SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
Table of contents
Analyzing massive datasets in the security domain......................................................................................................... 2
HP ArcSight ESM and the Common Event Format............................................................................................................. 2
Sample use case: Correlating structured and unstructured data using HP ArcSight ESM and HP IDOL................. 2
Social media monitoring for negative sentiment and insider threat.............................................................................. 3
Social media monitoring for hacktivist threats.................................................................................................................. 5
About HP.................................................................................................................................................................................... 6
Technical white paper
HP ArcSight ESM and HP IDOL
for Security Analytics
2
Analyzing massive datasets in the security domain
The ability to analyze massive amounts of data—both structured and unstructured—has quickly become all but
mandatory for large organizations that must effectively protect themselves against malicious activity. This exponential
growth in available data has created many challenges, particularly in terms of analysis and actionable intelligence in the
security domain. It has also created a unique opportunity for developers to look beyond the basic functionality of their
application and develop apps that are integrated more seamlessly into the world of big data.
Today’s security analysts typically rely on tools such as Security Information and Event Management (SIEM) systems and
log management solutions, both of which focus primarily on the collection and correlation of real-time audit logs from
network devices, operating systems, and applications. By utilizing the tools available in the HAVEn platform, such as the
Common Event Format, developers can greatly enhance the usefulness of their application’s audit data to help enable
security analysts to detect threats.
However, even with increased interoperability, there is a growing need to complement these solutions with more
extensive analytics to identify anomalies and other suspicious activity as attacks become increasingly sophisticated.
Combining an SIEM, like HP ArcSight ESM, with HP IDOL’s unstructured data analytics capabilities together with
applications that have been designed with interoperability in mind, allows organizations to gather the actionable security
intelligence necessary in today’s complex threat landscape.
HP ArcSight ESM and the Common Event Format
HP ArcSight ESM is the premier security event manager that enables organizations to store, analyze, and correlate
millions of events for security event monitoring, from compliance and risk management to security intelligence and
operations. ArcSight ESM sifts through millions of log records, correlates them, and provides identity and asset context
to find the critical events that matter in real time, via dashboards, notifications, and reports, enabling you to accurately
prioritize security risks and compliance violations.
The Common Event Format (CEF) is an open log management standard, created to simplify log management challenges.
It uses a standardized format allowing you to easily collect and aggregate data for analysis by an enterprise log
management system. CEF is an extensible, text-based, high-performance format designed to support multiple device
types and applications in the simplest manner possible. Specifically, CEF defines a syntax for audit log records comprised
of a standard header and a variable extension, formatted as key-value pairs. This format contains the most relevant
event information, making it easy for event consumers to parse and make use of the data.
Sample use case: Correlating structured and unstructured data using HP
ArcSight ESM and HP IDOL
One of the many sources of unstructured data available to an organization comes from social media outlets such as
Twitter, Facebook, Instagram, LinkedIn, GlassDoor, and more. Traditionally, these data streams have been inaccessible
by most SIEM platforms, however much of this information could provide useful insight into pending threats, especially
when combined with structured audit data from network devices, operating systems, and applications.
In this use case, IDOL is used to analyze unstructured social media data to detect negative sentiment towards an
organization. When it finds an email or social media thread, for example, containing negative sentiment, IDOL generates
an event in the Common Event Format and sends it to ArcSight ESM. IDOL can also analyze information to provide
additional business context regarding communications going in or out of an organization. For example, IDOL can analyze
the body of an email, attachments, and recipients to provide additional context beyond the subject line.
In addition, the integration between ArcSight ESM and HP IDOL is bi-directional. An analyst using ArcSight can ask IDOL
for additional information regarding an event they have seen in ArcSight, and IDOL can send CEF events to ESM. This can
