SlideShare uma empresa Scribd logo
1 de 27
TeamMongoose
Keertan Kini Zoe Durand Ricardo Rosales Frances Schroeder
INITIAL PROBLEM STATEMENT
Enable the NSA to rapidly
identify disposable
infrastructure used in
cyber-attacks
CURRENT PROBLEM STATEMENT
Democratize threat
intelligence by providing an
automatic “pivoting”
solution
100 Interviews
BS Symbolic Systems ‘22
Hipster
MBA ‘22
Hustler
MBA ‘22
Hound
MBA + MPP
Hacker
Problem Sponsor:
National Security
Agency Cybersecurity
Directorate
Over the past 10 weeks, we conducted 100 interviews.
Academic
Commercial
Government
We didn’t fully understand the beneficiary nor the
problem statement...
What is the full mission of the NSA?
What data does the NSA have
access to?
What is the organizational structure
between the NSA and all the other
agencies that it defends?
What is disposable infrastructure?
How is it used by adversaries in an
attack?
Week 1
Since we didn’t know what “disposable infrastructure” was… we
decided to start with the data where we could find it!
1. “The NSA does not have access to network data if it is domestic” - from Sponsor
1. “There is a clear reason for which the NSA doesn’t have access to that data - they should just work more
effectively with the FBI” - from cyber-crime / cyber-security diplomat
1. “What is missing is the defense agreement to get the data, not the data itself.” - from sponsor & DoD
representative
Week 1
We realized that the world was much
more complicated than we had originally
thought
Confused mongoose
Week 3
Aha moment! Disposable infrastructure = servers leased
through cloud providers
Week 3
All Agencies in
National
Security System
DoD Agencies in
National
Security
System
Critical
infrastructure,
private
companies
NSA
The interplay between agencies is even more complicated that we had originally thought!
Cybersecurity and
Infrastructure
Security Agency
CISA
FBI
Cloud
Providers
MALICIOUS CYBER
ACTOR
Disposable
Infrastructure
Already gone!
USCYBERCOM
Private Incident
Response
Companies
Week 4
Mission Model Canvas had a lot of other players involved
KEY PARTNERS
- NSA (analysts and
expertise)
- DHS CISA
- Private sector - -
Cloud provider Trust
and Security Teams
- FBI Cybercrime
Division
- Private Network
security firms
KEY RESOURCES
- Security Clearance
- IT Security Accreditation
- Examples of concerning
malware for categorization
and analysis
- Traffic Data (labeled
instances of disposable
infrastructure)
VALUE PROPOSITIONS
One or several of the
following:
-Reduce time required to
identify persistent
infrastructure used by
multiple malware
installations
- Identify temporary
infrastructure used by
malware installation
previously unidentified
and share to Cloud
Providers to shutdown
- Reduce time to serve
Data Preservation notices
to Cloud Providers to help
attribution
KEY ACTIVITIES
- Software Engineering:
- Identify common data for
behavioral analysis of
specific attacks
- Create analytics which
plugs into existing
engines
- Organizational: Fast Path
for data sharing
- Security Accreditation
MISSION ACHIEVEMENT/IMPACT FACTORS
Our mission will be successful if we develop a scalable solution to help
the NSA identify persistent infrastructure used by multiple malware
installations in a timely manner.
DEPLOYMENT
1. Back-end algorithm not
running in real time as
proof of concept
2. Back-end algorithm
running in real time
(streaming)
3. Dashboard updated in
real time deployed to the
cloud or on-prem and
accessible NSA/CISA/FBI
stakeholders
BUY-IN & SUPPORT
-Need IT Approvals
from NSA/CISA/FBI
for their systems
-Need demand
MISSION BUDGET/COST
BENEFICIARIES
Primary: Cyber
defenders at the NSA,
Secondary: Cyber
investigators at the FBI
Tertiary: All entities that
the NSA serves and the
DoD in general
Fixed:
- Software design & engineering
- Helpdesk/support functions
- Labelling Costs
Variable:
- Subscription API usage for External tools, cloud computation/storage
“Attack” can mean different things, and even the lifecycle of an
attack is broad - where could Mongoose help?
Prevention
Incident
response
Attribution
Week 4
Big identity crisis for the team!
A picture of a Mongoose team member boiling the ocean, circa Week 4
Prevention
