threat detection based on deep learning at scale · threat detection based on deep learning at...

31
Karl Peter Fuchs - [email protected] Jan Pospisil - [email protected] Siemens Cyber Defense Center www.siemens.com/cybersecurity Restricted © Siemens AG 2019 Threat Detection based on Deep Learning at Scale

Upload: others

Post on 22-May-2020

14 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

Karl Peter Fuchs - [email protected]

Jan Pospisil - [email protected]

Siemens Cyber Defense Center

www.siemens.com/cybersecurityRestricted © Siemens AG 2019

Threat Detection based on

Deep Learning at Scale

Page 2: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 2 Karl Peter Fuchs and Jan Pospisil

Cyber Defense Center

Globally distributed Team

Mission

• Monitoring of Siemens

infrastructure worldwide

• Identify and analyze

security threats

Cyber

Defense

Center

Focus Area

Page 3: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 3 Karl Peter Fuchs and Jan Pospisil

Cyber Defense Center

Analyze, Verify, HuntStore, Enrich, AlertLog Collection(Endpoints, Servers, Proxies, AD, Packet Captures, Sandboxes, Email Servers…)

Threat Detection System

Dashboards

Search Tools

Storage

Hybrid Cloud Solution(50,000+ Events/Sec)

Security AnalystsSiemens Corporate Network(500,000+ Hosts, 350,000+ Users)

Mission: Threat Detection

Page 4: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 4 Karl Peter Fuchs and Jan Pospisil

Cyber Defense CenterMain Detection Components

Machine Learning, Artificial

Intelligence and Deep Learning:

Non-exact Matching,

Aggregate/Preselect/Visualize etc.

Static Analysis

Exact Matching:

Rulesets, Regexes,

Periodic Search

Queries, Scripts etc.

Dynamic and Hybrid

Analysis

Key motivation for us:

• More robust detection: Learn general

malware characteristics

• Enable novel detection vectors: E.g.,

image recognition for phishing detection

• Automate repetitive tasks

Page 5: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 5 Karl Peter Fuchs and Jan Pospisil

AI and Deep Learning on the RiseHigh expectations due to success stories

Cancer DetectionSelf-driving Cars Translation

Page 6: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 6 Karl Peter Fuchs and Jan Pospisil

AI and Deep Learning on the RiseHow about Security?

Dedicated Workshops Large amount of new Papers Numerous (Open Source)

Tools and Implementations

Page 7: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 7 Karl Peter Fuchs and Jan Pospisil

AI and Deep Learning on the RiseKey Challenges (in Large Environments):

→ Huge gap between research and practice

Accuracy (TPs, FPs etc)

Not enough (labeled) Data

Amount of data

Per

form

ance

Shallow

Learners

Technical ChallengesNo Standard Architectures

Environ-

ment A

Environ-

ment B

Limited Generalizability Limited Scalability

Page 8: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

Use Case: DGA Detection

Page 9: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 9 Karl Peter Fuchs and Jan Pospisil

What is a DGA doing?

Malware: attempt to communicate with Attackers’ server 1

Infected Host www.IamEvil.com

Page 10: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 10 Karl Peter Fuchs and Jan Pospisil

Defenses Up: blacklist stops the communication2

Infected Host www.IamEvil.com

Blacklist

What is a DGA doing?

Page 11: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 11 Karl Peter Fuchs and Jan Pospisil

What is a DGA doing?

DGA in action3

Infected Hostwww.IamEvil-0001.comwww.IamEvil-0002.comwww.IamEvil-0003.com

Page 12: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 12 Karl Peter Fuchs and Jan Pospisil

What is a DGA doing?

DGA into action4

Infected hostwww.IamEvil-0001.comwww.IamEvil-0002.comwww.IamEvil-0003.com

Simply blocking domains does not scale anymore

Page 13: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 13 Karl Peter Fuchs and Jan Pospisil

A Simple DGA Example

[CryptoLocker DGA]

Page 14: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 14 Karl Peter Fuchs and Jan Pospisil

Quiz: Can you distinguish Legitimate

Domains from Malicious ones?

hzmksreiuojy.in

b9qmjjys3z.com

oqjiwef12egre6erg6qwefg312qrgqretg132.com lkckclckl1i1i.com

xjpakmdcfuqe.nl

reqblcsh.net

cilavocofer.eu

edkowalczyk.com

skhhtcss.edu.hk

blkdmnds.com

watdoejijbijbrand.nl

kdnlrklb.com

abcdefgtfddf2223.com

llanfairpwllgwyngyllgogerychwyrndrobwll-llantysiliogogogoch.com

Page 15: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 15 Karl Peter Fuchs and Jan Pospisil

Quiz: Can you distinguish Legitimate

Domains from Malicious ones?

