Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence

Total Page:16

File Type:pdf, Size:1020Kb

Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence Mariano Graziano Davide Canali Leyla Bilge Eurecom Eurecom Symantec Research Labs Andrea Lanzi Davide Balzarotti Universita’ degli Studi di Milano Eurecom Abstract The main advantage of these systems is the fact that the analysis is completely automated and easily paral- Malware sandboxes are automated dynamic analysis lelizable, thus providing a way to cope with the over- systems that execute programs in a controlled environ- whelming number of new samples that are collected ev- ment. Within the large volumes of samples submitted ery day. However, due to this extreme parallelization, every day to these services, some submissions appear to an incredible amount of reports are generated every day. be different from others, and show interesting character- This makes the task of distinguishing new and important istics. For example, we observed that malware samples malware from the background noise of polymorphic and involved in famous targeted attacks – like the Regin APT uninteresting samples very challenging. framework or the recently disclosed malwares from the Equation Group – were submitted to our sandbox months In particular, two important and distinct observations or even years before they were detected in the wild. In motivate our work. First, it is relatively common that other cases, the malware developers themselves interact malware samples used to carry out famous targeted at- with public sandboxes to test their creations or to develop tacks were collected by antivirus companies or public a new evasion technique. We refer to similar cases as sandboxes long before the attacks were publicly dis- malware developments. covered [25]. For instance, the binaries responsible for operation Aurora, Red October, Regin, and even some In this paper, we propose a novel methodology to au- of the new one part of the Equation Group were sub- tomatically identify malware development cases from the mitted to the sandbox we used in our experiments sev- samples submitted to a malware analysis sandbox. The eral months before the respective attacks appeared in the results of our experiments show that, by combining dy- news [11, 40, 17, 50, 45, 35]. The reasons behind this namic and static analysis with features based on the file phenomenon are not always clear. It is possible that the submission, it is possible to achieve a good accuracy in files were automatically collected as part of an automated automatically identifying cases of malware development. network or host-based protection system. Or maybe a Our goal is to raise awareness on this problem and on the security analyst noticed something anomalous on a com- importance of looking at these samples from an intelli- puter and wanted to double-check if a suspicious file ex- gence and threat prevention point of view. hibited a potentially malicious behavior. It is even pos- sible that the malware developers themselves submitted 1 Introduction an early copy of their work to verify whether it triggered any alert on the sandbox system. Whatever the reason, Malware sandboxes are automated dynamic analysis the important point is that no one paid attention to those tools that execute samples in an isolated and instru- files until it was too late. mented environment. Security researchers use them to The second observation motivating our study is the quickly collect information about the behavior of suspi- constant arm race between the researchers that put con- cious samples, typically in terms of their execution traces tinuous effort to randomize their analysis environments, and API calls. While customized sandboxes are often and the criminals that try to fingerprint those systems installed in the premises of security companies, some to avoid being detected. As a consequence of this hid- sandboxes are available as public online services, as it is den battle, malware and packers often include evasion the case for Malwr [13], Anubis [10], ThreatExpert [14], techniques for popular sandboxes [19] and updated in- VirusTotal [16], and many others [5, 18,4,6, 15,1,3] formation about the internal sandbox details are regu- 1 larly posted on public websites [2]. These examples to make sure that a certain evasion technique works as prove that there must be a constant interaction between expected in the sandbox environment, or that a certain malware developers and popular public malware analysis malware prototype does not raise any alarm. services. This interaction is driven by the need to collect In this paper, we focus on the detection of what we call updated information as well as to make sure that new malware development. We use the term “development” malware creation would go undetected. Even though de- in a broad sense, to include anything that is submitted by tecting this interaction might be very difficult, we be- the author of the file itself. In many cases the author has lieve it would provide valuable information for malware access to the source code of the program – either because triage. she wrote it herself or because she acquired it from some- Up to the present, malware analysis services have col- one else. However, this is not always the case, e.g., when lected large volumes of data. This data has been used the author of a sample uses a builder tool to automatically both to enhance analysis techniques [23, 46] and to ex- generate a binary according to a number of optional con- trapolate trends and statistics about the evolution of mal- figurations (see Section6 for a practical example of this ware families [24]. Unfortunately, to the best of our scenario). Moreover, to keep things simple, we also use knowledge, these datasets have never been used to sys- the word “malware” as a generic term to model any sus- tematically study malware development and support mal- picious program. This definition includes