Advanced SIEMs: A Road to the Security Knowledge, Protection, and Compliance - JANUARY 2021 / WHITE PAPER - Adlumin

Page created by Jesus Reid
 
CONTINUE READING
Advanced SIEMs: A Road to the Security Knowledge, Protection, and Compliance - JANUARY 2021 / WHITE PAPER - Adlumin
Advanced SIEMs:
A Road to the Security Knowledge, Protection, and Compliance
J A N U A RY 2 0 2 1 / W H I T E PA P E R

adlumin.com                                                    ©2021 Adlumin Inc. – All Rights Reserved
Advanced SIEMs: A Road to the Security Knowledge, Protection, and Compliance - JANUARY 2021 / WHITE PAPER - Adlumin
TABLE OF CONTENTS
Key Features of Adlumin’s Platform

Introduction ….……………………………………………………….........…....................…..................................... 3
How Adlumin Works ……………………………………………….........……………………………........................... 4

Darknet Exposure Module …………………...…………………….........………….....................…......................... 5

User & Entity Behavior Analytics (UEBA) ……………….........…................……………….......….......................... 6

Analytics Lifestyle and Algorithmic Detail …………………..………………..............................…......................... 7

Threat Intelligence Portal …………..…………........................……………………….........…………...................... 9

Permiter Defense …….........................................................................................................………............... 10

References ……........................................................................................................................……….......... 11

adlumin.com                                                                                                                                  page 2
Advanced SIEMs: A Road to the Security Knowledge, Protection, and Compliance - JANUARY 2021 / WHITE PAPER - Adlumin
INTRODUCTION
Sophisticated, targeted attacks can take weeks, months, or longer to discover and resolve. Security
teams require integrated tools that quickly uncover the source and scope of an attack to reduce time-to-
resolution, mitigate ongoing risk, detect attacker breakout, and further fortify the network. In addition, security
teams now need capabilities to extend predictive, analytical security beyond the boundaries of their enterprise
into the open deep and dark web.

Digital technologies have changed the face of business and government — and will continue to do so at
an even faster pace. They provide benefits including driving innovation, boosting productivity, improving
communications, and generating competitive advantage. A report from the World Economic Forum and
McKinsey & Company estimates that cyberattacks will cost the global economy $3 trillion in lost productivity
and growth by 2020, while theft, sabotage and other damage inflicted by trusted personnel continue to cost
organizations in lost revenues, revealed secrets and damaged reputations1.

Cyberattacks are becoming more sophisticated and it’s difficult to find hidden threats early – yet early
detection is critical to preventing the loss of confidential and sensitive enterprise and customer data. Now
more than ever, these sophisticated threats like APTs and insider attacks hide within the enterprise, indications
of breaches can be gleaned by analyzing large quantities data and extending the security sensor grid to the
open deep and dark web.

Organizations do not have the available human capital resources required to sift through these large quantities
of data, in search for the indicators that require analysis. Adlumin’s security platform uses artificial intelligence
and machine learning to analyze the behavior patterns of users on your network detecting threats, all the
while, monitoring the open deep and dark web for organizational intrusions.

What are organizations using Adlumin to detect?

   •   Account Manipulation                                   •   Lateral Movement
   •   Account Takeover Detection                             •   Lateral Movement by Insider
   •   Compliance                                             •   Leaked Accounts
   •   Compromised Account                                    •   Potential Inbound Attacks
   •   Dark Web Scanning                                      •   Privilege Management
   •   Data Exfiltration and IP Theft                         •   Remote Account Takeover
   •   Fraudulent Activity                                    •   Risk Management
   •   Identity Ecosystem Hardening                           •   Suspicious Behavior

Adlumin was designed and built on our artificial intelligence platform, which leverages big data analytics. It is
characterized by technology that can understand, reason, and learn.

adlumin.com                                                                                                    page 3
Advanced SIEMs: A Road to the Security Knowledge, Protection, and Compliance - JANUARY 2021 / WHITE PAPER - Adlumin
HOW ADLUMIN WORKS
Adlumin uses a complex, proprietary technology stack to deliver a premium analytics capability to its
customers that is cost efficient, simple to integrate, and easy-to-use. The architecture consists of relational
and non-relational databases, streaming analytics clusters, and robust API’s relational and non-relational
databases hold.

Our proprietary knowledge base was built from an incident response point-of-view, drawing correlations
between various data sets and threat vectors3.

Adlumin’s security platform is responsible for enforcing high velocity data science algorithms on streaming
data providing anomaly detection at the speed of cyber into five easy-to-ingest categories: Informational,
Low, Medium, High, and Critical.

