SlideShare uma empresa Scribd logo
1 de 61
Baixar para ler offline
Agenda
• 3 Industries , 5 real life Flutura user stories
• 7 Key “Gotchas” & Big Data Best Practices
Case Study-1 :
Reducing Network threats by Detecting Patterns in
perimeter device logs
What is the Biz problem being solved ?
What is the problem being solved?
Network threats are
growing ...
What is the problem being solved?
• 2 types of threats – Internal ( Social Unrest & Watch List ) &
External ( Hackers )
External hackers Internal Activists
Who is experiencing the pain ?
Telecom Security Operations centre
Lots of Telecom Machine data left untapped !
This is typically flushed but has gold in it
Why is it important to solve this problem?
• Reduces network disruption from hackers
• Minimize social disruption and unrest
Traditional RDBMS architectures cant handle high
velocity machine data !
SOC's cant see threat patterns …
running BLIND
• Being Blind = Risk
• BeingCannot be blind to patterns anymore
• The capability to “see” patterns previously not seen
• Network activity and behaviour – Firewalls , routers
• Saves lives, provides social stability – WL Chatter !
Capability to remove “data blind folds”
to “SEE” behavioural patterns key to
security
MACHINE
DATA
KEY TO
UNCOVERING
SECURITY
PATTERNS !
What are some “behavioural signatures” ?
1. Sudden increase
in you tube
uploads @ night
1. Viral Rate of
propagation of
MMS videos
So what does the data look like ?
National content filtering log – 1 billion events/day !
16
1329031890 http://photogallery.indiatimes.com/photo/4686985.cms 94.200.107.14 94.200.0.0 Du_Public_IP_Address 0 37
1 2 3 4 5 6
Decoding 7 components of the Netsweeper log entry
7
EPOCH
Time stamp
URL requested Source IP
Client
subnet
Client group
name
0 allowed
1 denied
URL Category
Descp tbd
50 categories in the system
Education, Pornoraphy, Phishing,
Criminal Skills etc
23" - Its related to "Pornography
“45" - Its related to "GENERAL"
Timestamp
URL requested
Source IP
Client Subnet
Client Group Name
Denied flag
URL Categort
Decoding National content filtering logs
Expand to ingest variety of watched events
File Delete Events
User Login Failure Events
Root access Failures
2 Sigma events
Table Drop Events
Table Delete Events
Column Drop Events
Critical Proc recompilation
OS logs Database logs
Critical tsn value changes
Master data changes
App login failures
Login at unusual time windows
Application logs
Search for specific keywords
2 Sigma event for URL’s
Decomp tree- failed reqsts
Login Failure
Web server logs
Dropped call frequency
Watch List inbound/outbound
Cut calls - poor connection
Call Failure event frequency
Timeout event frequency
Swarm event detected
Dropped IP calls frequency
Failed IP call frequency
CDR logs IPR logs
SMS Capacity events
Unusual sms traffic events
User defined router events
Compliance related router event
Router logs
Odd hour Unsuccessful logins
X happens Y times in Z time
User defined firewall events
Compliance oriented firewall e
Firewall logs
Frequency of login failures high in a certain pockets
Recency of late night events noticed in certain pockets
Certain corridors experiencing high dropped calls
Converting raw data Actionable Intelligence
INTEGRATED
EVENT 360
REPOSITORY
SENSE &
RESPOND
LAYER
LOG FILE
INGESTION
MACHINE LEARNING
ALGORITHMS ON
GRANULAR LOG
EVENT DATA
INFER INTENT FROM
PATTERNS
AND CREATE EVENT
PROFILES
LOAD RISK /
BEHAVIOR PROFILE
TO RULES ENGINE
DB
INTERCEPT OR
OFFLINE REVIEW OF
EVENTS
CONSOLIDATE & REVIEW
EVENT INTERCEPTS TO
ASSESS EVENT RULE
EFFECTIVENESS
MEASURE PATTERN RULE
EFFECTIVENESS
- TRUE POSITIVE / FALSE