be a powerful tool in facilitating an analyst’s investigation into an incident.
Technical white paper | HP ArcSight ESM and HP IDOL for Security Analytics
Unstructured data Structured data
HP IDOL HP ArcSight ESM
Alerts ESM to target negative
sentiment communications
and threat intelligence
IDOL provides additional
business context for suspicious
communications
Display to analyst the full
content of communications and
threat intelligence
HTTPS HTTPS
API queryCEF
CEF
CEF
Security devices (FW, IDS, etc.)
Identity and Access Management
Applications
Email, files
Social media, chat sessions
Websites, audio/video
HP ArcSight ESM and HP IDOL
3
Architecture
Social media monitoring for negative sentiment and insider threat
In this scenario, a current employee has posted a review on an employer review website expressing dissatisfaction with
their current employer and the possibility of leaving to go work for a competitor. IDOL has detected this post and sent an
event in CEF to ESM where a correlation rule is triggered and an analyst is alerted to the incident.
IDOL CEF Event:
CEF:0|IDOL|IDOL|1.0|event:0001|IDOL Category Event|0|cfp1=76.42 cfp1Label=Weight cs2=Recipe cs2Label=IDOL
Category cs3=c6c7f0054a7fa385817c13a9605656b6 cs3Label=IDOL MessageID cs4=Negative cs4Label=Sentiment
cs5= cs5Label=Sendmail MessageID cs6= cs6Label=FROM cs7= cs7Label=TO cs8= cs8Label=Handle cs9=
cs9Label=FacebookProfile cs11=http://www.employerreview.com/Reviews/Employee-Review-KobaltSystems-1783.
htm cs11Label=URL
The analyst can access the URL from the event within ArcSight and pull up the post for more information.
Technical white paper | HP ArcSight ESM and HP IDOL for Security Analytics
4
Unfortunately, at this point the analyst does not know who posted this, as these reviews are anonymous. Using HP
ArcSight Identity View and logs collected by ArcSight from the proxy, it can be determined that at approximately the same
times as this post was created, the user jsmith, who is a presales engineer, visited this exact post.
In addition to this, IDOL has sent ArcSight an alert identifying a potentially suspicious email containing source code. Upon
further investigation within ArcSight, using logs collected from Exchange, the analyst determines that this same user
emailed this source code to his personal account. Given his earlier posting to the employer review site, it may be that
this employee is looking to take some code with him, if he potentially leaves and joins a competitor. Using these tools, an
analyst can detect this and avoid a potentially devastating scenario.
Technical white paper | HP ArcSight ESM and HP IDOL for Security Analytics
5
Social media monitoring for hacktivist threats
In this scenario, IDOL is configured to crawl a social media feed for threads containing an
organization’s name and malicious activities. When a thread is detected, a CEF event is sent to
ArcSight ESM alerting an analyst of this potential DDOS attack along with the poster’s handle and the
sentiment evaluation of the post.
Sample IDOL Configuration File:
[SocialMedia_Search0]
Query=Kobalt Systems
LuaConfigureScript=C:AutonomyIDOL10SocialMediaConnectorlua_scriptsconfigure_
socialmedia_search.lua
ConnectionLibrary=connectionSocialMedia.dll
type=popular
USER=someUser
CONSUMER_KEY=xbp0rUbSxM8kSWuSKV1234
CONSUMER_SECRET=OGGnKPVuLinR00GIvEcyrBIvwSzg69Dg3qPb5c1234
ACCESS_TOKEN=891363228-pyKqh02EfuqNgfyu16iUlLDqkr1EbHthjky65vWv
ACCESS_TOKEN_SECRET=0F4AXpYJxl3Yhqt8yIApCMiHtOZlVsyGry3YRZf3b4
IndexDatabase=SocialMedia
IDOL CEF Event:
CEF:0|IDOL|IDOL|1.0|event:0001|IDOL Category Event|0|cfp1=90.18 cfp1Label=Weight cs2= DDOS
cs2Label=IDOL Category cs3=1e2c814ab194af80e0743fac572ba26e cs3Label=IDOL MessageID
cs4=Negative cs4Label=Sentiment cs5= cs5Label=Sendmail MessageID cs6= cs6Label=FROM
cs7= cs7Label=TO cs8=hakdplnt cs8Label=SocialMediaHandle cs9= cs9Label=FacebookProfile
cs10= cs10Label=User Internal Email
The analyst can access the URL from the ArcSight console and see the thread.
Technical white paper | HP ArcSight ESM and HP IDOL for Security Analytics
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only
warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein
should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
20131120_PI_WP_HP_ArcSight_ESM_IDOL_for_Security_Analytics
Share with colleagues
Sign up for updates
hp.com/go/getupdated
Technical white paper | HP ArcSight ESM and HP IDOL for Security Analytics
Additionally the poster has identified a vulnerable system and posts this information as well.
By combining the ability to analyze unstructured data using HP IDOL, the powerful correlation engine
of ArcSight ESM, and the enhanced interoperability made possible by the Common Event Format, the
analyst now has actionable information to use to potentially block this attack. This level of analysis
has traditionally not been available to organizations where they relied primarily on SIEM solutions
alone, but it is now possible using the HP HAVEn platform.
About HP
HP creates new possibilities for technology to have a meaningful impact on people, businesses,
governments and society. The world’s largest technology company, HP brings together a portfolio
that spans printing, personal computing, software, services and IT infrastructure to solve customer
problems.
More information about HP (NYSE: HPQ) is available at hp.com.

