10
1 © Copyright 2011 EMC Corporation. All rights reserved. 1 Proprietary and Confidential To Silver Tail Systems Evolution of the Web

Evolution of the Web - Black Hat | Home · Title: ecommerce-campaign-webinar.pptx Author: Steven Schain Created Date: 11/21/2013 6:25:28 PM

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Evolution of the Web - Black Hat | Home · Title: ecommerce-campaign-webinar.pptx Author: Steven Schain Created Date: 11/21/2013 6:25:28 PM

1 © Copyright 2011 EMC Corporation. All rights reserved. 1

Proprietary and C

onfidential To Silver Tail S

ystems

Evolution of the Web

Page 2: Evolution of the Web - Black Hat | Home · Title: ecommerce-campaign-webinar.pptx Author: Steven Schain Created Date: 11/21/2013 6:25:28 PM

2 © Copyright 2011 EMC Corporation. All rights reserved.

Security Goals

High Accuracy In Real Time

Design Objectives

Don’t Impact The User/Customer Experience

Don’t Touch The Web Application/Rely On Logs

Self Learning, No Tuning Required To Proactively Detect

New Threats

Avoid The End Point: Assume Compromised & Tablet,

Smart Phone Growth

Behavior

Page 3: Evolution of the Web - Black Hat | Home · Title: ecommerce-campaign-webinar.pptx Author: Steven Schain Created Date: 11/21/2013 6:25:28 PM

3 © Copyright 2011 EMC Corporation. All rights reserved.

Adaptive Controls adjusted dynamically based

on risk and threat level

Advanced Analytics provide context and visibility

to detect threats

Intelligence-Driven Security Powered by Big Data Risk-based, contextual, and agile

Information Sharing actionable intelligence from trusted sources and COIs

Risk Intelligence thorough understanding of risk to prioritize activity

Page 4: Evolution of the Web - Black Hat | Home · Title: ecommerce-campaign-webinar.pptx Author: Steven Schain Created Date: 11/21/2013 6:25:28 PM

4 © Copyright 2011 EMC Corporation. All rights reserved.

New Account Registration Fraud

Account Takeover

Password Guessing

Parameter Injection Man In The Browser

Man In The Middle Phishing Attacks Fraudulent Money

Movement

Unauthorized Account Activity

Access From High Risk Country Promotion Abuse

High Risk Checkout

Site Scraping Vulnerability Probing

DDOS Attacks

Threats Span Across Customer Interaction Points

Trojan Attacks

Rogue Mobile Apps

InfoSec Pre-Authentication Threats Fraud

Post-Authentication Threats

In the Wild Login Beginning of Session

Web and Mobile Channels

Logout Transaction

Page 5: Evolution of the Web - Black Hat | Home · Title: ecommerce-campaign-webinar.pptx Author: Steven Schain Created Date: 11/21/2013 6:25:28 PM

5 © Copyright 2011 EMC Corporation. All rights reserved.

Big Data Approach To Security

Insight from Silver Tail • Click-by-click visibility • Entire HTTP request insight • Behavioral anomalies

Title of Bullets •  1 •  2 •  3 •  4

Insight from Logs In Isolation • Limited transaction visibility • No traceability into behavior • Disconnected story

Page 6: Evolution of the Web - Black Hat | Home · Title: ecommerce-campaign-webinar.pptx Author: Steven Schain Created Date: 11/21/2013 6:25:28 PM

6 © Copyright 2011 EMC Corporation. All rights reserved.

The RSA Silver Tail Approach

Theoretical 192.168.17.221 172.26.123.12 192.168.17.222 192.168.17.223 192.168.17.224

•  The decision is based on deductive reasoning, such as, something happening against other possible things that could happen.

•  For example, looking for a specific datapoint, such as a specific signature.

Empirical •  The decision is based on data that has been collected by experiments and direct observation

•  A data scientist takes an empirical approach to analysis.

Page 7: Evolution of the Web - Black Hat | Home · Title: ecommerce-campaign-webinar.pptx Author: Steven Schain Created Date: 11/21/2013 6:25:28 PM

7 © Copyright 2011 EMC Corporation. All rights reserved.

The RSA Silver Tail Approach

Theoretical 192.168.17.221 172.26.123.12 192.168.17.222 192.168.17.223 192.168.17.224

Empirical

•  Anomalies, detection, analytics

•  We detect the current user/IP sessions to the statistically averaged user behavior for a site

•  The decision is based on data that has been collected by experiments and direct observation

•  We examine known threats, rules, signatures

Page 8: Evolution of the Web - Black Hat | Home · Title: ecommerce-campaign-webinar.pptx Author: Steven Schain Created Date: 11/21/2013 6:25:28 PM

8 © Copyright 2011 EMC Corporation. All rights reserved.

Criminals Look Different than Customers •  Velocity •  Page Sequence •  Origin •  Contextual Information

Anomalous Behavior Detection

Page 9: Evolution of the Web - Black Hat | Home · Title: ecommerce-campaign-webinar.pptx Author: Steven Schain Created Date: 11/21/2013 6:25:28 PM

9 © Copyright 2011 EMC Corporation. All rights reserved.

The Theoretical Approach

•  Traffic patterns •  Profile of session compared to data model •  Anomaly ratio = difference between the data

model and a current session •  Auto-tuning mechanism accounts for

cyclical patterns •  Normalized score is calculated

44

Page 10: Evolution of the Web - Black Hat | Home · Title: ecommerce-campaign-webinar.pptx Author: Steven Schain Created Date: 11/21/2013 6:25:28 PM

10 © Copyright 2011 EMC Corporation. All rights reserved.

Protecting Websites Web Session Intelligence

Scale – Process Massive Volumes of Data Monitor – Complete Visibility Into Web Sessions Analytics – Behavioral Patterns of Crowd & Users Real-Time – Threat Scores & Rules

Users Security Firewall Network Device

Websites

Databases

3rd Party Apps and Tools