POSITIVES
CASE MANAGEMENT
WORKFLOW
TELECOM SWITCHES
OTHER DEVICES
•CDR LOG FILES
•IP LOG FILES
•MISC LOG FILES
Holistic Value Chain
BIG DATA
REPOSITORY
Case Study-2 : Decoding travellers intent
What's the problem we are trying to solve ?
• Travellers are “signalling” to
us thru the behaviour they
exhibit
• OTA is unable to sense n
respond to these varied
behaviour
Why is it important to solve this problem ?
• Impacts look to book
• Increase revenue from cross sell
Srikanth intends to travel from San Fran to NYC
Srikanth searches !
Srikanths First Moment of Truth !
Srikanth sees the options rendered !
Is Srikanth Price Sensitive or Time conscious traveller?
87 %
13%
Does Srikanth have a bias towards any
airline ?
Those small clicks reveal a lot !
So who is Srikanth?
Do we 'know' him ?
What's his behavorial DNA ?
Key vectors ?
Early bird ( days = 21 )
Price insensitive ( click % = 89 %)
Prefers American Airlines
Most valuable customer ( Decile-1 )
Intra visit interval = 17 days
Visit dispersion = 12 % International
Churn propensity = 0
Bargain hunter = No ( 3 % coupon)
Roadie = Yes ( 28000 miles per qtr )
Sentiment index = 73 %
How do we respond in real time to Srikanths
experience and behavioural patterns we’ve seen ?
• If Srikanth is a high value customer
• If he does not book within 8 min window
• In real time route to high performing agent
• Short circuit the queue
• Extra 10 % discount since he is vulnerable
• If search response time velocity is trending downward
• Signal to beef up infrastructure
• Optimise code base
• Property recommendations
Case Study-3 : Watched List
What is the problem being solved?
• Internal watch lists
• Can we get e signals in their behavior ?
 Call patterns ?
 SMS patterns ?
 Youtube upload patterns ?
 Watched countries ?
 Intrawatch list chatter ?
 Late night communication behavior ?
• Watch list activity intelligence takes 6
weeks
• Bring it down to < day
• Enhance it to make it real time
Why is it important to solve this
problem ?
• Threat signals are
there in telecom
and communication
logs
• Saves lives !
• Ensures national
security !
Under the hood
• Remote Authentication Dial-In User Service (RADIUS) provide authentication,
authorization and accounting for network access.
• When a user wants to get access to the Internet he will first have to give his users
credentials (in most cases username and password) to a local RADIUS client.
Deconstructing Radius Logs
The IP address of the NAS ( Network Access server )
that is sending the request
The framed address to be configured for the user
3 time stamps
User Identity
Radius logs Netsweeper logs
Subscriber
database
Rich Security
intelligence !
Triangulate from 3 event data pools
Access/Device
Framed IP
address
Customer
ethnicity
URL accessed
Date/time
Day
Week
Client IP
address
Customer type
Customer
browse
location
Post paid
Subscriber
Database
1329031890 http://photogallery.indiatimes.com/photo/4686985.cms 94.200.107.14 94.200.0.0 Du_Public_IP_Address 0 37
Status
Enterprise
Residential
Asian
European
Dubai
Smart Phone
Desktop
Ipad
Others
URL Type
Gaming sites
News sites
Others
?
? Yes
No
Business rule to
derive access device
to be elicited from
SME
Location mapping
business logic to be
elicited from SME
Social Networking
Blogs
P2P sites
VPN/VOIP
NAS Port Id
Username Nas port id RADIUS Logs
Co-relating fragmented telecom log files-Info model
Calls to watched countries
Intra Watch list Chatter velocity is high
Call patterns reveal malicious intent
38
Entity on watch list
NOT on watched list
but high level of
interactions
