt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-finalRafael Junquera
 
Colt SDN Strategy - Telesemana December 2013
Colt SDN Strategy - Telesemana December 2013Colt SDN Strategy - Telesemana December 2013
Colt SDN Strategy - Telesemana December 2013Javier Benitez
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutionseroglu
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and RealitySwiss IPv6 Council
 

Ähnlich wie Botprobe - Reducing network threat intelligence big data (20)

Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analytics
 
Leverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage ThreatsLeverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage Threats
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
A new perspective on Network Visibility - RISK 2015
A new perspective on Network Visibility - RISK 2015A new perspective on Network Visibility - RISK 2015
A new perspective on Network Visibility - RISK 2015
 
Splunk app for stream
Splunk app for stream Splunk app for stream
Splunk app for stream
 
Meetup 4/2/2016 - Functionele en technische architectuur IoT
Meetup  4/2/2016 - Functionele en technische architectuur IoTMeetup  4/2/2016 - Functionele en technische architectuur IoT
Meetup 4/2/2016 - Functionele en technische architectuur IoT
 
Protocol and Integration Challenges for SDN
Protocol and Integration Challenges for SDNProtocol and Integration Challenges for SDN
Protocol and Integration Challenges for SDN
 
How to Implement SDN Technology in ITB
How to Implement SDN Technology in ITBHow to Implement SDN Technology in ITB
How to Implement SDN Technology in ITB
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
Scaling the Container Dataplane
Scaling the Container Dataplane Scaling the Container Dataplane
Scaling the Container Dataplane
 
Model driven telemetry
Model driven telemetryModel driven telemetry
Model driven telemetry
 
Colt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-final
Colt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-finalColt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-final
Colt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-final
 
Colt SDN Strategy - Telesemana December 2013
Colt SDN Strategy - Telesemana December 2013Colt SDN Strategy - Telesemana December 2013
Colt SDN Strategy - Telesemana December 2013
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
 
Simplify Networking for Containers
Simplify Networking for ContainersSimplify Networking for Containers
Simplify Networking for Containers
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
 

Mehr von DATA SECURITY SOLUTIONS

The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...DATA SECURITY SOLUTIONS
 
MLM or how to look at company users with new eyes
MLM or how to look at company users with new eyesMLM or how to look at company users with new eyes
MLM or how to look at company users with new eyesDATA SECURITY SOLUTIONS
 
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloudHow to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloudDATA SECURITY SOLUTIONS
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapDATA SECURITY SOLUTIONS
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 
How to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systemsHow to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systemsDATA SECURITY SOLUTIONS
 
Protecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricProtecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricDATA SECURITY SOLUTIONS
 
Patching: answers to questions you probably were afraid to ask about oracle s...
Patching: answers to questions you probably were afraid to ask about oracle s...Patching: answers to questions you probably were afraid to ask about oracle s...
Patching: answers to questions you probably were afraid to ask about oracle s...DATA SECURITY SOLUTIONS
 
Practical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementPractical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementDATA SECURITY SOLUTIONS
 
New security solutions for next generation of IT
New security solutions for next generation of ITNew security solutions for next generation of IT
New security solutions for next generation of ITDATA SECURITY SOLUTIONS
 
Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.DATA SECURITY SOLUTIONS
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...DATA SECURITY SOLUTIONS
 
IoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityIoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityDATA SECURITY SOLUTIONS
 
Services evolution in cybercrime economics
Services evolution in cybercrime economicsServices evolution in cybercrime economics
Services evolution in cybercrime economicsDATA SECURITY SOLUTIONS
 

Mehr von DATA SECURITY SOLUTIONS (20)

The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
 
MLM or how to look at company users with new eyes
MLM or how to look at company users with new eyesMLM or how to look at company users with new eyes
MLM or how to look at company users with new eyes
 
The artificial reality of cyber defense
The artificial reality of cyber defenseThe artificial reality of cyber defense
The artificial reality of cyber defense
 
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloudHow to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloud
 
Forensic tool development with rust
Forensic tool development with rustForensic tool development with rust
Forensic tool development with rust
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
How to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systemsHow to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systems
 
Protecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricProtecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabric
 
Patching: answers to questions you probably were afraid to ask about oracle s...
Patching: answers to questions you probably were afraid to ask about oracle s...Patching: answers to questions you probably were afraid to ask about oracle s...
Patching: answers to questions you probably were afraid to ask about oracle s...
 
