presenter: domenico stranieri | system engineer| palo alto

10
Using Machine Learning to prevent modern cyber attacks Presenter: Domenico Stranieri | System Engineer | Palo Alto Networks

Upload: others

Post on 19-Feb-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Presenter: Domenico Stranieri | System Engineer| Palo Alto

Using Machine Learning to prevent modern cyber attacksPresenter: Domenico Stranieri | System Engineer | Palo Alto Networks

Page 2: Presenter: Domenico Stranieri | System Engineer| Palo Alto

2 | © 2018, Palo Alto Networks. Confidential and Proprietary.

Disrupt every step to prevent successful cyberattacks

• Occurs in seconds to minutes• Involves a small number of network actions• Can often be identified by IoCs

• Occurs over days, weeks, or months• Involves a large number of network actions• Can rarely be identified by IoCs

Attack Lifecycle

Data Exfiltration

Lateral Movement

Malware Installation

Vulnerability Exploit

Command and Control

SUCCESSFUL ATTACKS REQUIRE MULTIPLE STEPS

Page 3: Presenter: Domenico Stranieri | System Engineer| Palo Alto

3 | © 2018, Palo Alto Networks. Confidential and Proprietary.

• Attackers must perform thousands of actions to achieve their objective• Each individual action may look innocent

By profiling behavior, organizations can detect the behavioral changes that attackers cannot conceal

Connectivity rate change

Vulnerability Exploit

Malware Installation

Command and Control

Lateral Movement

Data Exfiltration

Repeated access to an unusual site

Unusually large upload

DETECTION AND RESPONSE MUST BE DIFFERENT

Page 4: Presenter: Domenico Stranieri | System Engineer| Palo Alto

4 | © 2018, Palo Alto Networks. Confidential and Proprietary.

Targeted Attacks

0%10%20%30%40%50%60%

Secon

ds

Minutes

Hours

Days

Wee

ks

Months

Years

Verizon Data Breach Investigations Report, Cost of Cybercrime Study, Ponemon Institute

• Multi-stage, manual attacks are the most financially devastating

Time to Attack Discovery

$3.62 millionaverage cost of a breach

Risky Behavior

14%data breaches

caused by human error

• Risky behavior increases risk of malicious attacks

Malicious Insiders

25%of breaches

involve insidersAnd it takes months to discover attacks

Compromised Endpoints

51%data breaches leverage

already compromised machines

$2.4 millionAverage cost of malware

per company

STEALTHY THREATS THAT LEAD TO DATA BREACHES

Page 5: Presenter: Domenico Stranieri | System Engineer| Palo Alto

5 | © 2018, Palo Alto Networks. Confidential and Proprietary.

Static RulesManually-defined correlation rules • Hard to develop

and maintain• False positives

Slow InvestigationsRepetitive processes

Manual endpoint forensics

• Days or weeks to block threats

Wrong DataInconsistent logs; mostly violations

Collecting right data requires deploying

sensors and agents

Lack of ScaleNot built for big data Cost-prohibitive to log necessary data

Slow software release cycles

TODAY’S DETECTION & RESPONSE ARE NOT ENOUGH

Page 6: Presenter: Domenico Stranieri | System Engineer| Palo Alto

Slow InvestigationsRepetitive processes

Manual endpoint forensics

• Days or weeks to block threats

Static RulesManually-defined correlation rules • Hard to develop

and maintain• False positives

Lack of ScaleNot built for big data Cost-prohibitive to log necessary data

Slow software release cycles

Wrong DataInconsistent logs; mostly violations

Collecting right data requires deploying

sensors and agents

Rich DataComprehensive

network, endpoint and cloud data

collected by existing infrastructure

Cloud Scale& Agility

Cloud elasticity for data storageRapid innovation

Machine Learning

Machine learning to profile behavior and automatically

detect attacks

Rapid ResponseSmall number of actionable alerts

Threat intelligence and endpoint analysisFirewall remediation

6 | © 2018, Palo Alto Networks. Confidential and Proprietary.

WHAT IS NEEDED

Page 7: Presenter: Domenico Stranieri | System Engineer| Palo Alto

7 | © 2018, Palo Alto Networks. Confidential and Proprietary.

CLOUD-DELIVERED SECURITY SERVICES

DATA FROM LOGS & TELEMETRY

NETWORK

MACHINE LEARNING

ENDPOINT CLOUD

Analyze rich network, endpoint and cloud data with machine learning

Accelerate investigations with endpoint analysis

Gain scalability, agility and ease of deployment as a cloud-delivered app

HOW BEHAVIORAL ANALYTICS CAN HELP

Page 8: Presenter: Domenico Stranieri | System Engineer| Palo Alto

8 | © 2018, Palo Alto Networks. Confidential and Proprietary.

HOW BEHAVIORAL ANALYTICS CAN HELPPUBLIC CLOUDMOBILE USERSLocal Users Private Cloud / Datacenter

HEADQUARTERINFRASTRUCTURE

INTERNET

CLOUD DELIVERED

SECURITY SERVICES

Next Gen. FWVIRTUAL

Next Gen. FWPHYSICAL

Adv. ENDPOINT PROTECTION

LSBA

IoCLOGGING SERVICELS

BA BEHAVIORALANALYTICS

IoC INDICATORSSHARING

1

2

3

Investigate attacks fast with automated endpoint interrogation

Take Action by quarantine / blocking devices

Detect attacks based on rich network, endpoint, and cloud data

Page 9: Presenter: Domenico Stranieri | System Engineer| Palo Alto

9 | © 2018, Palo Alto Networks. Confidential and Proprietary.

Spambot Behavior, Command and Control ,

Malware Behavior

Large File Uploads, Remote Desktop

Services

New Administrative Behavior, Exfiltration

Command and Control, Internal Reconnaissance,

Remote Command Execution

Automatic Detection Streamlined Investigation Rapid Response

Actionable alerts with context of: • User • Endpoint • Process

Firewall remediation:• Block attack

sources• Block malicious

destinations

Targeted Attacks

Malicious Insiders

Risky Behavior

Compromised Endpoints

HOW B. ANALYTICS CAN STOP STEALTHY THREATS

Page 10: Presenter: Domenico Stranieri | System Engineer| Palo Alto

10 | © 2018, Palo Alto Networks. Confidential and Proprietary.

Thank You!Domenico Stranieri

Pre-Sales System EngineerPalo Alto Networks | EMEA Italy

Questions & Answers

e: [email protected]: +39 338 6986710