Are people ‘n’ degrees away from watched list performing 2 sigma activity across multiple
Call dimensions – sms, voice, conference and other behavioral activity ?
CDR
 From BTN
 To TN
 Date/Time
 Duration
 Call type,
 Approximate tower location which carried
call
Watch List Recommender Data Product
Modeling Unique behavioural signature
Discarded Telecom data--> Actionable Security patterns
Case Study-4 : Mobile forensics
Mobile funnel data
Analyzing Mobile Sub
Channel Behavioural
shift to Drive revenues
for a leading online
travel company
What's the problem being solved ?
• More applications becoming mobile
• There is a dip in transaction completion rate
• Friction points and hot spots exist
• No way to “see” these hot spots and patterns
• Spot friction points
• Mobile funnel drops
• Payment gateway drops
• Airline connector drops
Funnel Analysis
Churn Scoring Model
Case Study-5 : Money transmission
Minimizing fund leakages to watched
entities
Money transmission event
stream
Threat matrix
Graph Analysis
Money transmission behavioral modeling
Modeling money transmission behavior
Graph analysis to monitor money
transmission patterns
• Each account can be modelled as a node in a
graph
• Behaviour across nodes can be analyzed
• Proxy behaviours can be easily discerned
7 Key “gotchas”
( best practices)
Lesson-1 : Think “Polyglot persistence”
Asset
Sensor
Parameters
Asset tags Sensor tags
Events
Column family
( Hbase/Cassandra)
Document db
( Mongo)
Graph db
( Neo4js)
RDBMS
( Oracle )
Heavy duty write workloads
Photos, Videos, text Inter relationships
Low velocity self service
Logical Business Model
“Different strokes for different folks”
Lesson-2 : Think “pattern extraction”
1. Collaborative filtering
2. Text Mining
3. Scoring Models (
Logistic etc )
Embedding one ML process can help SPOT patterns not previously
seen
Lesson-3 : Think “Baby steps”
• 60-90 day Hadoop
Sandbox
• Build quick wins to
build momentum
• Pick a few low
hanging use cases to
demonstrate impact
No Big Bang !
Lesson-4 : Think “Data Products”
• Data Product = “Action an end user takes”
• EXAMPLE
• Watch List recommender vs tons of “feel good” graphs
• Next best action vs lots of dials, graphs
•
Focus on Outcomes more than Analysis
Lesson-5 : Think “MVP-Minimum Viable Product”
• Minimalist ... Key is to start simple
• Only core features ... No bells and whistles
• Get feedback from early adopters and enrich features
•
How can Big Data co-exist with existing DW solutions ?
Big DataExisting DW
Existing DW
OSS BSS CRM
ETL
Existing BI tools
Radius logs
IP traffic
logs
Comments
File copy / Bulk load / Agent based
Operational App Integration
Existing DW
OSS BSS CRM
ETL
Existing BI tools
Radius logs
IP traffic
logs
Comments
File copy / Bulk load / Agent based
Operational App Integration
Lesson-6 : Gracefully Co-exist
Lesson-7 : Think “Biz backward … NOT Tech
forward”
1. What is the business problem you
are solving ? Tightly framed ?
2. Why is important to solve this
problem ?
3. What happens if we dont solve this
problem ?
4. Is status quo an option ?
5. Is the business pain acknowledged ?
6. How would the end user “feel” when
the product is deployed ?
7. Are budgets allocated ?
8. What is the actual use case to solve
the pain ?
Connect with business @ a deeper level !
1. Think “Polyglot Persistence”
2. Think “Pattern Extraction”
3. Think “Crawl-Walk-Run”
4. Think “Data Products”
5. Think “MVP”
6. Think “Co-existence”
7. Think “Business Impact/Outcomes”
To summarize !
Taming and channelising data beast is going to be a crucial capability for survival
Pl feel free to reach out …
Derick.jose@fluturasolutions.com