Attribution
Incident
response
Team
Mongoose
NSA DoD
Critical infra
Lighthouse of the
teaching team
FBI
Flocks of
beneficiaries
Lightbulb moment!
Disposable
infrastructure isn’t in
and of itself a
problem, is it?
“Attacks” isn’t
specific enough.
You need to
narrow it down to a
specific attack!
“We were originally given a
solution, not a problem.”
Week 4
Pivot! Focus on a specific attack type: Data exfiltration.
Week 5 Problem Statement
WHAT: improve the early detection of
nation-state data exfiltration cyber-
attacks on the NSA corporate network
conducted through ephemeral cloud
infrastructure, where the initial attack
vector is a zero-day or supply chain
attack, by quickly identifying the C2
servers owned in full by the attackers
FOR WHO: NSA cyber analysts as early
adopter, later DoD agencies.
Week 5
To solve the problem of NSA’s access to domestic
data, we decide to focus on the NSA as a corporate
network
Week 5
We still have a data problem...
Intelligence and/or Firewall?
Intelligence for
signal analysis
Firewall to
instantly block
malicious traffic
Week 6
At this point, we still weren’t sure that Mongoose could really
bring anything to the table.
Week 6
Despite the new problem statement, we hit a new low.
We write an email to the teaching team outlining
our concerns: “Our problem statement is either too
broad, or too technical. People have tried to solve
these problems for years, and it’s unclear what we
might be able to contribute. ‘Redefine
cybersecurity’ is better suited to a PhD in
cybersecurity than to H4D”
Week 6
Week 1
Week 2
Week 3
Week 4 Week 5
“The NSA is a bit of a black
box in terms of their
processes and heir prior
attacks. Proxies don’t seem
to be working either as no
company seems keen to
discuss the ways in which
they’ve been breached.”
We talk to our sponsor and have a breakthrough moment.
What if I already had an
indicator of
compromise… and I
asked you to find similar
things?
! !
Major breakthrough: we redefine both the problem statement
and the beneficiary
WHAT: flag infrastructure on the public internet that “correlates” or
“matches” to a known malicious infrastructure (seed)
FOR WHO: NSA Discovery Team in conjunction with JFHQ-DODIN
Network Defenders.
Week 6
Team Mongoose is back!
Week 7
We define a high-level product!
Mongoose Intelligence will provide analysis automation through
an entity matching API
Mongoose entity
matching API
Malicious IP
or domain
Similar IP or
Domain
Week 7
We learn that visualization seems to be a compelling product in and of
itself for many beneficiaries
IP 1
IP 2
DoD
Endpoint 1
Domain
aws.com
Domain
XYZ.com
IP 3
IP 4
DoD
Endpoint 2
JFHQ-DoDIN network
- Country
- Date of first
connection
- Account holder
- # of connections
- Port
- Protocol
INPUT
OUTPUT
“Love the visualization! It would be great if you displayed context
and confidence scores.”
Why hadn’t the NSA ever built this before?
They might have.
Legal framework Large siloed
organization?
Week 8
We start to understand more about the details of the
specific data sources and systems that we would need to
plug into
“Nobody is doing anything with all the log data that is produced by Akamai
on DoD networks.”
“You should plug into Acropolis that is already doing data collection. DMA
is already dumping several terabytes of logs per day. Basically all of the
DoD is feeding in data.” -- Defense Digital Service
Week 9
With our MVPs, we got good signal that this is something that is
interesting to the NSA Discovery Team
“There are rules against me saying we would purchase this. But
this is a problem, and it needs to be solved ASAP.” -- NSA CSD
TD
Week 9
Several types of potential customers
Small/Medium
Enterprises
NSA/JFHQ-DODIN
Telecoms
Week 10
We’re still thinking about whether or not we want to
continue on the project after the class.
Week 10
Thank you to everyone who made this possible!
Special thanks to:
● Neal Ziring, NSA CSD Technical Director
● Jennifer Quarrie and Jason Chen
● Our defense mentor
● H4D TA Joel Johnson
● The entire H4D teaching team
● Our 100 interviewees
TeamMongoose
Problem Sponsor:
National Security
Agency, Cybersecurity
Directorate
Keertan Kini Zoe Durand Ricardo
Rosales
Frances
Schroeder

