17
WWW.CROWDSTRIKE.COM CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH The Cutting-Edge Use of Graph Data Models and Analytics in Cybersecurity

CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

WWW.CROWDSTRIKE.COM

CROWDSTRIKE // WHITE PAPER

STOPPING BREACHES

WITH THREAT GRAPH

The Cutting-Edge Use of Graph Data Models and Analytics in Cybersecurity

Page 2: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

"Siloed"”is a word often used to describe the current state of cybersecurity solutions. It has also been

blamed as the No. 1 reason why attackers manage to bypass defenses. The usual response to the

challenge has been to integrate and centrally collect events data generated by those solutions. However,

the growing number of successful data breaches demonstrates that this approach is insufficient. That’s

because collecting the data is not the biggest challenge. The difficulty lies in determining how the data

is used once it’s collected.

Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

is the sheer volume of data. As computer systems generate billions of events daily, the amount of

data to analyze over time can reach petabytes. Secondly, that data is often unstructured, discrete and

disconnected. Without adequate structure, determining how individual events may be connected to an

impending attack becomes a tedious and time-consuming manual process. In such an environment,

detecting attacks is often difficult, and sometimes impossible.

CrowdStrike sought to solve this challenge by employing a graph data model to collect and analyze

extremely large volumes of security-related data. Since no commercial graph database solutions were

capable of meeting the unique requirements of cybersecurity, CrowdStrike designed and built its own --

the CrowdStrike Threat GraphTM” -- to store, query and analyze relevant security events.

Graph theory is far from new. In fact, it has been used to solve mathematical problems for centuries.

The sheer power and scalability of the graph data model has led to its adoption by some of the largest

technology companies on earth, including Facebook, Microsoft and Google. CrowdStrike is the first to

purposefully use a graph database for cybersecurity.

This white paper explains why graph data models are uniquely suited to solving current cybersecurity

challenges, and details how CrowdStrike uses its own graph database to stop breaches.

Page 3: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

Why Graph Databases Are So Powerful Unlike most existing data models, such as relational

databases, graph databases offer a simple,

flexible and scalable way to store and model highly

interconnected datasets. Those qualities are critical

for the analysis of security data.

Detecting attacks requires the ability to track and

store the interaction of users, machines, applications,

network communications, system events, processes,

disk access, and more -- as these interactions

occur in the highly complex, rapid and dynamic

environment that constitutes an endpoint.

Traditional databases were designed to fit data into

predefined structures called schemas, presenting

a major limitation for security analysis. If new data

types or new relationships appear that were not

accounted for in the original design, the information

will not be stored. Put simply, with a traditional

database schema, data that does not fit is lost. This

presents an insurmountable obstacle to effective

security analysis because lost data creates "blind

spots" that attackers can exploit to avoid detection.

Conversely, graph databases can easily store and

keep track of security events, despite the frequently

unstructured and unanticipated nature of security

data. It has been said, "If you can whiteboard it, you

can graph it."

“ The sheer power and

scalability of the graph data model has led to

its adoption by some of the largest technology

companies on earth.

Page 4: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

In a graph database, each object -- called a vertex or node -- can have many relationships. Those relationships are called "edges." For example, the graph model above represents the social

interactions and gustatory preferences among a group of coworkers. In this case, Lisa and Marie represent vertices and their various relationships are considered an edge.

E xample of Graph Database Structure

Page 5: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

That’s because the graph model closely matches reality.

In a graph database, each piece of data is stored as its

own separate object with its own unique attributes.

The data with its attributes is then attached to the

graph. This gives graph databases the ability to grow

and accept new types of data infinitely. As a result, they

can be easily populated with properties and values,

without adhering to a predetermined schema, and

then immediately searched. That also makes graph

databases very good at mapping relationships and

uncovering the "interconnectedness" between entities

in a network.

Adapting Graph Data Models to Cybersecurity The powerful concept of graph data modeling is at the

heart of the CrowdStrike Threat Graph, a powerful and

massively scalable graph database that resides in the

Cloud. Custom-built by CrowdStrike, Threat Graph’s

capability for storing, visualizing, correlating and

analyzing the vast quantity of event data generated by

endpoints provides the CrowdStrike Falcon Platform”

with its unique ability to identify attacks in progress

and actually stop breaches.

Feeding the Graph Threat Graph is "fed" by a variety of sources. In addition

to endpoint telemetry transmitted directly from Falcon

Host sensors, it receives threat intelligence from

“ As a graph database built to fully utilize a highly elastic cloud

infrastructure, Threat Graph can scale to meet any volume

requirements.

Page 6: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

CrowdStrike’s Falcon Intelligence team and from a variety

of third-party sources. Its graph data model allows Threat

Graph to process billions of events daily, streaming from

millions of sensors, and to support more than 500,000

event writes per second. It also provides the ability to grow

by orders of magnitude to accommodate petabytes of

additional data. As a graph database built to fully utilize a

highly elastic cloud infrastructure, Threat Graph can scale

to meet any volume requirements.