Mais conteúdo relacionado

Mais procurados

Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideEntrust Datacard
 
Network security projects
Network security projectsNetwork security projects
Network security projectstcpipguru
 
NTXISSACSC3 - How Threat Modeling Can Improve Your IAM Solution by John Fehan
NTXISSACSC3 - How Threat Modeling Can Improve Your IAM Solution by John Fehan NTXISSACSC3 - How Threat Modeling Can Improve Your IAM Solution by John Fehan
NTXISSACSC3 - How Threat Modeling Can Improve Your IAM Solution by John Fehan North Texas Chapter of the ISSA
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
Achieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven MethodologiesAchieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven MethodologiesPriyanka Aash
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondJim Fenton
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessTim Bass
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceVishal Kumar
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainOrchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainPriyanka Aash
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleNCC Group
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Advanced red teaming all your badges are belong to us
Advanced red teaming  all your badges are belong to usAdvanced red teaming  all your badges are belong to us
Advanced red teaming all your badges are belong to usPriyanka Aash
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementPriyanka Aash
 

Mais procurados (15)

Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
 
Network security projects
Network security projectsNetwork security projects
Network security projects
 
NTXISSACSC3 - How Threat Modeling Can Improve Your IAM Solution by John Fehan
NTXISSACSC3 - How Threat Modeling Can Improve Your IAM Solution by John Fehan NTXISSACSC3 - How Threat Modeling Can Improve Your IAM Solution by John Fehan
NTXISSACSC3 - How Threat Modeling Can Improve Your IAM Solution by John Fehan
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
Achieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven MethodologiesAchieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven Methodologies
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusiness
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainOrchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Advanced red teaming all your badges are belong to us
Advanced red teaming  all your badges are belong to usAdvanced red teaming  all your badges are belong to us
Advanced red teaming all your badges are belong to us
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio Management
 

Destaque

YOU WILL REGRET THIS
YOU WILL REGRET THISYOU WILL REGRET THIS
YOU WILL REGRET THISMononcQc
 
Ortografia de la O i la U atones
Ortografia de la O i la U atonesOrtografia de la O i la U atones
Ortografia de la O i la U atonesPere MiG
 
The Emergence of Science Communication in Germany
The Emergence of Science Communication in GermanyThe Emergence of Science Communication in Germany
The Emergence of Science Communication in GermanyProf. Alexander Gerber
 
PROMO NEWS FEGEMU - abril 2014
PROMO NEWS FEGEMU -  abril 2014PROMO NEWS FEGEMU -  abril 2014
PROMO NEWS FEGEMU - abril 2014Suministros Herco
 
Suplemento Revista Artez 183, San javier 2012
Suplemento Revista Artez 183, San javier 2012Suplemento Revista Artez 183, San javier 2012
Suplemento Revista Artez 183, San javier 2012Artez Artes Escénicas
 
Google Analytics Konferenz 2015_ Account- und Trackingkonzeption_Markus Vollm...
Google Analytics Konferenz 2015_ Account- und Trackingkonzeption_Markus Vollm...Google Analytics Konferenz 2015_ Account- und Trackingkonzeption_Markus Vollm...
Google Analytics Konferenz 2015_ Account- und Trackingkonzeption_Markus Vollm...e-dialog GmbH
 
Diario Resumen 20141007
Diario Resumen 20141007Diario Resumen 20141007
Diario Resumen 20141007Diario Resumen
 
Exercicis Tecno[1]
Exercicis Tecno[1]Exercicis Tecno[1]
Exercicis Tecno[1]laietatm
 
Ncss training materials kjm 11 12 10
Ncss training materials kjm 11 12 10Ncss training materials kjm 11 12 10
Ncss training materials kjm 11 12 10Karlye Mull
 
Gesundheit Beilage Erfolg 03 2011
Gesundheit Beilage Erfolg 03 2011Gesundheit Beilage Erfolg 03 2011
Gesundheit Beilage Erfolg 03 2011Netzwerk-Verlag
 
Mayra documento final
Mayra documento finalMayra documento final
Mayra documento finalDiscua L
 
The Canals_June15 (1)
The Canals_June15 (1)The Canals_June15 (1)
The Canals_June15 (1)Andrea Mejia
 
Pres universidad cordoba-rebium-aag_20150312_v02
Pres universidad cordoba-rebium-aag_20150312_v02Pres universidad cordoba-rebium-aag_20150312_v02
Pres universidad cordoba-rebium-aag_20150312_v02Alberto Abella
 
Reclutamiento 2.0 | Redes Sociales e internet en RRHH y selección de personal
Reclutamiento 2.0 | Redes Sociales e internet en RRHH y selección de personalReclutamiento 2.0 | Redes Sociales e internet en RRHH y selección de personal
Reclutamiento 2.0 | Redes Sociales e internet en RRHH y selección de personalPablo Alonso
 
Ley de etica_gubernamental_de_puerto_rico_libro
Ley de etica_gubernamental_de_puerto_rico_libroLey de etica_gubernamental_de_puerto_rico_libro
Ley de etica_gubernamental_de_puerto_rico_libroYadira Mangual
 

Destaque (20)

YOU WILL REGRET THIS
YOU WILL REGRET THISYOU WILL REGRET THIS
YOU WILL REGRET THIS
 
Ortografia de la O i la U atones
Ortografia de la O i la U atonesOrtografia de la O i la U atones
Ortografia de la O i la U atones
 
Codigo 2.0 - Lawrence Lessig
Codigo 2.0 - Lawrence LessigCodigo 2.0 - Lawrence Lessig
Codigo 2.0 - Lawrence Lessig
 
