SlideShare a Scribd company logo
1 of 8
Download to read offline
Business white paper




Big security
for big data
Table of contents

	 3	 Big security for big data
	 3	 Data explosion
	 3	 Data collection
	 5	 Data integration
	 5	 Data analytics
	 5	 In real time versus the past
	 6	 Born for faster speed
	 6	 Real-time threat evaluation
	 7	 Pattern matching
	 7	 Statistical correlation
	 7	 Monitor and respond
	 8	 Conclusion
	 8	 About HP Enterprise Security
	 8	 Protect your business
Customers are generating lots of data
Figure 1. Data is generated at a much faster pace
                                                                                                                                                                                                                                   98,000
                                                                                                                                      kaggle                     Pandora                                                           tweets
                                                                                                                       Music
                                                                                                                                         SolidFire
                                                                                                                             iHandy                  Amazon
                                                                                                                                                                   Scribd.     SmugMug
                                                                                                                                                                                      Finance
                                                                                                                                                                                                                                      23,148 apps
                                                                           Joyent           Plex Systems
                                                                                                                                         SuperCam
                                                                                                                                             Snapfish
                                                                                                                                                         salesforce.com
                                                                                                                                                                       AppFog
                                                                                                                                                                                  Urban
                                                                                                                                                                                             Travel
                                                                                                                                                                                                                                      downloaded
                                                                                DCC                    Google                                               Xactly      Facebook        Parse

                                                                                                                                                                                                                                         400,710 ad
                                   Product               SAP                            eBay                                                     Dragon Diction                             PingMe
                                                                                                                                                                     GoGrid LinkedIn                Reference
                               Configurator                                        CCC               Hosting.com                                        UPS Mobile
                     HP                               CRM                                                                                                               Bromium      Atlassian
                               Bills of Material
                                                       Engineering
                                                                                          Tata Communications
                                                                                                       Ariba
                                                                                                                                                       buzzd
                                                                                                                                                                     Amazon Web Services
                                                                                                                                                                                         Lifestyl e                                      requests
                                                                                                                      NetReach
                                        SCM                                            Quickbooks                                                                                            Splunk        Sport
                                                            Inventory                          NetDocuments                Zoho                      Scanner Pro LimeLight
                                        Quality Control                                                                                                                                             ScaleXtreme
                                                                                                                                                                                  box.net


                                                                                                                                                                                                                                     Every
     Burroughs                                                   EMC                                    Alterian                                      Foursquare
                                                    HCM                                  Datapipe                    Qvidian                                               Taleo                Education Pinterest
                     Hitachi                        Cost Management                                                             Hyland
          IBM                                                               MRM                        OpenText
                                                                                                                             Sage
                                                                                                                                                              Mobile, social,
                                                                                                                                                                                                                                     60 seconds
                   Unisys           Manufacturing Projects              Order Entry                     Workscape                       NetSuite

   Mainframe                                   Client/server                                     The Internet                                                big data & the cloud

                                         Cash Management                                       CyberShift                      PaperHost                         DocuSign                          CloudSigma
    NEC
            Bull
                                    ERP
                                      Time and Expense
                                                          HCM
                                                                                                 Xerox                        Yahoo!
                                                                                                                                                                     Hootsuite
                                                                                                                                                                                     Yandex
                                                                                                                                                                                                    Games         Baidu
                                                                                                                                                                                                               YouTube
                                                                                                                                                                                                                                           2000 lyrics played
      Fijitsu                                                                                                                                                                        nebula
                              Costing            Accounts   Fixed Assets                    Microsoft
                                                                                            OpSource
                                                                                                                   Serif
                                                                                                                              SLI Systems
                                                                                                                                                             HP ePrint
                                                                                                                                                                                 Workbrain Zynga
                                                                                                                                                                                                   Atlassian
                                                                                                                                                                                                                Navigation
                                                                                                                                                                                                                                           on Tunewiki
                                                      Receivable                                          Avid                                                                                             Mixi
                                            Billing                                                                         Elemica                              iSchedule        Workday                           cloudability
                                                                                            ADP VirtualEdge
                          Payroll
                                                       Activity      PLM                          Corel                      SCM                            Khan Academy
                                                                                                                                                                                          Yandex
                                                                                                                                                                                      Twitter    Heroku
                                                                                                                                                                                                        Photo & Video
                                                                                                                                                                                                              Yammer
                                                                                                                                                                                                                                           1500 pings
                            Training               Management                                               CyberShift                                                          Zillabyte
      Sales tracking &
            Marketing                    Time &    Rostering
                                                                                    Adobe
                                                                                                  Yahoo                    Kinaxis
                                                                                                                                                         Renren
                                                                                                                                                                              SuccessFactors Entertainment Viber                           sent on PingMe
                                                                              Microsoft                                                                           News          Atlassian           Answers.com
                                     Attendance                                                         SugarCRM
                Commissions           Database Service                                         Saba                                                    BrainPOP              RightScale             Social Networking

                          Data Warehousing
           Claim Processing
                                                                                        PPM
                                                                                     Kenexa
                                                                                                Quadrem
                                                                                                                       Sonar6
                                                                                                                     Sonar6                               MobileFrame.com
                                                                                                                                                                                              CYw orld
                                                                                                                                                                                                  Jive Software
                                                                                                                                                                                                                                         34,597 people
                                                                                                                                                                                  Business
                                                                           Saba
                                                                     Intacct
                                                                                        Softscape               NetSuite
                                                                                                                                                     myHomew ork
                                                                                                                                                               Toggl
                                                                                                                                                                                         Tumblr.                Qzone                    using Zinio
                                                                                                                                                Fring                                Amazon         dotCloud
                                                               Cornerstone onDemand                       Exact Online
                                                                                                                                          Cookie Doodle           Xing                           Mozy
                                                                                                                                                                             New Relic
                                                                      Softscape
                                                                                        FinancialForce.com
                                                                                                                                     Ah! Fasion Girl
                                                                                                                                                             MailChimp
                                                                                                                                                                              Util ities   Zynga
                                                                                                                                                                                                        PingMe
                                                                                                                                                                                                                                       208,333 minutes of
                                                                        IntraLinks          Volusion
                                                                                                                                      SmugMug
                                                                                                                                                            Associatedcontent
                                                                                                                                                                   MobilieIron
                                                                                                                                                                                               BeyondCore
                                                                                                                                                                                                                                       Angry Birds played
                                                                                                                                                                   Fed Ex Mobile            Productivity
                                                                                                                                  Rackspace             Flickr
                                                                                                                                                                     Tw itter
                                                                                                                                                 Paint.NET                         TripIt




Big security for big data                                                                                                                                                                                                            format, so that real-time alerting and reporting can take place. The
                                                                                                                                                                                                                                     first step is to establish complete visibility so that your data and who
We are children of the information generation. No longer tied                                                                                                                                                                        accesses the data can be monitored. Next, you need to understand
to large mainframe computers, we now access information via                                                                                                                                                                          the context, so that you can focus on the valued assets, which are
applications, mobile devices, and laptops to make decisions based                                                                                                                                                                    critical to your business. Finally, utilize the intelligence gathered so
on real-time data. It is because information is so pervasive that                                                                                                                                                                    that you can harden your attack surface and stop attacks before the
businesses want to capture this data and analyze it for intelligence.                                                                                                                                                                data is exfiltrated. So, how do we get started?


