SlideShare uma empresa Scribd logo
1 de 27
TeamMongoose
Keertan Kini Zoe Durand Ricardo Rosales Frances Schroeder
INITIAL PROBLEM STATEMENT
Enable the NSA to rapidly
identify disposable
infrastructure used in
cyber-attacks
CURRENT PROBLEM STATEMENT
Democratize threat
intelligence by providing an
automatic “pivoting”
solution
100 Interviews
BS Symbolic Systems ‘22
Hipster
MBA ‘22
Hustler
MBA ‘22
Hound
MBA + MPP
Hacker
Problem Sponsor:
National Security
Agency Cybersecurity
Directorate
Over the past 10 weeks, we conducted 100 interviews.
Academic
Commercial
Government
We didn’t fully understand the beneficiary nor the
problem statement...
What is the full mission of the NSA?
What data does the NSA have
access to?
What is the organizational structure
between the NSA and all the other
agencies that it defends?
What is disposable infrastructure?
How is it used by adversaries in an
attack?
Week 1
Since we didn’t know what “disposable infrastructure” was… we
decided to start with the data where we could find it!
1. “The NSA does not have access to network data if it is domestic” - from Sponsor
1. “There is a clear reason for which the NSA doesn’t have access to that data - they should just work more
effectively with the FBI” - from cyber-crime / cyber-security diplomat
1. “What is missing is the defense agreement to get the data, not the data itself.” - from sponsor & DoD
representative
Week 1
We realized that the world was much
more complicated than we had originally
thought
Confused mongoose
Week 3
Aha moment! Disposable infrastructure = servers leased
through cloud providers
Week 3
All Agencies in
National
Security System
DoD Agencies in
National
Security
System
Critical
infrastructure,
private
companies
NSA
The interplay between agencies is even more complicated that we had originally thought!
Cybersecurity and
Infrastructure
Security Agency
CISA
FBI
Cloud
Providers
MALICIOUS CYBER
ACTOR
Disposable
Infrastructure
Already gone!
USCYBERCOM
Private Incident
Response
Companies
Week 4
Mission Model Canvas had a lot of other players involved
KEY PARTNERS
- NSA (analysts and
expertise)
- DHS CISA
- Private sector - -
Cloud provider Trust
and Security Teams
- FBI Cybercrime
Division
- Private Network
security firms
KEY RESOURCES
- Security Clearance
- IT Security Accreditation
- Examples of concerning
malware for categorization
and analysis
- Traffic Data (labeled
instances of disposable
infrastructure)
VALUE PROPOSITIONS
One or several of the
following:
-Reduce time required to
identify persistent
infrastructure used by
multiple malware
installations
- Identify temporary
infrastructure used by
malware installation
previously unidentified
and share to Cloud
Providers to shutdown
- Reduce time to serve
Data Preservation notices
to Cloud Providers to help
attribution
KEY ACTIVITIES
- Software Engineering:
- Identify common data for
behavioral analysis of
specific attacks
- Create analytics which
plugs into existing
engines
- Organizational: Fast Path
for data sharing
- Security Accreditation
MISSION ACHIEVEMENT/IMPACT FACTORS
Our mission will be successful if we develop a scalable solution to help
the NSA identify persistent infrastructure used by multiple malware
installations in a timely manner.
DEPLOYMENT
1. Back-end algorithm not
running in real time as
proof of concept
2. Back-end algorithm
running in real time
(streaming)
3. Dashboard updated in
real time deployed to the
cloud or on-prem and
accessible NSA/CISA/FBI
stakeholders
BUY-IN & SUPPORT
-Need IT Approvals
from NSA/CISA/FBI
for their systems
-Need demand
MISSION BUDGET/COST
BENEFICIARIES
Primary: Cyber
defenders at the NSA,
Secondary: Cyber
investigators at the FBI
Tertiary: All entities that
the NSA serves and the
DoD in general
Fixed:
- Software design & engineering
- Helpdesk/support functions
- Labelling Costs
Variable:
- Subscription API usage for External tools, cloud computation/storage
“Attack” can mean different things, and even the lifecycle of an
attack is broad - where could Mongoose help?
Prevention
Incident
response
Attribution
Week 4
Big identity crisis for the team!
A picture of a Mongoose team member boiling the ocean, circa Week 4
Prevention