This ever-growing, enriched data set creates a

perfect environment for analyzing security data at an

unprecedented scale, forming one of the primary pillars

supporting CrowdStrike’s breach prevention capabilities.

Full Visibility, Instantly The data stored in Threat Graph becomes immediately

available for viewing, visualization and for retrospective

searches. Some key use cases for taking advantage of this

capability include the following:

Real-Time Attack Visibility and Drill-Down

Threat Graph’s instant access to data allows users

to see and trace process execution on any endpoint

in their environment, includ ing rich contextual

information such as the process name, arguments

and exact time of execution, as well as the sequence of

events following that execution (see Figures 1 and 2).

“ The powerful concept

of graph data modeling is at the heart of the CrowdStrike Threat

GraphTM, a powerful and massively scalable graph database that resides in

the Cloud."

Page 7: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

This is key to better understanding the context of

code and other executables in an environment.

Being able to observe the process, command-line

arguments and timing allows security teams to

observe suspicious and anomalous activity that

could warrant action, and to trace potentially

malicious activities in the full context of the

affected machine.

Figure 1: The full context of code execution on an endpoint, displayed in a process tree.

Figure 2: The same chain of events, instantly displayed in the CrowdStrike Falcon user interface.

Page 8: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

Visualization

Another advantage of Threat Graph lies in its

ability to map dependencies and present the

information visually. By visualizing data in this

form (see Figure 3), analysts can spot outliers,

inconsistencies and variances at a glance, and

identify potential security issues in seconds.

Figure 3 represents a map of remote desktop

connections per user account, as it is displayed

in the Falcon Host management interface. The

unusually high number of connections established

by that account is a potential indication that the

account may have been compromised. Threat

Graph’s data visualization capability allows for

instant identification of this suspicious behavior

which would otherwise be very difficult to detect --

and could possibly go completely unnoticed.

Figure 3: Visualization of remote desktop connections per user and per system.

Potential indication of compromised credentials

Page 9: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

Historical and Retrospective Searches

Since the state of the endpoints and the

environment is kept over time, Threat Graph offers

the powerful ability to look back and retrace events

as they occurred on any endpoint. This provides

analysts with the ability to trigger detections

retrospectively. For example, if something is

discovered today, its roots can be traced back

to perform in-depth forensic analysis -- whether

the event took place yesterday, last week, or last

month. In this way, Threat Graph takes discovery

and insight not only forward, but also backward,

providing real-time and historical visibility

into individual events across all the endpoints

comprising a customer’s environment.

Automated Analysis Eliminates Slow, Tedious Manual Processes The type of real-time visibility and visualization

described above is possible because automated

analysis is performed on the data as soon as it is

written to the database. The graph nature of the

Threat Graph allows multiple detection methods and

algorithms to run against the data simultaneously,

leading to near-instant results. These methods include,

but are not limited to, checking against known malware

and using machine learning algorithms for detection of

unknown malware and Indicators of Attack (IOAs).

“ Threat Graph continually

looks for malicious activity by applying a combination

of graph analytics and machine learning

algorithms across its data.

Page 10: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

IOAs are a means of detection pioneered by CrowdStrike. These

indicators reflect a series of actions an adversary must perform to be

successful in their attack. IOAs rely on the relationships, context and

sequence of events to determine if an attack is in progress. Effective

and efficient IOA creation and analysis have been enabled largely by the

Threat Graph.

Prior to the Threat Graph, an analyst would have had to gather endpoint

telemetry, sometimes from multiple sources, then add intelligence

feeds, write their own correlation rules, and finally, pivot the data

endlessly to determine how events might be related. This required slow,

labor-intensive processes. In contrast, the Threat Graph offers one

unified view of all events and intelligence known to CrowdStrike and

its customer base spread across more than 175 countries. The analysis

can be automated since all the data -- including intelligence, events

and most importantly, their relationships -- are all kept in one place.

It is interesting to note that the endpoints themselves are not

impacted by the analysis, since Threat Graph runs in the Cloud. This

allows CrowdStrike to run concurrent tests, analysis and validation as

required, leading to faster answers and response times.

Finding the "Unknown Unknowns" We’ve seen that Threat Graph tremendously enhances and speeds

the detection of attacks and patterns of attacks by providing

unprecedented visibility, which in turn enables full automation of the

analysis. But Threat Graph also excels in facilitating the discovery of

Page 11: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

How the Threat Graph Works

Page 12: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

new behaviors that have never been observed before: the so-called

"unknown unknowns."

Threat Graph continually looks for malicious activity by applying a

combination of graph analytics and machine learning algorithms

across its data. The algorithms not only look at file features, but also

track the behaviors and sequence of code execution in the customer’s

environment. More importantly, the graph data model allows those

algorithms to discover relationships between events that are not

directly related, but which could constitute an attack that would

otherwise remain undetected.