Mais conteúdo relacionado

Mais de Andrey Karpov

Hpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guideHpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guideAndrey Karpov
 
Hpe Data Protector installation guide
Hpe Data Protector installation guideHpe Data Protector installation guide
Hpe Data Protector installation guideAndrey Karpov
 
Hpe Data Protector integration guide
Hpe Data Protector integration guideHpe Data Protector integration guide
Hpe Data Protector integration guideAndrey Karpov
 
HPE IDOL Technical Overview - july 2016
HPE IDOL Technical Overview - july 2016HPE IDOL Technical Overview - july 2016
HPE IDOL Technical Overview - july 2016Andrey Karpov
 
HPE VM Explorer 6 1 user manual
HPE VM Explorer 6 1 user manualHPE VM Explorer 6 1 user manual
HPE VM Explorer 6 1 user manualAndrey Karpov
 
Краткий обзор аппаратных платформ 2016 нре
Краткий обзор аппаратных платформ 2016 нреКраткий обзор аппаратных платформ 2016 нре
Краткий обзор аппаратных платформ 2016 нреAndrey Karpov
 
Резервное копирование и оптимизация хранения данных
Резервное копирование и оптимизация хранения данныхРезервное копирование и оптимизация хранения данных
Резервное копирование и оптимизация хранения данныхAndrey Karpov
 
Transform IT Service Delivery Helion
Transform IT Service Delivery Helion Transform IT Service Delivery Helion
Transform IT Service Delivery Helion Andrey Karpov
 
HPE Data Protector Administrator's Guide
HPE Data Protector Administrator's GuideHPE Data Protector Administrator's Guide
HPE Data Protector Administrator's GuideAndrey Karpov
 
Idol server 11.0.0_release_notes_en
Idol server 11.0.0_release_notes_enIdol server 11.0.0_release_notes_en
Idol server 11.0.0_release_notes_enAndrey Karpov
 
Конференция по программным решениям HPE 2016
Конференция по программным решениям HPE 2016Конференция по программным решениям HPE 2016
Конференция по программным решениям HPE 2016Andrey Karpov
 
Record manager 8.0 presentation
Record manager 8.0  presentationRecord manager 8.0  presentation
Record manager 8.0 presentationAndrey Karpov
 
Data Protection overview presentation
Data Protection overview presentationData Protection overview presentation
Data Protection overview presentationAndrey Karpov
 
Hp distributed R User Guide
Hp distributed R User GuideHp distributed R User Guide
Hp distributed R User GuideAndrey Karpov
 
Short Infrastructure Overview ru hpe Vertica
Short Infrastructure Overview ru hpe VerticaShort Infrastructure Overview ru hpe Vertica
Short Infrastructure Overview ru hpe VerticaAndrey Karpov
 
Connectivity to business outcomes
Connectivity to business outcomesConnectivity to business outcomes
Connectivity to business outcomesAndrey Karpov
 
HPE Vertica_7.0.x Administrators Guide
HPE Vertica_7.0.x Administrators GuideHPE Vertica_7.0.x Administrators Guide
HPE Vertica_7.0.x Administrators GuideAndrey Karpov
 
Flex Tables Guide Software V. 7.0.x
Flex Tables Guide Software V. 7.0.xFlex Tables Guide Software V. 7.0.x
Flex Tables Guide Software V. 7.0.xAndrey Karpov
 
HPE Information Governance
HPE Information GovernanceHPE Information Governance
HPE Information GovernanceAndrey Karpov
 

Mais de Andrey Karpov (20)

Hpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guideHpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guide
 
