Real-Time Data Security Webinar | SQLstream | July 2013 Series

42
If you haven’t dialed into the audio portion, please do so now: U.S.A +1909.259.0025 | code 986.247.708 THANK YOU FOR JOINING! THE WEBINAR IS ABOUT TO START Predict and Avert: Using Log File Data to Prepare Cybersecurity and Prevent Fraud Attacks in Real Time

description

The growth of identity theft, sophisticated fraud and unknown, persistent and adaptive threats represents a new and real challenge for existing enterprise IT and security intelligence systems. Many organizations do not have the visibility across their technology and business silos, and therefore despite their existing security protection infrastructure, are unable to detect these difficult to detect attacks and threats. Existing log monitoring and SIEM tools are no longer effective, nor have the real-time performance and flexibility required. This webinar presentation shows how streaming operational intelligence delivers the scalability and flexibility required with the lowest total cost of performance. The integration and analysis of high velocity unstructured log and Internet data feeds from a large variety of sources in real-time is addressed, as well as the application of multiple, sophisticated rules for detecting identify theft, fraud and cybersecurity attacks.

Transcript of Real-Time Data Security Webinar | SQLstream | July 2013 Series

Page 1: Real-Time Data Security Webinar | SQLstream | July 2013 Series

If you haven’t dialed into the audio portion, please do so now:

U.S.A +1909.259.0025 | code 986.247.708

T H A N K YO U F O R J O I N I N G ! T H E W E B I N A R I S A B O U T TO S TA R T

Predict and Avert: Using Log File Data to Prepare Cybersecurity and Prevent Fraud Attacks in Real Time

Page 2: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 2 Copyright © 2013 | +1 877 571 5775 | [email protected]

¤  Explain real-time Big Data and Operational Intelligence

¤  The principles of streaming data management

¤ Share our thoughts, experiences and use cases

¤ Audience Q&A

PROGRAM MISS ION

Page 3: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 3 Copyright © 2013 | +1 877 571 5775 | [email protected]

¤  Introduction (5 min)

¤ Presentation (35 min)

o  Internet, Theft and Cybersecurity – Emerging Issues

o  Streaming Operational Intelligence for Real-time Log Analyics

o  SQLstream at InfoArmor

o  Demonstration

¤ Q | A (20 min)

JULY 16 AGENDA

Page 4: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 4 Copyright © 2013 | +1 877 571 5775 | [email protected]

¤  July 9 2013 |10:00am PST- recording available upon request Analytics, Predictive Analytics, Prescriptive Analytics: The Anatomy of Operational Intelligence

¤  July 16 2013 |11:00am PST- recording available upon request Listen to your Sensors: A Tale of Managing Large Scale Sensor Networks in Real-time

¤  July 23 2013 |11:00am PST Predict and Avert: Using Log File Data to Prevent Cybersecurity and Fraud Attacks in Real Time

¤  July 30 2013 |10:00am PST No more CPR for your CDRs: Meet Real-time Traffic Utilization, Billing and Fraud Detection

T he Opera t i ona l I n t e l l i gen ce Se r i e s

Page 5: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 5 Copyright © 2013 | +1 877 571 5775 | [email protected]

OPERAT IONAL INTEL L IGENCE I n t eg ra t i ng Opera t i on s and Ana ly t i c s i n Rea l - t ime

As we move toward a real-time business environment, the capability to process data flows swiftly and flexibly will become increasingly important. SQLstream leads the industry in this kind of capability. ”

Robin Bloor Chief Analyst for Bloor Group

Business Intelligence

Operations

Real-time Operational Intelligence Continuous monitoring and analytics

Improve decision-making

Automate operational processes

Cybersecurity Fraud Monitoring

Identity Theft Alerts Compliance

Log Monitoring

Page 6: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 6 Copyright © 2013 | +1 877 571 5775 | [email protected]

T he I n fo r ma t i on Va l ue Cha i n

What is happening?

What might happen?

What just happened?

Make stuff happen!

Page 7: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 7 Copyright © 2013 | +1 877 571 5775 | [email protected]

ABOUT SQLs t ream

facts

o  Launched 2009 o  Multiple deployments

across many industries

o  Real world benchmarks

capabilities

o  Unstructured and structured data

o  Accelerates and extends Hadoop & RDBMS

o  Not only SQL

innovations

o  Massively scalable streaming data platform

o  Only standard SQL streaming engine

o  Five patents for stream processing

A Streaming Big Data Management Platform for real-time Operational Intelligence

from high-velocity machine data

Recent awards:

Page 8: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 8 Copyright © 2013 | +1 877 571 5775 | [email protected]

¤  Highest-scoring computer science graduate from the University of Manchester

¤  Highly successful career in the high tech, real-time software sector, with senior management positions at HP, XACCT and Followap.