Data explosion                                                                                                                                                                                                                       Data collection
The multitude of devices, users, and generated traffic all combine                                                                                                                                                                   Your first job is to aggregate all the information from every
to create a proliferation of data that is being created with incredible                                                                                                                                                              device into one place. This means collecting information from
volume, velocity, and variety. As a result, organizations need a                                                                                                                                                                     cloud, virtual, and real appliances: network devices, applications,
way to protect, utilize, and gain real-time insight from “big data.”                                                                                                                                                                 servers, databases, desktops, and security devices. With
This intelligence is not only valuable to businesses and consumers,                                                                                                                                                                  Software-as-a-Service (SaaS) applications deployed in the cloud,
but also to hackers. Robust information marketplaces have arisen                                                                                                                                                                     it is important to collect logs from those applications as well since
for hackers to sell credit card information, account usernames,                                                                                                                                                                      data stored in the cloud can contain information spanning from
passwords, national secrets (WikiLeaks), as well as intellectual                                                                                                                                                                     human resource management to customer information. Collecting
property. How does anyone keep secrets anymore? How does                                                                                                                                                                             this information gives you visibility into who is accessing your
anyone keep secrets protected from hackers?                                                                                                                                                                                          company’s information, what information they are accessing, and
                                                                                                                                                                                                                                     when this access is occurring. The goal is to capture usage patterns
In the past when the network infrastructure was straightforward                                                                                                                                                                      and look for signs of malicious behavior.
and perimeters used to exist, controlling access to data was much
simpler. If your secrets rested within the company network, all                                                                                                                                                                      Typically, data theft is done in five stages1. First, hackers “research”
you had to do to keep the data safe was to make sure you had a                                                                                                                                                                       their target in order to find a way to enter the network. After
strong firewall in place. However, as data became available through                                                                                                                                                                  “infiltrating” the network, they may install an agent to lie dormant
the Internet, mobile devices, and the cloud having a firewall was                                                                                                                                                                    and gather information until they “discover” where the payload is
not enough. Companies tried to solve each security problem in a                                                                                                                                                                      hosted, and how to “acquire” it. Once the target is captured, the
piecemeal manner, tacking on more security devices like patching a                                                                                                                                                                   next step is to “exfiltrate” the information out of the network. Most
hole in the wall. But, because these products did not interoperate,                                                                                                                                                                  advanced attacks progress through these five stages, and having this
you could not coordinate a defense against hackers.                                                                                                                                                                                  understanding helps you look for clues on whether an attack is taking
                                                                                                                                                                                                                                     place in your environment, and how to stop the attacker from reaching
In order to meet the current security problems faced by                                                                                                                                                                              their target. The key to determining what logs to collect are to focus
organizations, a new paradigm shift needs to occur. Businesses need                                                                                                                                                                  on records where an actor is accessing information or systems.
the ability to secure data, collect it, and aggregate into an intelligent




                                                                                                                                                                                                                                                                                                                3
Four steps to security intelligence
                                                  Benefits
                                         The CORR-Engine helps security
                                         analysts to:
                                         • Detect more incidents
                                         • Address more data
                                         • Operate more efficiently
    1   Data collection from cloud,      • Evaluate threats in real time
        virtual, and real devices for    • Find threats faster
        complete visibility into data    • Collect relevant information
        and its accessibility.             about user roles, critical assets
                                           and data in real time and uses
                                           it to reduce false-positives
    2   Data integration through
        automation and rule-based
        processing. HP ArcSight
        normalizes and categorizes log
        data into over 400 meta fields.            Results
                                                  • Security event monitoring is
                                                    simple, intelligent, efficient,
                                                    and manageable
                                                  • HP ArcSight Security Event
                                                    Information Management (SIEM)
    3   Data analytics which                        processes events faster making
        involves combining logs                     security information available
        from multiple sources and                   in real time
        correlating events together
        to create real-time alerts.


    4   HP ArcSight Correlation
        Optimized Retention and
        Retrieval (CORR) Engine
        serves as a foundation for
        threat detection,
        security analysis, and
        log data management.




4
Figure 2. Analysis: Normalize/Categorize Categorize
           Analysis: Normalize /

                                                                                Without normalization
               Jun 17 2009 12:16:03: %PIX-6-106015: Deny TCP (no connection) from 10.50.215.102/15605 to 204.110.227.16/443 flags
               FIN ACK on interface outside
               Jun 17 2009 14:53:16 drop gw.foobar.com >eth0 product VPN-1 & Firewall-1 src xxx.xxx.146.12 s_port 2523 dst
               xxx.xxx.10.2 service ms-sql-m proto udp rule 49


                                                                                 With normalization
                                               Device                                  Category           Category         Category             Category
              Time (Event Time)        name                    Device Product
                                               Vendor                                  Behavior          Device Group      Outcome            Significance

                                                                                                                                             /Informational/
              6/17/2009 12:16:03       Deny       Cisco             PIX                /Access             /Firewall        /Failure
                                                                                                                                                 Warning

                                                                                                                                             /Informational/
              6/17/2009 14:53:16       Drop   Checkpoint      Firewall-1/VPN-1       /Access/Start         /Firewall        /Failure
                                                                                                                                                 Warning



                                                          Benefit: Making sense out of the raw data

 Data integration                                                                                 Data analytics
 Once the machine data is collected, the data needs to be parsed                                  Normalized logs are indexed and categorized to make it easy for
 to derive intelligence from cryptic log messages. Automation and                                 a correlation engine to process and identify patterns based on
 rule-based processing is needed because having a person review                                   heuristics and security rules. It is here where the art of combining logs
 logs manually would make the problem of finding an attacker quite                                from multiple sources and correlating events together help to create
 difficult since the security analyst would need to manually separate                             real-time alerts. This preprocessing also speeds up correlation and
 attacks from logs of normal behavior. The solution is to normalize                               makes vendor-agnostic event logs, which give analysts the ability to
 machine logs so that queries can pull context-aware information                                  build reports and filters with simple English queries.
 from log data. For example, HP ArcSight connectors normalize and
 categorize log data into over 400 meta fields. Logs that have been
 normalized become more useful because you no longer need an                                      In real time versus the past
 expert on a particular device to interpret the log. By enriching logs                            Catching a hacker and being able to stop them as the attack is taking
 with metadata, you can turn strings of text into information that can                            place is more useful to a company than being able to use forensics to
 be indexed and searched.                                                                         piece together an attack that already took place. However, in order to
                                                                                                  have that as part of your arsenal, we have to resolve four problems:
                                                                                                  •	 How do you insert data faster into your data store?
                                                                                                  •	 How do you store all this data?
                                                                                                  •	 How do you quickly process events?
                                                                                                  •	 How do you return results faster?