Practical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementPractical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident management
 
When network security is not enough
When network security is not enoughWhen network security is not enough
When network security is not enough
 
New security solutions for next generation of IT
New security solutions for next generation of ITNew security solutions for next generation of IT
New security solutions for next generation of IT
 
Network is the Firewall
Network is the FirewallNetwork is the Firewall
Network is the Firewall
 
Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.
 
Secure enterprise mobility
Secure enterprise mobilitySecure enterprise mobility
Secure enterprise mobility
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 
IoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityIoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware Security
 
Cyber crime as a startup
Cyber crime as a startupCyber crime as a startup
Cyber crime as a startup
 
Services evolution in cybercrime economics
Services evolution in cybercrime economicsServices evolution in cybercrime economics
Services evolution in cybercrime economics
 

Kürzlich hochgeladen

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Kürzlich hochgeladen (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Botprobe - Reducing network threat intelligence big data

  • 1. ENRICH. ENABLE. #ISC2Summits Botprobe - Reducing Network Threat Intelligence Big Data adrian.winckles@anglia.ac.uk
  • 2. 2 project background PhD: “a botnet needle in a virtual haystack” - a mechanism to capture botnet communication traffic in virtualised environments such as Cloud Service Providers. why? •cloud providers are building block for IoT •a great hosting platform for botnets interesting built environment: •tenant isolation, data privacy •internal infrastructure is an attack surface 2
  • 3. 3 packet capture 3 vSwitch x CORE SWITCH CORE SWITCH EDGE SWITCH EDGE SWITCH if you want to capture network traffic for threat detection: use wireshark
  • 4. 4 packet capture 4 CORE SWITCH CORE SWITCH EDGE SWITCH EDGE SWITCH A B Third Party Capture Probe RSPAN VLAN EDGE SWITCH C Third Party Managed SOC
  • 5. 5 packet capture Three drawbacks in this scenario: 1) port mirroring doubles network bandwidth volumes 2) assumes the monitored devices support mirroring 3) big fat pipe to send traffic to a 3rd party SOC 5CORE SWITCH CORE SWITCH EDGE SWITCH EDGE SWITCH A B Third Party Capture Probe RSPAN VLAN EDGE SWITCH C Third Party Managed SOC
  • 6. 6 history lesson 1980’s Simple Network Management Protocol (SNMP) • MIB information is limited, so use syslog • Syslog is unstructured 1990’s • 1991 – IETF proposed packet aggregation into flows • 1993 – Disbanded due to lack of interest • 1996 – Cisco patented NetFlow • continued… 6
  • 7. 7 history lesson 1996 – Cisco patented NetFlow flow aggregates similar traffic based on an attributes tuple: e.g. 5 field flow tuple: { sIP, dIP, sPort, dPort, protocol } PCAP is a phone call flow is the phone bill (who, when, how long) 7
  • 8. 8 flow export architecture 8 Network Packets Probe Collector Storage Analysis NetFlow / IPFIX Aggregated Flow DBMS Query
  • 9. 9 history lesson 1996 – Cisco patented NetFlow 2002 – NetFlow v5 2004 – NetFlow v9 NetFlow was designed for application to network management, but has limitations when applied to threat detection: •NFv5 has 18 fixed fields (only 10 useful!) •header information ONLY •transport layer is UDP only •no support for: MPLS, IPv6, VLANs, MAC addresses •[typically 1:50 sampling rates] Cisco NFv9 supports (most) of these, but is proprietary. 9