Attribution
Incident
response
Team
Mongoose
NSA DoD
Critical infra
Lighthouse of the
teaching team
FBI
Flocks of
beneficiaries
Lightbulb moment!
Disposable
infrastructure isn’t in
and of itself a
problem, is it?
“Attacks” isn’t
specific enough.
You need to
narrow it down to a
specific attack!
“We were originally given a
solution, not a problem.”
Week 4
Pivot! Focus on a specific attack type: Data exfiltration.
Week 5 Problem Statement
WHAT: improve the early detection of
nation-state data exfiltration cyber-
attacks on the NSA corporate network
conducted through ephemeral cloud
infrastructure, where the initial attack
vector is a zero-day or supply chain
attack, by quickly identifying the C2
servers owned in full by the attackers
FOR WHO: NSA cyber analysts as early
adopter, later DoD agencies.
Week 5
To solve the problem of NSA’s access to domestic
data, we decide to focus on the NSA as a corporate
network
Week 5
We still have a data problem...
Intelligence and/or Firewall?
Intelligence for
signal analysis
Firewall to
instantly block
malicious traffic
Week 6
At this point, we still weren’t sure that Mongoose could really
bring anything to the table.
Week 6
Despite the new problem statement, we hit a new low.
We write an email to the teaching team outlining
our concerns: “Our problem statement is either too
broad, or too technical. People have tried to solve
these problems for years, and it’s unclear what we
might be able to contribute. ‘Redefine
cybersecurity’ is better suited to a PhD in
cybersecurity than to H4D”
Week 6
Week 1
Week 2
Week 3
Week 4 Week 5
“The NSA is a bit of a black
box in terms of their
processes and heir prior
attacks. Proxies don’t seem
to be working either as no
company seems keen to
discuss the ways in which
they’ve been breached.”
We talk to our sponsor and have a breakthrough moment.
What if I already had an
indicator of
compromise… and I
asked you to find similar
things?
! !
Major breakthrough: we redefine both the problem statement
and the beneficiary
WHAT: flag infrastructure on the public internet that “correlates” or
“matches” to a known malicious infrastructure (seed)
FOR WHO: NSA Discovery Team in conjunction with JFHQ-DODIN
Network Defenders.
Week 6
Team Mongoose is back!
Week 7
We define a high-level product!
Mongoose Intelligence will provide analysis automation through
an entity matching API
Mongoose entity
matching API
Malicious IP
or domain
Similar IP or
Domain
Week 7
We learn that visualization seems to be a compelling product in and of
itself for many beneficiaries
IP 1
IP 2
DoD
Endpoint 1
Domain
aws.com
Domain
XYZ.com
IP 3
IP 4
DoD
Endpoint 2
JFHQ-DoDIN network
- Country
- Date of first
connection
- Account holder
- # of connections
- Port
- Protocol
INPUT
OUTPUT
“Love the visualization! It would be great if you displayed context
and confidence scores.”
Why hadn’t the NSA ever built this before?
They might have.
Legal framework Large siloed
organization?
Week 8
We start to understand more about the details of the
specific data sources and systems that we would need to
plug into
“Nobody is doing anything with all the log data that is produced by Akamai
on DoD networks.”
“You should plug into Acropolis that is already doing data collection. DMA
is already dumping several terabytes of logs per day. Basically all of the
DoD is feeding in data.” -- Defense Digital Service
Week 9
With our MVPs, we got good signal that this is something that is
interesting to the NSA Discovery Team
“There are rules against me saying we would purchase this. But
this is a problem, and it needs to be solved ASAP.” -- NSA CSD
TD
Week 9
Several types of potential customers
Small/Medium
Enterprises
NSA/JFHQ-DODIN
Telecoms
Week 10
We’re still thinking about whether or not we want to
continue on the project after the class.
Week 10
Thank you to everyone who made this possible!
Special thanks to:
● Neal Ziring, NSA CSD Technical Director
● Jennifer Quarrie and Jason Chen
● Our defense mentor
● H4D TA Joel Johnson
● The entire H4D teaching team
● Our 100 interviewees
TeamMongoose
Problem Sponsor:
National Security
Agency, Cybersecurity
Directorate
Keertan Kini Zoe Durand Ricardo
Rosales
Frances
Schroeder