 Figure 3. Performance improvements of ESM with CORR-Engine over ESM with Oracle
 Performance gains over 5.2
               20
 20                                                            Detect more incidents incidents
                                                                        Detect more
                               Oracle                          Up to 3x the current performance using the same hardware
                                                                             Up to 3x the current performance (events per second [EPS]) using
                                                               Faster Query 15x
                               CORR                 15                  the same hardware
 15                                                                     Faster query 15x2
                                                               Address more data
                                                               Up to 20x the current capacity for correlated events
                                                                            Address more data
                                                               using the same disk space

 10                                                                     Up to 20x the current capacity for
                                                               Operate more efficiently
                                                                        correlated events
                                                               Frees up security analyst cycles for proactive monitoring
                                                               No DBA neededusing the same disk space2
   5
                                   3                                        Operate more efficiently

          1                1                  1
                                                                            Frees up security analyst cycles for proactive monitoring
                                                                            No DBA needed
   0
         Storage            EPS               Query
                                                                                                                                                                              5
At HP ArcSight, we have been evolving our solution for over 12 years.    This new capability allows users to search for any string or
When we created our first SIEM product, Oracle’s database was            “keyword” located in the database, regardless of the event type or
the best data store. However, as the problem space of our SIEM           source. The HP ArcSight CORR-Engine indexes both raw (unstructured)
customers evolved over the years and big data became prevalent;          and normalized (structured) event data to provide rapid search
it was important to redesign our solution to handle the new              capabilities. With our combined flat-file and RDBMS technology,
challenges. The data store now needs to capture more events,             HP ArcSight can return search results in excess of millions events per
compress and archive more data, and execute searches much faster.        second for both structured and unstructured data.

                                                                         As a result of using this new data store, security administrators
Born for faster speed                                                    could focus on finding malicious activities, not on tuning or
                                                                         managing the database. Also, central to our ability to process more
When we originally introduced this technology into our logger            events in real time, the new CORR-Engine permitted additional
solution, customers could see the benefits. HP ArcSight’s                parallel processing capabilities, up to 80 CPU cores, big enough
CORR-Engine (correlation optimized retention and retrieval) is           for the biggest organizations on the planet. By adding parallel
uniquely architected to enable a single instance to capture raw          processing power, HP ArcSight can handle more events, faster in
logs at rates of above 100,000 events per second, compress, and          an easy-to-use interface.
store up to 42 TB of log data per instance and execute searches
at millions of events per second.2 By creating our own data store
that utilized both column and row-store technology, we were able         Real-time threat evaluation
to marry the significant performance benefits with the flexibility
of free-form unstructured searches, all while providing a very           HP ArcSight also makes use of actor information as a variable in
intuitive, easy-to-operate user interface.                               its threat formula that collects information regarding identity
                                                                         management user roles, critical assets, vulnerability data, and
The CORR-Engine serves as a foundation that provides the speed           “watch lists” in real time and uses this information to reduce
needed for today’s threat detection, security analysis, and log data     false-positives and monitor critical infrastructure in memory. For
management. By processing more events, it can soon identify the          example, if a Microsoft® SQL Server injection attack is targeting an
meaning of any event by placing it within context of what, where,        Oracle database, HP ArcSight immediately lowers the severity of the
when, and why that event occurred and its impact on the organization.    attack, knowing that Oracle is not susceptible to MS SQL attacks.
                                                                         However, if a privileged user is accessing a critical piece of infrastructure
Our correlation delivers accurate and automated prioritization           after regular working hours and inserting a USB thumb drive into their
of security risks and compliance violations in a business relevant       system, this may generate a number of low severity events. Pieced
context. Real-time alerts show administrators the most critical          together, HP ArcSight would immediately raise the severity of this
security events occurring in the environment, along with the             activity based on the understanding of the user’s privileges and the
context necessary to further analyze and mitigate a breach. Using        assets criticality. This would start the alert process and start monitoring
CORR-Engine, administrators and analysts are able to:                    activity and workflow processes for a potential security breach.

Detect more incidents
•	 The new architecture allows event correlation rates of up to 3x the   Figure 4. Correlation is the key to making sense of 1s and 0s
   current performance using the same hardware.

Address more data
                                                                             History
•	 The new architecture enables storage capacity of up to 20x the
                                                                                                                                    Session
   current capacity for correlated events using the same disk space.2                        Privileged user
Operate more efficiently
•	 The use of a common data store allows both the real-time                  Role                                   Anomaly
   correlation application and the log management application to use
   the same set of data, providing a seamless workflow that includes
   detection, alerting, and forensic analysis and reporting.

Find threats faster                                                                                                                       Location
                                                                                               Asset
•	 The graph above shows the multiples of improvement when we
   switched from RDBMS to our own-patented data store utilizing our
                                                                                                              Action
   new CORR-Engine.                                                         Transactions                                           IP address




6
Pattern matching                                                            Figure 5. Smart correlation

HP ArcSight has an expansion pack: Threat Detector which allows                Collect         Detect        Respond
customers to mine through archived data looking for relationships
between events that would have been missed by real-time correlation.
                                                                                            Who
                                                                                                                   Intelligent threat and risk detection
                                                                                         (User roles)              −−Intelligent threat and risk detection
                                                                                                                      Sophisticated correlation
As an example, a low-and-slow attack takes place when an attacker
purposely lowers the threshold on their attack to avoid detection.                                                   -technologies
                                                                                                                       Sophisticated correlation technologies
                                                                                                                   −−-Patternrecognition andand anomaly
                                                                                                                       Pattern recognition anomaly detection to identify
Such an evasive technique might be when the attacker is using a                              Better
                                                                                            visibility;
                                                                                                                      detection to identify modern known
                                                                                                                       modern known and unknown threats
dictionary attack to guess a user’s password. They would not try                         superior threat             -and more you collect, the smarter it gets
                                                                                                                       The unknown threats
                                                                              What                          Where
to brute-force the authentication system all at once, as the system          (Logs)         detection      (Flows)
                                                                                                                   −− The more you collect, the smarter
would lock out the user’s account after a series of unsuccessful login                                                it gets
attempts. So the attacker uses a scripted stealth method of only                                                           Detect and prevent attacks
attempting to login twice while trying to guess the password, then
sleeps for five minutes and continues to invoke two attempts every
five minutes. This means there would be 576 unsuccessful login
attempts daily, but since most correlation rules look for brute-force       Monitor and respond
methods, only a routine that would mine through historical data
would be able to match this pattern. Threat Detector would detect           HP ArcSight proactively alerts and notifies you when malicious activity
this attack and then allow customers to introduce new rules that            has occurred in your environment. However, because of the ability
would block the attacker going forward.                                     to process events quickly, we can alert your analysts in real time. For
                                                                            example, if we detect a distributed denial of services (DDoS) attack,
                                                                            we can send an email to you and your team, and notify you via your
                                                                            mobile device. A priority 1 escalation alerts your team so that a
Statistical correlation                                                     response can be mobilized against a prioritized security event. For
HP ArcSight’s multidimensional correlation engine combines real time,       example, if the Tier 1 team doesn’t acknowledge a notification within
in memory event log data with asset awareness, asset vulnerability, and     a certain timeframe, HP ArcSight can automatically escalate this to
identity correlation to assist operating teams with immediate detection     your Tier 2 team, tying into your existing response processes and
of threats. The powerful correlation engine allows you to maintain a        procedures.
state of situational awareness by processing millions of log events
in real time. We help to prioritize critical events so that your security   Once you’ve received a notification, you can start to analyze and
administrator can review only those events that need specialized            investigate your environment using our easy-to-use data driven
attention. With built-in network asset and user models, HP ArcSight is      capabilities. Our dashboards help you visualize where your data is
uniquely able to understand who is on the network, what data they are       located and provide specialized views from business oriented to
seeing, and which actions they are taking with that data.                   geographical oriented to systems oriented. From the dashboard,
                                                                            we can drill into the supporting events, drill into any level of detail,
HP ArcSight Enterprise Security Manager (ESM) uses a heuristic              and customize the view and presentation of that data. And with
analytics model to keep a baseline of activity from events                  our strong visualization capabilities, you can easily understand the
received by ESM and monitors any increases in attack, target,               significance of the data.
protocol, or user activity using a percentage threshold. The
statistics that are calculated are used by ESM to determine spikes          IT must be able to respond quickly, efficiently, and accurately to help
in the baseline average as well as other deterministic activity such        minimize damage to the enterprise. HP ArcSight Threat Detector
as anomalous behavior, session reconciliation, effectiveness of             follows a simple three-step methodology:
IDS and firewalls as well as monitoring DHCP lease activity. This           •	 Discover the systems on your network
statistical baseline is also used for determining anomalous user or         •	 Analyze what actions we should take and which offer the best results
application-usage behavior.
                                                                            •	 Provide guidance on what to do