traditional ma- ware intelligence on a large scale. The only public excep- licious samples, but also attack tools, packers, and small tion is a research recently conducted by looking at Virus- probes written with the only goal of exfiltrating informa- Total to track the activity of specific high-profile hacking tion about the sandbox internals. groups involved in APT campaigns [52, 27]. Our main goal is to automatically detect suspicious In this paper, we approach this objective by applying submissions that are likely related to malware develop- data-mining and machine learning techniques to study ment or to a misuse of the public sandbox. We also want the data collected by Anubis Sandbox [10], a popular to use the collected information for malware intelligence. malware dynamic analysis service. At the time we per- In this context, intelligence means a process, supported formed our analysis, the dataset contained the analysis by data analysis, that helps an analyst to infer the moti- reports for over 30 millions unique samples. Our main vation, intent, and possibly the identity of the attacker. goal is to automatically detect if miscreants submit their Our analysis consists of five different phases. In the samples during the malware development phase and, if first phase, we filter out the samples that are not inter- this is the case, to acquire more insights about the dy- esting for our analysis. Since the rest of the analysis is namics of malware development. By analyzing the meta- quite time-consuming, any sample that cannot be related data associated to the sample submissions, it might be to malware development or that we cannot process with possible to determine the software provenance and im- our current prototype is discarded at this phase. In the plement an early-warning system to flag suspicious sub- second phase, we cluster the remaining samples based mission behaviors. on their binary similarity. Samples in each cluster are It is important to understand that our objective is not then compared using a more fine-grained static analysis to develop a full-fledged system, but instead to explore a technique. Afterwards, we collect six sets of features, new direction and to show that by combining metadata based respectively on static characteristics of the submit- with static and dynamic features it is possible to suc- ted files, on the results of the dynamic execution of the cessfully detect many examples of malware development samples in the cluster, and on the metadata associated to submitted to public sandboxes. In fact, our simple pro- the samples submissions. This features are finally pro- totype was able to automatically identify thousands of vided to a classifier that we previously trained to identify development cases, including botnets, keyloggers, back- the malware development clusters. doors, and over a thousand unique trojan applications. 3 Data reduction 2 Overview and Terminology The first phase of our study has the objective of reducing There are several reasons why criminals may want to in- the amount of data by filtering out all the samples that teract with an online malware sandbox. It could be just are not relevant for our analysis. We assume that a cer- for curiosity, in order to better understand the analysis tain file could be a candidate for malware development environment and estimate its capabilities. Another rea- only if two conditions are met. First, the sample must son could be to try to escape from the sandbox isolation have been submitted to the public sandbox before it was to perform some malicious activity, such as scanning a observed in the wild. Second, it has to be part of a man- network or attacking another machine. Finally, criminals ual submission done by an individual user – and not, for may also want to submit samples for testing purposes, example, originating from a batch submission of a secu- 2 rity company or from an automated malware collection Dataset Submissions or protection system.
Recommended publications
  • VYSOKÁ ŠKOLA POLYTECHNICKÁ JIHLAVA Katedra Technických Studií
    VYSOKÁ ŠKOLA POLYTECHNICKÁ JIHLAVA Katedra technických studií Návrh bezpečnostní politiky filtrování webového provozu ve školním prostředí bakalářská práce Autor práce: Radek Kudrna Vedoucí práce: Mgr. Antonín Přibyl Jihlava 2020 ZADÁNÍ BAKALÁŘSKÉ PRÁCE Autor práce: Radek Kudrna Studijní program: Elektrotechnika a informatika Obor: Aplikovaná informatika Název práce: Návrh bezpečnostní politiky filtrování webového provozu ve školním prostředí Cíl práce: V teoretické části diskutujte návrh bezpečného přístupu k Internetu pro žáky škol včetně návrhu monitoringu přístupů, na druhou stranu je potřeba zvážit politiku nefiltrovaného přístupu k Internetu. Diskutujte právní fakt nemožnosti delegace právní odpovědnosti na nezletilé žáky, která souvisí s provozem školních (bezdrátových) sítí. V praktické části bude provedeno nasazení Kerio Control s Active Directory pro filtrování provozu na MŠ a ZŠ Brtnice. Mgr. Antonín Přibyl doc. Ing. Zdeněk Horák, Ph.D. vedoucí bakalářské práce vedoucí katedry Katedra technických studií Abstrakt Tato bakalářská práce se zabývá problémem přístupu k internetu pro školy, zejména pro základní školy. Při nefiltrovaném obsahu jsou nezletilí žáci vystaveni určitým rizikům. Jedná se především o přístup na stránky se závadným obsahem, možností stát se kybernetickou obětí, nebo k samotné možnosti páchání trestné činnosti přes školní internet. Pro zamezení těchto činností je nutnost zavést určitou bezpečnostní politiku v podobě filtrování webových stránek. Právě jednotlivé možnosti blokování stránek jsou v práci popsány. Součástí je i ukázka a popis řešení v nástroji Kerio Control, který je nasazen na filtrování provozu na základní a mateřské škole Brtnice. Klíčová slova filtrování provozu; Kerio Control; monitoring; nezletilí žáci; webový filtr Abstract This bachelor thesis deals with the problem of Internet access for schools, especially for primary schools.