Mais conteúdo relacionado

Mais procurados

Sea Watch H4D 2020 Lessons Learned
Sea Watch H4D 2020 Lessons LearnedSea Watch H4D 2020 Lessons Learned
Sea Watch H4D 2020 Lessons LearnedStanford University
 
Gordian Knot Center Roundtable w/Depty SecDef
Gordian Knot Center Roundtable w/Depty SecDef Gordian Knot Center Roundtable w/Depty SecDef
Gordian Knot Center Roundtable w/Depty SecDef Stanford University
 
The Incident of Chinese Spy Balloon.pptx
The Incident of Chinese Spy Balloon.pptxThe Incident of Chinese Spy Balloon.pptx
The Incident of Chinese Spy Balloon.pptxAdityaBodhi
 
Top 10 business solution architect interview questions and answers
Top 10 business solution architect interview questions and answersTop 10 business solution architect interview questions and answers
Top 10 business solution architect interview questions and answerstonychoper5506
 
Team LiOn Batteries - 2022 Technology, Innovation & Great Power Competition
Team LiOn Batteries  - 2022 Technology, Innovation & Great Power CompetitionTeam LiOn Batteries  - 2022 Technology, Innovation & Great Power Competition
Team LiOn Batteries - 2022 Technology, Innovation & Great Power CompetitionStanford University
 
Module 6 Implementation: project management and monitoring
Module 6 Implementation: project management and monitoringModule 6 Implementation: project management and monitoring
Module 6 Implementation: project management and monitoringTogar Simatupang
 
Stakeholder analysis
Stakeholder analysisStakeholder analysis
Stakeholder analysisStefan Csosz
 
Crisis Management Solutions Deck PowerPoint Presentation Slides
Crisis Management Solutions Deck PowerPoint Presentation SlidesCrisis Management Solutions Deck PowerPoint Presentation Slides
Crisis Management Solutions Deck PowerPoint Presentation SlidesSlideTeam
 
PAS Biodiversity Net Gain consultation overview - 10 February 2022
PAS Biodiversity Net Gain consultation overview - 10 February 2022PAS Biodiversity Net Gain consultation overview - 10 February 2022
PAS Biodiversity Net Gain consultation overview - 10 February 2022PAS_Team
 
Community Policing in Kenya
Community Policing in KenyaCommunity Policing in Kenya
Community Policing in Kenyacliffordcomondi
 
Monitoring and evaluation of Projects
Monitoring and evaluation of ProjectsMonitoring and evaluation of Projects
Monitoring and evaluation of ProjectsLitunya Laurean
 
The People Case: How to Convince Your Organisation to Invest in Change
The People Case: How to Convince Your Organisation to Invest in ChangeThe People Case: How to Convince Your Organisation to Invest in Change
The People Case: How to Convince Your Organisation to Invest in ChangeProsci ANZ
 
Project Cycle Management (PCM) & Logical Framework Analysis (LFA)
Project Cycle Management (PCM) & Logical Framework Analysis (LFA)Project Cycle Management (PCM) & Logical Framework Analysis (LFA)
Project Cycle Management (PCM) & Logical Framework Analysis (LFA)Erik Kijne
 
SCORE Strategic Planning Workshop-SLIDES 2017-01-11R2
SCORE Strategic Planning Workshop-SLIDES 2017-01-11R2SCORE Strategic Planning Workshop-SLIDES 2017-01-11R2
SCORE Strategic Planning Workshop-SLIDES 2017-01-11R2Ray Madaghiele
 

Mais procurados (20)

Sea Watch H4D 2020 Lessons Learned
Sea Watch H4D 2020 Lessons LearnedSea Watch H4D 2020 Lessons Learned
Sea Watch H4D 2020 Lessons Learned
 
Strategic Planning Workshop
Strategic Planning WorkshopStrategic Planning Workshop
Strategic Planning Workshop
 
Gordian Knot Center Roundtable w/Depty SecDef
Gordian Knot Center Roundtable w/Depty SecDef Gordian Knot Center Roundtable w/Depty SecDef
Gordian Knot Center Roundtable w/Depty SecDef
 
The Incident of Chinese Spy Balloon.pptx
The Incident of Chinese Spy Balloon.pptxThe Incident of Chinese Spy Balloon.pptx
The Incident of Chinese Spy Balloon.pptx
 
Mel presentation
Mel presentationMel presentation
Mel presentation
 
Cbap babok ppt day 1 bapm ea
Cbap babok ppt day 1   bapm eaCbap babok ppt day 1   bapm ea
Cbap babok ppt day 1 bapm ea
 