Hpe Data Protector installation guide
Hpe Data Protector installation guideHpe Data Protector installation guide
Hpe Data Protector installation guide
 
Hpe Data Protector integration guide
Hpe Data Protector integration guideHpe Data Protector integration guide
Hpe Data Protector integration guide
 
HPE IDOL Technical Overview - july 2016
HPE IDOL Technical Overview - july 2016HPE IDOL Technical Overview - july 2016
HPE IDOL Technical Overview - july 2016
 
HPE VM Explorer 6 1 user manual
HPE VM Explorer 6 1 user manualHPE VM Explorer 6 1 user manual
HPE VM Explorer 6 1 user manual
 
Краткий обзор аппаратных платформ 2016 нре
Краткий обзор аппаратных платформ 2016 нреКраткий обзор аппаратных платформ 2016 нре
Краткий обзор аппаратных платформ 2016 нре
 
Резервное копирование и оптимизация хранения данных
Резервное копирование и оптимизация хранения данныхРезервное копирование и оптимизация хранения данных
Резервное копирование и оптимизация хранения данных
 
Transform IT Service Delivery Helion
Transform IT Service Delivery Helion Transform IT Service Delivery Helion
Transform IT Service Delivery Helion
 
HPE Data Protector Administrator's Guide
HPE Data Protector Administrator's GuideHPE Data Protector Administrator's Guide
HPE Data Protector Administrator's Guide
 
Idol server 11.0.0_release_notes_en
Idol server 11.0.0_release_notes_enIdol server 11.0.0_release_notes_en
Idol server 11.0.0_release_notes_en
 
Конференция по программным решениям HPE 2016
Конференция по программным решениям HPE 2016Конференция по программным решениям HPE 2016
Конференция по программным решениям HPE 2016
 
Record manager 8.0 presentation
Record manager 8.0  presentationRecord manager 8.0  presentation
Record manager 8.0 presentation
 
IDOL presentation
IDOL presentationIDOL presentation
IDOL presentation
 
Data Protection overview presentation
Data Protection overview presentationData Protection overview presentation
Data Protection overview presentation
 
Hp distributed R User Guide
Hp distributed R User GuideHp distributed R User Guide
Hp distributed R User Guide
 
Short Infrastructure Overview ru hpe Vertica
Short Infrastructure Overview ru hpe VerticaShort Infrastructure Overview ru hpe Vertica
Short Infrastructure Overview ru hpe Vertica
 
Connectivity to business outcomes
Connectivity to business outcomesConnectivity to business outcomes
Connectivity to business outcomes
 
HPE Vertica_7.0.x Administrators Guide
HPE Vertica_7.0.x Administrators GuideHPE Vertica_7.0.x Administrators Guide
HPE Vertica_7.0.x Administrators Guide
 
Flex Tables Guide Software V. 7.0.x
Flex Tables Guide Software V. 7.0.xFlex Tables Guide Software V. 7.0.x
Flex Tables Guide Software V. 7.0.x
 
HPE Information Governance
HPE Information GovernanceHPE Information Governance
HPE Information Governance
 

Último

Kings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about themKings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about themeitharjee
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制vexqp
 
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...kumargunjan9515
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNKTimothy Spann
 
Computer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfComputer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfSayantanBiswas37
 
Statistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbersStatistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numberssuginr1
 
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...SOFTTECHHUB
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxronsairoathenadugay
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...gajnagarg
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...gajnagarg
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.pptibrahimabdi22
 
Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1ranjankumarbehera14
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...nirzagarg
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...Elaine Werffeli
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabiaahmedjiabur940
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...gajnagarg
 
Dubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls DubaiDubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls Dubaikojalkojal131
 

Último (20)

Kings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about themKings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about them
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
 
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 
Computer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfComputer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdf
 
Statistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbersStatistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbers
 
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
 
Dubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls DubaiDubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls Dubai
 

