core intel

45
Core Intel Krzysztof Adamski, Krzysztof Żmij On the bank secret service

Upload: krzysztof-adamski

Post on 22-Mar-2017

57 views

Category:

Data & Analytics


0 download

TRANSCRIPT

Page 1: Core intel

Core Intel

Krzysztof Adamski, Krzysztof Żmij

On the bank secret service

Page 2: Core intel

Are security breaches common?

https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/432412/bis-15-302-information_security_breaches_survey_2015-full-report.pdf

Page 3: Core intel

Carbanak

3

https://securelist.com/blog/research/68732/the-great-bank-robbery-the-carbanak-apt/

Page 4: Core intel

Core Intel is a part of ING Cyber Crime Resilience Programme to structurally improve the capabilities for the cybercrime

• prevention• detection and the • response

CoreIntel

4

Page 5: Core intel

• Measures against e-banking fraud, DDoS and Advanced Persistent Threats (APTs).

• Threat intelligence allow to respond to, or even prevent, a cybercrime attack • (This kind of intelligence is available via internal and external parties and

includes both open and closed communities)• Monitoring, detection and response to “spear phishing”• Detection/mitigation of infected ING systems’ • Baselining network traffic/anomaly detection• Response to incidents (knowledge, tools, IT environment)• Automated feeds, automated analysis and historical data analysis

The reasoning

5

Page 6: Core intel

The world is not enough

Page 7: Core intel

So the challenge is…

Page 8: Core intel

Market leaders Benelux

Growth marketsCommercial Banking

Challengers

Most of our data is within Europe

8

Page 9: Core intel

Market leaders Benelux

Growth marketsCommercial Banking

Challengers

but we operate globally

9

Page 10: Core intel

Expect the unexpected to collect all the data

10

Page 11: Core intel

• What kind of data do we need?• Where is our data located?• How we can potentially capture it?• What are the legal implications?

So there is a challenge to capture „all” the data

11

Page 12: Core intel

Core Intel architecture

Page 13: Core intel

So what you would like to see is…

Photo credit: edgarpierce via Foter.com / CC BY

Page 14: Core intel

…In fact it is slightly more complicated

Page 15: Core intel

All has its own purpose. Let’s see in details.

15

Photo credit: https://www.pexels.com/photo/dslr-camera-equipments-147462/

Page 16: Core intel

Local data collector

16

Page 17: Core intel

But tell how to capture that data

17

https://observer.viavisolutions.com/includes/popups/taps/tap-vs-span.php

Page 18: Core intel

Broker settings:Replication factor >= 3min.insync.replicas = 2unclean.leader.election.enable = falsereplica.lag.time.max.ms

Producer settings:acks = allretries = Integer.MAX_VALUEmax.block.ms = Long.MAX_VALUEblock.on.buffer.full = true

To have data in ordermax.in.flight.requests.per.connection = 1

Kafka producer configuration (as we don’t like losing data)

18

Page 19: Core intel

Central data collector

19

Page 21: Core intel

But your business data more, so proceed with caution

21

Photo credit: https://www.pexels.com/photo/white-caution-cone-on-keyboard-211151/

Page 22: Core intel

• Network bandwidth control• quota.consumer.default• quota.producer.default

Kafka mirror maker configuration

22

Page 23: Core intel

Secure data:listeners=SSL://host.name:portssl.client.auth=requiredssl.keystore.locationssl.keystore.passwordssl.key.passwordssl.truststore.locationssl.truststore.password

Kafka mirror maker configuration

23

Secure data in transit

Page 24: Core intel

Streaming data

24

Page 25: Core intel

spark.yarn.maxAppAttemptsspark.yarn.am.attemptFailuresValidityIntervalspark.yarn.max.executor.failuresspark.yarn.executor.failuresValidityIntervalspark.task.maxFailuresspark.hadoop.fs.hdfs.impl.disable.cachespark.streaming.backpressure.enabled=truespark.streaming.kafka.maxRatePerPartition

Spark on yarn streaming configuration

25

Page 26: Core intel

In memory data grid

26

val rddFromMap = sc.fromHazelcastMap("map-name-to-be-loaded")

Page 27: Core intel

Let’s find something in these logs

27

Photo credit: https://www.flickr.com/photos/65363769@N08/12726065645/in/pool-555784@N20/

Page 28: Core intel

Matching

28

Tornado - a Python web framework and asynchronous networking library - http://www.tornadoweb.org/MessagePack – binary transport formathttp://msgpack.org/

Page 29: Core intel

• Automatically & continually match network logs <->threat intel • When new threat intel arrives, against full history network logs• When new network logs arrive, against full history threat intel• Alerts are shown in a hit dashboard• Dashboard is a web-based interfaces that provide flexible charts, querying,

aggregation and browsing • Quality/relevance of an alert is subject to the quality of IoC feeds and

completeness of internal log data.

Hit, alerts and dashboards

29

Page 30: Core intel

Be smart with your tooling

30

Photo credit https://www.flickr.com/photos/12749546@N07/

Page 31: Core intel

and leverage e.g. elasticsearch templates

31

Page 32: Core intel

Data mapping: - doc_value - fielddata - fields

Cluster settings to check:gateway.recover_after_nodesgateway.recover_after_master_nodesgateway.recover_after_data_nodesindices.recovery.max_bytes_per_secindices.breaker.total.limitindices.breaker.fielddata.limit

Elasticsearch configuration

32

Page 33: Core intel

For those who know how to use heavy equipment

33

Photo credit: News Collection & Public Distribution @techpearce2 via Foter.com / CC BY

Page 34: Core intel

Long data storage - HDFS

34

Page 35: Core intel

Kafka offset management

35

Page 36: Core intel

Core Intel allows users to perform advanced analytics on network logs using a set of powerful tools

• Spark API to write code to process large data sets on a cluster• perform complex aggregations to collect interesting statistics• run large scale clustering algorithms with Spark’s MLLib• run graph analyses on network logs using Spark’s GraphX• transform and extract data for use in another system (which are better for specific

analytics or visualization purposes)• Kafka, co you can write own Consumers and Producers to work with your data• to perform streaming analysis on your data• to implement your own alerting logic

• Toolset• Programming languages: Scala, Java, Python• IDE’s: Eclipse / Scala IDE, IPython Notebook and R Studio

Advanced analytics

36

Page 37: Core intel

How do we schedule the jobs

37

Page 38: Core intel

How to keep everything under control

38

Photo credit: https://www.flickr.com/photos/martijn141

Page 39: Core intel

Monitoring crucial points in your data pipeline

39

Page 40: Core intel

Something for smart guys

40

Photo credit: https://www.flickr.com/photos/jdhancock/5173498203/

Page 41: Core intel

Plenty of data to analyze

41

Page 42: Core intel

Upcoming challenges on the operations side

42

Page 43: Core intel

Shaken, not stirred?

43

Page 44: Core intel

44

Page 45: Core intel

Follow us to stay a step ahead

ING.com

YouTube.com/ING

SlideShare.net/ING@ING_News LinkedIn.com/company/ING

Flickr.com/INGGroupFacebook.com/ING