Stake holder
Stake holderStake holder
Stake holder
 
Top 10 business solution architect interview questions and answers
Top 10 business solution architect interview questions and answersTop 10 business solution architect interview questions and answers
Top 10 business solution architect interview questions and answers
 
Team LiOn Batteries - 2022 Technology, Innovation & Great Power Competition
Team LiOn Batteries  - 2022 Technology, Innovation & Great Power CompetitionTeam LiOn Batteries  - 2022 Technology, Innovation & Great Power Competition
Team LiOn Batteries - 2022 Technology, Innovation & Great Power Competition
 
Module 6 Implementation: project management and monitoring
Module 6 Implementation: project management and monitoringModule 6 Implementation: project management and monitoring
Module 6 Implementation: project management and monitoring
 
Stakeholder analysis
Stakeholder analysisStakeholder analysis
Stakeholder analysis
 
Strategic Planning 2007
Strategic  Planning 2007Strategic  Planning 2007
Strategic Planning 2007
 
Most Significant Change Guide
Most Significant Change GuideMost Significant Change Guide
Most Significant Change Guide
 
Crisis Management Solutions Deck PowerPoint Presentation Slides
Crisis Management Solutions Deck PowerPoint Presentation SlidesCrisis Management Solutions Deck PowerPoint Presentation Slides
Crisis Management Solutions Deck PowerPoint Presentation Slides
 
PAS Biodiversity Net Gain consultation overview - 10 February 2022
PAS Biodiversity Net Gain consultation overview - 10 February 2022PAS Biodiversity Net Gain consultation overview - 10 February 2022
PAS Biodiversity Net Gain consultation overview - 10 February 2022
 
Community Policing in Kenya
Community Policing in KenyaCommunity Policing in Kenya
Community Policing in Kenya
 
Monitoring and evaluation of Projects
Monitoring and evaluation of ProjectsMonitoring and evaluation of Projects
Monitoring and evaluation of Projects
 
The People Case: How to Convince Your Organisation to Invest in Change
The People Case: How to Convince Your Organisation to Invest in ChangeThe People Case: How to Convince Your Organisation to Invest in Change
The People Case: How to Convince Your Organisation to Invest in Change
 
Project Cycle Management (PCM) & Logical Framework Analysis (LFA)
Project Cycle Management (PCM) & Logical Framework Analysis (LFA)Project Cycle Management (PCM) & Logical Framework Analysis (LFA)
Project Cycle Management (PCM) & Logical Framework Analysis (LFA)
 
SCORE Strategic Planning Workshop-SLIDES 2017-01-11R2
SCORE Strategic Planning Workshop-SLIDES 2017-01-11R2SCORE Strategic Planning Workshop-SLIDES 2017-01-11R2
SCORE Strategic Planning Workshop-SLIDES 2017-01-11R2
 

Semelhante a Mongoose H4D 2021 Lessons Learned

Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAPNIC
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Barry Greene
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Priyanka Aash
 
Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)TzahiArabov
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistMyNOG
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the CloudAlert Logic
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014Bee_Ware
 
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringCombating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringLancope, Inc.
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Tiffany Sandoval
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC PerspectivePositive Hack Days
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 
Network security monitoring with open source tools
Network security monitoring with open source toolsNetwork security monitoring with open source tools
Network security monitoring with open source toolsterriert
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersMegan DeBlois
 
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...Amazon Web Services
 
Splunk for Security - Hands-On
Splunk for Security - Hands-On Splunk for Security - Hands-On
Splunk for Security - Hands-On Splunk
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetuppbink
 
NetworkWorld-SafeBreach
NetworkWorld-SafeBreachNetworkWorld-SafeBreach
NetworkWorld-SafeBreachDan Kunkel
 

Semelhante a Mongoose H4D 2021 Lessons Learned (20)

Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)
 
Big security for big data
Big security for big dataBig security for big data
Big security for big data
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringCombating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security Monitoring
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
Network security monitoring with open source tools
Network security monitoring with open source toolsNetwork security monitoring with open source tools
Network security monitoring with open source tools
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and Practitioners
 
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
 
Splunk for Security - Hands-On
Splunk for Security - Hands-On Splunk for Security - Hands-On
Splunk for Security - Hands-On
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
NetworkWorld-SafeBreach
NetworkWorld-SafeBreachNetworkWorld-SafeBreach
NetworkWorld-SafeBreach
 