                                                                            By using HP ArcSight Threat Detector, you can:
                                                                            •	 Reduce your response time from hours to seconds
                                                                            •	 Simulate response actions before applying changes
                                                                            •	 Cut off threats at the most effective choke points
                                                                            •	 Automatically document all changes for audit or rollback




                                                                                                                                                               7
Figure 6. HP ArcSight ESM management console




Conclusion                                                                                      HP Services
In today’s business environment, having access to the right                                     HP ESP Global Services take a holistic approach to building and
information means making the right decision critical to surviving.                              operating cyber security and response solutions and capabilities
Businesses need to protect their intelligence as it accumulates much                            that support the cyber threat management and regulatory
faster because of big data. With HP ArcSight ESM, you can process                               compliance needs of the world’s largest enterprises. We use a
big data events at faster speeds, get results in real time so that                              combination of operational expertise—yours and ours—and proven
your business is getting the security information when it needs it                              methodologies to deliver fast, effective results and demonstrate
the most in real time. With HP ArcSight CORR-Engine, security event                             ROI. Our proven, use-case driven solutions combine market-leading
monitoring is simple, intelligent, efficient, and manageable.                                   technology together with sustainable business and technical
                                                                                                process executed by trained and organized people.
                                                                                                Learn more about HP ESP Global Services at
About HP Enterprise Security                                                                    hpenterprisesecurity.com.
HP is a leading provider of security and compliance solutions
for the modern enterprise that wants to mitigate risk in their
hybrid environment and defend against advanced threats. Based                                   Protect your business
on market-leading products from HP ArcSight, HP Fortify, and                                    Find out how to strengthen your security intelligence with
HP TippingPoint, the HP Security Intelligence Platform uniquely                                 HP ArcSight. Visit hp.com/go/hpesm.
delivers the advanced correlation, application protection, and
network defenses to protect today’s hybrid IT infrastructure from
sophisticated cyber threats.                                                                    1
                                                                                                    Source: “Advanced Data Exfiltration,” Iftach Ian Amit, VP Consulting, Security Art, Israel,
                                                                                                    September 2011. http://www.iamit.org/blog/wp-content/uploads/2012/01/
                                                                                                    Advanced-data-exfiltration-%E2%80%93-the-way-Q-would-have-done-it.pdf
                                                                                                2
                                                                                                    Source: ESM 6.0c Beta-Test, HP ArcSight QA and Dev team, August 2012




Get connected	
hp.com/go/getconnected	
Get the insider view on tech trends,
support alerts, and HP solutions.

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and
services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors
or omissions contained herein.

Oracle is a registered trademark of Oracle and/or its affiliates. Microsoft is a U.S. registered trademark of Microsoft Corporation.

4AA4-4051ENW, Created December 2012

More Related Content

Similar to Big security for_big_data

Bb2883 bess mt cs apps transformation
Bb2883   bess mt cs apps transformationBb2883   bess mt cs apps transformation
Bb2883 bess mt cs apps transformationCharlie Bess
 
Using big data analytics to monetise and link customer experience and direct ...
Using big data analytics to monetise and link customer experience and direct ...Using big data analytics to monetise and link customer experience and direct ...
Using big data analytics to monetise and link customer experience and direct ...Chris Selland
 
2011年06月 会津大学日新館講座 「僕と契約してクラウド学生になってよ!」
2011年06月 会津大学日新館講座 「僕と契約してクラウド学生になってよ!」2011年06月 会津大学日新館講座 「僕と契約してクラウド学生になってよ!」
2011年06月 会津大学日新館講座 「僕と契約してクラウド学生になってよ!」Serverworks Co.,Ltd.
 
Bercovici top 10 things net app learned 0416133
Bercovici top 10 things net app learned 0416133Bercovici top 10 things net app learned 0416133
Bercovici top 10 things net app learned 0416133OpenStack Foundation
 
Top 10 Things We Learned Implementing OpenStack
Top 10 Things We Learned Implementing OpenStackTop 10 Things We Learned Implementing OpenStack
Top 10 Things We Learned Implementing OpenStackOpenStack Foundation
 
Brand Science
Brand ScienceBrand Science
Brand ScienceiStrategy
 
Why Memcached?
Why Memcached?Why Memcached?
Why Memcached?Gear6
 
모바일(Mobile)에서의 웹(Web) 전망 2부(총3부)
모바일(Mobile)에서의 웹(Web) 전망 2부(총3부)모바일(Mobile)에서의 웹(Web) 전망 2부(총3부)
모바일(Mobile)에서의 웹(Web) 전망 2부(총3부)mosaicnet
 
Hadoop Summit San Diego Feb2013
Hadoop Summit San Diego Feb2013Hadoop Summit San Diego Feb2013
Hadoop Summit San Diego Feb2013Narayan Bharadwaj
 
Evolution of a Memcached Deployment Webinar 2010 01 13
Evolution of a Memcached Deployment Webinar 2010 01 13Evolution of a Memcached Deployment Webinar 2010 01 13
Evolution of a Memcached Deployment Webinar 2010 01 13Gear6
 
2011 Mobile & Web technologies
2011 Mobile & Web technologies 2011 Mobile & Web technologies
2011 Mobile & Web technologies JungHyuk Kwon
 
HTML5를 활용한 하이브리드 앱개발하기
HTML5를 활용한 하이브리드 앱개발하기HTML5를 활용한 하이브리드 앱개발하기
HTML5를 활용한 하이브리드 앱개발하기정현 황
 
Marketing Mind Map for Small Business
Marketing Mind Map for Small BusinessMarketing Mind Map for Small Business
Marketing Mind Map for Small BusinessEquilibria, Inc.
 