HP ArcSight ESM and HP IDOL for Security Analytics

  • 1. Table of contents Analyzing massive datasets in the security domain......................................................................................................... 2 HP ArcSight ESM and the Common Event Format............................................................................................................. 2 Sample use case: Correlating structured and unstructured data using HP ArcSight ESM and HP IDOL................. 2 Social media monitoring for negative sentiment and insider threat.............................................................................. 3 Social media monitoring for hacktivist threats.................................................................................................................. 5 About HP.................................................................................................................................................................................... 6 Technical white paper HP ArcSight ESM and HP IDOL for Security Analytics
  • 2. 2 Analyzing massive datasets in the security domain The ability to analyze massive amounts of data—both structured and unstructured—has quickly become all but mandatory for large organizations that must effectively protect themselves against malicious activity. This exponential growth in available data has created many challenges, particularly in terms of analysis and actionable intelligence in the security domain. It has also created a unique opportunity for developers to look beyond the basic functionality of their application and develop apps that are integrated more seamlessly into the world of big data. Today’s security analysts typically rely on tools such as Security Information and Event Management (SIEM) systems and log management solutions, both of which focus primarily on the collection and correlation of real-time audit logs from network devices, operating systems, and applications. By utilizing the tools available in the HAVEn platform, such as the Common Event Format, developers can greatly enhance the usefulness of their application’s audit data to help enable security analysts to detect threats. However, even with increased interoperability, there is a growing need to complement these solutions with more extensive analytics to identify anomalies and other suspicious activity as attacks become increasingly sophisticated. Combining an SIEM, like HP ArcSight ESM, with HP IDOL’s unstructured data analytics capabilities together with applications that have been designed with interoperability in mind, allows organizations to gather the actionable security intelligence necessary in today’s complex threat landscape. HP ArcSight ESM and the Common Event Format HP ArcSight ESM is the premier security event manager that enables organizations to store, analyze, and correlate millions of events for security event monitoring, from compliance and risk management to security intelligence and operations. ArcSight ESM sifts through millions of log records, correlates them, and provides identity and asset context to find the critical events that matter in real time, via dashboards, notifications, and reports, enabling you to accurately prioritize security risks and compliance violations. The Common Event Format (CEF) is an open log management standard, created to simplify log management challenges. It uses a standardized format allowing you to easily collect and aggregate data for analysis by an enterprise log management system. CEF is an extensible, text-based, high-performance format designed to support multiple device types and applications in the simplest manner possible. Specifically, CEF defines a syntax for audit log records comprised of a standard header and a variable extension, formatted as key-value pairs. This format contains the most relevant event information, making it easy for event consumers to parse and make use of the data. Sample use case: Correlating structured and unstructured data using HP ArcSight ESM and HP IDOL One of the many sources of unstructured data available to an organization comes from social media outlets such as Twitter, Facebook, Instagram, LinkedIn, GlassDoor, and more. Traditionally, these data streams have been inaccessible by most SIEM platforms, however much of this information could provide useful insight into pending threats, especially when combined with structured audit data from network devices, operating systems, and applications. In this use case, IDOL is used to analyze unstructured social media data to detect negative sentiment towards an organization. When it finds an email or social media thread, for example, containing negative sentiment, IDOL generates an event in the Common Event Format and sends it to ArcSight ESM. IDOL can also analyze information to provide additional business context regarding communications going in or out of an organization. For example, IDOL can analyze the body of an email, attachments, and recipients to provide additional context beyond the subject line. In addition, the integration between ArcSight ESM and HP IDOL is bi-directional. An analyst using ArcSight can ask IDOL for additional information regarding an event they have seen in ArcSight, and IDOL can send CEF events to ESM. This can be a powerful tool in facilitating an analyst’s investigation into an incident. Technical white paper | HP ArcSight ESM and HP IDOL for Security Analytics
