Proactive Risk Management through Improved Situational Awareness - - PowerPoint PPT Presentation

proactive risk management through improved situational
SMART_READER_LITE
LIVE PREVIEW

Proactive Risk Management through Improved Situational Awareness - - PowerPoint PPT Presentation

Proactive Risk Management through Improved Situational Awareness https://protective-h2020.eu/ PROTECTIVE is a H2020 funded Innovation Action to evolve cyber alert flow processing , namely: correlation, prioritisation, analysis,


slide-1
SLIDE 1

Proactive Risk Management through Improved Situational Awareness

https://protective-h2020.eu/

slide-2
SLIDE 2

This project has received funding from the European Union’s Horizon 2020 research and innovation program under grant agreement No 700071. This output reflects the views only of the author(s), and the European Union cannot be held responsible for any use which may be made of the information contained therein.

PROTECTIVE is a H2020 funded Innovation Action to evolve cyber alert flow processing, namely:

  • correlation,
  • prioritisation,
  • analysis,
  • visualisation,
  • sharing,

into effective solutions integrated into existing security toolsets for Computer Security Incident Response Teams (CSIRTs) .

slide-3
SLIDE 3

Project Details

Content

slide-4
SLIDE 4

Consortium

Innovation Action: ▪ 36 month duration ▪ Sept 2016 – Aug 2019 ▪ 10 partners: ▪ 3 academic partners ▪ 4 industry partners ▪ 3 NREN (National Research & Educational Network) partners ▪ 8 countries: Ireland, UK, Poland, Austria, Germany, Spain, Czech Republic, Romania

slide-5
SLIDE 5

Time-plan

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 WP1 Project Management WP2 Requirements, Scenarions and Architecture WP3 Correlation and Prioritisation WP4 Context Awareness WP5 Threat Intelligence Sharing WP6 Framework Development, Integr. & System Test WP7 Pilots Management and Execution WP8 Busiess Planning, Exploitation and Dissemination Year 1 Year 2 Year 3

PILOT 1 PILOT 2

2017 2018 2019

slide-6
SLIDE 6

Work plan

slide-7
SLIDE 7

Motivation and Challenges

Content

slide-8
SLIDE 8

PROTECTIVE motivation> “Detect, SHARE, Protect”

▪ Make existing tools interoperable and promote the use of standards for data exchange ▪ Enhance the functionality of existing tools as regards: ▪ Correlation engines for alert analysis ▪ Automatic prioritisation of security alerts ▪ Improved threat intelligence sharing ▪ Advanced analytics and visualisation for massive numbers of alerts

ENISA (Detect, Share Protect, 2013)

slide-9
SLIDE 9

Challenges

▪ Gathering both technical and human factor requirements of NRENs ▪ State of the art literature survey + interviews of potential end-users (analysts at NRENs) ▪ Defining Threat Intelligence ▪ Defining Trust: “Secure connection” vs “Quality of Event” vs “Reputation Scores” vs “Freshness” etc. ▪ Understanding optimal use of Automation and Human intelligence ▪ Can we aggregate events in meaningful ways to generate intelligence -> fewer alerts! ▪ Which aspects should be automated? What human factors prevent/enhance CTI sharing? ▪ Understanding context - generating and maintaining mission and constituency insight. ▪ Understanding legal and ethical considerations in the wake of the EU General Data Protection Regulation ▪ Data handling concerns: At what point is threat intelligence personal data? ▪ Requirements analysis: Going from legal speak to tech speak is difficult.

This project has received funding from the European Union’s Horizon 2020 research and innovation program under grant agreement No 700071. This output reflects the views only of the author(s), and the European Union cannot be held responsible for any use which may be made of the information contained therein.

slide-10
SLIDE 10

High-level approach – key ideas

Key idea: A platform for “Proactive Risk Management through Improved Situational Awareness” ▪ For NREN CSIRTs initially ▪ Address NREN needs specifically. Starting point – existing tools well-tested in the NREN space ▪ Eventually expand to public CSIRTs ▪ Eventually share threat intelligence with SMEs ▪ Situational Awareness: We need awareness capabilities w.r.t.: ▪ Threats – internal and external alerts, incidents and intelligence ▪ Context – “Mission” and “Constituency” (Asset management) ▪ Risk – “Prioritisation” and “Correlation”

