Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

11/5/2013
05:06 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

IT Security From The Eyes Of Data Scientists

Enterprises will increasingly employ data science experts to help drive security analytics and risk mitigation

As IT security leaders try to base more of their day-to-day decisions on statistical analysis of relevant data coming from IT infrastructure and business processes, they're running into a skills and resource gap. Often security teams have lots of specialists with deep technical knowledge of attack techniques and trends, but they frequently lack the skills to aggregate and manipulate data in order to draw meaningful conclusions from statistical trends.

As the speed and volume of security data continues to mount, so will that gap, which is why many within the industry believe that in the coming years, an IT security team will not be complete without at least one data scientist among its ranks.

"In the past, it has always been us who has been behind the game, trying to catch up with the attackers' techniques," says Dan Mitchell, product manager of data sciences for RSA, The Security Division of EMC. "I think data science gives us the opportunity to get ahead of the attackers and have them be behind for a change."

Mitchell is among a growing legion of data scientists growing active within the IT security community, and one of several that Dark Reading caught up with to get their views on the value that their colleagues bring to the table, why enterprises need to employ more, and how organizations can develop talent and embed these experts into their security practices.

The complex chain of techniques that attackers today use to infiltrate IT resources and steal data makes it absolutely critical that security teams spot trends and connect behaviors that span across IT infrastructure, user groups, and geographical locations.

In order to do that, it requires security to have experts that can manipulate data, visualize it, and draw conclusions from it. Not only that, the team needs to be able to build infrastructure to store data, normalize it, and develop modeling that can answer the burning questions security analysts have about anomalies that may indicate compromise -- and that infrastructure should preferably be designed to do it all automatically.

This is the exact kind of expertise a data scientist brings to the table, says Ram Keralapura, data scientist for Netskope, a cloud apps analytics and policy creation company, who explains that the CISO and data scientist have the opportunity to form a symbiotic relationship.

"Security officers have a very good understanding of the outcome they want and have identified their problems -- they want to know specific kinds of information about certain kinds of anomalies or activities that are happening in their enterprise, but they don't always know how to get that information," says Keralapura. "Data scientists are the right people to bridge this gap and provide the insights that these security officers need in order to make more informed decisions."

What's more, Mitchell explains that someone with his type of expertise can help break down a lot of the silos that currently exist in the security realm.

"So because the security industry has become so fractionalized in terms of specialty areas, data science offers a way to bring specific domain expertise and then combine that with things like machine learning, mathematical modeling and manipulating data to solve problems that extend across all specialties," he says. "It's really about creating the whole picture."

[How do you know if you've been breached? See Top 15 Indicators of Compromise.]

Whereas in the past a lot of the mathematical minds in security tended to gravitate toward specialties like encryption or authentication, Mitchell believes that many will be diverted into data science.

"There's so much more we can do mathematically to solve our problems," he says. "I think you're going to see more and more of that. It's a larger trend."

Many vendors have already been leading the trend of hiring and training more data scientists to develop analytics-based security products, but the role of the data scientist should also be a staple within enterprise IT security teams.

"The reason I think that businesses also have to be hiring data scientists is that in security, especially, a large component of the practice is data about your particular environment," says Michael Roytman, data scientist for Risk I/O, a vulnerability threat monitoring vendor. "A lot can be done to use that data to narrow down where you should be focusing on your security risks, and that's where an in-house data scientist plays a part."

And, says Keralapura, it really should be a full-time role. There are several big reasons for this, he says. First, in order to develop predictive models about the enterprise's specific data, data scientists need to develop long-term relationships with security experts on staff and deal with data on a day-to-day basis. Second, in order to accomplish real-time detection, they'll need to be around to help with response in real time. And, third, a full-time data scientist is crucial to helping forensics problems that could pop up at any time.

"When a problem happens, you need to look at data right away in order to identify what it was, why did it happen, how did it happen, and all of these different dimensions that need to be answered," says Keralapura. "These things keep happening all the time."

As enterprises seek out those with a data science background, there are two big skill sets they should be looking for. The most obvious is a high degree of mathematics and statistical analysis. The second is the coding chops of a hacker.

"You are going to want people that have some hacking ability to put things together quickly. A lot of it is going to be about changing the view quickly, and some developers may know how to program well in a long development cycle," says George Ng, data scientist for YarcData, a Cray company that focuses on graph analytics. "But if someone is trying to steal your data, the pattern isn't something you already have in production to look for -- it's something you develop on the fly."

Next page: The insider data scientist Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-28971
PUBLISHED: 2020-12-01
An issue was discovered on Western Digital My Cloud OS 5 devices before 5.06.115. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to execute privileged commands on the device via a cookie, because of insufficient validation of URI paths.
CVE-2020-28993
PUBLISHED: 2020-12-01
A Directory Traversal vulnerability exists in ATX miniCMTS200a Broadband Gateway through 2.0 and Pico CMTS through 2.0. Successful exploitation of this vulnerability would allow an unauthenticated attacker to retrieve administrator credentials by sending a malicious POST request.
CVE-2020-6880
PUBLISHED: 2020-12-01
A ZXELINK wireless controller has a SQL injection vulnerability. A remote attacker does not need to log in. By sending malicious SQL statements, because the device does not properly filter parameters, successful use can obtain management rights. This affects: ZXV10 W908 all versions before MIPS_A_10...
CVE-2020-28940
PUBLISHED: 2020-12-01
On Western Digital My Cloud OS 5 devices before 5.06.115, the NAS Admin dashboard has an authentication bypass vulnerability that could allow an unauthenticated user to execute privileged commands on the device.
CVE-2020-28970
PUBLISHED: 2020-12-01
An issue was discovered on Western Digital My Cloud OS 5 devices before 5.06.115. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to execute privileged commands on the device via a cookie. (In addition, an upload endpoint could then be used by an authenticated adm...