Another striking aspect of the Threat Graph is that it allows multiple

algorithms to be run simultaneously. This concurrent analysis

ultimately allows triggers, or potential threats, to be discovered much

faster. In addition, the discovery of new triggers can automatically

spawn additional analysis. This allows the whole system to learn

and build its own intelligence over time. As more data is fed into

the Threat Graph, more attack patterns are discovered. Those new

detections are tested and added to the analysis process, increasing

Threat Graph’s ability to quickly and automatically detect similar

attacks. This potent combination of automation and intelligent

analysis allows CrowdStrike to find these "unknown unknowns" that

elude conventional security measures.

Enabling Managed Threat Hunting Threat Graph enables unprecedented levels of automation to eliminate

many of the manual processes that response teams typically endure

to detect attacks. However, the threat landscape has changed. Security

Page 13: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

professionals increasingly must face-off with human adversaries, who

may have the skill and ingenuity to defeat even the most sophisticated

automation. That’s why CrowdStrike has always advised that human

security assets must be part of the defense chain. Once again, Threat

Graph provides unique and exceptional help to achieve that.

A shining example of this is the way Falcon Overwatch, CrowdStrike’s

proactive threat-hunting team, uses Threat Graph. As noted earlier,

Threat Graph first automates the process of discovering triggers,

eliminating a very lengthy and tedious process that overtaxes and

underutilizes most in-house security teams. Once these triggers are

presented to a managed hunting team such as Overwatch, the hunters

can turn back to the Threat Graph for further investigation. At that

point, they may need to run ad hoc queries, something at which Threat

Graph excels. Unlike traditional databases, which are only really suited

to providing answers to predetermined questions on a "big data" scale,

graph databases can answer these off-the-cuff questions without

delay or difficulty. In addition, since analysts often don’t know ahead of

time what they will be asking, the ability to answer ad hoc queries is a

"must-have" feature for successful and timely detections. In this way,

Threat Graph enables the Falcon Overwatch team to hunt much more

quickly and efficiently.

How CrowdStrike Customers Benefit from Threat Graph Upon deployment of CrowdStrike Falcon solutions, the Threat Graph

provides you with immediate benefits, such as:

• FASTER INVESTIGATIONS FOR FASTER RESPONSE TIME

Threat Graph stores the timeline of activity needed to detect and

Page 14: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

prevent attacks, and to provide advanced forensic capabilities. It

then automates the manual processes required to triage events

and discover triggers. Finally, it enables the Falcon Overwatch team

to hunt down and validate each trigger. This type of investigation

would normally take hours and even days, tying up precious security

talent and resources, but with Threat Graph, the process can take

place in minutes. The ability to conclude investigations faster

allows CrowdStrike customers to respond to incidents as they are

uncovered, gaining precious hours and days over your adversaries.

• THREAT GRAPH DOES THE JOB FOR YOU

Because new attack patterns are identified, created and validated in

the Threat Graph, customers don’t have to worry about creating and

updating their own detection patterns.

• THE POWER OF THE CROWD: COLLECTIVE INTELLIGENCE

One new artifact, technique, tool, process or tactic found at a single

customer site can be immediately tested and validated across all

customers. The scale and speed of Threat Graph enables CrowdStrike

to do this in real time and historically, significantly increasing both

the speed and precision of detection and prevention. If Threat Graph

detects something in one customer environment, all customers

benefit from it automatically.

Page 15: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

Conclusion CrowdStrike Threat Graph is the brain behind the Falcon Host

prevention platform. It provides complete real-time visibility and

insight into everything happening on your endpoints throughout

your environment. Using powerful graph analytics to scour

billions of events in real time, Threat Graph draws links between

security events across the global Falcon Host sensor community

to immediately detect and prevent adversary activity, at scale and

with unprecedented speed. In this way, Threat Graph empowers

CrowdStrike customers with an extraordinary level of protection

against breaches.

Page 16: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

A B O U T C R O W D S T R I K ECrowdStrike is the leader in next-generation endpoint

protection, threat intelligence and response services.

CrowdStrike’s core technology, the CrowdStrike FalconTM

platform, stops breaches by preventing and responding to

all attack types – both malware and malware-free.

CrowdStrike has revolutionized endpoint protection by being

the first and only company to unify three crucial elements:

next-generation AV, endpoint detection and response (EDR),

and a 24/7 managed hunting service — all powered by

intelligence and uniquely delivered via the cloud in a single

integrated solution.

Falcon uses the patent-pending CrowdStrike Threat GraphTM

to analyze and correlate billions of events in real time,

providing complete protection and five-second visibility across

all endpoints. Many of the world’s largest organizations already

put their trust in CrowdStrike, including three of the 10 largest

global companies by revenue, five of the 10 largest financial

institutions, three of the top 10 health care providers, and three

of the top 10 energy companies. CrowdStrike Falcon is currently

deployed in more than 176 countries.

We Stop Breaches. Learn more: www.crowdstrike.com

Page 17: CROWDSTRIKE // WHITE PAPER STOPPING BREACHES WITH THREAT GRAPH · 2018-08-16 · Harnessing the data to effectively stop breaches presents significant challenges. The first to overcome

crowdstrike.com15440 Laguna Canyon Road, Suite 250, Irvine, CA 92618

VER. 10 .03.16