This project has received funding from the European Union’s Horizon 2020 research and innovation program under grant agreement No 700071. This output reflects the views only of the author(s), and the European Union cannot be held responsible for any use which may be made of the information contained therein.

slide-11
SLIDE 11

PROTECTIVE approach-> situational awareness

Information Security Situational Awareness - “Within a volume of time and space, the

  • perception of an enterprise’s

threat environment and its security posture; the

  • comprehension/meaning of

both taken together (i.e. risk) and the

  • projection of their status into

the near future”

(adapted from Mitre Corporation) NIST IR 7298 Revision 2, Glossary of Key Information Security Terms

slide-12
SLIDE 12

Goals

▪ Provide NRENs with improved security alert management capabilities (after ENISA) ▪ Starting with NRENs, then (hopefully) move to the public CSIRTs ▪ Explore added value to SMEs – warn SMEs early ▪ Meta alerts: summarising threats and incidents – what’s the bigger picture? Fewer alerts! ▪ Context awareness: enable better prioritisation of internal events ▪ Threat Intelligence Sharing between NRENs ▪ GDPR and NDA compliance ▪ Trust: Confidentiality + Reputation scores + Quality of threat intelligence ▪ Automation, (automation, automation!)

slide-13
SLIDE 13

PROTECTIVE system

slide-14
SLIDE 14

PROTECTIVE ecosystem

CSIRT Constituency CSIRT Constituency CSIRT Constituency

Protective Node

CSIRT Constituency

Protective Node Protective Node Protective Node

TI Sharing PROTECTIVE Ecosystem

Protective Node

slide-15
SLIDE 15

Risk Awareness

Content

slide-16
SLIDE 16

Risk awareness

slide-17
SLIDE 17

Meta alert prioritisation

▪ Transformation (mapping) of meta-alerts’ attributes into criteria by customizable templates supporting temporal (time-dependent) values ▪ Classification and ranking of meta-alerts based on learned preference model – two possible modes: assignment to preference-ordered classes or full ranking (meta-alerts also ranked inside classes) ▪ Multiple criteria considered at the same time – MCDA approach ▪ Learning based on data-sets provided by individual operators ▪ Reference ranking / Assignment of criterial vectors (describing meta-alerts) to preference-ordered classes ▪ Dominance-based rough-set approach (DRSA) applied to deal with inconsistencies ▪ Interpretable preference model in form of DRSA decision rules

slide-18
SLIDE 18

Alert statistics

▪ Predefined views to provide overview ▪ Fully-customizable dashboard by user to focus on particular dataset ▪ Multiple relevant views on alerts and meta-alerts ▪ Status of reporting nodes ▪ Extendable with new views as new data (enriched) appear in database ▪ Timeseries to observe trends in data ▪ Simple anomaly detection in time series using EWMA and deviation ▪ Parameters set by user

slide-19
SLIDE 19

Threat projection

▪ Identify multi-stage attacks using sequential analysis ▪ the sequential patterns are used to create models of attackers behaviour ▪ can be used to predict future attacks if partial match found form current alerts ▪ Attack prediction using association rule mining ▪ generates rule to predict next step ▪ associates confidence level with rule ▪ Attack prediction using deep learning LSTM based approach ▪ builds on language processing techniques

slide-20
SLIDE 20

Threat Intelligence Sharing

Content

slide-21
SLIDE 21

Emerging concerns in sharing threat intelligence

▪ GDPR/NDA - “What the baseline?” ▪ GDPR not written with cyber threat intelligence in mind ▪ GDPR/NDA -“How do I know I meet legal specifications?” ▪ Experimenting with run-time information sharing compliance monitors for NDAs and GDPR ▪ Use-case based - multiple domain expert review ▪ e.g. legal, ethical, technical reviews ▪ Rule-based – akin to an IDS, based on Inspector ▪ Iterative refinement – improve over two pilots ▪ From the ground up – interviews and desktop analysis. https://www.eugdpr.org/

slide-22
SLIDE 22

Challenging use cases

▪ New capabilities: How do we deal with ethical and legal concerns? ▪ How do we come up with rules in the first place? Illegal or Sensitive (Personal, Classified, NDA, etc.) ▪ During: Research, Development, in Use – look at the problems from different lenses!