    [Show full text]
  • Comodo Internet Security Essentials User Guide | © 2018 Comodo Security Solutions Inc
    Comodo Internet Security Essentials Software Version 1.3 User Guide Guide Version 1.3.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Internet Security Essentials- User Guide Table of Contents Comodo Internet Security Essentials.......................................................................................................................................... 3 What is Comodo Internet Security Essentials?.......................................................................................................................... 3 How do I install Comodo Internet Security Essentials?.............................................................................................................4 What is a man-in-the-middle attack?......................................................................................................................................... 6 How does Comodo Internet Security Essentials protect me from a man-in-the-middle attack?................................................7 What is the install location of Comodo Internet Security Essentials?........................................................................................8 How do I update CISE?............................................................................................................................................................. 8 Understanding alerts and configuring exceptions....................................................................................................................14
    [Show full text]
  • Comodo Internet Security Quick Start Guide | © 2020 Comodo Security Solutions Inc
    Comodo Internet Security Software Version 12.2 Quick Start Guide Guide Version 12.2.050520 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Internet Security - Quick Start Guide Comodo Internet Security - Quick Start Guide This tutorial explains how to use Comodo Internet Security (CIS). Please use the following links to go straight to the section that you need help with: • Installation • The main interface • Scan and clean your computer • Run an instant antivirus scan on selected items • Set up the Firewall for maximum security and usability • Set up HIPS for maximum security and usability • Run untrusted programs in the container • Browse the internet and run untrusted programs inside the Virtual Desktop • Renew or upgrade licenses • More Help Installation • If you haven't done so already, please download the CIS setup file from https://www.comodo.com/home/internet-security/security-software.php • Before beginning installation, please ensure you have uninstalled any other antivirus and firewall products that are on your computer. More specifically, remove any other products of the same type as those Comodo products you plan to install. • Double click the CIS setup file to start the installation wizard. • Click 'Options' if you wish to configure advanced options. • After finishing the wizard, CIS runs an initial scan • You will be asked to choose your type of internet connection • On completion of scanning, the scan results are shown. You can choose the action to be taken on the threats found, if any. • You need to reboot your computer to complete installation. A more detailed description of the options available during installation can be found in the installation guide at https://help.comodo.com/topic-72-1-772-9552-CIS-Installation.html The Main Interface The CIS interface is designed to be as clean and informative as possible while letting you carry out tasks with the minimum of fuss.
    [Show full text]
  • Mind Your Own Business: a Longitudinal Study of Threats and Vulnerabilities in Enterprises
    Mind your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises Abstract—Enterprises own a significant fraction of the hosts to, financial assets, and security investment. Thus, it is very connected to the Internet and possess valuable assets, such as likely that the best practices mentioned above do not equally financial data and intellectual property, which may be targeted apply to all of them. by attackers. They suffer attacks that exploit unpatched hosts and install malware, resulting in breaches that may cost millions Currently, it is not clear how the security posture of in damages. Despite the scale of this phenomenon, the threat and enterprises differ according to different factors and whether vulnerability landscape of enterprises remains under-studied. The enterprises are indeed more secure than consumer hosts, i.e., security posture of enterprises remains unclear, and it’s unknown if their security investment is paying off. In this paper, we aim whether enterprises are indeed more secure than consumer hosts. to throw light into these questions by conducting a large-scale To address these questions, we perform the largest and longest longitudinal measurement study of enterprise security. We an- enterprise security study up to date. Our data covers nearly alyze the enterprise threat landscape including the prevalence 3 years and is collected from 28K enterprises, belonging to 67 industries, which own 82M hosts and 73M public-facing servers. of malware and PUP in enterprise hosts and how common security practices, such as vulnerability patching and operating Our measurements comprise of two parts: an analysis of system updates are handled.
