Perimeter
2/13/2013
01:51 PM
Adrian Lane
Adrian Lane
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Security Analytics And Big Data

Does big data impact security?

I get a flood of announcements about how using big data clusters to analyze the mountains of event data companies collect will "transform" security as we know it. I think this is wrong.

What I think is this: Big data capabilities close the gap between what SIEM platforms overpromised a decade ago and what they deliver today.

First, some background. Most of the owners and operators of SIEM platforms I speak with are not happy with the platform they own/manage/use. There are lots of reasons for this, but scalability, data collection, performance, and management difficulty top the list. SIEM is a must-have technology for most enterprises because it provides critical data to compliance and operations teams, and, in many cases, it's core to security teams as well. But that does not mean the customers are happy or are not looking for something better.

Three areas have invalidated assumptions on which SIEM buying decisions were made during the past five years -- three areas where buyer's anticipated need and vendor's anticipated capabilities both missed the mark. What buyers thought they would need to address compliance requirements, security threats, and volume(s) of event data was, in fact, well below what they really needed.

So how does big data play into this? Three reasons. First, the architectural advantages of big data clusters allow them to handle larger amounts of data very quickly, and scale up with the number of events being generated. Second, the query and analysis capabilities offered by most big data clusters offers faster, more flexible approaches to combing through the data collected. Finally, big data can be embedded into, or be integrated as, a peer application to existing SIEM deployments.

But beyond the native capabilities to address scale and "input velocity" -- inherent traits of big data -- it's all speculation. Yes, big data offers a great deal of flexibility in how it can mine data. And adoption of big data infrastructure to house event data helps solve the volumetric and speed issues customers experience with SIEM. That's why it's being touted as a technology that will transform security analytics.

But for the analysis to occur, someone needs to actually write the scripts to analyze the data. Someone needs to actually put Map-Reduce or similar queries to work. And they need to know what data they are interested in examining. The reports, forensic analysis tools, visualization capabilities, data correlation, and enrichment will need to be built. Today, that's just an idea. It's potential. And for anyone who watches NFL or NBA drafts can tell you, lots of time potential does not pan out.

Someone needs to put in the work to make the promise of big data a reality. Yes, we can get better analysis, and get it faster than before, but there is a lot of work to be done to get there. Some features will undoubtedly be provided by vendors and some by your internal development teams; most likely it will be a combination of both. The core technology is likely to address a couple of limiting factors (scale, timeliness of analysis, flexible query options) in the near term; the rest (reports, rules, controls, alerts, forensic tools) will be the same problem you have today.

If you did not have the time to write SIEM policies in the past, then it's likely you won't have time to write the queries for big data deployments in your future.

Adrian Lane is an analyst/CTO with Securosis LLC, an independent security consulting practice. Special to Dark Reading. Adrian Lane is a Security Strategist and brings over 25 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and secure software development. With experience at Ingres, Oracle, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
JCharles
50%
50%
JCharles,
User Rank: Apprentice
2/15/2013 | 3:45:46 PM
re: Security Analytics And Big Data
A Big Data Mining Tool that does SIEM and that is scalable & easy. Well then check out Secnology.
dangleebits2
50%
50%
dangleebits2,
User Rank: Apprentice
2/14/2013 | 12:43:15 AM
re: Security Analytics And Big Data
Your gonna need a new security role to fill the gap like this one-áhttp://bigsnarf.wordpress.com/...
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2886
Published: 2014-09-18
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during ins...

CVE-2014-4352
Published: 2014-09-18
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.

CVE-2014-4353
Published: 2014-09-18
Race condition in iMessage in Apple iOS before 8 allows attackers to obtain sensitive information by leveraging the presence of an attachment after the deletion of its parent (1) iMessage or (2) MMS.

CVE-2014-4354
Published: 2014-09-18
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.

CVE-2014-4356
Published: 2014-09-18
Apple iOS before 8 does not follow the intended configuration setting for text-message preview on the lock screen, which allows physically proximate attackers to obtain sensitive information by reading this screen.

Best of the Web
Dark Reading Radio