  • 3. Unstructured data Structured data HP IDOL HP ArcSight ESM Alerts ESM to target negative sentiment communications and threat intelligence IDOL provides additional business context for suspicious communications Display to analyst the full content of communications and threat intelligence HTTPS HTTPS API queryCEF CEF CEF Security devices (FW, IDS, etc.) Identity and Access Management Applications Email, files Social media, chat sessions Websites, audio/video HP ArcSight ESM and HP IDOL 3 Architecture Social media monitoring for negative sentiment and insider threat In this scenario, a current employee has posted a review on an employer review website expressing dissatisfaction with their current employer and the possibility of leaving to go work for a competitor. IDOL has detected this post and sent an event in CEF to ESM where a correlation rule is triggered and an analyst is alerted to the incident. IDOL CEF Event: CEF:0|IDOL|IDOL|1.0|event:0001|IDOL Category Event|0|cfp1=76.42 cfp1Label=Weight cs2=Recipe cs2Label=IDOL Category cs3=c6c7f0054a7fa385817c13a9605656b6 cs3Label=IDOL MessageID cs4=Negative cs4Label=Sentiment cs5= cs5Label=Sendmail MessageID cs6= cs6Label=FROM cs7= cs7Label=TO cs8= cs8Label=Handle cs9= cs9Label=FacebookProfile cs11=http://www.employerreview.com/Reviews/Employee-Review-KobaltSystems-1783. htm cs11Label=URL The analyst can access the URL from the event within ArcSight and pull up the post for more information. Technical white paper | HP ArcSight ESM and HP IDOL for Security Analytics
  • 4. 4 Unfortunately, at this point the analyst does not know who posted this, as these reviews are anonymous. Using HP ArcSight Identity View and logs collected by ArcSight from the proxy, it can be determined that at approximately the same times as this post was created, the user jsmith, who is a presales engineer, visited this exact post. In addition to this, IDOL has sent ArcSight an alert identifying a potentially suspicious email containing source code. Upon further investigation within ArcSight, using logs collected from Exchange, the analyst determines that this same user emailed this source code to his personal account. Given his earlier posting to the employer review site, it may be that this employee is looking to take some code with him, if he potentially leaves and joins a competitor. Using these tools, an analyst can detect this and avoid a potentially devastating scenario. Technical white paper | HP ArcSight ESM and HP IDOL for Security Analytics
  • 5. 5 Social media monitoring for hacktivist threats In this scenario, IDOL is configured to crawl a social media feed for threads containing an organization’s name and malicious activities. When a thread is detected, a CEF event is sent to ArcSight ESM alerting an analyst of this potential DDOS attack along with the poster’s handle and the sentiment evaluation of the post. Sample IDOL Configuration File: [SocialMedia_Search0] Query=Kobalt Systems LuaConfigureScript=C:AutonomyIDOL10SocialMediaConnectorlua_scriptsconfigure_ socialmedia_search.lua ConnectionLibrary=connectionSocialMedia.dll type=popular USER=someUser CONSUMER_KEY=xbp0rUbSxM8kSWuSKV1234 CONSUMER_SECRET=OGGnKPVuLinR00GIvEcyrBIvwSzg69Dg3qPb5c1234 ACCESS_TOKEN=891363228-pyKqh02EfuqNgfyu16iUlLDqkr1EbHthjky65vWv ACCESS_TOKEN_SECRET=0F4AXpYJxl3Yhqt8yIApCMiHtOZlVsyGry3YRZf3b4 IndexDatabase=SocialMedia IDOL CEF Event: CEF:0|IDOL|IDOL|1.0|event:0001|IDOL Category Event|0|cfp1=90.18 cfp1Label=Weight cs2= DDOS cs2Label=IDOL Category cs3=1e2c814ab194af80e0743fac572ba26e cs3Label=IDOL MessageID cs4=Negative cs4Label=Sentiment cs5= cs5Label=Sendmail MessageID cs6= cs6Label=FROM cs7= cs7Label=TO cs8=hakdplnt cs8Label=SocialMediaHandle cs9= cs9Label=FacebookProfile cs10= cs10Label=User Internal Email The analyst can access the URL from the ArcSight console and see the thread. Technical white paper | HP ArcSight ESM and HP IDOL for Security Analytics
  • 6. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. 20131120_PI_WP_HP_ArcSight_ESM_IDOL_for_Security_Analytics Share with colleagues Sign up for updates hp.com/go/getupdated Technical white paper | HP ArcSight ESM and HP IDOL for Security Analytics Additionally the poster has identified a vulnerable system and posts this information as well. By combining the ability to analyze unstructured data using HP IDOL, the powerful correlation engine of ArcSight ESM, and the enhanced interoperability made possible by the Common Event Format, the analyst now has actionable information to use to potentially block this attack. This level of analysis has traditionally not been available to organizations where they relied primarily on SIEM solutions alone, but it is now possible using the HP HAVEn platform. About HP HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. The world’s largest technology company, HP brings together a portfolio that spans printing, personal computing, software, services and IT infrastructure to solve customer problems. More information about HP (NYSE: HPQ) is available at hp.com.