Our robust API integration pipeline provides unmatched data enrichment with threat intelligence, geolocation,
and open deep and dark web intrusion detection.

The easy-to-use dashboard interface makes every member of your team—from beginner to expert—effective
at investigating and countering threats. Beginners have access to simple auto-populating, use-case based
research capabilities that will allow a novice analyst to scope a breach in under three seconds. Advanced
analysts have access to the Kibana dashboard allowing them to make highly customized queries and
visualizations across the entire Adlumin dataset.

adlumin.com                                                                                                  page 4
DARKNET EXPOSURE MODULE
Adlumin delivers a true, big data platform that facilitates the searching millions of events in real-time, providing
the capability to extend predictive and analytical security beyond the boundaries of the enterprise into the
open deep and dark web.

Adlumin utilizes Human Intelligence (HUMINT), proprietary automated scanning, and various technology
providers to gain access to the same leaked data the fraudsters use. Using a combination of our proprietary
technology and tradecraft, we can share exposed data with our customers before it is used to cause harm,
typically weeks or even months before it becomes available to dark web scanners.

Due to widespread password reuse, Account Takeover (ATO) attacks have become an extremely lucrative
business for cybercriminals. The Federal Bureau of Investigation (FBI) and Department of Justice (DOJ)
reported that organized crime rings are performing ATO attacks on a massive scale and can leverage botnet-
infected armies to attempt credential stuffing attacks against various web and mobile applications2.

The use of stolen credentials to break into sites is not particularly new or sophisticated – but it works. It’s not
surprising to hear that one reused password can easily jeopardize millions of accounts. The Adlumin security
platform discovers and recovers stolen credentials in real-time, immediately alerting you of a match and
initiates an automated response protecting your organization from these extremely effective attacks.

Adlumin collects stolen and leaked artifacts using multiple techniques and from many sources. We acquire
the most actionable data from sources using Human Intelligence and Applied Research (HUMAN +
TECHNOLOGY), further providing the capability to extend predictive, analytical, security beyond the
boundaries of the enterprise into the open deep and dark web.

adlumin.com                                                                                                    page 5
USER & ENTITY BEHAVIOR ANALYTICS (UEBA)
Compromised accounts are part of almost every financial intrusion. Adlumin uses proprietary artificial
intelligence (AI) and machine learning algorithms to analyze account-based threats and write your
SIEM rules.

Multidimensional Monitoring
Adlumin looks at events from a user, host, and cohort-based perspective. Adlumin will monitor whether a user
behavior pattern and computer usage pattern looks normal relative to itself and similar machines.

Live Monitoring vs. Monitoring Data at Rest
Much of UEBA happens well after the most recent user session has been cached and reporting to the
sysadmin may occur long after the data was collected. At Adlumin, we analyze user behavior as soon as it
becomes available in real-time. Using our proprietary architecture, we can notify customers from the hot data
coming in, instead of resorting to batch processing of stale data at a later time.

Baselines From “Clean Data”
Our methods identify and discard outliers in baseline data collection, which allows us to create a perspective
that will not be skewed by one-off or potentially malicious usage patterns. This means our baselines are
comprised of the best general representation of a given user or host.

Adlumin’s enhancement of your existing security offerings and currently deployed technologies provides new
capabilities to extend predictive, analytical, security beyond the boundaries of the enterprise into the open
deep and dark web.

adlumin.com                                                                                               page 6
ANALYTICS LIFESTYLE AND ALGORITHMIC DETAIL
Two Types of Profiles for Monitoring the Adlumin UEBA Engine Builds
Event Profile
For simplicity, we will just consider users as they typically have a simple set of usage patterns.. For instance,
a user will login, open an application, create file, and logout. This pattern will happen over and over, which
makes this behavior predictable. Adlumin clusters on these patterns and extracts the most representative
pattern for each cluster.

Detailed Profile
The second is a set of attributes based on that
profile. For example, the user will typically open
the same type of application at the same time
and create a file with a similar size. Some of
these attributes can vary; however, for each
set of user sessions, our platform compresses
it into a generalized set of details allowing for
some flexibility in variation. New profiles are
trained on weekly schedule to account for
behavior drift.