The Emergence of Science Communication in Germany
The Emergence of Science Communication in GermanyThe Emergence of Science Communication in Germany
The Emergence of Science Communication in Germany
 
Cca
CcaCca
Cca
 
PROMO NEWS FEGEMU - abril 2014
PROMO NEWS FEGEMU -  abril 2014PROMO NEWS FEGEMU -  abril 2014
PROMO NEWS FEGEMU - abril 2014
 
Suplemento Revista Artez 183, San javier 2012
Suplemento Revista Artez 183, San javier 2012Suplemento Revista Artez 183, San javier 2012
Suplemento Revista Artez 183, San javier 2012
 
Google Analytics Konferenz 2015_ Account- und Trackingkonzeption_Markus Vollm...
Google Analytics Konferenz 2015_ Account- und Trackingkonzeption_Markus Vollm...Google Analytics Konferenz 2015_ Account- und Trackingkonzeption_Markus Vollm...
Google Analytics Konferenz 2015_ Account- und Trackingkonzeption_Markus Vollm...
 
Diario Resumen 20141007
Diario Resumen 20141007Diario Resumen 20141007
Diario Resumen 20141007
 
Exercicis Tecno[1]
Exercicis Tecno[1]Exercicis Tecno[1]
Exercicis Tecno[1]
 
Ncss training materials kjm 11 12 10
Ncss training materials kjm 11 12 10Ncss training materials kjm 11 12 10
Ncss training materials kjm 11 12 10
 
2010ko Inserzioak
2010ko Inserzioak2010ko Inserzioak
2010ko Inserzioak
 
Gesundheit Beilage Erfolg 03 2011
Gesundheit Beilage Erfolg 03 2011Gesundheit Beilage Erfolg 03 2011
Gesundheit Beilage Erfolg 03 2011
 
Mayra documento final
Mayra documento finalMayra documento final
Mayra documento final
 
The Canals_June15 (1)
The Canals_June15 (1)The Canals_June15 (1)
The Canals_June15 (1)
 
CV OF MOHAMMADY
CV OF MOHAMMADYCV OF MOHAMMADY
CV OF MOHAMMADY
 
Pres universidad cordoba-rebium-aag_20150312_v02
Pres universidad cordoba-rebium-aag_20150312_v02Pres universidad cordoba-rebium-aag_20150312_v02
Pres universidad cordoba-rebium-aag_20150312_v02
 
Reclutamiento 2.0 | Redes Sociales e internet en RRHH y selección de personal
Reclutamiento 2.0 | Redes Sociales e internet en RRHH y selección de personalReclutamiento 2.0 | Redes Sociales e internet en RRHH y selección de personal
Reclutamiento 2.0 | Redes Sociales e internet en RRHH y selección de personal
 
Paper based interaction
Paper based interactionPaper based interaction
Paper based interaction
 
Ley de etica_gubernamental_de_puerto_rico_libro
Ley de etica_gubernamental_de_puerto_rico_libroLey de etica_gubernamental_de_puerto_rico_libro
Ley de etica_gubernamental_de_puerto_rico_libro
 

Semelhante a Fluturas presentation @ Big Data Conclave

Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsAdeo Security
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Andris Soroka
 
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)Amazon Web Services
 
Presentation data security solutions certified ibm business partner for ibm...
Presentation   data security solutions certified ibm business partner for ibm...Presentation   data security solutions certified ibm business partner for ibm...
Presentation data security solutions certified ibm business partner for ibm...xKinAnx
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseJim Porell
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIsSteven Aiello
 
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Amazon Web Services
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitAmazon Web Services
 
End-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic StackEnd-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic StackElasticsearch
 
Continuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash BaraiContinuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash BaraiAllanGray11
 
SplunkApplicationLoggingBestPractices_Template_2.3.pdf
SplunkApplicationLoggingBestPractices_Template_2.3.pdfSplunkApplicationLoggingBestPractices_Template_2.3.pdf
SplunkApplicationLoggingBestPractices_Template_2.3.pdfTuynNguyn819213
 
IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)stelligence
 
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119lior mazor
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertISSA LA
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Stefaan Van daele
 