Mais de Stanford University

Team Networks - 2022 Technology, Innovation & Great Power Competition
Team Networks  - 2022 Technology, Innovation & Great Power CompetitionTeam Networks  - 2022 Technology, Innovation & Great Power Competition
Team Networks - 2022 Technology, Innovation & Great Power CompetitionStanford University
 
Team Quantum - 2022 Technology, Innovation & Great Power Competition
Team Quantum  - 2022 Technology, Innovation & Great Power CompetitionTeam Quantum  - 2022 Technology, Innovation & Great Power Competition
Team Quantum - 2022 Technology, Innovation & Great Power CompetitionStanford University
 
Team Disinformation - 2022 Technology, Innovation & Great Power Competition
Team Disinformation  - 2022 Technology, Innovation & Great Power CompetitionTeam Disinformation  - 2022 Technology, Innovation & Great Power Competition
Team Disinformation - 2022 Technology, Innovation & Great Power CompetitionStanford University
 
Team Wargames - 2022 Technology, Innovation & Great Power Competition
Team Wargames  - 2022 Technology, Innovation & Great Power CompetitionTeam Wargames  - 2022 Technology, Innovation & Great Power Competition
Team Wargames - 2022 Technology, Innovation & Great Power CompetitionStanford University
 
Team Acquistion - 2022 Technology, Innovation & Great Power Competition
Team Acquistion  - 2022 Technology, Innovation & Great Power Competition Team Acquistion  - 2022 Technology, Innovation & Great Power Competition
Team Acquistion - 2022 Technology, Innovation & Great Power Competition Stanford University
 
Team Climate Change - 2022 Technology, Innovation & Great Power Competition
Team Climate Change - 2022 Technology, Innovation & Great Power Competition Team Climate Change - 2022 Technology, Innovation & Great Power Competition
Team Climate Change - 2022 Technology, Innovation & Great Power Competition Stanford University
 
Altuna Engr245 2022 Lessons Learned
Altuna Engr245 2022 Lessons LearnedAltuna Engr245 2022 Lessons Learned
Altuna Engr245 2022 Lessons LearnedStanford University
 
Invisa Engr245 2022 Lessons Learned
Invisa Engr245 2022 Lessons LearnedInvisa Engr245 2022 Lessons Learned
Invisa Engr245 2022 Lessons LearnedStanford University
 
ānanda Engr245 2022 Lessons Learned
ānanda Engr245 2022 Lessons Learnedānanda Engr245 2022 Lessons Learned
ānanda Engr245 2022 Lessons LearnedStanford University
 
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Stanford University
 
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Stanford University
 
Team Catena - 2021 Technology, Innovation & Great Power Competition
Team Catena - 2021 Technology, Innovation & Great Power CompetitionTeam Catena - 2021 Technology, Innovation & Great Power Competition
Team Catena - 2021 Technology, Innovation & Great Power CompetitionStanford University
 
Team Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power CompetitionTeam Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power CompetitionStanford University
 
Team Drone - 2021 Technology, Innovation & Great Power Competition
Team Drone - 2021 Technology, Innovation & Great Power CompetitionTeam Drone - 2021 Technology, Innovation & Great Power Competition
Team Drone - 2021 Technology, Innovation & Great Power CompetitionStanford University
 
Team Short Circuit - 2021 Technology, Innovation & Great Power Competition
Team Short Circuit - 2021 Technology, Innovation & Great Power CompetitionTeam Short Circuit - 2021 Technology, Innovation & Great Power Competition
Team Short Circuit - 2021 Technology, Innovation & Great Power CompetitionStanford University
 
Team Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionTeam Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionStanford University
 
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...Stanford University
 
Lecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - CyberLecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - CyberStanford University
 
Lecture 7 - Technology, Innovation and Great Power Competition - Space
Lecture 7 - Technology, Innovation and Great Power Competition - SpaceLecture 7 - Technology, Innovation and Great Power Competition - Space
Lecture 7 - Technology, Innovation and Great Power Competition - SpaceStanford University
 
Lecture 6 - Technology, Innovation and Great Power Competition - Autonomy and...
Lecture 6 - Technology, Innovation and Great Power Competition - Autonomy and...Lecture 6 - Technology, Innovation and Great Power Competition - Autonomy and...
Lecture 6 - Technology, Innovation and Great Power Competition - Autonomy and...Stanford University
 

Mais de Stanford University (20)