¤  Holds 11 US patents

¤  Finalist in the 1995 International Management Challenge

Today ’ s P re sen te r : Dam ian B la c k SQL s t ream Co- founde r & CEO

Page 9: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 9 Copyright © 2013 | +1 877 571 5775 | [email protected]

¤  Over 15 years of information security, network security and intrusion detection experience

¤  CTO of InfoArmor, with previous experience at Level 3 Communications, Trustwave and owner of Sage Technologies.

Today ’ s Gue s t : Ch r i s t i an Lee s I n foAr mor CTO

Page 10: Real-Time Data Security Webinar | SQLstream | July 2013 Series

¤  TWEET: during and after the webinar, please

use #cybersecurity for live discussions

¤  DIRECT QUESTIONS: please use the box to the

right of your screen

¤  RECORDINGS: an edited version of the webinar

recording will be emailed upon request

Page 11: Real-Time Data Security Webinar | SQLstream | July 2013 Series

Cyber se cu r i t y - t he i s s ue s

Page 12: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 12 Copyright © 2013 | +1 877 571 5775 | [email protected]

Cybe r se cu r i t y | A GROWING MARKET

¤  No longer an unorganized hacker world ¤  Innovation and technology ¤  Global economy ¤  Political support

$207 Billion

Entrepreneur.com

In 2012, U.S. Navy databases were hacked and 200,000 sailors’ information was put at risk.

Page 13: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 13 Copyright © 2013 | +1 877 571 5775 | [email protected]

Cybe r A t ta c k s | DAMAGES

î  12.6 Million Americans were ID Theft victims last year

î  608,271,950 and growing records have been compromised due to security breaches since 2005

î  94% of healthcare organizations surveyed had at least one data breach in the past 2 years

î  1 in 4 data breach notification recipients became a victim of identity fraud

î  5 times more likely to be a fraud victim if your Social Security Number has been compromised in a data breach

Page 14: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 14 Copyright © 2013 | +1 877 571 5775 | [email protected]

Types of At tacks

¤  Credit card numbers ¤  Personally identifiable information ¤  Protected health information ¤  Social Security Numbers ¤  Intellectual Property or trade secrets

data breach

security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an unauthorized individual.

Page 15: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 15 Copyright © 2013 | +1 877 571 5775 | [email protected]

ABOUT InfoAr mor

¤  Founded by Washington Mutual to protect 10M credit card holders

¤  Focused on employee benefits and value-added subscriber services

¤  70% employee owned

¤  Growing at triple digit rates

¤  Engaged, satisfied subscribers

¤  Overall Satisfaction:

>90% “Strongly Agree” or “Agree”

Fortune 500 Clients

information protection experts

Page 16: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 16 Copyright © 2013 | +1 877 571 5775 | [email protected]

INTERNET SURVEILLANCE

InfoArmor Internet Surveillance uses bots to continuously monitor the Underground Economy to uncover compromised,

sensitive information. Whether it is personal identifying data or a medical insurance card, Internet Surveillance

uncovers breached data and alerts in real time.

What We Monitor:

¤  Malicious Command & Control Networks

¤  Black Market Forums

What is the Underground

Economy?

An ever-evolving complex of compromised machines, networks and web services identified by InfoArmor and leading cyber security firms.

¤  Phishing Networks

¤  Exploited Websites

¤  Known Compromised Machines & Servers

Page 17: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 17 Copyright © 2013 | +1 877 571 5775 | [email protected]

INTERNET SURVEILLANCE

How We Monitor:

¤  Proprietary hardware and software solution

¤  Unparalleled alert accuracy (minimized false positives)

¤  Secure: separate reconnaissance and analysis efforts, plus no refined search queries

What We Monitor:

¤  SSNs, names, addresses, emails and DOBs

¤  Wallet items (i.e. credit cards, medical insurance card)

INFOARMOR BOTS monitor UNDERGROUND ECONOMY

COMPROMISED DATA sent back to INFOARMOR

SENSOR compares compromised to subscriber data in secure environment, creating

ALERTS with 100% accuracy

X

Page 18: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 18 Copyright © 2013 | +1 877 571 5775 | [email protected]

KNOW YOUR DATA | S I EM CHALLENGES

SIEM Tools ¤  ‘Black Box’ tools – Easy start but rigid ¤ Limited to supported rules ¤ No repurposing of tools ¤ High cost of real-time performance

one size does NOT fit all

You as a product owner know your data best, not the SIEM provider.

