170 likes | 294 Views
AT&T Security Technologies Improving Enterprise Security Against Emerging Threats. Jim Boxmeyer Director of Cyber Intelligence and Incident Response Twitter: @ jboxmeyer. AT&T Security Process. Before Security Event & Threat Analysis. After Security Event & Threat Analysis. Discovery.
E N D
AT&T Security TechnologiesImproving Enterprise Security Against Emerging Threats Jim BoxmeyerDirector of Cyber Intelligence and Incident ResponseTwitter: @jboxmeyer
AT&T Security Process Before Security Event & Threat Analysis After Security Event & Threat Analysis • Discovery • Discovery • Lessons Learned • Lessons Learned • Identification • Identification • Containment • Containment • Recovery • Recovery • Eradication • Eradication • Hundred’s of thousands of log entries • 2 – 3 Hours to handle a case • 500 – 600 cases per day • 600+ Million log entries per day • 10 Minutes to handle a case • 40 cases per day
Transforming Cyber Security • Web-based Information Collection • Broad Network Mapping Web-based Information Collection • Vulnerability Exploitation • Malware Installation • Web-based Information Collection • Web-based Information Collection • SocialEngineering • Targeted • Scan • Password Guessing • Reconnaissance • Scanning • System Access • Damage • Track Coverage Preventive Phase(Defense) Reactive Phase (Defense) AT&T Security ServicePrimary Emphasis
AT&T Expertise • Network Traffic Analysis • Botnet Tracking Analysis • Internet Baseline • Anomaly Detection • DNS Analysis • Route Analysis • Registry Analysis • Passive Monitoring • Capture Malware • Monitor Attacks / Infections • Develop Signatures • Massive Data Volumes • Network Flow Analysis (8B+) • Enterprise log events (600M) • 28P per day traffic volumes • Malware Analysis • Passive Capture • Automated Analysis • Develop Signatures
AT&T Analysis Volume • Currently processing more than 8 billion records per hour. • Representing more than 2.6 Petabytesof traffic per day.
Malware Analysis & Botnet Tracking • Capture Communication • Retrieves malware • Checks Anti-virus detection (submits undetected) • Identifies network observable behavior • Short & long-term controlled operation & reporting • Tracks status in database • Determine new communications to monitor • Analyze Communication • Tracking several hundred known botnets • thousands of servers • hundreds of thousands of bots • Monitoring command and control channels • file transfers • attacks • recruiting and reconnaissance activities • Analyze Malware for Behavior • Capture New Malware • Thousands of malware updates retrieved • Approx 70+% NOT detected by Anti-virus
AT&T Intelligence Sharing • Botnet Data • Signatures • Blocking • Alerting • Research • Network • Enterprise • Spam Sources • Controllers • Malicious DNS • Internet Protect • Learn Techniques • Improve Automation • Customer Alerts
Cyber Threat Report http://techchannel.att.com
Advanced Persistent Threat (APT) Willing to take steps to defeat security layers Develop technology to accomplish objectives Patience and careful planning and research Hard to detect. Difficult to remove. Persistent! Advanced Persistent Threat
Typical APT Malware Behavior APT Research Protocol Monitoring Domain Tracking APT Alarms
AT&T Security Operations System Security Event & Threat Analysis AT&T Labs Research • Tools development • Network Research • 1,200 + world’s best scientists at six locations • 2 Patents Average per day CSO Technologies • Security Research • AT&T Security Technologies • Patented Technologies and processes 10+ years in development AT&T Network • 28+ Petabytes of Traffic/day • Enormous Statistical analysis • Unique view of the world’s IP traffic ExperiencedPeople • 1,500+ Security Professionals • Industry Leaders • Experienced Scientists and Engineers