Application Security // Database Security
8/23/2013
01:02 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

3 Inconvenient Truths About Big Data In Security Analysis

HD Moore at UNITED Security Conference predicts: "We'll see a large breach from one of the analytics providers in the next 12 months"

Big data analytics tools and distributed databases may offer a lot of potential to change the way security monitoring and investigation is done. But these innovative ways of concentrating security data stores and accelerating analysis bring with them some unwanted baggage.

Not only are these tools and services harder to bake into processes than vendors market them, but they're also introducing a lot of risk to security organizations that use them uncritically, warned security researcher H.D. Moore, chief research officer at Rapid7, at the UNITED Security Conference earlier this week in Boston.

According to Moore, big data holds the potential to "start changing the mathematics for both attackers and defenders." However, organizations beware because there are some pretty inconvenient truths about big data that Moore laid out in his conference session at the show.

1. Big Data Isn't Magic
According to Moore, the buzz around the big data trend is so pitched that the term is being used interchangeably with all types of security analysis tools. And it's almost used as a security open-sesame incantation that will offer the holy grail of security: instantly clear visibility.

"People say if you have all of your data in one place, you'll magically get the security benefit. That's not true," he says. "It's a ton of data -- you can dig into it, and you can find stuff. You can obviously find some good security benefit to having this data. But it doesn’t come for free."

Without someone dedicated to the process of going through and writing the right queries and generally asking the right security questions, the benefits will be minimal. "So just be careful about where you invest, and make sure that if you are investing in a data analytics tool, you at least have one body sitting in front of it and you're investing just as much in people as you are in the process," he says.

2. Putting All Our Eggs In One Rickety Basket
Even more distressing to Moore, though, is the insecure infrastructure backing many big data security analysis tools -- homegrown or otherwise.

"We see a lot of stuff in development around big data toolkits -- things like Mongo and Cassandra -- and there's not a lot of security built into these tools," he says. For example, MongoDB doesn't support SSL by default, and there isn't the same level of security offered in similar tools as more established traditional relational databases. "It's actually pretty frightening how insecure these tools are by default, yet they're becoming the back-end for most of the big data services being sold today."

Meanwhile, organizations are consolidating their risks into these systems by aggregating huge stores of security metadata, log files, and more in order to do large-scale analysis.

"Organizations are doing whatever they can to get all of their data in these central locations," he says. "You're making these really juicy targets for someone to go after. Everyone kind of cringes when we look at some of those big password breaches in the past, but that's nothing compared to a multiterabyte data leak."

Not only are organizations putting their sensitive security data in one giant basket, but it is a rickety one at that.

3. Law of Averages Says An Analytics Provider Breach Is Coming
In many cases, the basket isn't tended in-house, either. As more big data security analytics service providers come into play, organizations are increasing their risk profile if they aren't vetting their providers, Moore warns.

"The amount of data these folks are processing and the type of data they're processing is really important," Moore says. "You're seeing everything from SIP phone call logs -- who talked to who, to when users logged on -- to sensitive information being sent in the log files themselves."

Moore believes that with the greater proliferation of service providers, the insecurity in many of the products they're using and the growing list of important customer data held by these providers make a big breach inevitable, and very soon.

"One thing that's almost guaranteed to happen in the next year is we're going to see one of the large providers of analytics services -- whether security, log data, or something else -- get breached," he says. "It's just the law of averages at this point. There's enough folks offering services who don’t necessarily know what they're doing that we're going to see a big breach."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
TerrenceW503
50%
50%
TerrenceW503,
User Rank: Apprentice
8/27/2013 | 7:21:03 PM
re: 3 Inconvenient Truths About Big Data In Security Analysis
My thoughts on "Big Data" - http://www.divergentinfosec.co...
RSCHUMACHER400
50%
50%
RSCHUMACHER400,
User Rank: Apprentice
8/23/2013 | 1:43:19 PM
re: 3 Inconvenient Truths About Big Data In Security Analysis
FYI - Cassandra added security features earlier this year, while those and other advanced security features were added to the commercial edition of Cassandra (DataStax Enterprise).
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2003-1598
Published: 2014-10-01
SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable.

CVE-2011-4624
Published: 2014-10-01
Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.

CVE-2012-0811
Published: 2014-10-01
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files gene...

CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Chris Hadnagy, who hosts the annual Social Engineering Capture the Flag Contest at DEF CON, will discuss the latest trends attackers are using.