Page 19: Real-Time Data Security Webinar | SQLstream | July 2013 Series

S t r eam i ng Ope ra t i o na l I n t e l l i ge n ce

Page 20: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 20 Copyright © 2013 | +1 877 571 5775 | [email protected]

H igh - ve lo c i t y B ig Da ta Ana ly t i c s

Historical queries and data

enrichment

Storing valuable derived streams for future access

Ope

ratio

nal I

ntel

ligen

ce

Logs

Sensors

GPS

Networks

Social media

RFIDs

Servers

Telecom

Smart grid

Oil & Gas

Manufacturing

Logistics

M2M

Telematics

Retail

Internet

Banking

Data centers

Automotive

¤  Continuous Queries over Sliding Time Windows ¤  Analysis and Integration of Unstructured and Structured data ¤  Prescriptive Analytics drives Automated Actions

Page 21: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 21 Copyright © 2013 | +1 877 571 5775 | [email protected]

L og and Mac h i ne Da ta W h e r e i s t h e i n t e l l i ge n c e ?

TRANS,2013-02-17-15:30:22,3458783,2347897953,128.56.0.253,STATUS:-15, DE69975, 4157588342 Transaction Log Details

Web Server Logs

Network Logs

Device Locations

Twitter {"created_at:Thu Feb 17 15:30:55 +0000 2013,id:304612775055998976,id_str:304612775055998976,text:@MyServiceProvider today sucks, keeps dropped!,source:u006ca href=http:www.url.com rel=nofollow,followers_count:147,friends_count:10142, location: San Francisco, time_zone: Pacific, geo_enabled:true, location:u00dcT: -6.1987552,106.8661953, screen_name:APerson

<id>1597831220</id><deviceid>0198873465</deviceid><lat>lat=47.643957</lat><lon>lon= -122.3269</lon><time>2013-02-17T15:37:26Z</time><bearing>223.4535</bearing>

<id>1597865781</id><deviceid>0198873465</deviceid><lat>lat=47.645982</lat><lon>lon=-122.327500</lon><time>2013-02-17T15:37:26Z</time><bearing>200.6138</bearing>

<id>1597940125</id><deviceid>0198873465</deviceid><lat>lat=47.647381</lat><lon>lon=-122.326501</lon><time>2013-02-17T15:37:26Z</time><bearing>87.4357</bearing>

[Sun Feb 17 15:30:49 2013] [notice] srv-sfo-08 caught SIGTERM, shutting down [Sun Feb 17 15:30:49 2013] [notice] Apache/2.2.21 -- resuming normal operations

TERMINATE,ctl09gsx,01299796304,GMT-08:00,02-17-13,15:21:00,9,387,64ms,02-17-13,15:30:55,0005, IP-TO-IP,4157588342,8775715775,1,0,4157588342,RD_AXY_NN0_001,SFR01AAG34,40.50.245.60, 234.234.60.75,65678,411,399,SIP,SANFRANCISCO,0x4B1698,0x0005E,0x49768,4157588342,0198873465

Timestamp

Timestamp

Timestamp

Timestamp

Timestamp

Mobile # Customer

Mobile # Device ID Term Reason

Device ID Location

Location

Service Provider

Fail Code

Server

Page 22: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 22 Copyright © 2013 | +1 877 571 5775 | [email protected]

SELECT STREAM "SuspectLoginFailures"."accountNumber”,

"webFail" + "phoneFail" AS "loginFailureCount”, "transactionType", "amount”,"city", "region", "lat", "lon” FROM "SuspectLoginFailures" OVER "lastFew” JOIN "Transactions" OVER "now" USING ("accountNumber”) WHERE "isDebit” WINDOW "lastFew" AS (RANGE INTERVAL '1' MINUTE PRECEDING), "now" AS (RANGE CURRENT ROW);

The Power Of S t ream ing SQL A n E x a m p l e o f A P i p e l i n e P r o c e s s i n g N o d e

BUSINESS NEED: Detecting suspect account

debits following unusual login behavior

BLAZING SPEED: Processing millions of records

per second on low-end servers.