Team Networks - 2022 Technology, Innovation & Great Power Competition
Team Networks  - 2022 Technology, Innovation & Great Power CompetitionTeam Networks  - 2022 Technology, Innovation & Great Power Competition
Team Networks - 2022 Technology, Innovation & Great Power Competition
 
Team Quantum - 2022 Technology, Innovation & Great Power Competition
Team Quantum  - 2022 Technology, Innovation & Great Power CompetitionTeam Quantum  - 2022 Technology, Innovation & Great Power Competition
Team Quantum - 2022 Technology, Innovation & Great Power Competition
 
Team Disinformation - 2022 Technology, Innovation & Great Power Competition
Team Disinformation  - 2022 Technology, Innovation & Great Power CompetitionTeam Disinformation  - 2022 Technology, Innovation & Great Power Competition
Team Disinformation - 2022 Technology, Innovation & Great Power Competition
 
Team Wargames - 2022 Technology, Innovation & Great Power Competition
Team Wargames  - 2022 Technology, Innovation & Great Power CompetitionTeam Wargames  - 2022 Technology, Innovation & Great Power Competition
Team Wargames - 2022 Technology, Innovation & Great Power Competition
 
Team Acquistion - 2022 Technology, Innovation & Great Power Competition
Team Acquistion  - 2022 Technology, Innovation & Great Power Competition Team Acquistion  - 2022 Technology, Innovation & Great Power Competition
Team Acquistion - 2022 Technology, Innovation & Great Power Competition
 
Team Climate Change - 2022 Technology, Innovation & Great Power Competition
Team Climate Change - 2022 Technology, Innovation & Great Power Competition Team Climate Change - 2022 Technology, Innovation & Great Power Competition
Team Climate Change - 2022 Technology, Innovation & Great Power Competition
 
Altuna Engr245 2022 Lessons Learned
Altuna Engr245 2022 Lessons LearnedAltuna Engr245 2022 Lessons Learned
Altuna Engr245 2022 Lessons Learned
 
Invisa Engr245 2022 Lessons Learned
Invisa Engr245 2022 Lessons LearnedInvisa Engr245 2022 Lessons Learned
Invisa Engr245 2022 Lessons Learned
 
ānanda Engr245 2022 Lessons Learned
ānanda Engr245 2022 Lessons Learnedānanda Engr245 2022 Lessons Learned
ānanda Engr245 2022 Lessons Learned
 
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
 
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
Team Army venture capital - 2021 Technology, Innovation & Great Power Competi...
 
Team Catena - 2021 Technology, Innovation & Great Power Competition
Team Catena - 2021 Technology, Innovation & Great Power CompetitionTeam Catena - 2021 Technology, Innovation & Great Power Competition
Team Catena - 2021 Technology, Innovation & Great Power Competition
 
Team Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power CompetitionTeam Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power Competition
 
Team Drone - 2021 Technology, Innovation & Great Power Competition
Team Drone - 2021 Technology, Innovation & Great Power CompetitionTeam Drone - 2021 Technology, Innovation & Great Power Competition
Team Drone - 2021 Technology, Innovation & Great Power Competition
 
Team Short Circuit - 2021 Technology, Innovation & Great Power Competition
Team Short Circuit - 2021 Technology, Innovation & Great Power CompetitionTeam Short Circuit - 2021 Technology, Innovation & Great Power Competition
Team Short Circuit - 2021 Technology, Innovation & Great Power Competition
 
Team Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionTeam Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power Competition
 
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
Team Conflicted Capital Team - 2021 Technology, Innovation & Great Power Comp...
 
Lecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - CyberLecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - Cyber
 
Lecture 7 - Technology, Innovation and Great Power Competition - Space
Lecture 7 - Technology, Innovation and Great Power Competition - SpaceLecture 7 - Technology, Innovation and Great Power Competition - Space
Lecture 7 - Technology, Innovation and Great Power Competition - Space
 
Lecture 6 - Technology, Innovation and Great Power Competition - Autonomy and...
Lecture 6 - Technology, Innovation and Great Power Competition - Autonomy and...Lecture 6 - Technology, Innovation and Great Power Competition - Autonomy and...
Lecture 6 - Technology, Innovation and Great Power Competition - Autonomy and...
 