hzmksreiuojy.in

b9qmjjys3z.com

oqjiwef12egre6erg6qwefg312qrgqretg132.com lkckclckl1i1i.com

xjpakmdcfuqe.nl

reqblcsh.net

cilavocofer.eu

edkowalczyk.com

skhhtcss.edu.hk

blkdmnds.com

watdoejijbijbrand.nl

kdnlrklb.com

abcdefgtfddf2223.com

llanfairpwllgwyngyllgogerychwyrndrobwll-llantysiliogogogoch.com

= malicious

Page 16: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

Name of a town in Wales[https://www.youtube.com/watch?v=fHxO0UdpoxM]

Page 17: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

Detecting DGAs with

Deep Learners

Page 18: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 18 Karl Peter Fuchs and Jan Pospisil

Detecting DGAs with AI

1. Characters are

converted to ASCII tokens

2. Tokens are embedded

into multi-dimensional

vectors

3. Forward layers or

Recurrent layers can be

utilized to generate features

4. Fully connected layers

can be used to increase

the model depth

5. A suspiciousness score is

assigned based on the

output of sigmoid output

neuron or softmax layer

Page 19: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 19 Karl Peter Fuchs and Jan Pospisil

Example CNN Layer with UMAP

© Marionete Limited 2018

5

3

2

1

Norm

al

Page 20: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 20 Karl Peter Fuchs and Jan Pospisil

Results

Shallow Learner Approach ( Deep Learning Approach

Accuracy (%) TPR (%) FPR (%) TNR (%) FNR (%)

98.64 98.08 0.77 99.23 1.02

Accuracy (%) TPR (%) FPR (%) TNR (%) FNR (%)

84.36 96.78 31.56 68.43 3.21

Page 21: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

Design Platform and

Operationalize

Page 22: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 22 Karl Peter Fuchs and Jan Pospisil

Operational Challenge

500,000+ Hosts

50,000+ Events per second

6+ TBs of data per day

24/7 Operations

Highly Volatile Loads (20x)

Page 23: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 23 Karl Peter Fuchs and Jan Pospisil

Operationalize Smart!

500,000+ Hosts

50,000+ Events per second

6+ TBs of data per day

24/7 Operations

Highly Volatile Loads (20x)

Auto Scaling (Elasticity)

Auto Failover

Server Patching

Backups

Don't burden your team with

Go Serverless

Page 24: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 24 Karl Peter Fuchs and Jan Pospisil

Important Pipelines

Endpoint

Network

Ingest Pipeline: Store AD- Proxy- Email-Logs into the S31

S3

Landing Zone

Kinesis

Streaming

Log Sources

Ingest and Inference

Page 25: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 25 Karl Peter Fuchs and Jan Pospisil

Important Pipelines

Glue

Incremental ETL

Endpoint

Network

ETL: Cleaning and Transforming Data2

S3

Landing Zone

S3

Data Lake

Kinesis

Streaming

Log Sources

Ingest and Inference

Page 26: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 26 Karl Peter Fuchs and Jan Pospisil

Important Pipelines

Glue

Incremental ETL

Endpoint

Network

Presentation: Create Statistics, Provide Data to Analysts3

S3

Landing Zone

S3

Data Lake

Athena

Analyze

Incidents and

Query

History

Kinesis

Streaming

IOCs

Incident

Analysis

Log Sources

Ingest and Inference

Page 27: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 27 Karl Peter Fuchs and Jan Pospisil

Important Pipelines

Glue

Incremental ETL

Endpoint

Network

Detection: Real Time Prediction of Threats 4

S3

Landing Zone

S3

Data Lake

Athena

Analyze

Incidents and

Query

History

SageMaker AI

Predict Incidents

Kinesis

Streaming

IOCs

Incident

Analysis

Data

Scientists

Log Sources

Ingest and Inference

Page 28: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 28 Karl Peter Fuchs and Jan Pospisil

Important Pipelines

Glue

Incremental ETL

Endpoint

Network

Log Sources

Detection: Real Time Prediction of Threats 4

S3

Landing Zone

S3

Data Lake

Athena

Analyze

Incidents and

Query

History

SageMaker AI

Predict Incidents

Kinesis

Streaming

IOCs

Incident

Analysis

Data

Scientists

Ingest and Inference

Page 29: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 29 Karl Peter Fuchs and Jan Pospisil

Important Pipelines

model.py config.

yaml

Gate: requires

human approval

Build a ModelValidate Model

A/B Testing etc.

Deliver Model

to EndpointDeploy Model

to Pipeline

Data

Scientist

AI Model Generation and Deployment

Page 30: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

2019Page 30 Karl Peter Fuchs and Jan Pospisil

Important Pipelines

model.py config.

yaml

Gate: requires

human approval

Build a ModelValidate Model

A/B Testing etc.

Deliver Model

to EndpointDeploy Model

to Pipeline

Continuously

measure

Model quality

Security

Analysts

Constantly

improve Models

with TPs/FPs from

Security Analysts

Data

Scientist

AI Feedback Loop

Page 31: Threat Detection based on Deep Learning at Scale · Threat Detection based on Deep Learning at Scale. Page 2 2019 Karl Peter Fuchs and Jan Pospisil Cyber Defense Center ... Intelligence

Thank You