Identifies accounts where transactions have taken place concurrent with

suspect login activity over a 1 minute moving time window

Page 23: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 23 Copyright © 2013 | +1 877 571 5775 | [email protected]

CLEANING & FILTERING

STREAMING ANALYTICS

STREAMING AGGREGATION

CONTINUOUS INTEGRATION

Internet Security Fraud

Prevention Network

Monitoring

CyberAttack Monitoring

Compliance Monitoring

An Opera t i ona l I n t e l l i gen ce P la t fo r m

Log Files Databases Locations Networks Social Media Servers M2M Feeds

Page 24: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 24 Copyright © 2013 | +1 877 571 5775 | [email protected]

Rea l - t ime A r c h i t e c t u re Streaming Analysis and Integration for Infinite Flows of Unstructured Data in Real Time

Streaming Agent & Adapter Layer + JDBC API Hadoop Streaming

Query Planner & Optimizer for MPP Execution SQL

Developer Tools

Platform Administration

Streaming SQL Real-time Applications

Real-time Dashboards & Visualization

Logs

Sensors

GPS

Networks Social Media Servers

M2M Telematics

Impala SQL

HBase

HDFS / MR

Hadoop for Stream Persistence, Enrichment & Replay (Optional)

Any external data warehouse, operational system and

enterprise platform

Page 25: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 25 Copyright © 2013 | +1 877 571 5775 | [email protected]

T he SQL s t ream s -S t ream ing P roduc t Po r t fo l i o

s-Server Data Management Platform for Streaming Big Data

s-Analyzer Real-Time Visualization for Streaming

Operational Intelligence

s-Transport Geo-Analytics for Location-based

Applications

s-Visualizer Advanced

Visualization

s-Cloud s-Server EC2 AMI Deployment

s-St

udio

D

evel

oper

& A

dmin

Con

sole

Page 26: Real-Time Data Security Webinar | SQLstream | July 2013 Series

Case s t udy

Page 27: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 27 Copyright © 2013 | +1 877 571 5775 | [email protected]

New cards New cell phones New accounts New addresses

offline

online Authentications Social Media

KNOW YOUR DATA | Da ta Sou r ce s

Page 28: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 28 Copyright © 2013 | +1 877 571 5775 | [email protected]

Continuous integration with existing data warehouses

Alerts, real-time dashboards and integration

with operational systems

Real-time syslog data collection using remote

lightweight agents

SQL s t ream| Rea l - t ime Secu r i t y I n t e l l i gen ce

Syslog data collection ¤  Agents turn log data into real-time streams ¤  Data from firewalls, authentication logs, databases, intrusion detection, user activity logs

Correlation and rules execution ¤  Dynamic rules (streaming SQL) ¤  Evaluate any combinations of log

streams any number of times ¤  Real-time and time window-based

analytics

Alert logging and data warehouse updates

Page 29: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 29 Copyright © 2013 | +1 877 571 5775 | [email protected]

Nex t s t ep s | COMPL IANCE

è Monitor system commands for employees, vendors and contractors

Continuous integration with existing data warehouses

Alerts, real-time dashboards and integration

with operational systems

Real-time syslog data collection using remote

lightweight agents

Page 30: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 30 Copyright © 2013 | +1 877 571 5775 | [email protected]

KNOW YOUR DATA | S I EM CHALLENGES

one size does NOT fit all

The real-time advantage ¤ Consumes any data source ¤ Scales to millions of events per second ¤ Streaming SQL analytics – tailored to our rules and data ¤ Multipurpose with low cost of ownership ¤ Scales the business for real-time operations

Page 31: Real-Time Data Security Webinar | SQLstream | July 2013 Series

Demon s t ra t i o n Rea l - t ime Se c u r i t y I n t e l l i ge n ce

Page 32: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 32 Copyright © 2013 | +1 877 571 5775 | [email protected]

¤ Security Intelligence Demo

¤  Overview

o  Fraud analytics

o  Log monitoring

o  Alerts

¤  Demonstration

o  Walkthrough the visual demo

o  Illustrate SQL rules

o  Discuss ease of update and deployment of additional rules

Demo: Real - t ime Secur i ty In te l l igence

Page 33: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 33 Copyright © 2013 | +1 877 571 5775 | [email protected]

REAL-T IME FRAUD DETECT ION | Demons t rat ion

Remote Log Agent

Remote Log Agent

Remote Log Agent

Web Login Servers (Data Center 1)

Phone Login Servers

(Data Center 2)

Transaction Servers

(Data Center 3)

