320 likes | 331 Views
Learn about the role of artificial intelligence (AI) in cybersecurity, its benefits, and how it can help fill the gap in detecting and responding to advanced threats. Gain insights from Jeff Michael, a seasoned security architect, on the value of AI and its potential in improving security operations.
E N D
This isn’t your Grandpa’s AI Jeff Michael CISSP, CCSI, CCSE+, CCSE, CCSA, NSE, NSA, ICESENIOR SECURITY ARCHITECT LASTLINE
Agenda • Who is this guy • Goal of AI in Security • Need for AI • How is AI mis-understood • Why vendors love to say “AI” • Filling the gap with AI • Questions / Comments / Concerns
About the Speaker Jeff Michael Senior Security Architect, Lastline Jeff Michael is a seasoned security professional with nearly 22 years in malware investigations, penetration testing, security assessments, malware reverse-engineering and forensics investigations. Mr. Michael has written several security courses and has been a presenter at many worldwide conferences and shows. Classes that he wrote include "Security Open Source", "Hacking Exposed", and "Forensic Analysis 101". He is considered a Subject Matter Expert in computer forensics and investigations. As a subject matter expert, he has utilized his knowledge in security to assist in numerous international and criminal investigations. These investigations have included Malware Infections, HTTP code review, Malware analysis, Virus/Trojan analysis, social engineering, and several other techniques. He is currently working as a Senior Solutions Architect for Lastline. He has over 20 years of experience helping numerous startup security companies. These companies include FireEye, NetWitness, NetForensics, ISS, and other security firms. Mr. Michael graduated from Purdue University obtaining a bachelor's degree in Electrical Engineering. He holds the following certifications: CISSP, CCSI, CCSE+, CCSE, CCSA, NSA, NCSE, NCSA, ICE
AI • What’s the real goal for any AI system? • Find thing’s quickly that are impossible or time consuming for humans to find • Replace the simple tasks with AI to free up more hours for Investigations • What’s the value behind AI • Finding unknown threats • Correlation of events • Reduced time to remediation • Increased productivity
AI, ML, Deep Learning, and Anomaly Detection Artificial Intelligence Machine Learning Deep Learning AnomalyDetection
What Is AI? • “Artificial intelligence (AI), sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and other animals.” https://en.wikipedia.org/wiki/Artificial_intelligence
Why You Need AI-Based Network Security • Advanced Threats Evade Detection • Both legacy and “Next-Gen” security controls easily bypassed • Threats engineered to hide within normal network activity Understaffed Security Team Can’t Keep Up • 24/7 threat monitoring is not feasible • Unable to Process Massive Amounts of Data • Flood of information from your infrastructure
AI wasn’t Initially designed for Security • AI and ML techniques were developed to support the analysis of natural language, images, sounds, …. • NOT Security Threats
Expert Systems • Capture the expertise of a human being • Require human labor to create models and rules • Support the scalable application of knowledge
Expert Systems and Security • Capture the knowledge of a security expert/analyst • Support the application of models and rules to large datasets • Perform independently of the data they operate on • Takes the human (mostly) out of the loop
What Is Machine Learning? • “Machine learning explores the study and construction of algorithms that can learn from and perform predictive analysis on data” https://en.wikipedia.org/wiki/Machine_learning
Why Machine Learning? • Supports data analysis • Supports characterization • Supports classification
Machine Learning and Security • Supports the clustering of events and objects • Can identify similarities among data samples • Allows for the handling of groups of events • Allows for the identification of outliers • Supports the classification of events and objects • Can create classifiers based on historical ground truth • Takes the human (mostly) out of the loop
AI Done Right • Learn from the right dataset • Filter data to avoid pollution • Elicit behavior that reveals the actual characteristics of the sample • Use multi-classification and clustering to identify evasive samples • Perform quality control of your learned models • Make sure you learn the right thing…
Misuse vs. Anomaly Detection Model What’s Bad Model What’s Good
Modeling Bad Behavior • Time consuming • Requires expert knowledge • Incomplete • Constantly outdated Model What’s Bad
Learning Good Behavior • Automated • Continued • Comprehensive • Requires East-West traffic Model What’s Good
Learn What Your Network Does • Input: Netflow data, DNS resolutions, HTTP requests, DHCP logs, Active Directory data • Output: A network baseline model • Ports open • Recurrent name resolutions and repeated connections • HTTP request characteristics (and amount of errors) • Normal destinations of flows (flow fan-in/fan-out) • Normal amount of data sent/received • Time of activity, logins
Identify Anomalies • Once the baseline model has been established, the system identifies outliers • A new service started on a host • An RDP connection has been established to a server that was never contacted before • An unusual amount of data has been uploaded to a never-seen-before host • An unusual amount of HTTP errors has been generated
Pitfalls in Anomaly Detection Bad is anomalous Anomalous is bad
AI-Based Network Security • False Positives • Limited Attack Chain Visibility Artificial Intelligence Network Traffic Anomalous Activity Normal Activity
Why Vendors Love to say “AI” • Makes their product sound smarter • Helps spark interest • Better than saying “a bunch of nested signatures” • Because it’s not cool to say APT anymore
Conclusion • You only have so many brain cycles. Let AI do its job to save you a few. • Work Smarter not Harder • Make sure you are using real genuine AI, not an imitation • Trust but Verify
Introducing LastlineDefender The best AI-powered network security solution to stop advanced threats from entering and operating within your network.
About Lastline Company • Founded in 2011 by 3 of the top 10 threat researchers in the world • HQ in Silicon Valley, California • Santa Barbara | Boston | London | Vienna | Tokyo • Strong financial backing from top venture firms Market Leadership • 8 million users • 600 enterprise customers • 50 OEM, service provider, and technology partners including SecureWorks & IBM Technology • Deterministic approach delivers unmatched visibility into threats operating in your network • Scales to largest enterprise deployments • On-premises or cloud deployment options Awards • Leadership awards by NSS Labs, Forrester, Frost & Sullivan • Winner of multiple industry awards