  • 10. 10 IP Flow Information eXport 2013 – IPFIX the flow export standard (RFC7011 - RFC7015) IPFIX IS A FLOW EXPORT PROTOCOL IN ITS OWN RIGHT (not NFv10) »Standards-based: vendor neutrality »Extensible: NFv5 – fixed template: 18 fields NFv9 - 79 fields (104 if Cisco) IPFIX - 433 Information Elements (IANA) »EEs create your own bespoke Enterprise Elements »Security: security by design »Future-proof: supports IPv6, MPLS and multi-cast 10
  • 11. 11 botprobe template 11 10.0.2.29 210.222.39.8 53542 80 6 184785 187029 7 8 4951234579 192.168.0.1 6542876452 404 Not Found 192.168.0.1 srcIPv4 (8) 0 Bytes (4) dstIPv4 (12) 1 Bytes (4) Template ID (302) Field Count (19) srcPort (7) 4 Bytes (2) dstPort (11) 5 Bytes (2) packetTotal (2) 25 Bytes (8) flowEndMS (154) 21 Bytes (8) flowStartMS (153) 20 Bytes (8) proto (4) 6 Bytes (1) initTCPFlag (6) 29 Bytes (1) tcpSeqNos (184) 37 Bytes (4) collectorIPv4 (211) 80 Bytes (4) Template Records 16_flowKeyHash Bytes (1) 125_ircTextMessage variable 112_httpGet variable 123_httpResponse variable 1_dnsARecord Bytes (1) 6_dnsSOARecord Bytes (4) 162_smtpHello variable 41_sslName variable 10.0.2.29 210.222.39.8 53542 80 6 184785 187029 7 8 4951234579 192.168.0.1 6557765411 302 Found 192.168.0.1 10.0.2.29 210.222.39.8 53542 80 6 184785 187029 7 8 4951234579 192.168.0.1 2557373211 POST /?ptrxcz_FP 200 OK 0_sIP (8) 1_dIP (12) 4_sPort (7) 5_dPort (11) 25_packets (2) 21_eTimeMS (154) 20_sTimeMS (153) 6_protocol (4) 29_iFlags (6) 37_tcpSeq (184) 80_collector (211)
  • 12. 12 botprobe performance 12 IPFIX PCAP DATAVOLUME TB MB 97%Reduction pcap botprobe data volumes: 99.4 MB 3.0 MB load/analysis: 172.5 sec 0.2 sec
  • 13. 13 botnet detection 13 repeated 30 botnet experiments: »97% less capture data volume »faster capture »no change to algorithm feeds
  • 14. 14 ipfix v pcap 14 PCAP IPFIX so what? SPAN mirroring Inline TAP mirroring doubles network bandwidth, TAP is more efficient dedicated infrastructure s/w probe on any device more control over data capture, lower data volumes plain Text encryption, replay protection security by design, can be sent over internet unstructured data structured data easier search TB data volumes MB data volumes 97% reduction data volumes full packet: payload L3/L7 templates- capture privacy, lawful inspection.
  • 15. 15 case studies further IPFIX templates: • botprobe : botnets • smtpprobe : spam traffic • httpprobe : malicious http streams • iotprobe : malicious IoT traffic • icsprobe : malicious Industrial Control Systems traffic if an attribute is present in a packet [header or payload], we can capture it. 15
  • 17. 17 adaptive capture 17 machine learning genetic algorithms for real- time template adaption as traffic profiles change. AI 97% Less Data SOC ANALYST Network Traffic (PCAP Stream) Passive Inline Capture A B E A B C D E A B C D E A D T1 T2
  • 18. 18 threat detection three key phases of a cyber attack:  infection  detection  response average time to detect a cyberattack is 205 days (Gartner, 2016) the cost of a cyber attack is reputational, not just financial. 18
  • 20. 20 big data challenge 20 97% reduction in threat intel. data volumes 1)SOC team reacts faster to cyberattacks 2) protecting business assets and reputation
  • 21. 21 new opportunities template extensibility + big data reduction = • automated mitigation • legal interception • pre-event forensics • pcap indexing [flow indexing] • new detection algorithms [not just for botnets] 21
  • 22. 22 we need you… if you are interested in collaboration, We’d love to talk with you: adrian.winckles@anglia.ac.uk www.botprobe.co.uk 22

