Chapter-1 Data Analysis For Cyber Security
Chapter-1 Data Analysis For Cyber Security
Assets Affected
• Personal assets
• Public assets
• Corporate assets at risk
Data Analytics
5
16/10/2024 Data Analytics for Cyber security, 2024.
What is
Cybersecurity?
Cybersecurity refers to securing valuable electronic assets and
physical assets, which have electronic access, against unauthorized
access. These assets may include personal devices, networked
devices, information assets, and infrastructural assets, among others.
10/2/2022 6
Data Analytics for Cyber security.
Aims of Cybersecurity: prevent,
detect, and respond to threats
Prevention of cyberattacks against critical assets
Detection of threats
Respond to threats in the event that they penetrate access to critical assets
Recover and restore the normal state of the system in the event that an attack
is successful
10/2/2022 7
Data Analytics for Cyber security.
Assets Affected
Personal Public Corporate
• Phones (home and
• Smart meters, • Customer database,
mobile),
• Tablets , • Power grid, • Websites,
• Personal computers • Sewage controls, • Business applications,
(desktop and laptops), • Nuclear power plant, • Business network,
• External physical hard • Rail lines, • Emails,
drive, • Airplanes and air traffic, • Off the shelf software,
• Cloud drive, • Traffic lights, • Intellectual property
• Email accounts, • Citizen databases,
• Fitness trackers, • Websites (county, state
• Smart watches, and federal),
• Smart glasses, • Space travel programs
• Media devices (TIVO, • Satellites
apple TV, cable box),
• Bank accounts,
• Credit cards,
• Personal gaming
systems 10/2/2022 8
Data Analytics for Cyber security
Motivation behind Cyber
Threats
1 2 3 4 5
Stealing intellectual Gaining access to Making a political Performing cyber Damaging reputation,
property customer data statement espionage Making a splash/ for
fun, Impedeing access
to data and applications
10/2/2022 9
Data Analytics for Cyber security.
Why do we have security
risks?
Organizational risks
(multiple partners, such as
Applications with several Logical errors in software in cyber-attacks at Target
dependencies, code (such as Heartbleed), and the Pacific Northwest
National Laboratories
[PNNL]),
10/2/2022 10
Data Analytics for Cyber security
Summary of Motivation, Risks and
Security Motivation Risks
• To steal Intellectual property • Internet protocol which is inherently not secure
• To damage reputation • Applications with several dependencies
• Gain access to data , which can then be sold • Logical errors in software code (ex. Heartbleed)
• Gain access to information, which is not • Organizational risks (multiple partners ex. Target,
generally available PNNL)
• To make a political statement • Lack of User awareness of cybersecurity risks (ex.
• To impede access to critical data and Social engineering, phishing)
applications • Personality traits of individuals using the systems
• To make a splash/ for fun
Attaining Security
• Protecting resources
• Hardening defenses
• Capturing data logs
• Monitoring systems
• Tracing the attacks
• Predicting risks
• Predicting attacks
• Identifying vulnerabilities
8
Data Analytics for Cyber security
• According to a McAfee report, the monetary loss resulting
from cybercrime costs about $600 billion, which that is
about 0.8% of the world Gross Domestic Product (GDP)
(McAfee–-Cybercrime Impact 2018), with malicious
What is the actors becoming more and more sophisticated.
• The loss due to cyber-attacks is not simply based on direct
level of financial loss but also based on several indirect factors,
which that may lead to a major financial impact.
damage • Example: Target cyber-attack (RSkariachan and
Finkleeuters-Target
• Target reported $61 2014)million in expenses related to
that can the cyber- attack out of which $44 million were
covered by insurance.
occur? • The direct financial impact to Target was $17
million.
• A 46 % drop in net profit in the holiday quarter,
• 5.5% drop in transactions during the quarter,
• share price fluctuations led to further losses,
• cards had to be reissued for to several customers,
• All these
and losses amount to much more than the total $61
million loss. In addition, the trust of the customers was
• Target
lost, had
which is toaoffer
not identity protection
quantifiable to long-term
loss and has affected
customers.
impacts.
10/2/2022 12
• Protecting resources,
• Hardening defenses,
• Capturing data logs,
Handli • Monitoring systems,
• Tracing the attacks,
ng Cyber • Predicting risks,
Attacks • Predicting attacks, and
• Identifying
vulnerabilities
13
Overall Areas of Cybersecurity
• Network Security
• Cyberphysical Security
11
Sub areas of Cybersecurity
Application security: incorporating security Data and information security: securing Network security: securing the traditional
in the software development process. data from the risk of unauthorized access computer networks and security measures
and misuse adopted to secure, prevent unauthorized
access and misuse of either the public or
the private network.