Racketeer Toolkit. Prototyping Controlled Ransomware Operations
Racketeer Toolkit. Prototyping Controlled Ransomware OperationsRacketeer Toolkit. Prototyping Controlled Ransomware Operations
Racketeer Toolkit. Prototyping Controlled Ransomware OperationsDimitry Snezhkov
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 
Webinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System AnalysisWebinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System AnalysisDeepak Shankar
 

Semelhante a Fluturas presentation @ Big Data Conclave (20)

Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
 
Presentation data security solutions certified ibm business partner for ibm...
Presentation   data security solutions certified ibm business partner for ibm...Presentation   data security solutions certified ibm business partner for ibm...
Presentation data security solutions certified ibm business partner for ibm...
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An Enterprise
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
 
End-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic StackEnd-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic Stack
 
Continuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash BaraiContinuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash Barai
 
SplunkApplicationLoggingBestPractices_Template_2.3.pdf
SplunkApplicationLoggingBestPractices_Template_2.3.pdfSplunkApplicationLoggingBestPractices_Template_2.3.pdf
SplunkApplicationLoggingBestPractices_Template_2.3.pdf
 
Introduction to threat_modeling
Introduction to threat_modelingIntroduction to threat_modeling
Introduction to threat_modeling
 
IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)
 
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
 
Racketeer Toolkit. Prototyping Controlled Ransomware Operations
Racketeer Toolkit. Prototyping Controlled Ransomware OperationsRacketeer Toolkit. Prototyping Controlled Ransomware Operations
Racketeer Toolkit. Prototyping Controlled Ransomware Operations
 
ISSA Siem Fraud
ISSA Siem FraudISSA Siem Fraud
ISSA Siem Fraud
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Webinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System AnalysisWebinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System Analysis
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Fluturas presentation @ Big Data Conclave