VendorStack - Top 50 vendors to startups
VendorStack  - Top 50 vendors to startupsVendorStack  - Top 50 vendors to startups
VendorStack - Top 50 vendors to startupsAlok Mittal
 
고품질웹앱개발전략
고품질웹앱개발전략고품질웹앱개발전략
고품질웹앱개발전략민태 김
 
Designing Silverlight
Designing SilverlightDesigning Silverlight
Designing SilverlightReagan Hwang
 
SpagoBI 3.x official presentation
SpagoBI 3.x official presentationSpagoBI 3.x official presentation
SpagoBI 3.x official presentationSpagoWorld
 
Mobile Social Location (Web Directions @media version)
Mobile Social Location (Web Directions @media version)Mobile Social Location (Web Directions @media version)
Mobile Social Location (Web Directions @media version)Matt Biddulph
 
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...Chad Lawler
 

Similar to Big security for_big_data (20)

Bb2883 bess mt cs apps transformation
Bb2883   bess mt cs apps transformationBb2883   bess mt cs apps transformation
Bb2883 bess mt cs apps transformation
 
Using big data analytics to monetise and link customer experience and direct ...
Using big data analytics to monetise and link customer experience and direct ...Using big data analytics to monetise and link customer experience and direct ...
Using big data analytics to monetise and link customer experience and direct ...
 
2011年06月 会津大学日新館講座 「僕と契約してクラウド学生になってよ!」
2011年06月 会津大学日新館講座 「僕と契約してクラウド学生になってよ!」2011年06月 会津大学日新館講座 「僕と契約してクラウド学生になってよ!」
2011年06月 会津大学日新館講座 「僕と契約してクラウド学生になってよ!」
 
Bercovici top 10 things net app learned 0416133
Bercovici top 10 things net app learned 0416133Bercovici top 10 things net app learned 0416133
Bercovici top 10 things net app learned 0416133
 
Top 10 Things We Learned Implementing OpenStack
Top 10 Things We Learned Implementing OpenStackTop 10 Things We Learned Implementing OpenStack
Top 10 Things We Learned Implementing OpenStack
 
Cloud Trend
Cloud TrendCloud Trend
Cloud Trend
 
Brand Science
Brand ScienceBrand Science
Brand Science
 
Why Memcached?
Why Memcached?Why Memcached?
Why Memcached?
 
모바일(Mobile)에서의 웹(Web) 전망 2부(총3부)
모바일(Mobile)에서의 웹(Web) 전망 2부(총3부)모바일(Mobile)에서의 웹(Web) 전망 2부(총3부)
모바일(Mobile)에서의 웹(Web) 전망 2부(총3부)
 
Hadoop Summit San Diego Feb2013
Hadoop Summit San Diego Feb2013Hadoop Summit San Diego Feb2013
Hadoop Summit San Diego Feb2013
 
Evolution of a Memcached Deployment Webinar 2010 01 13
Evolution of a Memcached Deployment Webinar 2010 01 13Evolution of a Memcached Deployment Webinar 2010 01 13
Evolution of a Memcached Deployment Webinar 2010 01 13
 
2011 Mobile & Web technologies
2011 Mobile & Web technologies 2011 Mobile & Web technologies
2011 Mobile & Web technologies
 
HTML5를 활용한 하이브리드 앱개발하기
HTML5를 활용한 하이브리드 앱개발하기HTML5를 활용한 하이브리드 앱개발하기
HTML5를 활용한 하이브리드 앱개발하기
 
Marketing Mind Map for Small Business
Marketing Mind Map for Small BusinessMarketing Mind Map for Small Business
Marketing Mind Map for Small Business
 
VendorStack - Top 50 vendors to startups
VendorStack  - Top 50 vendors to startupsVendorStack  - Top 50 vendors to startups
VendorStack - Top 50 vendors to startups
 
고품질웹앱개발전략
고품질웹앱개발전략고품질웹앱개발전략
고품질웹앱개발전략
 
Designing Silverlight
Designing SilverlightDesigning Silverlight
Designing Silverlight
 
SpagoBI 3.x official presentation
SpagoBI 3.x official presentationSpagoBI 3.x official presentation
SpagoBI 3.x official presentation
 
Mobile Social Location (Web Directions @media version)
Mobile Social Location (Web Directions @media version)Mobile Social Location (Web Directions @media version)
Mobile Social Location (Web Directions @media version)
 
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
The Executive View on Cloud Service Brokers – Cloud Computing Association Con...
 

More from Shyam Sarkar

Scry analytics article on data analytics outsourcing, nov. 18, 2014
Scry analytics article on data analytics outsourcing, nov. 18, 2014Scry analytics article on data analytics outsourcing, nov. 18, 2014
Scry analytics article on data analytics outsourcing, nov. 18, 2014Shyam Sarkar
 
Cancer genomics big_datascience_meetup_july_14_2014
Cancer genomics big_datascience_meetup_july_14_2014Cancer genomics big_datascience_meetup_july_14_2014
Cancer genomics big_datascience_meetup_july_14_2014Shyam Sarkar
 
Serial number java_code
Serial number java_codeSerial number java_code
Serial number java_codeShyam Sarkar
 
Technology treasury-management-2013
Technology treasury-management-2013Technology treasury-management-2013
Technology treasury-management-2013Shyam Sarkar
 
UN-Creative economy-report-2013
UN-Creative economy-report-2013UN-Creative economy-report-2013
UN-Creative economy-report-2013Shyam Sarkar
 
Local exchanges for_sm_es
Local exchanges for_sm_esLocal exchanges for_sm_es
Local exchanges for_sm_esShyam Sarkar
 
Innovative+agricultural+sme+finance+models
Innovative+agricultural+sme+finance+modelsInnovative+agricultural+sme+finance+models
Innovative+agricultural+sme+finance+modelsShyam Sarkar
 
Forrester big data_predictive_analytics
Forrester big data_predictive_analyticsForrester big data_predictive_analytics
Forrester big data_predictive_analyticsShyam Sarkar
 
Stock markets and_human_genomics
Stock markets and_human_genomicsStock markets and_human_genomics
Stock markets and_human_genomicsShyam Sarkar
 
Cancer genome repository_berkeley
Cancer genome repository_berkeleyCancer genome repository_berkeley
Cancer genome repository_berkeleyShyam Sarkar
 
Renewable energy report
Renewable energy reportRenewable energy report
Renewable energy reportShyam Sarkar
 
Wef big databigimpact_briefing_2012
Wef big databigimpact_briefing_2012Wef big databigimpact_briefing_2012
Wef big databigimpact_briefing_2012Shyam Sarkar
 
Green technology report_2012
Green technology report_2012Green technology report_2012
Green technology report_2012Shyam Sarkar
 
Portfolio investment opportuities in india
Portfolio investment opportuities in indiaPortfolio investment opportuities in india
Portfolio investment opportuities in indiaShyam Sarkar
 
Nabc 2012 schedule_sunday_part_2
Nabc 2012 schedule_sunday_part_2Nabc 2012 schedule_sunday_part_2
Nabc 2012 schedule_sunday_part_2Shyam Sarkar
 
Nabc2012_schedule_sunday_part_1
Nabc2012_schedule_sunday_part_1Nabc2012_schedule_sunday_part_1
Nabc2012_schedule_sunday_part_1Shyam Sarkar
 
Nabc 2012 schedule_saturday_part_2
Nabc 2012 schedule_saturday_part_2Nabc 2012 schedule_saturday_part_2
Nabc 2012 schedule_saturday_part_2Shyam Sarkar
 