LoginEvents (STREAM JOIN: UNION ALL)

SuspectLoginFails (STREAM ANALYSIS, 1 MINUTE WINDOW)

SuspectDebits (STREAM JOIN, 1 MINUTE WINDOW)

RealTimeAlerts

SMTP Adapter

Account API

Data Warehouse

Email Alerts

Account Freeze (Auto)

Continuous ETL

Adapter & Agents

Streaming SQL Query

Data Stream

Page 34: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 34 Copyright © 2013 | +1 877 571 5775 | [email protected]

CREATE OR REPLACE VIEW “SuspectDebits” AS SELECT STREAM "SuspectLoginFailures"."accountNumber”, "webFail" + "phoneFail" AS "loginFailureCount”, "transactionType", "amount”,"city", "region", "lat", "lon” FROM "SuspectLoginFailures" OVER "lastFew” JOIN "Transactions" OVER "now" USING ("accountNumber”) WHERE "isDebit” WINDOW "lastFew" AS (RANGE INTERVAL '1' MINUTE PRECEDING), "now" AS (RANGE CURRENT ROW);

REAL-T IME FRAUD DETECT ION | Demons t rat ion

CREATE OR REPLACE VIEW "LoginEvents” AS SELECT STREAM "recNo", 'PHONE' AS "accessType", "accountNumber", "loginSuccessful", "callerId"

AS "client”, "directDial" AS "server", "customerId”, "countryCode", "countryName", "city", "region", "lat", "lon”

FROM "PhoneLoginEvents” UNION ALL SELECT STREAM "recNo", 'WEB' AS "accessType", "accountNumber", "loginSuccessful", "sourceIP”

AS "client", "destIP" AS "server", "customerId", "countryCode", "countryName", "city", "region”, "lat", "lon”

FROM "WebLoginEvents";

Page 35: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 35 Copyright © 2013 | +1 877 571 5775 | [email protected]

REAL-T IME FRAUD DETECT ION | Demons t rat ion

Page 36: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 36 Copyright © 2013 | +1 877 571 5775 | [email protected]

REAL-T IME FRAUD DETECT ION | Demons t rat ion

Page 37: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 37 Copyright © 2013 | +1 877 571 5775 | [email protected]

REAL-T IME FRAUD DETECT ION | Demons t rat ion

Page 38: Real-Time Data Security Webinar | SQLstream | July 2013 Series

Opera t i o na l I n t e l l i ge n ce a nd To ta l Co s t o f Pe r fo r man ce

Page 39: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 39 Copyright © 2013 | +1 877 571 5775 | [email protected]

R E C O R D S P E R S E C O N D

To ta l Co s t Of Pe r fo r mance ( t o ta l COP ) T h e H i g h - Ve l o c i t y, L ow - L a t e n c y T i p p i n g Po i n t f o r B i g D a t a

Patterns Trends Mining Connections

Searches Inventory Reports Statistics Billing

SOCIAL E-COMM SECURITY TELEMATICS TELECOM

Trading Advertising Alerts Detection Signal

Intelligence

TO

TA

L C

OS

T

Page 40: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 40 Copyright © 2013 | +1 877 571 5775 | [email protected]

Intelligence

TELECOM

Patterns Trends Mining Connections

Searches Inventory Reports Statistics Billing

Trading Advertising Alerts Detection Signal

SOCIAL E-COMM SECURITY TELEMATICS

R E C O R D S P E R S E C O N D

TO

TA

L C

OS

T To ta l Co s t Of Pe r fo r mance ( t o ta l COP ) T h e H i g h - Ve l o c i t y, L ow - L a t e n c y T i p p i n g Po i n t f o r B i g D a t a

Page 41: Real-Time Data Security Webinar | SQLstream | July 2013 Series

| 41 Copyright © 2013 | +1 877 571 5775 | [email protected]

DATA EXPLOSION

COMPLEXITY

BUSINESS AGILITY

S t ream ing Opera t i ona l I n t e l l i gen ce

Eliminates the development risk •  Simplifies development, rapid time to market

Lowest Cost of Performance for Real-time Apps •  Efficient scale-out for high velocity data

Adding new applications on the fly •  With dynamic sharing of data streams across Apps

Page 42: Real-Time Data Security Webinar | SQLstream | July 2013 Series

Damian Black

Email | [email protected]

Phone | 415.652.6942

Website | www.sqlstream.com

Upcoming events | www.sqlstream.com/webinars/

Q | A