Último

BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 

Último (20)

BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 

Mongoose H4D 2021 Lessons Learned

  • 1. TeamMongoose Keertan Kini Zoe Durand Ricardo Rosales Frances Schroeder INITIAL PROBLEM STATEMENT Enable the NSA to rapidly identify disposable infrastructure used in cyber-attacks CURRENT PROBLEM STATEMENT Democratize threat intelligence by providing an automatic “pivoting” solution 100 Interviews BS Symbolic Systems ‘22 Hipster MBA ‘22 Hustler MBA ‘22 Hound MBA + MPP Hacker Problem Sponsor: National Security Agency Cybersecurity Directorate
  • 2. Over the past 10 weeks, we conducted 100 interviews. Academic Commercial Government
  • 3. We didn’t fully understand the beneficiary nor the problem statement... What is the full mission of the NSA? What data does the NSA have access to? What is the organizational structure between the NSA and all the other agencies that it defends? What is disposable infrastructure? How is it used by adversaries in an attack? Week 1
  • 4. Since we didn’t know what “disposable infrastructure” was… we decided to start with the data where we could find it! 1. “The NSA does not have access to network data if it is domestic” - from Sponsor 1. “There is a clear reason for which the NSA doesn’t have access to that data - they should just work more effectively with the FBI” - from cyber-crime / cyber-security diplomat 1. “What is missing is the defense agreement to get the data, not the data itself.” - from sponsor & DoD representative Week 1
  • 5. We realized that the world was much more complicated than we had originally thought Confused mongoose Week 3
  • 6. Aha moment! Disposable infrastructure = servers leased through cloud providers Week 3
  • 7. All Agencies in National Security System DoD Agencies in National Security System Critical infrastructure, private companies NSA The interplay between agencies is even more complicated that we had originally thought! Cybersecurity and Infrastructure Security Agency CISA FBI Cloud Providers MALICIOUS CYBER ACTOR Disposable Infrastructure Already gone! USCYBERCOM Private Incident Response Companies Week 4
  • 8. Mission Model Canvas had a lot of other players involved KEY PARTNERS - NSA (analysts and expertise) - DHS CISA - Private sector - - Cloud provider Trust and Security Teams - FBI Cybercrime Division - Private Network security firms KEY RESOURCES - Security Clearance - IT Security Accreditation - Examples of concerning malware for categorization and analysis - Traffic Data (labeled instances of disposable infrastructure) VALUE PROPOSITIONS One or several of the following: -Reduce time required to identify persistent infrastructure used by multiple malware installations - Identify temporary infrastructure used by malware installation previously unidentified and share to Cloud Providers to shutdown - Reduce time to serve Data Preservation notices to Cloud Providers to help attribution KEY ACTIVITIES - Software Engineering: - Identify common data for behavioral analysis of specific attacks - Create analytics which plugs into existing engines - Organizational: Fast Path for data sharing - Security Accreditation MISSION ACHIEVEMENT/IMPACT FACTORS Our mission will be successful if we develop a scalable solution to help the NSA identify persistent infrastructure used by multiple malware installations in a timely manner. DEPLOYMENT 1. Back-end algorithm not running in real time as proof of concept 2. Back-end algorithm running in real time (streaming) 3. Dashboard updated in real time deployed to the cloud or on-prem and accessible NSA/CISA/FBI stakeholders BUY-IN & SUPPORT -Need IT Approvals from NSA/CISA/FBI for their systems -Need demand MISSION BUDGET/COST BENEFICIARIES Primary: Cyber defenders at the NSA, Secondary: Cyber investigators at the FBI Tertiary: All entities that the NSA serves and the DoD in general Fixed: - Software design & engineering - Helpdesk/support functions - Labelling Costs Variable: - Subscription API usage for External tools, cloud computation/storage
  • 9. “Attack” can mean different things, and even the lifecycle of an attack is broad - where could Mongoose help? Prevention Incident response Attribution Week 4
  • 10. Big identity crisis for the team! A picture of a Mongoose team member boiling the ocean, circa Week 4 Prevention Attribution Incident response Team Mongoose NSA DoD Critical infra Lighthouse of the teaching team FBI Flocks of beneficiaries
  • 11. Lightbulb moment! Disposable infrastructure isn’t in and of itself a problem, is it? “Attacks” isn’t specific enough. You need to narrow it down to a specific attack! “We were originally given a solution, not a problem.” Week 4