More from Shyam Sarkar (20)

Scry analytics article on data analytics outsourcing, nov. 18, 2014
Scry analytics article on data analytics outsourcing, nov. 18, 2014Scry analytics article on data analytics outsourcing, nov. 18, 2014
Scry analytics article on data analytics outsourcing, nov. 18, 2014
 
Cancer genomics big_datascience_meetup_july_14_2014
Cancer genomics big_datascience_meetup_july_14_2014Cancer genomics big_datascience_meetup_july_14_2014
Cancer genomics big_datascience_meetup_july_14_2014
 
Serial number java_code
Serial number java_codeSerial number java_code
Serial number java_code
 
Technology treasury-management-2013
Technology treasury-management-2013Technology treasury-management-2013
Technology treasury-management-2013
 
UN-Creative economy-report-2013
UN-Creative economy-report-2013UN-Creative economy-report-2013
UN-Creative economy-report-2013
 
Local exchanges for_sm_es
Local exchanges for_sm_esLocal exchanges for_sm_es
Local exchanges for_sm_es
 
Innovative+agricultural+sme+finance+models
Innovative+agricultural+sme+finance+modelsInnovative+agricultural+sme+finance+models
Innovative+agricultural+sme+finance+models
 
Religionofman
ReligionofmanReligionofman
Religionofman
 
Forrester big data_predictive_analytics
Forrester big data_predictive_analyticsForrester big data_predictive_analytics
Forrester big data_predictive_analytics
 
Stock markets and_human_genomics
Stock markets and_human_genomicsStock markets and_human_genomics
Stock markets and_human_genomics
 
Cancer genome repository_berkeley
Cancer genome repository_berkeleyCancer genome repository_berkeley
Cancer genome repository_berkeley
 
Renewable energy report
Renewable energy reportRenewable energy report
Renewable energy report
 
Wef big databigimpact_briefing_2012
Wef big databigimpact_briefing_2012Wef big databigimpact_briefing_2012
Wef big databigimpact_briefing_2012
 
World bank report
World bank reportWorld bank report
World bank report
 
Green technology report_2012
Green technology report_2012Green technology report_2012
Green technology report_2012
 
Portfolio investment opportuities in india
Portfolio investment opportuities in indiaPortfolio investment opportuities in india
Portfolio investment opportuities in india
 
Tapan 29 jun
Tapan 29 junTapan 29 jun
Tapan 29 jun
 
Nabc 2012 schedule_sunday_part_2
Nabc 2012 schedule_sunday_part_2Nabc 2012 schedule_sunday_part_2
Nabc 2012 schedule_sunday_part_2
 
Nabc2012_schedule_sunday_part_1
Nabc2012_schedule_sunday_part_1Nabc2012_schedule_sunday_part_1
Nabc2012_schedule_sunday_part_1
 
Nabc 2012 schedule_saturday_part_2
Nabc 2012 schedule_saturday_part_2Nabc 2012 schedule_saturday_part_2
Nabc 2012 schedule_saturday_part_2
 

