Cognitive Security Overview

Download Report

Transcript Cognitive Security Overview

Gabriel Dusil
VP, Global Sales & Marketing
www.facebook.com/gdusil
cz.linkedin.com/in/gabrieldusil
gdusil.wordpress.com
[email protected]
Origins
 Research began in 2006
 Company established in 2009
 Funded by U.S. Army, Navy & Air Force
Experts in Network Behavior Analysis
Mission
 Providing detailed intelligence to detect
modern sophisticated network attacks
Headquarters
 Prague, Czech Republic & Silicon Valley, CA
Security
Innovation
Experts in Network Behavior Analysis
Page 2, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Point of Entry  Compromise
Compromise  Discovery
  50% attacks take days to
months of reconnaissance for a
successful breach
  70% of victims allow a breach to
persist for weeks to months before
detecting a compromise
Verizon – ‘11 Data Breach Investigations Report
Experts in Network Behavior Analysis
Page 3, www.cognitive-security.com
© 2012, gdusil.wordpress.com
• Managed Security Services
• Security Monitoring & Management
• Network Behavior Analysis
• Anomaly Detection
• Web Security, Content Filtering • SIEM
• Web-Application Firewalls
• IDS & IPS
• Vulnerability Management
• IAM
• Firewalls
• Anti-Virus
• Email Security
• VPN (SSL & IPsec)
SIEM = Security Information & Event Management)
IDS & IPS = Intrusion Detection & Prevention System
AAA = Authentication, Authorization, & Accounting
IAM = Identity & Access Management
VPN = Virtual Private Network, SSL = Secure Sockets Layer
Experts in Network Behavior Analysis
Page 4, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Security as a Service
Network
Behavior
Analysis
IDS & IPS
Web Security
email Security
Firewall
Network Behavior Analysis
 Cost effective Expert Security for
enterprises, telcos & governments
 Important security layer & a higher
wall for modern-day protection
APT, Zero-Day, Exploit Kits
& Polymorphic malware…
Attack Patterns
malware, etc.
Filtering, XXS
SQL Inj., etc.
Virus,
Trojans,
Span, etc.
Footprint
reduction,
scripts, etc.
Experts in Network Behavior Analysis
Page 5, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 6, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Cognitive Analyst
Cost Effective & Robust
Network Behavior Analysis for
Enterprise
High Throughput Traffic
Volumes
- Telco, Mobile, ISP & NSP
High Resolution & Attack
sensitivity
- custom for Governments
Experts in Network Behavior Analysis
Page 7, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Corporate Governance
 Device or Network Misconfig
 Restricted Apps, Policy Violations
 Irregular Behavior & Misuse
Monitoring
Employees,
4%
IAM, 11%
Audits, 8%
Vulnerability
Analysis, 10%
Incident
Response,
12%
 Vulnerability & Pen-testing
 Forensics Analysis
 Incident & Response
Malware
Analysis, 14%
Threat
Research,
8%
Responsibilities of a
Security Administrator
Advanced Cyber-Attacks
Trojans, Botnets, C2 & Exploit Kits
Spyware & Info leaks
Brute Force & Insider Attacks
Denial of Service (DoS)
Polymorphic Malware
Patching,
21%
Log Anal., 8%
Diagnostics Support





