Analytics // Security Monitoring
6/28/2013
11:37 PM
Connect Directly
RSS
E-Mail
50%
50%

Machine-Learning Project Sifts Through Big Security Data

As the volume of data created by security and network devices multiplies, researchers look for ways to teach computer to better highlight attack patterns

As an information-security consultant, Alexandre Pinto spent 12 years helping companies set up difficult-to-configure systems to cull security intelligence from logs and security events.

Click here for more of Dark Reading's Black Hat articles.

Yet configuring the systems required months of work and even then needed constant maintenance to enable them to detect the latest threats and pinpoint likely malicious traffic. He realized that while companies may want to monitor their networks for threats, they typically have too few security people to work through data from far too many logs -- a problem that will only get worse as companies seek to sift through more operational data to detect threats. Big data could be the downfall of security if companies don't find better ways of dealing with the growing volumes, he says.

"What chance do we have: We can't find the needle in the haystack as it is now, and now the haystack is 100,000 times larger," he says. "We are going to need help."

To help solve the problem, Pinto has worked during the past six months on a machine-learning system that can take logs and identify traffic that originates from suspicious neighborhoods of the Internet. Dubbed MLSec, the project uses supervised learning algorithms to identify networks that are home to malicious actors. Pinto plans to demonstrate the tool at the Black Hat Security Briefings in July.

The independent researcher started with data from the SANS Institute's DShield project, which gathers firewall logs from participating community members. Pinto trained the system on 1.2 million events from 30 million log entries as well as other data submitted by volunteers. When comparing his results to known blacklists, the machine-learning algorithm appeared to be accurate in 92 to 95 percent of cases. Unlike blacklists, however, the systems does not need to be told which networks are malicious; it creates its own representation of the Internet.

Such a system can help information security managers by more accurately flagging traffic coming from questionable areas of the Internet, says Johannes Ullrich, dean of research for the SANS Technology Institute. In addition, the system can give administrators the best guess of the maliciousness of incoming traffic based on incomplete information, he says.

"It really helps to direct the attention of the security administrator," Ullrich says. "The big-data approach filters the data down to a subset, so you know what is worth looking at."

[Rather than watching for communications between infected systems and command-and-control servers, companies can detect stealthy malware when it attempts to spread. See Researcher To Open-Source Tools For Finding Odd Authentication Behavior.]

For companies with overworked staff, the ability to cull the run-of-the-mill data from the interesting -- potentially malicious -- traffic can be a great benefit. In addition, a machine-learning system can be constructed to adapt far faster than a human as the attackers change their tactics, Pinto argues.

"The model will outperform the expert because the model does not forget the data," he says. "It selectively diminishes the weight of what happened before, as time goes by, but it does not forget it."

Pinto plans to make the system available as a service to anyone to upload their firewall logs. In exchange, the people will get a report that summarizes the findings of the system.

In the end, the more people who use the system, the better the results should be, Pinto says.

"In machine learning, of course, the algorithm is important, but the more data that you throw at it, the better," he says. "This is the perfect fit with data security. The more you are attacked, the better your defenses should get."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Robert Lemos is a veteran technology journalist of more than 16 years and a former research engineer, writing articles that have appeared in Business Week, CIO Magazine, CNET News.com, Computing Japan, CSO Magazine, Dark Reading, eWEEK, InfoWorld, MIT's Technology Review, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-0914
Published: 2014-07-30
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8 and 6.x and 7.x through 7.5.0.6, Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk, and Maximo Asset Management 6.2 through 6.2.8 for Tivoli IT Asset Management f...

CVE-2014-0915
Published: 2014-07-30
Multiple cross-site scripting (XSS) vulnerabilities in IBM Maximo Asset Management 6.2 through 6.2.8, 6.x and 7.1 through 7.1.1.2, and 7.5 through 7.5.0.6; Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk; and Maximo Asset Management 6.2 through 6.2.8...

CVE-2014-0947
Published: 2014-07-30
Unspecified vulnerability in the server in IBM Rational Software Architect Design Manager 4.0.6 allows remote authenticated users to execute arbitrary code via a crafted update site.

CVE-2014-0948
Published: 2014-07-30
Unspecified vulnerability in IBM Rational Software Architect Design Manager and Rational Rhapsody Design Manager 3.x and 4.x before 4.0.7 allows remote authenticated users to execute arbitrary code via a crafted ZIP archive.

Best of the Web
Dark Reading Radio