  • 1.
  • 2. Agenda • 3 Industries , 5 real life Flutura user stories • 7 Key “Gotchas” & Big Data Best Practices
  • 3. Case Study-1 : Reducing Network threats by Detecting Patterns in perimeter device logs
  • 4. What is the Biz problem being solved ?
  • 5. What is the problem being solved? Network threats are growing ...
  • 6. What is the problem being solved? • 2 types of threats – Internal ( Social Unrest & Watch List ) & External ( Hackers ) External hackers Internal Activists
  • 7. Who is experiencing the pain ? Telecom Security Operations centre
  • 8. Lots of Telecom Machine data left untapped ! This is typically flushed but has gold in it
  • 9. Why is it important to solve this problem? • Reduces network disruption from hackers • Minimize social disruption and unrest
  • 10. Traditional RDBMS architectures cant handle high velocity machine data !
  • 11. SOC's cant see threat patterns … running BLIND • Being Blind = Risk • BeingCannot be blind to patterns anymore • The capability to “see” patterns previously not seen • Network activity and behaviour – Firewalls , routers • Saves lives, provides social stability – WL Chatter !
  • 12. Capability to remove “data blind folds” to “SEE” behavioural patterns key to security MACHINE DATA KEY TO UNCOVERING SECURITY PATTERNS !
  • 13. What are some “behavioural signatures” ? 1. Sudden increase in you tube uploads @ night 1. Viral Rate of propagation of MMS videos
  • 14. So what does the data look like ? National content filtering log – 1 billion events/day !
  • 15. 16 1329031890 http://photogallery.indiatimes.com/photo/4686985.cms 94.200.107.14 94.200.0.0 Du_Public_IP_Address 0 37 1 2 3 4 5 6 Decoding 7 components of the Netsweeper log entry 7 EPOCH Time stamp URL requested Source IP Client subnet Client group name 0 allowed 1 denied URL Category Descp tbd 50 categories in the system Education, Pornoraphy, Phishing, Criminal Skills etc 23" - Its related to "Pornography “45" - Its related to "GENERAL" Timestamp URL requested Source IP Client Subnet Client Group Name Denied flag URL Categort Decoding National content filtering logs
  • 16. Expand to ingest variety of watched events File Delete Events User Login Failure Events Root access Failures 2 Sigma events Table Drop Events Table Delete Events Column Drop Events Critical Proc recompilation OS logs Database logs Critical tsn value changes Master data changes App login failures Login at unusual time windows Application logs Search for specific keywords 2 Sigma event for URL’s Decomp tree- failed reqsts Login Failure Web server logs Dropped call frequency Watch List inbound/outbound Cut calls - poor connection Call Failure event frequency Timeout event frequency Swarm event detected Dropped IP calls frequency Failed IP call frequency CDR logs IPR logs SMS Capacity events Unusual sms traffic events User defined router events Compliance related router event Router logs Odd hour Unsuccessful logins X happens Y times in Z time User defined firewall events Compliance oriented firewall e Firewall logs Frequency of login failures high in a certain pockets Recency of late night events noticed in certain pockets Certain corridors experiencing high dropped calls
  • 17. Converting raw data Actionable Intelligence INTEGRATED EVENT 360 REPOSITORY SENSE & RESPOND LAYER LOG FILE INGESTION MACHINE LEARNING ALGORITHMS ON GRANULAR LOG EVENT DATA INFER INTENT FROM PATTERNS AND CREATE EVENT PROFILES LOAD RISK / BEHAVIOR PROFILE TO RULES ENGINE DB INTERCEPT OR OFFLINE REVIEW OF EVENTS CONSOLIDATE & REVIEW EVENT INTERCEPTS TO ASSESS EVENT RULE EFFECTIVENESS MEASURE PATTERN RULE EFFECTIVENESS - TRUE POSITIVE / FALSE POSITIVES CASE MANAGEMENT WORKFLOW TELECOM SWITCHES OTHER DEVICES •CDR LOG FILES •IP LOG FILES •MISC LOG FILES Holistic Value Chain BIG DATA REPOSITORY
  • 18. Case Study-2 : Decoding travellers intent
  • 19. What's the problem we are trying to solve ? • Travellers are “signalling” to us thru the behaviour they exhibit • OTA is unable to sense n respond to these varied behaviour
  • 20. Why is it important to solve this problem ? • Impacts look to book • Increase revenue from cross sell
  • 21. Srikanth intends to travel from San Fran to NYC
  • 24. Srikanth sees the options rendered !
  • 25. Is Srikanth Price Sensitive or Time conscious traveller? 87 % 13%
  • 26. Does Srikanth have a bias towards any airline ? Those small clicks reveal a lot !
  • 27. So who is Srikanth? Do we 'know' him ? What's his behavorial DNA ? Key vectors ? Early bird ( days = 21 ) Price insensitive ( click % = 89 %) Prefers American Airlines Most valuable customer ( Decile-1 ) Intra visit interval = 17 days Visit dispersion = 12 % International Churn propensity = 0 Bargain hunter = No ( 3 % coupon) Roadie = Yes ( 28000 miles per qtr ) Sentiment index = 73 %
  • 28. How do we respond in real time to Srikanths experience and behavioural patterns we’ve seen ? • If Srikanth is a high value customer • If he does not book within 8 min window • In real time route to high performing agent • Short circuit the queue • Extra 10 % discount since he is vulnerable • If search response time velocity is trending downward • Signal to beef up infrastructure • Optimise code base • Property recommendations
  • 29. Case Study-3 : Watched List
  • 30. What is the problem being solved? • Internal watch lists • Can we get e signals in their behavior ?  Call patterns ?  SMS patterns ?  Youtube upload patterns ?  Watched countries ?  Intrawatch list chatter ?  Late night communication behavior ? • Watch list activity intelligence takes 6 weeks • Bring it down to < day • Enhance it to make it real time