Mais conteúdo relacionado

Mais procurados

Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Jorge Orchilles
 

Mais procurados (20)

Agile Retrospective by Manohar Prasad
Agile Retrospective by Manohar PrasadAgile Retrospective by Manohar Prasad
Agile Retrospective by Manohar Prasad
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOC
 
Technical Debt: A Management Problem That Requires a Management Solution
Technical Debt: A Management Problem That Requires a Management SolutionTechnical Debt: A Management Problem That Requires a Management Solution
Technical Debt: A Management Problem That Requires a Management Solution
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
 
SBOM, Is It 42?
SBOM, Is It 42?SBOM, Is It 42?
SBOM, Is It 42?
 
Adopting Domain-Driven Design in your organization
Adopting Domain-Driven Design in your organizationAdopting Domain-Driven Design in your organization
Adopting Domain-Driven Design in your organization
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
SIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security FrameworkSIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security Framework
 
Strategy for Reducing Ticket Backlog
Strategy for Reducing Ticket BacklogStrategy for Reducing Ticket Backlog
Strategy for Reducing Ticket Backlog
 
Inception deck and lift off examples
Inception deck and lift off   examplesInception deck and lift off   examples
Inception deck and lift off examples
 
The Importance of having a Sprint Goal
The Importance of having a Sprint GoalThe Importance of having a Sprint Goal
The Importance of having a Sprint Goal
 
Thinking in OODA Loops
Thinking in OODA LoopsThinking in OODA Loops
Thinking in OODA Loops
 
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
 
World-Class Incident Response Management
World-Class Incident Response ManagementWorld-Class Incident Response Management
World-Class Incident Response Management
 
Inceptions
InceptionsInceptions
Inceptions
 
Agile-overview: Agile Manifesto, Agile principles and Agile Methodologies
Agile-overview: Agile Manifesto, Agile principles and Agile MethodologiesAgile-overview: Agile Manifesto, Agile principles and Agile Methodologies
Agile-overview: Agile Manifesto, Agile principles and Agile Methodologies
 
Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018
 
How Spotify Builds Products (Organization. Architecture, Autonomy, Accountabi...
How Spotify Builds Products (Organization. Architecture, Autonomy, Accountabi...How Spotify Builds Products (Organization. Architecture, Autonomy, Accountabi...
How Spotify Builds Products (Organization. Architecture, Autonomy, Accountabi...
 
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
 

Semelhante a Mongoose H4D 2021 Lessons Learned

Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...
Tiffany Sandoval
 
Network security monitoring with open source tools
Network security monitoring with open source toolsNetwork security monitoring with open source tools
Network security monitoring with open source tools
terriert
 
NetworkWorld-SafeBreach
NetworkWorld-SafeBreachNetworkWorld-SafeBreach
NetworkWorld-SafeBreach
Dan Kunkel
 

Semelhante a Mongoose H4D 2021 Lessons Learned (20)

Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)
 
Big security for big data
Big security for big dataBig security for big data
Big security for big data
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringCombating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security Monitoring
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
Network security monitoring with open source tools
Network security monitoring with open source toolsNetwork security monitoring with open source tools
Network security monitoring with open source tools
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and Practitioners
 
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
 
Splunk for Security - Hands-On
Splunk for Security - Hands-On Splunk for Security - Hands-On
Splunk for Security - Hands-On
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
NetworkWorld-SafeBreach
NetworkWorld-SafeBreachNetworkWorld-SafeBreach
NetworkWorld-SafeBreach
 

Mais de Stanford University

Mais de Stanford University (20)

Team Networks - 2022 Technology, Innovation & Great Power Competition
Team Networks  - 2022 Technology, Innovation & Great Power CompetitionTeam Networks  - 2022 Technology, Innovation & Great Power Competition
Team Networks - 2022 Technology, Innovation & Great Power Competition
 