  • 12. Pivot! Focus on a specific attack type: Data exfiltration. Week 5 Problem Statement WHAT: improve the early detection of nation-state data exfiltration cyber- attacks on the NSA corporate network conducted through ephemeral cloud infrastructure, where the initial attack vector is a zero-day or supply chain attack, by quickly identifying the C2 servers owned in full by the attackers FOR WHO: NSA cyber analysts as early adopter, later DoD agencies. Week 5
  • 13. To solve the problem of NSA’s access to domestic data, we decide to focus on the NSA as a corporate network Week 5 We still have a data problem...
  • 14. Intelligence and/or Firewall? Intelligence for signal analysis Firewall to instantly block malicious traffic Week 6
  • 15. At this point, we still weren’t sure that Mongoose could really bring anything to the table. Week 6
  • 16. Despite the new problem statement, we hit a new low. We write an email to the teaching team outlining our concerns: “Our problem statement is either too broad, or too technical. People have tried to solve these problems for years, and it’s unclear what we might be able to contribute. ‘Redefine cybersecurity’ is better suited to a PhD in cybersecurity than to H4D” Week 6 Week 1 Week 2 Week 3 Week 4 Week 5 “The NSA is a bit of a black box in terms of their processes and heir prior attacks. Proxies don’t seem to be working either as no company seems keen to discuss the ways in which they’ve been breached.”
  • 17. We talk to our sponsor and have a breakthrough moment. What if I already had an indicator of compromise… and I asked you to find similar things? ! !
  • 18. Major breakthrough: we redefine both the problem statement and the beneficiary WHAT: flag infrastructure on the public internet that “correlates” or “matches” to a known malicious infrastructure (seed) FOR WHO: NSA Discovery Team in conjunction with JFHQ-DODIN Network Defenders. Week 6
  • 19. Team Mongoose is back! Week 7
  • 20. We define a high-level product! Mongoose Intelligence will provide analysis automation through an entity matching API Mongoose entity matching API Malicious IP or domain Similar IP or Domain Week 7
  • 21. We learn that visualization seems to be a compelling product in and of itself for many beneficiaries IP 1 IP 2 DoD Endpoint 1 Domain aws.com Domain XYZ.com IP 3 IP 4 DoD Endpoint 2 JFHQ-DoDIN network - Country - Date of first connection - Account holder - # of connections - Port - Protocol INPUT OUTPUT “Love the visualization! It would be great if you displayed context and confidence scores.”
  • 22. Why hadn’t the NSA ever built this before? They might have. Legal framework Large siloed organization? Week 8
  • 23. We start to understand more about the details of the specific data sources and systems that we would need to plug into “Nobody is doing anything with all the log data that is produced by Akamai on DoD networks.” “You should plug into Acropolis that is already doing data collection. DMA is already dumping several terabytes of logs per day. Basically all of the DoD is feeding in data.” -- Defense Digital Service Week 9
  • 24. With our MVPs, we got good signal that this is something that is interesting to the NSA Discovery Team “There are rules against me saying we would purchase this. But this is a problem, and it needs to be solved ASAP.” -- NSA CSD TD Week 9
  • 25. Several types of potential customers Small/Medium Enterprises NSA/JFHQ-DODIN Telecoms Week 10
  • 26. We’re still thinking about whether or not we want to continue on the project after the class. Week 10
  • 27. Thank you to everyone who made this possible! Special thanks to: ● Neal Ziring, NSA CSD Technical Director ● Jennifer Quarrie and Jason Chen ● Our defense mentor ● H4D TA Joel Johnson ● The entire H4D teaching team ● Our 100 interviewees TeamMongoose Problem Sponsor: National Security Agency, Cybersecurity Directorate Keertan Kini Zoe Durand Ricardo Rosales Frances Schroeder

Notas do Editor

  1. Disposable infrastructure - didn’t quite know what it meant, but then decided it sounded interesting and wanted to dive deeper “If it sounds ambiguous to you, it sounded the same to us as well :)” - ,
  2. 5 second slide
  3. First three questions might seem obvious to people working in the govt or agencies, but we’re Stanford students - remind them who we are :)
  4. We don’t know what disposable infrastructure is, but let’s start with the data ! Make the data <> infrastructure link clear in the title. Current title is subtitle. Cartoon of someone looking under rocks :)
  5. the NSA is severely restricted in what they can look at in terms of US person information (including IP addresses)
  6. I can’t tell what this means -> Say: we are thinking of continuing, looking for some advice
  7. Can we add rachel ?