  • 31. Why is it important to solve this problem ? • Threat signals are there in telecom and communication logs • Saves lives ! • Ensures national security !
  • 32. Under the hood • Remote Authentication Dial-In User Service (RADIUS) provide authentication, authorization and accounting for network access. • When a user wants to get access to the Internet he will first have to give his users credentials (in most cases username and password) to a local RADIUS client.
  • 33. Deconstructing Radius Logs The IP address of the NAS ( Network Access server ) that is sending the request The framed address to be configured for the user 3 time stamps User Identity
  • 34. Radius logs Netsweeper logs Subscriber database Rich Security intelligence ! Triangulate from 3 event data pools
  • 35. Access/Device Framed IP address Customer ethnicity URL accessed Date/time Day Week Client IP address Customer type Customer browse location Post paid Subscriber Database 1329031890 http://photogallery.indiatimes.com/photo/4686985.cms 94.200.107.14 94.200.0.0 Du_Public_IP_Address 0 37 Status Enterprise Residential Asian European Dubai Smart Phone Desktop Ipad Others URL Type Gaming sites News sites Others ? ? Yes No Business rule to derive access device to be elicited from SME Location mapping business logic to be elicited from SME Social Networking Blogs P2P sites VPN/VOIP NAS Port Id Username Nas port id RADIUS Logs Co-relating fragmented telecom log files-Info model
  • 36. Calls to watched countries Intra Watch list Chatter velocity is high Call patterns reveal malicious intent
  • 37. 38 Entity on watch list NOT on watched list but high level of interactions Are people ‘n’ degrees away from watched list performing 2 sigma activity across multiple Call dimensions – sms, voice, conference and other behavioral activity ? CDR  From BTN  To TN  Date/Time  Duration  Call type,  Approximate tower location which carried call Watch List Recommender Data Product Modeling Unique behavioural signature
  • 38. Discarded Telecom data--> Actionable Security patterns
  • 39. Case Study-4 : Mobile forensics
  • 40. Mobile funnel data Analyzing Mobile Sub Channel Behavioural shift to Drive revenues for a leading online travel company
  • 41. What's the problem being solved ? • More applications becoming mobile • There is a dip in transaction completion rate • Friction points and hot spots exist • No way to “see” these hot spots and patterns
  • 42. • Spot friction points • Mobile funnel drops • Payment gateway drops • Airline connector drops
  • 45. Case Study-5 : Money transmission
  • 46. Minimizing fund leakages to watched entities Money transmission event stream Threat matrix Graph Analysis
  • 49. Graph analysis to monitor money transmission patterns • Each account can be modelled as a node in a graph • Behaviour across nodes can be analyzed • Proxy behaviours can be easily discerned
  • 50. 7 Key “gotchas” ( best practices)
  • 51. Lesson-1 : Think “Polyglot persistence” Asset Sensor Parameters Asset tags Sensor tags Events Column family ( Hbase/Cassandra) Document db ( Mongo) Graph db ( Neo4js) RDBMS ( Oracle ) Heavy duty write workloads Photos, Videos, text Inter relationships Low velocity self service Logical Business Model “Different strokes for different folks”
  • 52. Lesson-2 : Think “pattern extraction” 1. Collaborative filtering 2. Text Mining 3. Scoring Models ( Logistic etc ) Embedding one ML process can help SPOT patterns not previously seen
  • 53. Lesson-3 : Think “Baby steps” • 60-90 day Hadoop Sandbox • Build quick wins to build momentum • Pick a few low hanging use cases to demonstrate impact No Big Bang !
  • 54. Lesson-4 : Think “Data Products” • Data Product = “Action an end user takes” • EXAMPLE • Watch List recommender vs tons of “feel good” graphs • Next best action vs lots of dials, graphs • Focus on Outcomes more than Analysis
  • 55. Lesson-5 : Think “MVP-Minimum Viable Product” • Minimalist ... Key is to start simple • Only core features ... No bells and whistles • Get feedback from early adopters and enrich features •
  • 56. How can Big Data co-exist with existing DW solutions ? Big DataExisting DW
  • 57. Existing DW OSS BSS CRM ETL Existing BI tools Radius logs IP traffic logs Comments File copy / Bulk load / Agent based Operational App Integration Existing DW OSS BSS CRM ETL Existing BI tools Radius logs IP traffic logs Comments File copy / Bulk load / Agent based Operational App Integration Lesson-6 : Gracefully Co-exist
  • 58. Lesson-7 : Think “Biz backward … NOT Tech forward” 1. What is the business problem you are solving ? Tightly framed ? 2. Why is important to solve this problem ? 3. What happens if we dont solve this problem ? 4. Is status quo an option ? 5. Is the business pain acknowledged ? 6. How would the end user “feel” when the product is deployed ? 7. Are budgets allocated ? 8. What is the actual use case to solve the pain ? Connect with business @ a deeper level !
  • 59. 1. Think “Polyglot Persistence” 2. Think “Pattern Extraction” 3. Think “Crawl-Walk-Run” 4. Think “Data Products” 5. Think “MVP” 6. Think “Co-existence” 7. Think “Business Impact/Outcomes” To summarize !
  • 60. Taming and channelising data beast is going to be a crucial capability for survival
  • 61. Pl feel free to reach out … Derick.jose@fluturasolutions.com