When a user profile is built, the UEBA engine
will collect and score live user data against the
profile. The engine looks for completed user
sessions (where the user has idled for a given
threshold) and then take the most recent set
of events to be scored. The set of events is
first mapped to an event profile. If it cannot be
mapped within a tolerance (e.g. a user uses the
command line when they never have before),
that set of events is flagged and a detection
is created.

adlumin.com                                                                                                  page 7
After being mapped to an event profile, the set of events will be compared to the detail profile. If this pattern
is significantly different from the detail profile, that set of events is flagged and a detection created, further
providing the capability to extend predictive, analytical, security beyond the boundaries of the enterprise into
the open deep and dark web.

adlumin.com                                                                                                   page 8
THREAT INTELLIGENCE PORTAL
The Adlumin Threat Intelligence Portal (ATIP) provides powerful new capabilities to the already robust
cloud-native SIEM from Adlumin, a cybersecurity company dedicated to defending corporate networks from
threats, malfunctions, and IT operations failures. ATIP is a threat intelligence platform that conducts searches
across numerous databases, and the world’s largest crowdsourced threat intelligence database – with
additional integrations in the works.

Integrating with Adlumin’s threat intelligence sources enables a collaborative defensive system through
community-powered threat data. Every Adlumin platform user has access to crowdsourced threat intelligence
from more than 100,000 participants in 140 countries. That adds up to millions of threat indicators daily.

The portal automatically checks millions of dangerous Indicators of Compromise (IoC) against the IP traffic
in your network, providing additional context to make informed decisions about your network’s security, based
on similar threats flagged in other users’ networks. It facilitates real-time searches of individual IP address
across the three threat intelligence databases, in
addition to firewalls, VPN servers, and network security
appliances. Users receive immediate notifications of
potentially dangerous events. ATIP also allows users to
share information about suspected threats with others.

The new platform builds on Adlumin’s existing line
of dependable, easy-to-use network protection and
breach detection software. Users can access ATIP from
the main Adlumin dashboard, where clear, color-coded
visualizations aid the user experience.

Adlumin’s Threat Intelligence Platform provides financial
institutions with automated threat detection at an
intermediate level of security within Domain 2 of the
FFIEC CAT and NCUA ACET. Organizations receive
automated security threat alerts without any work on the
part of the IT or Security Team. Additionally, the main
ATIP dashboard provides a real-time feed with articles
from top cybersecurity news and information sources.

adlumin.com                                                                                                page 9
PERIMETER DEFENSE
Adlumin’s Perimeter Defense is a unique feature, in that it gives the user insight into their network from the
perspective of the attacker. With Perimeter Defense, internet-facing servers, DMZ hosts, and ATM networks
are regularly scanned and monitored for changes and abnormalities. From the Perimeter Defense
management page, users input the IP addresses or CIDRs of their high-value assets and internet-facing
networks, select a detection severity level, and choose the types of monitoring they’d like to enable. Once
a network or IP has been added, Adlumin Perimeter Defense monitors several key data points depending
on the enabled options, including remotely accessible ports, expired TLS certificates and known product
vulnerabilities.

As periodic scanning occurs, Adlumin will alert on issues such as new ports being opened or existing ports
being closed, self-signed or expired TLS certificates, as well as if any publicly accessible services are running
product versions with known vulnerabilities. If any issues are detected, Adlumin will trigger a detection with
the severity level that the user has specified for a given network range or IP address. Adlumin Perimeter
Defense gives users the tools to monitor all their connected devices on the Internet.

adlumin.com                                                                                                page 10
REFERENCES
1.      D. Chinn, J. Kaplan and A. Weinberg, “Rick and responsibility in a hyperconnected world: Implications
        for enterprises,” January 2014. [Online]. Available: https://www.mckinsey.com/business-functions/digital-
        mckinsey/our-insights/riskand-responsibility-in-a-hyperconnected-world-implications-for-enterprises.
2.      FBI, “International Business E-Mail Compromise Takedown,” June 2018. [Online]. Available: https://www.fbi.
        gov/news/stories/international-bec-takedown-061118.
3.      Amazon.com, “System and Organization Controls 3 (SOC 3) Report,” AWS, March 2018. [Online]. Available:
        https://d1.awsstatic.com/whitepapers/compliance/AWS_SOC3.pdf.

The information contained in this document is solely for example purposes only and not intended to be relied on for
implementation purposes or otherwise by the reader. Adlumin hereby expressly disclaims any indication to the contrary.
Adlumin, its affiliates or subsidiaries, and a customer are only bound by the terms and conditions contained in a contract
between the parties. The Adlumin names and logos and all other names, logos, and slogans identifying Adlumin’s products
and services are trademarks and service marks or registered trademarks and service marks of Adlumin Trademark Services
LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of
their respective owners.

adlumin.com                                                                                                           page 11
You can also read