Awareness,
7%
Modern Sophisticated Attacks
 Advanced Persistent Threats
 Reconnaissance & Sabotage
 Zero-Day Attacks
Information Week - Strategic Security Survey '11
Experts in Network Behavior Analysis
Page 8, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 9, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 10, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 11, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Unclassified
Behavior Unexpected
Anomaly
Peer 2 Peer
Network
Behavior
Heavy DNS
Use &
Sophisticated
Scans
Outbound
Encrypted
sessions
(eg. SSH)
Periodic
Polling
- Command
& Control
Unexpected
new service
or Outlier
Client
Experts in Network Behavior Analysis
Page 12, www.cognitive-security.com
© 2012, gdusil.wordpress.com
No Signatures!
 No Signature limitations
 Attackers will exploit:
• Delays in writing signatures
• Delay to install new signatures
• Clients ignoring updates due to
resource constraints
Artificial Intelligence
 Strength of 8 Detection Algorithms
• Highly Accurate Attack detection
 Peer-Reviewed Algorithms
• Tested by the scientific community
 Long-Duration Trust Modeling
• Analyzing current behavior against
past assessments
 Unique Self-configuration
• Challenge Agents ensures system
is operational
 Hacker Circumvention Resistance
• Game Theory optimization ensures
system behavior is not predicable
Cost Competitive
 Cost effective Expert Security
 State-of-the-art Auto-Tuning
• Minimal deployment resources
needed
Experts in Network Behavior Analysis
Page 13, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 14, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 15, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Cognitive Analyst classifies
trustfulness of
data,
then
is separated
from
Then further separated into…
assessed
event
into over
categories,
& into severity levels
which can not be
immediately classified
Experts in Network Behavior Analysis
Page 16, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Comparing Near real-time data
to the past
Severity 8
Unclassified
Normal
 Historical threat data is
incorporated to detect
sophisticated attacks
Using the most sophisticated
self-learning techniques in the
Security Industry today
 Using 8 independent
Anomaly Detection Algorithms
Aggregating multiple threat
sources into clusters
Experts in Network Behavior Analysis
Page 17, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Al1 → 0.7
TM1 → 0.5
Network Traffic
Al2 → 0.2
Al3 → 0.9
TM2 → 0.7
Al4 → 0.4
CTS→ 0.7
Al5→ 0.3
TM3 → 0.4
Al6 → 0.2
Al7 → 0.4
Cognitive
Trust
Score
..
.
TM4 → 0.6
Al8 → 0.5
Detection
Algorithms
Trust
Modeling
Knowledge
Fusion
Trustfulness
Assessment
Layer
CTS = Cognitive Trust Score
Unclassified
Behavior
Event
Generation
Layer
Severity
Assignment
Layer
Experts in Network Behavior Analysis
Page 18, www.cognitive-security.com
© 2012, gdusil.wordpress.com
(hh:mm) Start
System
connected to
network data
source
Self-Initialization
2 Algorithms
3 Algorithms
all Algorithms
Online
Knowledge
Fusion - active
Self-Configuration
 Artificial Intelligence
• Continually tunes to the client’s
environment
• Highly accurate by combining
several advanced algorithms
 Auto-Learning Engine
• Self-Optimizing
Self-Optimization
 Scalable Architecture
• Decentralized & Distributed
• Parallel Processing for attack
detection in high speed networks
Experts in Network Behavior Analysis
Page 19, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 20, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Pharma
Defence
Chemical
Energy, Oil&Gas
Mobile
ISP & NSP
Defence
Intelligence
Finance
Manufacturing
Hosting
Utilities
Downtime Sabotage Tarnished Image
Lost Productivity
Terrorism
Theft of Corporate Secrets
Government Sponsored Attacks
Fraud
Detecting Modern Sophisticated Attacks
Attack Forensics
Advanced Threat Diagnostics
Security Monitoring Services
Behavior Monitoring
Expert Services
R&D
Cognitive1
Distribution
Bronze
Silver Gold
Consulting
Training
Software Development
Platinum
Forensics
Research
Cognitive10
CognitiveExpert
Appliance VM or ISO Image
Software
Experts in Network Behavior Analysis
Page 21, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 22, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Security Innovation
 Delivering Forward-thinking
Security Solutions
 Thought Leadership
R&D Expertise
 Cost-effective Research &
Development resources
 Quick development turn-around
 Flexible integration with OEMs,
MSSPs, & device manufacturers
Product Reliability
 5th Generation Network Behavior
Analysis platform
Privacy Concerns
 Data anonymity is maintained
Intuitive Management Interface
 Easy-to-Use Dashboard
 Granular attack detection analysis
Experts in Network Behavior Analysis
Page 23, www.cognitive-security.com
© 2012, gdusil.wordpress.com
http://gdusil.wordpress.com/2013/03/08/cognitive-secu…ntroduction-12/
Experts in Network Behavior Analysis
Page 24, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 25, www.cognitive-security.com
© 2012, gdusil.wordpress.com
• Corporate leaders face complex challenges in balancing security
spending against the evolving risks that internet commerce
presents. This has resulted in new and advanced levels of
protection needed to facilitate these strategic objectives. Expert
Security addresses the need to implement more robust and cost
effective levels of expertise, and also helps to bridge the gap to
higher, and more expensive - and often culturally adverse outsourced solutions. As companies expand, their need for
additional layers of protection it is paramount to ensure asset
protection. Network Behavior Analysis are the building blocks of
Expert Security, and offers a viable solution to modern
sophisticated cyber-attacks. This presentation was prepared to
outline our corporate overview and market positioning of
Cognitive Security.
Experts in Network Behavior Analysis
Page 26, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Network Behavior Analysis, NBA, Cyber Attacks, Forensics Analysis,
Normal vs. Abnormal Behavior, Anomaly Detection, NetFlow, Incident
Response, Security as a Service, SaaS, Managed Security Services,
MSS, Monitoring & Management, Advanced Persistent Threats, APT,
Zero-Day attacks, Zero Day attacks, polymorphic malware, Modern
Sophisticated Attacks, MSA, Non-Signature Detection, Artificial
Intelligence, A.I., AI, Security Innovation, Mobile security, Cognitive
Security, Cognitive Analyst, Forensics analysis, Gabriel Dusil
Experts in Network Behavior Analysis
Page 27, www.cognitive-security.com
© 2012, gdusil.wordpress.com