Team LiOn Batteries - 2022 Technology, Innovation & Great Power Competition
Team LiOn Batteries  - 2022 Technology, Innovation & Great Power CompetitionTeam LiOn Batteries  - 2022 Technology, Innovation & Great Power Competition
Team LiOn Batteries - 2022 Technology, Innovation & Great Power Competition
 
Team Quantum - 2022 Technology, Innovation & Great Power Competition
Team Quantum  - 2022 Technology, Innovation & Great Power CompetitionTeam Quantum  - 2022 Technology, Innovation & Great Power Competition
Team Quantum - 2022 Technology, Innovation & Great Power Competition
 
Team Disinformation - 2022 Technology, Innovation & Great Power Competition
Team Disinformation  - 2022 Technology, Innovation & Great Power CompetitionTeam Disinformation  - 2022 Technology, Innovation & Great Power Competition
Team Disinformation - 2022 Technology, Innovation & Great Power Competition
 
Team Wargames - 2022 Technology, Innovation & Great Power Competition
Team Wargames  - 2022 Technology, Innovation & Great Power CompetitionTeam Wargames  - 2022 Technology, Innovation & Great Power Competition
Team Wargames - 2022 Technology, Innovation & Great Power Competition
 
Team Acquistion - 2022 Technology, Innovation & Great Power Competition
Team Acquistion  - 2022 Technology, Innovation & Great Power Competition Team Acquistion  - 2022 Technology, Innovation & Great Power Competition
Team Acquistion - 2022 Technology, Innovation & Great Power Competition
 
Team Climate Change - 2022 Technology, Innovation & Great Power Competition
Team Climate Change - 2022 Technology, Innovation & Great Power Competition Team Climate Change - 2022 Technology, Innovation & Great Power Competition
Team Climate Change - 2022 Technology, Innovation & Great Power Competition
 
Altuna Engr245 2022 Lessons Learned
Altuna Engr245 2022 Lessons LearnedAltuna Engr245 2022 Lessons Learned
Altuna Engr245 2022 Lessons Learned
 
Invisa Engr245 2022 Lessons Learned
Invisa Engr245 2022 Lessons LearnedInvisa Engr245 2022 Lessons Learned
Invisa Engr245 2022 Lessons Learned
 
ānanda Engr245 2022 Lessons Learned
ānanda Engr245 2022 Lessons Learnedānanda Engr245 2022 Lessons Learned
ānanda Engr245 2022 Lessons Learned
 
Gordian Knot Center Roundtable w/Depty SecDef
Gordian Knot Center Roundtable w/Depty SecDef Gordian Knot Center Roundtable w/Depty SecDef
Gordian Knot Center Roundtable w/Depty SecDef
 
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
 
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
 
Team Catena - 2021 Technology, Innovation & Great Power Competition
Team Catena - 2021 Technology, Innovation & Great Power CompetitionTeam Catena - 2021 Technology, Innovation & Great Power Competition
Team Catena - 2021 Technology, Innovation & Great Power Competition
 
Team Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power CompetitionTeam Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power Competition
 
Team Drone - 2021 Technology, Innovation & Great Power Competition
Team Drone - 2021 Technology, Innovation & Great Power CompetitionTeam Drone - 2021 Technology, Innovation & Great Power Competition
Team Drone - 2021 Technology, Innovation & Great Power Competition
 
Team Short Circuit - 2021 Technology, Innovation & Great Power Competition
Team Short Circuit - 2021 Technology, Innovation & Great Power CompetitionTeam Short Circuit - 2021 Technology, Innovation & Great Power Competition
Team Short Circuit - 2021 Technology, Innovation & Great Power Competition
 
Team Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionTeam Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power Competition
 
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
 
Lecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - CyberLecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - Cyber
 