Hinweis der Redaktion

  1. From ARU, Cambridge. Research AI in threat detection. PHD – capture botnet comms traffic (ie. C&C to bot – keep alives, attack traffic). This has morphed into a method to reduce big data volumes threat detection
  2. Wanted to do something in botnet detection. Already a bunch of v good detection algos, so decided to look into how we can make the capture process more efficient bearing in mind this is a big data environment We set our scenario in CSP because: 1. CSP integral Building block for IOT [ease of access to centralised storage of device data], starting to see device intelligence outsourced to the cloud to reduce cost of end devices (Routers, IoT devices etc) 2. Cloud is a great platform to host bots (spin up VMs with C&C (redeploy if take down), or VM with bot(s) – no AV to bypass and easy to clone) 3. Interesting build environ Got us thinking what would happen if malware could abuse the vulnerabilities in hypervisors (esp QEMU) to attack the infrastructure.
  3. So how are we going to capture this botnet traffic? Obvious way is via full packet capture… WShark will see A to B if on separate core, but not if B on same edge switch, as wont pass core So need Wireshark on each nw segment –
  4. Could use Port Mirroring (SPAN in cisco talk) Set up a SPAN port on a switch Mirror takes an EXACT COPY of the packet and forwards it to a collection device (probably via mgmt vlan) This collection device will send it to the analysis device (might be a 3rd party soc) (might be compression in SPAN traffic, but generating a LOAD of extra traffic)
  5. 3 DRAWBACKS: double the bandwidth (because you are mirroring) 1GB edge, what you got in the core? 10GB -> generate TBs of data! 2) assumes the monitored device supports span. What about iot hubs? You’ll probably want to send all this SPAN traffic to a 3rd party SOC (can be compressed but still need a big fat pipe) (encryption to avoid MITM)
  6. So what else could we use? 1980s – SNMP was standard for network management. Poll a proprietary MIB on a device every x minutes regardless of a change on the device: up/down status, alters etc. SNMP limited – cannot carry large amounts of device data, so if wanted more granular information you would use syslog alongside SNMP Syslog is unstructured, must be rearranged before querying 1991 – Internet Engineering Task Force – aggregation for internet accounting.
  7. Netflow came from Cisco Express forwarding – route the first packet, switch the rest (a way to speed up the network) It works by grouping together similar traffic streams based on similar attributes: So, if over a fixed collection period, 10 traffic streams match this tuple, they are exported as one aggregated flow. For example, the standard 5 field tuple that is used a lot to aggregate nw magmt traffic is ….. 10 streams in collection period, match tuple => 1 stream. 10 MB to 1 MB NFv5 common in nw mgmt. = 90%+ devices
  8. Flow EXPORT The probe observes packets via a TAP, and takes a COPY of the fields needed (not the whole packet) –> Not interrupt traffic flow So 2 lots of data reduction TAP not mirror good probe do aggregation (more common in IPFIX, so NF probes aggregate but slower)
  9. 2002, 1st commercial release of netflow. Don’t get me wrong, Netflow was designed for network management statistics and it is good for that. Not so useful for threat detection. 18 fields: nw mgmt. fields – 10 any use! [don’t need input interface, next hop device, ToS, AS (Autonomous systems)] fixed at 48 bytes, you cannot chose what to capture. HEADER only – no L7 <- v imp!!! UDP - fast, but no encryption, susceptible to replay attacks, etc 1:50 = in large NW, NF not efficient (poor aggregation) so typically sample 1:50 - miss botnet comms? NFv9 to overcome this, but still proprietary.
  10. In 2013, IETF standardised IPFIX. It was developed (using NFv9 as a base) to address the drawbacks of Netflow. export protocol in its own right. Many people call NFv9 IPFIX, or call it NFv10 For threat detection – NFv9 is non standard fore runner to IPFIX Biggest advantage in threat detection is vendor neutral VENDOR NEUTRAL = multi vendor nw EXTENSIBLE EES(L3 – L7) Security = encrypt, replay and drop packet protection Also: bi-directional flows, configurable cache timeouts Protocol: NF is UDP; IPFIX supports UDP / TCP / SCTP (TLS) Transport: TCP/SCTP (stream control transmission protocol) –congestion awareness, protects against replay attack
  11. 25 million pcap streams 30 botnet families (HTTP, IRC, Spam, etc) 300 IEs and EEs Uses rudimentary AI to select common attributes = occurrence, and relevance (basic ML) NFv5 – 48 bytes fixed, 10 fields IPFIX – 43 bytes (core), 19 fields, L7
  12. 97% vol reduction Python search for malware – 3mins v .2 sec
  13. Repeated 30 expts (used NFv5 and/or PCAP) (2 used NFv9, 0 used IPFIX) NFv5 + PCAP = lots of data Benefits: Data volume reduction NO CHANGE TO ALGO capture ANYTHING in a packet => new detection algorithms.
  14. IPFIX benefits: Inline tap – reduced data Sw – deploy anywhere Structured data – easier to search, deploy to graph/elk MB data L7
  15. working on some case studies, with some organisations. More IoT and ICS [Modbus, scada]
  16. Software on devices. Small footprint devices (tested on PI 0) IPFIX = less data
  17. Genetic algo Real time adaption – T1 & T2 ABE -> AD What about latency here as AI updates template? (cache pcap?)
  18. Infection -> detection = 205 days. Longest period in attack cycle, nw most vulnerable We want to reduce this infection to detection time. How much does it cost your business per hour during a cyber breach? Its not just financial, it reputation damage and brand credibility.
  19. Threat detection is a big data challenge At botprobe, we tackle the challenges of network threat big data. Can you see threat in big data?
  20. SCRAP the CRAP. (97% reduction) Analyst efficiency.
  21. So we think our research opens up new opportunities that Use template Extensibility to reduce big data. Automated mitigation = less traffic for AI (needs more traffic when learning, but want less when detecting) Interception = less traffic to store/index Forensics = cannot do with PCAP (too much data) New algos – capture anything in packet [L3 – L7]
  22. We can do a demo…