威胁情报论坛 X-Force Exchange The Concrete Value of Threat Intelligence Sharing and IBM X-Force Practice Ron Williams, STSM Chief Architect, Infrastructure Security Ron Williams, STSM, Principal Architect IBM Security IBM Agenda Threat Analyst Operations - ‘Getting to Go’ The Power of Community Analyzing, Mitigating, and Sharing Active Threats Copyright 2015 IBM Corporation The Internet is Really – REALLY BIG 4.2 Billion IPv4 Addresses (Research indicates visibility to ~1.2 Billion < 25%) 7x1038 IPv6 Addresses Systematic Scanning & Site Analysis is mathematically infeasible. Effective Internet Threat Data starts with observables associated with questionable activity. Effective Internet Threat Intelligence starts with intranet observables correlated with Internet Threat Data. IBM Daily Analyzes 12+ Million Malicious Emails, 10+ Million Web Sites, Generating and updating new threat data across ~1 Billion IPs & URLs Copyright 2015 IBM Corporation Effective Threat Intelligence Starts with a trigger (observable) • Malicious Mail (SPAM) -> Dropper URLs, Associated IP’s, Actual Malware • Detected Malware Beaconing to Unknown IP • Network Observable (Suspicious Destination Address) Further Analysis • IP/URL – Have other’s seen malicious activity? Multi-hoster? New Domain? • Has malware been found? Has it’s C2 infrastructure been identified • Can other’s confirm the ‘Three-Legged Stool: IP, URL, Malware’ Copyright 2015 IBM Corporation Of Observables and Indicators Q: When does an ‘observable’ become an ‘indicator’ Copyright 2015 IBM Corporation Of Observables and Indicators A: When it’s associated with other known malicious observables Copyright 2015 IBM Corporation Collecting the data – making the correlation True 0-Days may be confirmed in one of two-ways 1. Human Analysis 2. Automated Behavioral analysis of one or more of the observables (IP, URL, Malware, Compromised System) The ‘holy grail’ of Threat Mitigation is ‘Automated Action’ based on ‘Actionable Intelligence’ We have technical examples of this today in Next Generation Firewalls, Intrusion Prevention Systems, Malware Sandboxes, Security Information and Event Management Systems. But there is yet to be an end-to-end and automated system that can start with a zero-day threat and end with automated and actionable threat intelligence. Copyright 2015 IBM Corporation Getting to ‘go’ – the role of the threat analyst Until a Watson or Hal takes over the internet – The Human Security Analyst remains the most important part of any Threat Protection System. His or her role is to: 1. Understand a threat and how to mitigate it 2. Apply business metrics to prioritize threat mitigation 3. And Increasingly – how to apply tools to continuously shorten the time from identification to validation to prioritization to mitigation (or risk acceptance) Copyright 2015 IBM Corporation Internet Threat Activity Active Threat Analysis Actors Techniques, Tactics, Procedures Indicators Vulnerabilities Analyst’s Scope: Detection/Response Intranet Topology Use Cases Prevention Detection Response Copyright 2015 IBM Corporation infiltrating an enterprise (darkhotel) A. At hotel, I want WiFi access in Lobby B. Presented with ‘Hotel’s’ WiFi Finder App and promise of Free WiFi C. Select ‘Connect’ - authenticate to O/S to permit installation Powned D. Urgent phone call - close laptop - leave town Copyright 2015 IBM Corporation back home in SOC 1. SIEM Alert - SRC 172.10.34.17 DEST 216.158.85.49 2. Identified C2 Communications 3. Response 1. Identify SRC Machine from Asset Repository/Network 2. Institute Malware Scan 3. Found Suspicious File MD5: 560d68c31980c26d2adab7406b61c651 Copyright 2015 IBM Corporation Copyright 2015 IBM Corporation Copyright 2015 IBM Corporation Copyright 2015 IBM Corporation Copyright 2015 IBM Corporation threat data -> intelligence Copyright 2015 IBM Corporation what we can share Attack Flow Suspect Internet IP’s & URLs Identified Malware Signatures Other IOC’s (Registry Keys, dropped files, command files, executables, etc.) Meaningful Correlations Significant data to assist the 2nd analyst Copyright 2015 IBM Corporation what we (typically) don’t share internal infrastructure (internal networks, ip’s) 0day application and system vulnerabilities (unpublished) target specific data (individuals, accounts, ip addrs, etc) Copyright 2015 IBM Corporation Threat Intelligence – Enabling Machine Processing Making Threat Data and
2015-《威胁情报的具体价值及IBM X-Force实践-Ron Williams》
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
本文档由 张玉竹 于 2022-04-08 10:44:24上传分享