network data: powering the modern soc · instrumentation understand the constraints of each data...

23
Network Data: Powering the Modern SOC

Upload: others

Post on 19-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

Network Data: Powering

the Modern SOC

Page 2: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

J a m i e M o l e s , S e n i o r S e c u r i t y S a l e s E n g i n e e r

Jamie Moles provides security consulting and advisory services to

ExtraHop customers and internal teams and loves playing with new

technologies on the block, in the security space.

After 30+ years in the IT industry, Jamie retains his passion for

breaking things, explaining how technologies work and showing cool

ideas and ways of solving problems to peers and customers.

Page 3: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

DATA IS EATING THE WORLD.

Software is eating

the world.

—Marc Andreessen, 2011

—Jesse Rothstein, 2018

Page 4: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

4.4ZB2013

0.13ZB2005

175ZB2025

43% CAGR33ZB

2018

IDC Data Age 2025, Nov 2018

Page 5: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

Global IP Traffic

Exabytes/month

26% CAGRCisco VNI Global IP Traffic Forecast

2017-2022

396

319

254

201

156

122

2017 2018 2019 2020 2021 2022

Page 6: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

WIRE DATA

Page 7: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate
Page 8: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

Data

Va

lue

Time

Today30 Days Ago

Threat Hunting

Incident Response

D a t a Va l u e C h a n g e s O ve r T i m e F o r D i f f e r e n t U s e C a s e s

Page 9: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

WIRE DATA• Instant• Empirical and Definitive• Complete Context

LOGS

AGENTS &

INSTRUMENTATION

Understand The Constraints Of Each Data Source

“Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk

Find the ultimate truth in the

wire. Even the most granular logs

are not enough to be the truth.

Page 10: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate
Page 11: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate
Page 12: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

MACHINE LEARNING HYPE IN 2018

The 100 startups on this list have raised

$3.8B in aggregate funding across 263

deals since 2012.

“The hype around data science and machine learning continues to defy gravity

and soar to ever-higher levels.”—Gartner, July 2018

Machine Learning is at

the peak of the Hype

Cycle.

Page 13: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

AI IS HARD

Chihuahua

or Muffin?

Sheepdog

or Mop?

Parrot or

Guacamole?

Puppy

or Bagel?

Labradoodle or

Fried Chicken?

Sloth or

Pain Au Chocolat?

Page 14: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate
Page 15: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate
Page 16: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

T h e G o a l s o f N T A

COMPLETE VISIBILITYHeadlines, “need to know” decryption, TLS 1.3

serve expanding exec and privacy requirements

REAL-TIME DETECTIONNew ML detections for escalation attacks,

ransomware, insider threats, prioritized

based on critical asset value

GUIDED INVESTIGATIONRicher context and integrations help

Tier 1 analysts perform like Tier 3 experts

Page 17: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

P O S T C O M P R O M I S E A C T I V I T I E S H I D E I N E A S T - W E S T T R A F F I C

NetworkPrivilege

Escalation

Command and Control

MaliciousEncryption

ExploitationLateral

MovementData

Exfiltration

Recon

Unauthorized Access

NetworkPrivilege

Escalation

Command and Control

MaliciousEncryption

ExploitationLateral

MovementData

Exfiltration

Recon

Page 18: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

Breach Detection & Response Insider Threat Detection Ransomware Defense

DETECT THREATS

IMPROVE POSTURE

SOC Productivity Red Team/Audit Findings Reduce Attack Surface

Page 19: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate
Page 20: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

NEW TLS 1.3 STANDARD

• Faster handshakes

• No obsolete ciphers or hashes

• No compression or

renegotiation

1994 1998 2002 2006 2010 2014 2018

SSL 2.0TLS 1.3

SSL 3.0 TLS 1.0 TLS 1.1 TLS 1.2

Page 21: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

Source: TLS 1.3 Adoption in the Enterprise, Enterprise Management Associates, 2019

TLS 1.3 ADOPTION

Page 22: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate

ENCRYPTION TRENDRECOMMENDED SOUL SEARCHING FOR YOUR SOC

Page 23: Network Data: Powering the Modern SOC · INSTRUMENTATION Understand The Constraints Of Each Data Source “ Source: Young Cho, Sr. Industrial IOT Practitioner, Splunk Find the ultimate