Último

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 

Mongoose H4D 2021 Lessons Learned

  • 1. TeamMongoose Keertan Kini Zoe Durand Ricardo Rosales Frances Schroeder INITIAL PROBLEM STATEMENT Enable the NSA to rapidly identify disposable infrastructure used in cyber-attacks CURRENT PROBLEM STATEMENT Democratize threat intelligence by providing an automatic “pivoting” solution 100 Interviews BS Symbolic Systems ‘22 Hipster MBA ‘22 Hustler MBA ‘22 Hound MBA + MPP Hacker Problem Sponsor: National Security Agency Cybersecurity Directorate
  • 2. Over the past 10 weeks, we conducted 100 interviews. Academic Commercial Government
  • 3. We didn’t fully understand the beneficiary nor the problem statement... What is the full mission of the NSA? What data does the NSA have access to? What is the organizational structure between the NSA and all the other agencies that it defends? What is disposable infrastructure? How is it used by adversaries in an attack? Week 1
  • 4. Since we didn’t know what “disposable infrastructure” was… we decided to start with the data where we could find it! 1. “The NSA does not have access to network data if it is domestic” - from Sponsor 1. “There is a clear reason for which the NSA doesn’t have access to that data - they should just work more effectively with the FBI” - from cyber-crime / cyber-security diplomat 1. “What is missing is the defense agreement to get the data, not the data itself.” - from sponsor & DoD representative Week 1
  • 5. We realized that the world was much more complicated than we had originally thought Confused mongoose Week 3
  • 6. Aha moment! Disposable infrastructure = servers leased through cloud providers Week 3
  • 7. All Agencies in National Security System DoD Agencies in National Security System Critical infrastructure, private companies NSA The interplay between agencies is even more complicated that we had originally thought! Cybersecurity and Infrastructure Security Agency CISA FBI Cloud Providers MALICIOUS CYBER ACTOR Disposable Infrastructure Already gone! USCYBERCOM Private Incident Response Companies Week 4
  • 8. Mission Model Canvas had a lot of other players involved KEY PARTNERS - NSA (analysts and expertise) - DHS CISA - Private sector - - Cloud provider Trust and Security Teams - FBI Cybercrime Division - Private Network security firms KEY RESOURCES - Security Clearance - IT Security Accreditation - Examples of concerning malware for categorization and analysis - Traffic Data (labeled instances of disposable infrastructure) VALUE PROPOSITIONS One or several of the following: -Reduce time required to identify persistent infrastructure used by multiple malware installations - Identify temporary infrastructure used by malware installation previously unidentified and share to Cloud Providers to shutdown - Reduce time to serve Data Preservation notices to Cloud Providers to help attribution KEY ACTIVITIES - Software Engineering: - Identify common data for behavioral analysis of specific attacks - Create analytics which plugs into existing engines - Organizational: Fast Path for data sharing - Security Accreditation MISSION ACHIEVEMENT/IMPACT FACTORS Our mission will be successful if we develop a scalable solution to help the NSA identify persistent infrastructure used by multiple malware installations in a timely manner. DEPLOYMENT 1. Back-end algorithm not running in real time as proof of concept 2. Back-end algorithm running in real time (streaming) 3. Dashboard updated in real time deployed to the cloud or on-prem and accessible NSA/CISA/FBI stakeholders BUY-IN & SUPPORT -Need IT Approvals from NSA/CISA/FBI for their systems -Need demand MISSION BUDGET/COST BENEFICIARIES Primary: Cyber defenders at the NSA, Secondary: Cyber investigators at the FBI Tertiary: All entities that the NSA serves and the DoD in general Fixed: - Software design & engineering - Helpdesk/support functions - Labelling Costs Variable: - Subscription API usage for External tools, cloud computation/storage
  • 9. “Attack” can mean different things, and even the lifecycle of an attack is broad - where could Mongoose help? Prevention Incident response Attribution Week 4
  • 10. Big identity crisis for the team! A picture of a Mongoose team member boiling the ocean, circa Week 4 Prevention Attribution Incident response Team Mongoose NSA DoD Critical infra Lighthouse of the teaching team FBI Flocks of beneficiaries
  • 11. Lightbulb moment! Disposable infrastructure isn’t in and of itself a problem, is it? “Attacks” isn’t specific enough. You need to narrow it down to a specific attack! “We were originally given a solution, not a problem.” Week 4