Domain experts Ethics Legal Wider community (e.g. TIS guidelines) Direct stakeholders (analysts) Automation (tools)

slide-23
SLIDE 23

Sharing cyber threat intelligence

▪ CTI Sharing Compliance rules: ▪ Who am I allowed to share the TI with? NOTE: separate from – “who can I share with?” ▪ Filtering on top of a share (pub/sub-like) model ▪ What TI am I allowed to share? NOTE: separate from – “what is available to share?” ▪ Anonymisation/Pseudonymisation/Aggregation data

NREN A TI Inspector Compliant TI Pub/Sub List Ruleset TI leaving TI leaves

Compliance checker

NREN B GDPR NDA

slide-24
SLIDE 24

TI Sharing – p2p sharing architecture

Org 1 Org 3 Org 2 Org 1 Org 2 Org 3 Org 1 Org 2 Org 3 Community B Community A Community C =

Community controls what is sent to other communities

slide-25
SLIDE 25

TI Sharing – centralised sharing architecture

Community B Community A Community C

Org 1

Org 3 Org 2 Org 1 Org 2 Org 3 Org 1 Org 2 Org 3 Community controls what is sent central server but not what is sent to other communities

slide-26
SLIDE 26

TI sharing –PROTECTIVE system

slide-27
SLIDE 27

Alert Processing

Content

slide-28
SLIDE 28

Alert processing

slide-29
SLIDE 29

Meta-alert correlation

This project has received funding from the European Union’s Horizon 2020 research and innovation program under grant agreement No 700071. This output reflects the views only of the author(s), and the European Union cannot be held responsible for any use which may be made of the information contained therein.

▪ Correlated based on source and target IP address ▪ Alerts correlation based on time window. ▪ Rule-based correlation strategy to detect known attack scenarios. ▪ Generate Meta-alerts from existing Meta-alerts, based on time window.

slide-30
SLIDE 30

Alert trust

The Alert Trust module takes the following into account for calculating a quality score: ▪ IP Recurrence (IPR): how often have we seen the IP address of the attacker? ▪ Source Relevance (SR): how reliable is the detector? how likely is that the detector produced a false positive ▪ Attack Freshness (AF): how fresh (i.e., new) is the alert? ▪ Completeness (C): Are any important fields (e.g., the port number or the protocol) missing?

slide-31
SLIDE 31

Context Awareness

  • Develop a comprehensive picture of critical constituency dependencies and asset configurations.

Link

  • business objectives/missions to:
  • business processes/services to:
  • computing infrastructure
  • Understand dependencies in order to support
  • alert analysis triage,
  • real time response
  • informed defense planning
slide-32
SLIDE 32

Existing Tools

Content

slide-33
SLIDE 33

Warden

https://warden.cesnet.cz/en/architecture

slide-34
SLIDE 34

Mentat

https://mentat.cesnet.cz/en/index

slide-35
SLIDE 35

Pilots

Content

slide-36
SLIDE 36

Pilots

▪ Pilot 1: Internal focus with consortium developers ▪ Jan 2018 - August 2018 ▪ Functional, system and usability testing in three live NREN environments. ▪ Constituency focus, then Community focus. Configuration: P2P ▪ Pilot 2: External focus ▪ Dec/Jan 2018/2019 – July 2019 ▪ Aim: minimise disruption, maximise benefit, get outsider feedback ▪ In conversations with other NRENs + SMEs ▪ (SMEs as subscribers only – akin to an RSS feed)

slide-37
SLIDE 37

Conclusions

Content

slide-38
SLIDE 38

Conclusions

▪ PROTECTIVE is an EU international collaborative research project ▪ PROTECTIVE will contribute to cyber crime prevention by developing ▪ a correlation engine for cyber incident analysis ▪ platform for improved threat intelligence sharing ▪ advanced analytics and visualisation for massive numbers of incidents ▪ constituency context awareness system to enable.. ▪ automated security alert prioritisation based on operator preferences ▪ PROTECTIVE will validate the projects outputs through a multi-partner threat intelligence sharing pilot involving NRENs and SME ▪ PROTECTIVE will provide an open source cyber threat management platform for further exploitation by the cyber-defense community.

slide-39
SLIDE 39

Questions? www.protective-h2020.eu

▪ Contact us: info@protective-h2020.eu @ProtectiveH2020

slide-40
SLIDE 40

https://protective-h2020.eu/