Cognitive Security Overview
Download
Report
Transcript Cognitive Security Overview
Gabriel Dusil
VP, Global Sales & Marketing
www.facebook.com/gdusil
cz.linkedin.com/in/gabrieldusil
gdusil.wordpress.com
[email protected]
Origins
Research began in 2006
Company established in 2009
Funded by U.S. Army, Navy & Air Force
Experts in Network Behavior Analysis
Mission
Providing detailed intelligence to detect
modern sophisticated network attacks
Headquarters
Prague, Czech Republic & Silicon Valley, CA
Security
Innovation
Experts in Network Behavior Analysis
Page 2, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Point of Entry Compromise
Compromise Discovery
50% attacks take days to
months of reconnaissance for a
successful breach
70% of victims allow a breach to
persist for weeks to months before
detecting a compromise
Verizon – ‘11 Data Breach Investigations Report
Experts in Network Behavior Analysis
Page 3, www.cognitive-security.com
© 2012, gdusil.wordpress.com
• Managed Security Services
• Security Monitoring & Management
• Network Behavior Analysis
• Anomaly Detection
• Web Security, Content Filtering • SIEM
• Web-Application Firewalls
• IDS & IPS
• Vulnerability Management
• IAM
• Firewalls
• Anti-Virus
• Email Security
• VPN (SSL & IPsec)
SIEM = Security Information & Event Management)
IDS & IPS = Intrusion Detection & Prevention System
AAA = Authentication, Authorization, & Accounting
IAM = Identity & Access Management
VPN = Virtual Private Network, SSL = Secure Sockets Layer
Experts in Network Behavior Analysis
Page 4, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Security as a Service
Network
Behavior
Analysis
IDS & IPS
Web Security
email Security
Firewall
Network Behavior Analysis
Cost effective Expert Security for
enterprises, telcos & governments
Important security layer & a higher
wall for modern-day protection
APT, Zero-Day, Exploit Kits
& Polymorphic malware…
Attack Patterns
malware, etc.
Filtering, XXS
SQL Inj., etc.
Virus,
Trojans,
Span, etc.
Footprint
reduction,
scripts, etc.
Experts in Network Behavior Analysis
Page 5, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 6, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Cognitive Analyst
Cost Effective & Robust
Network Behavior Analysis for
Enterprise
High Throughput Traffic
Volumes
- Telco, Mobile, ISP & NSP
High Resolution & Attack
sensitivity
- custom for Governments
Experts in Network Behavior Analysis
Page 7, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Corporate Governance
Device or Network Misconfig
Restricted Apps, Policy Violations
Irregular Behavior & Misuse
Monitoring
Employees,
4%
IAM, 11%
Audits, 8%
Vulnerability
Analysis, 10%
Incident
Response,
12%
Vulnerability & Pen-testing
Forensics Analysis
Incident & Response
Malware
Analysis, 14%
Threat
Research,
8%
Responsibilities of a
Security Administrator
Advanced Cyber-Attacks
Trojans, Botnets, C2 & Exploit Kits
Spyware & Info leaks
Brute Force & Insider Attacks
Denial of Service (DoS)
Polymorphic Malware
Patching,
21%
Log Anal., 8%
Diagnostics Support
Awareness,
7%
Modern Sophisticated Attacks
Advanced Persistent Threats
Reconnaissance & Sabotage
Zero-Day Attacks
Information Week - Strategic Security Survey '11
Experts in Network Behavior Analysis
Page 8, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 9, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 10, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 11, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Unclassified
Behavior Unexpected
Anomaly
Peer 2 Peer
Network
Behavior
Heavy DNS
Use &
Sophisticated
Scans
Outbound
Encrypted
sessions
(eg. SSH)
Periodic
Polling
- Command
& Control
Unexpected
new service
or Outlier
Client
Experts in Network Behavior Analysis
Page 12, www.cognitive-security.com
© 2012, gdusil.wordpress.com
No Signatures!
No Signature limitations
Attackers will exploit:
• Delays in writing signatures
• Delay to install new signatures
• Clients ignoring updates due to
resource constraints
Artificial Intelligence
Strength of 8 Detection Algorithms
• Highly Accurate Attack detection
Peer-Reviewed Algorithms
• Tested by the scientific community
Long-Duration Trust Modeling
• Analyzing current behavior against
past assessments
Unique Self-configuration
• Challenge Agents ensures system
is operational
Hacker Circumvention Resistance
• Game Theory optimization ensures
system behavior is not predicable
Cost Competitive
Cost effective Expert Security
State-of-the-art Auto-Tuning
• Minimal deployment resources
needed
Experts in Network Behavior Analysis
Page 13, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 14, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 15, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Cognitive Analyst classifies
trustfulness of
data,
then
is separated
from
Then further separated into…
assessed
event
into over
categories,
& into severity levels
which can not be
immediately classified
Experts in Network Behavior Analysis
Page 16, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Comparing Near real-time data
to the past
Severity 8
Unclassified
Normal
Historical threat data is
incorporated to detect
sophisticated attacks
Using the most sophisticated
self-learning techniques in the
Security Industry today
Using 8 independent
Anomaly Detection Algorithms
Aggregating multiple threat
sources into clusters
Experts in Network Behavior Analysis
Page 17, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Al1 → 0.7
TM1 → 0.5
Network Traffic
Al2 → 0.2
Al3 → 0.9
TM2 → 0.7
Al4 → 0.4
CTS→ 0.7
Al5→ 0.3
TM3 → 0.4
Al6 → 0.2
Al7 → 0.4
Cognitive
Trust
Score
..