Big security for_big_data

  • 1. Business white paper Big security for big data
  • 2. Table of contents 3 Big security for big data 3 Data explosion 3 Data collection 5 Data integration 5 Data analytics 5 In real time versus the past 6 Born for faster speed 6 Real-time threat evaluation 7 Pattern matching 7 Statistical correlation 7 Monitor and respond 8 Conclusion 8 About HP Enterprise Security 8 Protect your business
  • 3. Customers are generating lots of data Figure 1. Data is generated at a much faster pace 98,000 kaggle Pandora tweets Music SolidFire iHandy Amazon Scribd. SmugMug Finance 23,148 apps Joyent Plex Systems SuperCam Snapfish salesforce.com AppFog Urban Travel downloaded DCC Google Xactly Facebook Parse 400,710 ad Product SAP eBay Dragon Diction PingMe GoGrid LinkedIn Reference Configurator CCC Hosting.com UPS Mobile HP CRM Bromium Atlassian Bills of Material Engineering Tata Communications Ariba buzzd Amazon Web Services Lifestyl e requests NetReach SCM Quickbooks Splunk Sport Inventory NetDocuments Zoho Scanner Pro LimeLight Quality Control ScaleXtreme box.net Every Burroughs EMC Alterian Foursquare HCM Datapipe Qvidian Taleo Education Pinterest Hitachi Cost Management Hyland IBM MRM OpenText Sage Mobile, social, 60 seconds Unisys Manufacturing Projects Order Entry Workscape NetSuite Mainframe Client/server The Internet big data & the cloud Cash Management CyberShift PaperHost DocuSign CloudSigma NEC Bull ERP Time and Expense HCM Xerox Yahoo! Hootsuite Yandex Games Baidu YouTube 2000 lyrics played Fijitsu nebula Costing Accounts Fixed Assets Microsoft OpSource Serif SLI Systems HP ePrint Workbrain Zynga Atlassian Navigation on Tunewiki Receivable Avid Mixi Billing Elemica iSchedule Workday cloudability ADP VirtualEdge Payroll Activity PLM Corel SCM Khan Academy Yandex Twitter Heroku Photo & Video Yammer 1500 pings Training Management CyberShift Zillabyte Sales tracking & Marketing Time & Rostering Adobe Yahoo Kinaxis Renren SuccessFactors Entertainment Viber sent on PingMe Microsoft News Atlassian Answers.com Attendance SugarCRM Commissions Database Service Saba BrainPOP RightScale Social Networking Data Warehousing Claim Processing PPM Kenexa Quadrem Sonar6 Sonar6 MobileFrame.com CYw orld Jive Software 34,597 people Business Saba Intacct Softscape NetSuite myHomew ork Toggl Tumblr. Qzone using Zinio Fring Amazon dotCloud Cornerstone onDemand Exact Online Cookie Doodle Xing Mozy New Relic Softscape FinancialForce.com Ah! Fasion Girl MailChimp Util ities Zynga PingMe 208,333 minutes of IntraLinks Volusion SmugMug Associatedcontent MobilieIron BeyondCore Angry Birds played Fed Ex Mobile Productivity Rackspace Flickr Tw itter Paint.NET TripIt Big security for big data format, so that real-time alerting and reporting can take place. The first step is to establish complete visibility so that your data and who We are children of the information generation. No longer tied accesses the data can be monitored. Next, you need to understand to large mainframe computers, we now access information via the context, so that you can focus on the valued assets, which are applications, mobile devices, and laptops to make decisions based critical to your business. Finally, utilize the intelligence gathered so on real-time data. It is because information is so pervasive that that you can harden your attack surface and stop attacks before the businesses want to capture this data and analyze it for intelligence. data is exfiltrated. So, how do we get started? Data explosion Data collection The multitude of devices, users, and generated traffic all combine Your first job is to aggregate all the information from every to create a proliferation of data that is being created with incredible device into one place. This means collecting information from volume, velocity, and variety. As a result, organizations need a cloud, virtual, and real appliances: network devices, applications, way to protect, utilize, and gain real-time insight from “big data.” servers, databases, desktops, and security devices. With This intelligence is not only valuable to businesses and consumers, Software-as-a-Service (SaaS) applications deployed in the cloud, but also to hackers. Robust information marketplaces have arisen it is important to collect logs from those applications as well since for hackers to sell credit card information, account usernames, data stored in the cloud can contain information spanning from passwords, national secrets (WikiLeaks), as well as intellectual human resource management to customer information. Collecting property. How does anyone keep secrets anymore? How does this information gives you visibility into who is accessing your anyone keep secrets protected from hackers? company’s information, what information they are accessing, and when this access is occurring. The goal is to capture usage patterns In the past when the network infrastructure was straightforward and look for signs of malicious behavior. and perimeters used to exist, controlling access to data was much simpler. If your secrets rested within the company network, all Typically, data theft is done in five stages1. First, hackers “research” you had to do to keep the data safe was to make sure you had a their target in order to find a way to enter the network. After strong firewall in place. However, as data became available through “infiltrating” the network, they may install an agent to lie dormant the Internet, mobile devices, and the cloud having a firewall was and gather information until they “discover” where the payload is not enough. Companies tried to solve each security problem in a hosted, and how to “acquire” it. Once the target is captured, the piecemeal manner, tacking on more security devices like patching a next step is to “exfiltrate” the information out of the network. Most hole in the wall. But, because these products did not interoperate, advanced attacks progress through these five stages, and having this you could not coordinate a defense against hackers. understanding helps you look for clues on whether an attack is taking place in your environment, and how to stop the attacker from reaching In order to meet the current security problems faced by their target. The key to determining what logs to collect are to focus organizations, a new paradigm shift needs to occur. Businesses need on records where an actor is accessing information or systems. the ability to secure data, collect it, and aggregate into an intelligent 3
  • 4. Four steps to security intelligence Benefits The CORR-Engine helps security analysts to: • Detect more incidents • Address more data • Operate more efficiently 1 Data collection from cloud, • Evaluate threats in real time virtual, and real devices for • Find threats faster complete visibility into data • Collect relevant information and its accessibility. about user roles, critical assets and data in real time and uses it to reduce false-positives 2 Data integration through automation and rule-based processing. HP ArcSight normalizes and categorizes log data into over 400 meta fields. Results • Security event monitoring is simple, intelligent, efficient, and manageable • HP ArcSight Security Event Information Management (SIEM) 3 Data analytics which processes events faster making involves combining logs security information available from multiple sources and in real time correlating events together to create real-time alerts. 4 HP ArcSight Correlation Optimized Retention and Retrieval (CORR) Engine serves as a foundation for threat detection, security analysis, and log data management. 4
  • 5. Figure 2. Analysis: Normalize/Categorize Categorize Analysis: Normalize / Without normalization Jun 17 2009 12:16:03: %PIX-6-106015: Deny TCP (no connection) from 10.50.215.102/15605 to 204.110.227.16/443 flags FIN ACK on interface outside Jun 17 2009 14:53:16 drop gw.foobar.com >eth0 product VPN-1 & Firewall-1 src xxx.xxx.146.12 s_port 2523 dst xxx.xxx.10.2 service ms-sql-m proto udp rule 49 With normalization Device Category Category Category Category Time (Event Time) name Device Product Vendor Behavior Device Group Outcome Significance /Informational/ 6/17/2009 12:16:03 Deny Cisco PIX /Access /Firewall /Failure Warning /Informational/ 6/17/2009 14:53:16 Drop Checkpoint Firewall-1/VPN-1 /Access/Start /Firewall /Failure Warning Benefit: Making sense out of the raw data Data integration Data analytics Once the machine data is collected, the data needs to be parsed Normalized logs are indexed and categorized to make it easy for to derive intelligence from cryptic log messages. Automation and a correlation engine to process and identify patterns based on rule-based processing is needed because having a person review heuristics and security rules. It is here where the art of combining logs logs manually would make the problem of finding an attacker quite from multiple sources and correlating events together help to create difficult since the security analyst would need to manually separate real-time alerts. This preprocessing also speeds up correlation and attacks from logs of normal behavior. The solution is to normalize makes vendor-agnostic event logs, which give analysts the ability to machine logs so that queries can pull context-aware information build reports and filters with simple English queries. from log data. For example, HP ArcSight connectors normalize and categorize log data into over 400 meta fields. Logs that have been normalized become more useful because you no longer need an In real time versus the past expert on a particular device to interpret the log. By enriching logs Catching a hacker and being able to stop them as the attack is taking with metadata, you can turn strings of text into information that can place is more useful to a company than being able to use forensics to be indexed and searched. piece together an attack that already took place. However, in order to have that as part of your arsenal, we have to resolve four problems: • How do you insert data faster into your data store? • How do you store all this data? • How do you quickly process events? • How do you return results faster? Figure 3. Performance improvements of ESM with CORR-Engine over ESM with Oracle Performance gains over 5.2 20 20 Detect more incidents incidents Detect more Oracle Up to 3x the current performance using the same hardware Up to 3x the current performance (events per second [EPS]) using Faster Query 15x CORR 15 the same hardware 15 Faster query 15x2 Address more data Up to 20x the current capacity for correlated events Address more data using the same disk space 10 Up to 20x the current capacity for Operate more efficiently correlated events Frees up security analyst cycles for proactive monitoring No DBA neededusing the same disk space2 5 3 Operate more efficiently 1 1 1 Frees up security analyst cycles for proactive monitoring No DBA needed 0 Storage EPS Query 5