15
• Emerging challenges due to the coupling of the
cyber systems with the physical systems.
• The power plants being controlled by a cyber
system,
Sub areas of • risk of disruption of the cyber component or
Cybersecurity • risk of unauthorized control of the cyber
system,
• gaining unauthorized control of the physical
systems.
Cyber physical
security
10/2/2022 16
• Cross cutting across areas to learn from existing
threats and develop solutions for novel and
unknown threats towards networks,
infrastructure, data, and information
Sub areas of
• Example: Threat hunting proactively looks for
Cybersecurity malicious players across the myriad data
sources in an organization
• Does not necessarily have to be a completely
machine-driven process and should account
for user behaviors
• Must look at the operational context.
• Provide security analysts a much focused field
of vision to security analysts to zero in on
Data analytics solutions for potential threats
17
• Multiple types of networks and devices
• computer networks, Cyber Physical Systems (CPS), Internet of
Things (IoT), sensor networks, smart grids, and wired or wireless
networks.
Hardware • Computer networks - Traditional type of networks
• Groups of computers are connected in pre-specified
and configurations. These configurations can be designed using
security policy deciding who has access to what areas of
Network networks. Another way networks form is by determining patterns
of use over a period of time. In both cases, zones can be created
Landscap for access and connectivity where each computer in the network
and sub-networks can be monitored.
e • Cyber Physical Systems - an amalgamation of two interacting sub-
systems, cyber and physical
• used to monitor and perform the day- to- day functions of the
many automated systems that we rely on, including power
stations, chemical factories, and nuclear power plants, to name a
few.
• Ubiquitous connected technology - “smart” things - Internet of Things
10/2/2022
• Data analytics deals with analyzing large amounts of
data from disparate sources to discover actionable
information leading to gains for an organization.
• Includes techniques from data mining, statistics,
and business management, among other fields.
• Bigdata
Data Massive datasets (volume)
Generated at a rapid rate (velocity)
•
Analyti
Heterogeneous nature (variety)
•
19
Anatomy of
an
attack
17
vulnerability in one of the lab's public-facing web servers
PCs of site visitors
Drive by attack
(lab employees)
Compromised Workstations
Shared Network
resources Spear Phishing attack
Business Partners
19
Multi-dimensional view of Events become relevant when they
Threats occur
together
These events become relevant with
proximities rather than causation
The two items are in close Proximity, based
Spatial
on
Distance
• Source Proximity
N • Destination Proximity
1 • Temporal proximity
N1 or Delay
N 2
2 N
8
N N N
3 5 4
N N N N1 N1 N
4 6 9 0 1 3
0 4 8 12
Tim
16
e
Goal : to identify potential “collusions” among the entities responsible for these two events
20
• Looking at one dimension of
the data is not enough in such
prolonged attack scenarios.
Why Data Analytics is
• For such a multipronged
important for attacks, we need a multilevel
cybersecurity: A framework
case • Brings together data
from several different
study of databases.
understanding the • Events of interest can be
identified using a
anatomy of an attack combination of factors
such as proximity of
events in time, in terms
of series of
communications and
even in terms of the
geographic origin or
destination of the
communication.
10/2/2022 24
• Intruder Detection System (IDS) logs such as
Understanding SNORT
combinations
25
Understandin
• Extract associations to identify potentially
g the repeated or targeted communications
Collusions
and
associations
10/2/2022 26
• Time intervals accounts for time proximity
Understanding • Allows mining the data in proximity of time
network
evolution
27
How Can Data Analytics Help?
What this course is not about: This course does not address the traditional views of security
configurations and shoring up the defenses, including, setting up computer networks, setting
up firewalls, web server management, and patching of vulnerabilities.
What this course is about: This course addresses the challenges in cybersecurity that data
analytics can helpja address, including analytics for threat hunting or threat detection,
discovering knowledge ne for attack prevention or mitigation, discovering knowledge about
Ja
2 2
vulnerabilities,y, ©
20 and performing retrospective and prospective analysis for understanding the
rit
mechanics
er
se
c of attacks to help prevent for preventing them in the future.
u
b
r Cy
o
s f ved.
c
ti r 10/2/2022 29
n aly rese
a A ts
at igh
https://www.threatintelligence.com/blog/cyber-tabletop-
exercise-example-scenarios
Thank you!
10/2/2022 30