  • 12. Pivot! Focus on a specific attack type: Data exfiltration. Week 5 Problem Statement WHAT: improve the early detection of nation-state data exfiltration cyber- attacks on the NSA corporate network conducted through ephemeral cloud infrastructure, where the initial attack vector is a zero-day or supply chain attack, by quickly identifying the C2 servers owned in full by the attackers FOR WHO: NSA cyber analysts as early adopter, later DoD agencies. Week 5
  • 13. To solve the problem of NSA’s access to domestic data, we decide to focus on the NSA as a corporate network Week 5 We still have a data problem...
  • 14. Intelligence and/or Firewall? Intelligence for signal analysis Firewall to instantly block malicious traffic Week 6
  • 15. At this point, we still weren’t sure that Mongoose could really bring anything to the table. Week 6
  • 16. Despite the new problem statement, we hit a new low. We write an email to the teaching team outlining our concerns: “Our problem statement is either too broad, or too technical. People have tried to solve these problems for years, and it’s unclear what we might be able to contribute. ‘Redefine cybersecurity’ is better suited to a PhD in cybersecurity than to H4D” Week 6 Week 1 Week 2 Week 3 Week 4 Week 5 “The NSA is a bit of a black box in terms of their processes and heir prior attacks. Proxies don’t seem to be working either as no company seems keen to discuss the ways in which they’ve been breached.”
  • 17. We talk to our sponsor and have a breakthrough moment. What if I already had an indicator of compromise… and I asked you to find similar things? ! !
  • 18. Major breakthrough: we redefine both the problem statement and the beneficiary WHAT: flag infrastructure on the public internet that “correlates” or “matches” to a known malicious infrastructure (seed) FOR WHO: NSA Discovery Team in conjunction with JFHQ-DODIN Network Defenders. Week 6
  • 19. Team Mongoose is back! Week 7
  • 20. We define a high-level product! Mongoose Intelligence will provide analysis automation through an entity matching API Mongoose entity matching API Malicious IP or domain Similar IP or Domain Week 7
  • 21. We learn that visualization seems to be a compelling product in and of itself for many beneficiaries IP 1 IP 2 DoD Endpoint 1 Domain aws.com Domain XYZ.com IP 3 IP 4 DoD Endpoint 2 JFHQ-DoDIN network - Country - Date of first connection - Account holder - # of connections - Port - Protocol INPUT OUTPUT “Love the visualization! It would be great if you displayed context and confidence scores.”
  • 22. Why hadn’t the NSA ever built this before? They might have. Legal framework Large siloed organization? Week 8
  • 23. We start to understand more about the details of the specific data sources and systems that we would need to plug into “Nobody is doing anything with all the log data that is produced by Akamai on DoD networks.” “You should plug into Acropolis that is already doing data collection. DMA is already dumping several terabytes of logs per day. Basically all of the DoD is feeding in data.” -- Defense Digital Service Week 9
  • 24. With our MVPs, we got good signal that this is something that is interesting to the NSA Discovery Team “There are rules against me saying we would purchase this. But this is a problem, and it needs to be solved ASAP.” -- NSA CSD TD Week 9
  • 25. Several types of potential customers Small/Medium Enterprises NSA/JFHQ-DODIN Telecoms Week 10
  • 26. We’re still thinking about whether or not we want to continue on the project after the class. Week 10
  • 27. Thank you to everyone who made this possible! Special thanks to: ● Neal Ziring, NSA CSD Technical Director ● Jennifer Quarrie and Jason Chen ● Our defense mentor ● H4D TA Joel Johnson ● The entire H4D teaching team ● Our 100 interviewees TeamMongoose Problem Sponsor: National Security Agency, Cybersecurity Directorate Keertan Kini Zoe Durand Ricardo Rosales Frances Schroeder

Notas do Editor

  1. Disposable infrastructure - didn’t quite know what it meant, but then decided it sounded interesting and wanted to dive deeper “If it sounds ambiguous to you, it sounded the same to us as well :)” - ,
  2. 5 second slide
  3. First three questions might seem obvious to people working in the govt or agencies, but we’re Stanford students - remind them who we are :)
  4. We don’t know what disposable infrastructure is, but let’s start with the data ! Make the data <> infrastructure link clear in the title. Current title is subtitle. Cartoon of someone looking under rocks :)
  5. the NSA is severely restricted in what they can look at in terms of US person information (including IP addresses)
  6. I can’t tell what this means -> Say: we are thinking of continuing, looking for some advice
  7. Can we add rachel ?