.
TM4 → 0.6
Al8 → 0.5
Detection
Algorithms
Trust
Modeling
Knowledge
Fusion
Trustfulness
Assessment
Layer
CTS = Cognitive Trust Score
Unclassified
Behavior
Event
Generation
Layer
Severity
Assignment
Layer
Experts in Network Behavior Analysis
Page 18, www.cognitive-security.com
© 2012, gdusil.wordpress.com
(hh:mm) Start
System
connected to
network data
source
Self-Initialization
2 Algorithms
3 Algorithms
all Algorithms
Online
Knowledge
Fusion - active
Self-Configuration
Artificial Intelligence
• Continually tunes to the client’s
environment
• Highly accurate by combining
several advanced algorithms
Auto-Learning Engine
• Self-Optimizing
Self-Optimization
Scalable Architecture
• Decentralized & Distributed
• Parallel Processing for attack
detection in high speed networks
Experts in Network Behavior Analysis
Page 19, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 20, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Pharma
Defence
Chemical
Energy, Oil&Gas
Mobile
ISP & NSP
Defence
Intelligence
Finance
Manufacturing
Hosting
Utilities
Downtime Sabotage Tarnished Image
Lost Productivity
Terrorism
Theft of Corporate Secrets
Government Sponsored Attacks
Fraud
Detecting Modern Sophisticated Attacks
Attack Forensics
Advanced Threat Diagnostics
Security Monitoring Services
Behavior Monitoring
Expert Services
R&D
Cognitive1
Distribution
Bronze
Silver Gold
Consulting
Training
Software Development
Platinum
Forensics
Research
Cognitive10
CognitiveExpert
Appliance VM or ISO Image
Software
Experts in Network Behavior Analysis
Page 21, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 22, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Security Innovation
Delivering Forward-thinking
Security Solutions
Thought Leadership
R&D Expertise
Cost-effective Research &
Development resources
Quick development turn-around
Flexible integration with OEMs,
MSSPs, & device manufacturers
Product Reliability
5th Generation Network Behavior
Analysis platform
Privacy Concerns
Data anonymity is maintained
Intuitive Management Interface
Easy-to-Use Dashboard
Granular attack detection analysis
Experts in Network Behavior Analysis
Page 23, www.cognitive-security.com
© 2012, gdusil.wordpress.com
http://gdusil.wordpress.com/2013/03/08/cognitive-secu…ntroduction-12/
Experts in Network Behavior Analysis
Page 24, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 25, www.cognitive-security.com
© 2012, gdusil.wordpress.com
• Corporate leaders face complex challenges in balancing security
spending against the evolving risks that internet commerce
presents. This has resulted in new and advanced levels of
protection needed to facilitate these strategic objectives. Expert
Security addresses the need to implement more robust and cost
effective levels of expertise, and also helps to bridge the gap to
higher, and more expensive - and often culturally adverse outsourced solutions. As companies expand, their need for
additional layers of protection it is paramount to ensure asset
protection. Network Behavior Analysis are the building blocks of
Expert Security, and offers a viable solution to modern
sophisticated cyber-attacks. This presentation was prepared to
outline our corporate overview and market positioning of
Cognitive Security.
Experts in Network Behavior Analysis
Page 26, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Network Behavior Analysis, NBA, Cyber Attacks, Forensics Analysis,
Normal vs. Abnormal Behavior, Anomaly Detection, NetFlow, Incident
Response, Security as a Service, SaaS, Managed Security Services,
MSS, Monitoring & Management, Advanced Persistent Threats, APT,
Zero-Day attacks, Zero Day attacks, polymorphic malware, Modern
Sophisticated Attacks, MSA, Non-Signature Detection, Artificial
Intelligence, A.I., AI, Security Innovation, Mobile security, Cognitive
Security, Cognitive Analyst, Forensics analysis, Gabriel Dusil
Experts in Network Behavior Analysis
Page 27, www.cognitive-security.com
© 2012, gdusil.wordpress.com