project plan
play

Project Plan Detecting Security Threats from User Authentication - PowerPoint PPT Presentation

Project Plan Detecting Security Threats from User Authentication Patterns The Capstone Experience Team Symantec Stephen Alfa Keerthana Kolisetty Robert Novak Abby Urbanski Xiaoyo Wu Department of Computer Science and Engineering Michigan


  1. Project Plan Detecting Security Threats from User Authentication Patterns The Capstone Experience Team Symantec Stephen Alfa Keerthana Kolisetty Robert Novak Abby Urbanski Xiaoyo Wu Department of Computer Science and Engineering Michigan State University Spring 2018 From Students… …to Professionals

  2. Functional Specifications • The goal of the project is to provide VIP customers a Splunk add-on and an AWS AMI to visualize various operational and security trend information present in log data and analyze it in near real-time • Both applications should alert users when suspicious or malicious activity is detected • Launching and deployment of both of those applications should be frictionless The Capstone Experience Team Symantec Project Plan Presentation 2

  3. Design Specifications • Create easy to read graphs and charts to represent authentication data o Successful vs Failed o Device Types o Authentications over time • Create premade graphics and searches and allow users to choose which ones to display. • Highlight patterns that could reveal suspicious or malicious activity The Capstone Experience Team Symantec Project Plan Presentation 3

  4. Process Flow Security Dashboard is User puts created in certificate in VIP Splunk/ELK Reference Client VIP Reference client The log data Splunk/ELK pulls VIP log data Installation of is stored as a takes in log pertaining to the Splunk/ELK CSV/JSON file data file certificate Operational User puts in Dashboard is Certificate in created in Splunk/ELK UI Splunk/ELK The Capstone Experience Team Symantec Project Plan Presentation 4

  5. Screen Mockup: Pie Chart Panel The Capstone Experience Team Symantec Project Plan Presentation 5

  6. Screen Mockup: Bar Graph Panel The Capstone Experience Team Symantec Project Plan Presentation 6

  7. Screen Mockup: Dashboard in Splunk The Capstone Experience Team Symantec Project Plan Presentation 7

  8. Screen Mockup: Dashboard in ELK The Capstone Experience Team Symantec Project Plan Presentation 8

  9. Technical Specifications • SOAP (Simple Object Access Protocol) API • Java • VIP Reporting Service Client (REST API) • JavaScript, HTML • SPL (Search Processing Language) The Capstone Experience Team Symantec Project Plan Presentation 9

  10. System Architecture The Capstone Experience Team Symantec Project Plan Presentation 10

  11. System Components • Hardware Platforms ▪ Amazon Web Services o Amazon Machine Images ▪ Software Platforms / Technologies ▪ Splunk ▪ Elasticsearch, Logstash, Kibana (ELK) The Capstone Experience Team Symantec Project Plan Presentation 11

  12. Risks Risks • Ability to Detect suspicious patterns ▪ There is a wide range of threats to detect and want to avoid false flags ▪ Consult with experienced security advisor and identify possible threats • Test Data ▪ Real VIP data is necessary to identify accurate threat patterns ▪ Get MSU’s VIP data • Consistency between Splunk and ELK ▪ Making sure that functionality is consistent between both platforms ▪ Develop both applications concurrently • AWS Servers ▪ The possibility of deploying the ELK applications on the AWS server ▪ Use AWS documentation and use online resources The Capstone Experience Team Symantec Project Plan Presentation 12

  13. Questions? ? ? ? ? ? ? ? ? ? The Capstone Experience Team Symantec Project Plan Presentation 13

Recommend


More recommend