  • 6. At HP ArcSight, we have been evolving our solution for over 12 years. This new capability allows users to search for any string or When we created our first SIEM product, Oracle’s database was “keyword” located in the database, regardless of the event type or the best data store. However, as the problem space of our SIEM source. The HP ArcSight CORR-Engine indexes both raw (unstructured) customers evolved over the years and big data became prevalent; and normalized (structured) event data to provide rapid search it was important to redesign our solution to handle the new capabilities. With our combined flat-file and RDBMS technology, challenges. The data store now needs to capture more events, HP ArcSight can return search results in excess of millions events per compress and archive more data, and execute searches much faster. second for both structured and unstructured data. As a result of using this new data store, security administrators Born for faster speed could focus on finding malicious activities, not on tuning or managing the database. Also, central to our ability to process more When we originally introduced this technology into our logger events in real time, the new CORR-Engine permitted additional solution, customers could see the benefits. HP ArcSight’s parallel processing capabilities, up to 80 CPU cores, big enough CORR-Engine (correlation optimized retention and retrieval) is for the biggest organizations on the planet. By adding parallel uniquely architected to enable a single instance to capture raw processing power, HP ArcSight can handle more events, faster in logs at rates of above 100,000 events per second, compress, and an easy-to-use interface. store up to 42 TB of log data per instance and execute searches at millions of events per second.2 By creating our own data store that utilized both column and row-store technology, we were able Real-time threat evaluation to marry the significant performance benefits with the flexibility of free-form unstructured searches, all while providing a very HP ArcSight also makes use of actor information as a variable in intuitive, easy-to-operate user interface. its threat formula that collects information regarding identity management user roles, critical assets, vulnerability data, and The CORR-Engine serves as a foundation that provides the speed “watch lists” in real time and uses this information to reduce needed for today’s threat detection, security analysis, and log data false-positives and monitor critical infrastructure in memory. For management. By processing more events, it can soon identify the example, if a Microsoft® SQL Server injection attack is targeting an meaning of any event by placing it within context of what, where, Oracle database, HP ArcSight immediately lowers the severity of the when, and why that event occurred and its impact on the organization. attack, knowing that Oracle is not susceptible to MS SQL attacks. However, if a privileged user is accessing a critical piece of infrastructure Our correlation delivers accurate and automated prioritization after regular working hours and inserting a USB thumb drive into their of security risks and compliance violations in a business relevant system, this may generate a number of low severity events. Pieced context. Real-time alerts show administrators the most critical together, HP ArcSight would immediately raise the severity of this security events occurring in the environment, along with the activity based on the understanding of the user’s privileges and the context necessary to further analyze and mitigate a breach. Using assets criticality. This would start the alert process and start monitoring CORR-Engine, administrators and analysts are able to: activity and workflow processes for a potential security breach. Detect more incidents • The new architecture allows event correlation rates of up to 3x the Figure 4. Correlation is the key to making sense of 1s and 0s current performance using the same hardware. Address more data History • The new architecture enables storage capacity of up to 20x the Session current capacity for correlated events using the same disk space.2 Privileged user Operate more efficiently • The use of a common data store allows both the real-time Role Anomaly correlation application and the log management application to use the same set of data, providing a seamless workflow that includes detection, alerting, and forensic analysis and reporting. Find threats faster Location Asset • The graph above shows the multiples of improvement when we switched from RDBMS to our own-patented data store utilizing our Action new CORR-Engine. Transactions IP address 6
  • 7. Pattern matching Figure 5. Smart correlation HP ArcSight has an expansion pack: Threat Detector which allows Collect Detect Respond customers to mine through archived data looking for relationships between events that would have been missed by real-time correlation. Who Intelligent threat and risk detection (User roles) −−Intelligent threat and risk detection Sophisticated correlation As an example, a low-and-slow attack takes place when an attacker purposely lowers the threshold on their attack to avoid detection. -technologies Sophisticated correlation technologies −−-Patternrecognition andand anomaly Pattern recognition anomaly detection to identify Such an evasive technique might be when the attacker is using a Better visibility; detection to identify modern known modern known and unknown threats dictionary attack to guess a user’s password. They would not try superior threat -and more you collect, the smarter it gets The unknown threats What Where to brute-force the authentication system all at once, as the system (Logs) detection (Flows) −− The more you collect, the smarter would lock out the user’s account after a series of unsuccessful login it gets attempts. So the attacker uses a scripted stealth method of only Detect and prevent attacks attempting to login twice while trying to guess the password, then sleeps for five minutes and continues to invoke two attempts every five minutes. This means there would be 576 unsuccessful login attempts daily, but since most correlation rules look for brute-force Monitor and respond methods, only a routine that would mine through historical data would be able to match this pattern. Threat Detector would detect HP ArcSight proactively alerts and notifies you when malicious activity this attack and then allow customers to introduce new rules that has occurred in your environment. However, because of the ability would block the attacker going forward. to process events quickly, we can alert your analysts in real time. For example, if we detect a distributed denial of services (DDoS) attack, we can send an email to you and your team, and notify you via your mobile device. A priority 1 escalation alerts your team so that a Statistical correlation response can be mobilized against a prioritized security event. For HP ArcSight’s multidimensional correlation engine combines real time, example, if the Tier 1 team doesn’t acknowledge a notification within in memory event log data with asset awareness, asset vulnerability, and a certain timeframe, HP ArcSight can automatically escalate this to identity correlation to assist operating teams with immediate detection your Tier 2 team, tying into your existing response processes and of threats. The powerful correlation engine allows you to maintain a procedures. state of situational awareness by processing millions of log events in real time. We help to prioritize critical events so that your security Once you’ve received a notification, you can start to analyze and administrator can review only those events that need specialized investigate your environment using our easy-to-use data driven attention. With built-in network asset and user models, HP ArcSight is capabilities. Our dashboards help you visualize where your data is uniquely able to understand who is on the network, what data they are located and provide specialized views from business oriented to seeing, and which actions they are taking with that data. geographical oriented to systems oriented. From the dashboard, we can drill into the supporting events, drill into any level of detail, HP ArcSight Enterprise Security Manager (ESM) uses a heuristic and customize the view and presentation of that data. And with analytics model to keep a baseline of activity from events our strong visualization capabilities, you can easily understand the received by ESM and monitors any increases in attack, target, significance of the data. protocol, or user activity using a percentage threshold. The statistics that are calculated are used by ESM to determine spikes IT must be able to respond quickly, efficiently, and accurately to help in the baseline average as well as other deterministic activity such minimize damage to the enterprise. HP ArcSight Threat Detector as anomalous behavior, session reconciliation, effectiveness of follows a simple three-step methodology: IDS and firewalls as well as monitoring DHCP lease activity. This • Discover the systems on your network statistical baseline is also used for determining anomalous user or • Analyze what actions we should take and which offer the best results application-usage behavior. • Provide guidance on what to do By using HP ArcSight Threat Detector, you can: • Reduce your response time from hours to seconds • Simulate response actions before applying changes • Cut off threats at the most effective choke points • Automatically document all changes for audit or rollback 7
  • 8. Figure 6. HP ArcSight ESM management console Conclusion HP Services In today’s business environment, having access to the right HP ESP Global Services take a holistic approach to building and information means making the right decision critical to surviving. operating cyber security and response solutions and capabilities Businesses need to protect their intelligence as it accumulates much that support the cyber threat management and regulatory faster because of big data. With HP ArcSight ESM, you can process compliance needs of the world’s largest enterprises. We use a big data events at faster speeds, get results in real time so that combination of operational expertise—yours and ours—and proven your business is getting the security information when it needs it methodologies to deliver fast, effective results and demonstrate the most in real time. With HP ArcSight CORR-Engine, security event ROI. Our proven, use-case driven solutions combine market-leading monitoring is simple, intelligent, efficient, and manageable. technology together with sustainable business and technical process executed by trained and organized people. Learn more about HP ESP Global Services at About HP Enterprise Security hpenterprisesecurity.com. HP is a leading provider of security and compliance solutions for the modern enterprise that wants to mitigate risk in their hybrid environment and defend against advanced threats. Based Protect your business on market-leading products from HP ArcSight, HP Fortify, and Find out how to strengthen your security intelligence with HP TippingPoint, the HP Security Intelligence Platform uniquely HP ArcSight. Visit hp.com/go/hpesm. delivers the advanced correlation, application protection, and network defenses to protect today’s hybrid IT infrastructure from sophisticated cyber threats. 1 Source: “Advanced Data Exfiltration,” Iftach Ian Amit, VP Consulting, Security Art, Israel, September 2011. http://www.iamit.org/blog/wp-content/uploads/2012/01/ Advanced-data-exfiltration-%E2%80%93-the-way-Q-would-have-done-it.pdf 2 Source: ESM 6.0c Beta-Test, HP ArcSight QA and Dev team, August 2012 Get connected hp.com/go/getconnected Get the insider view on tech trends, support alerts, and HP solutions. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Oracle is a registered trademark of Oracle and/or its affiliates. Microsoft is a U.S. registered trademark of Microsoft Corporation. 4AA4-4051ENW, Created December 2012