Thursday, March 09, 2006

 

The Art of Digital War - [Part 2] Alarms in Digital Intrusion

The following table shows a set of words and its frequency. I know you must be wondering about, frequency related to what? That’s the key!

Word

Frequency


Word

Frequency


Word

Frequency

The

1101

That

389

As

228

And

878

Is

334

Be

226

To

726

Not

315

Lord

218

Of

657

This

296

He

216

I

561

His

292

What

203

You

544

But

265

So

197

My

508

With

257

Him

189

A

498

For

247

Have

179

In

414

Your

242

….

……

It

414

Me

235




The above table shows the word count from Shakespeare’s Hamlet!

If we put these words in the ‘RIGHT CONTEXT’ you will get a classic in English literature.

‘To be or not to be: that’s the question’ is a famous quote from Shakespeare's Hamlet by Prince Hamlet (of Denmark) in a self conversation mode. Other Conversations include his (Hamlet’s) conversations with The Ghost (his assassinated father), his friend Horatio, The King Claudius etc. So, the words arranged in the Right Context, create the scenarios and build the conversation with various characters (Hero, Villain, Friends, Lovers etc) which results in the complete story.

Now let us look at the current set of Intrusion Detection Systems. It generates Alarms with some severity (and lots of them are false positives) and the current breed of Enterprise Security Management software’s do some basic algorithms to do the scoring which ends up similar to the data in the following table.

Alarm

Risk Score / Priority / Event Count

Alarm 100

1101

Alarm 12931

878

Alarm 14987

726

Alarm 231

657


If you compare the two set of table it doesn’t tell you exactly the story behind those words (or Alarms). Security Analysts with their experience and intuition runs through these Alarms and creates a mental map of a potentially story. However, what matters or what the industry or the Security Analysts wants, is to put these words (Alarms/Events) in the ‘RIGHT CONTEXT!
Therefore, why don’t we look at this data set from a different point of view? i.e., instead of Security Events, Why don’t we try to see a ‘Conversation’?

For Example.
1. A financial user using his Financial Application for his routine daily job.
2. Customers accesing the Web Application
3. Inter department communications.

All these have a definitive start and end segments. However currently we look at all these transactions as events and then we do correlate based on these events.

Now why should we see events? Why can’t we see a conversation?

What is a Conversation?

A Conversation happens when a user logs into a system do certain activities and then logs off.A Conversation could be for few seconds to hours, depends upon the nature of the conversation. A Conversation could be polite or rude! So the idea is clear. A Conversation shows a set of events in itslogical order (or grouping them in its logical order).
If we look at the usual network traffic, most of raw events (Alarms generated by the security devices) can be grouped under a certain types of conversations. For Example;

1. Business Conversation
Legitimate web users or business partners accessing the Application server (Web Services).


2. Inter - Department Conversations

Understanding the applications which communicate across the department (in normal office hours)


3. Personal Conversations
Employees browsing the web pages, checking personal emails etc


4. Un-known Conversation
This type of conversations is the one which doesn’t fit into current business rules or policies.


5. Rude Conversation
An Attacker scanning a server and compromising it


6. Impolite Employee Conversation

Employees breaking the security policies


7. Harmful Robotic Conversation
Self propagating worm attack


Data doesn’t tell a story unless it is interpreted in the right way.

Comments: Post a Comment



<< Home

This page is powered by Blogger. Isn't yours?