    [Show full text]
  • Mcafee Epolicy Orchestrator DATA SHEET
    DATA SHEET McAfee ePolicy Orchestrator Centrally get, visualize, share, and act on security insights Security management requires cumbersome juggling between tools and data. This puts the adversary at an advantage by offering more time to exploit the gap not seen between the tools and do damage. In addition, the cybersecurity workforce is limited and needs to be empowered to manage cybersecurity complexity. The McAfee® ePolicy Orchestrator® (McAfee ePO™) management platform removes the time-consuming and potential human error effort and inspires those responsible to manage security quicker and with higher efficacy. Fundamental Security Proven Advanced Security Management Start with the fundamentals. Core to any security More than 30,000 businesses and organizations trust architecture is the ability to monitor and control the the McAfee ePO console to manage security, streamline health of endpoints and systems. Industry standards and automate compliance processes, and increase such as Center for Internet Security (CIS) Controls and overall visibility across endpoint, network, and security National Institute of Standards Technology (NIST) SP operations. Big companies rely on the McAfee ePO 800 153 security and privacy controls call this out as console’s highly scalable architecture, allowing large a must. The McAfee ePO console allows you to gain enterprises to manage hundreds and thousands of critical visibility and set and automatically enforce nodes from a single console. The McAfee ePO console policies to ensure a healthy security posture across provides an enterprise security administrator with the your enterprise. Policy management and enforcement opportunity to simplify policy maintenance, pull in third- across security products for your entire enterprise party threat intelligence leveraging Data Exchange Layer is accomplished from a single console, removing the (DXL), and integrate policies bi-directionally with an array complexity of managing multiple products.
    [Show full text]
  • A Large-Scale Empirical Study on Industrial Fake Apps
    A Large-Scale Empirical Study on Industrial Fake Apps Chongbin Tang∗, Sen Chen∗, Lingling Fan∗, Lihua Xuy, Yang Liuz, Zhushou Tangx, Liang Dou∗ ∗East China Normal University, China yNew York University Shanghai, China zNanyang Technological University, Singapore xPwnzen Infotech Inc., China Abstract—While there have been various studies towards of app searching and downloading is greatly affected by the Android apps and their development, there is limited discussion fake apps in real world. of the broader class of apps that fall in the fake area. Fake Even worse, as the doorsill to develop an app has been set apps and their development are distinct from official apps and belong to the mobile underground industry. Due to the lack of low, the cost to develop a fake app is much lower than what it knowledge of the mobile underground industry, fake apps, their takes to develop a desktop program, providing an ideal hotbed ecosystem and nature still remain in mystery. for the underground industry to thrive on [3]. Moreover, the To fill the blank, we conduct the first systematic and com- flexibility of Android app implementation [4] contributes the prehensive empirical study on a large-scale set of fake apps. fake apps’ complexity. Over 150,000 samples related to the top 50 popular apps are collected for extensive measurement. In this paper, we present Despite the ubiquity, little is known about fake apps and discoveries from three different perspectives, namely fake sample their ecosystem – their common characteristics, the number characteristics, quantitative study on fake samples and fake au- of fake apps at large, their production process and speed, thors’ developing trend.
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Printmgr File
    ˆ200F$l2ZLVgqon1gÈŠ 200F$l2ZLVgqon1g¨ VDI-W7-PR3-1248 SYMANTEC CORPORATION Donnelley Financial12.6.30 EGV yanns0ap24-May-2018 22:26 EST 594139 TX 1 2* SYMANTEC CORP PAL HTM ESS 0C Page 1 of 1 UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM SD SPECIALIZED DISCLOSURE REPORT Symantec Corporation (Exact Name of Registrant as Specified in its Charter) Delaware 000-17781 77-0181864 (State or other jurisdiction of (Commission (IRS Employer incorporation or organization ) File Number) Identification No.) 350 Ellis Street, Mountain View, California 94043 (Address of Principal Executive Offices) (Zip Code) Nicholas R. Noviello, Executive Vice President and Chief Financial Officer (650) 527-8000 (Name and telephone number, including area code, of the person to contact in connection with this report.) Not Applicable (Former Name or Former Address, if Changed Since Last Report) Check the appropriate box below to indicate the rule pursuant to which this form is being filed, and provide the period to which the information in this form applies: Rule 13p-1 under the Securities Exchange Act (17 CFR 240.13p-1) for the reporting period January 1 to December 31, 2017 ˆ200F$l2ZLVhV$Vk6$Š 200F$l2ZLVhV$Vk6$ VDI-W7-PFL-0639 SYMANTEC CORPORATION Donnelley Financial12.6.29 EGV ahern0ap24-May-2018 23:14 EST 594139 TX 2 3* SYMANTEC CORP PAL HTM ESS 0C Page 1 of 1 Item 1.01. Conflict Minerals Disclosure and Report. Conflict Minerals Disclosure A copy of the Conflict Minerals Report of Symantec Corporation (“Symantec”) for the reporting period January 1 to December 31, 2017 is filed as Exhibit 1.01 to this specialized disclosure report on Form SD and is also available at Symantec’s website at https://www.symantec.com/about/corporate-responsibility/resources/corporate-responsibility-policies .
    [Show full text]
  • Q3 Consumer Endpoint Protection Jul-Sep 2020
    HOME ANTI- MALWARE PROTECTION JUL - SEP 2020 selabs.uk [email protected] @SELabsUK www.facebook.com/selabsuk blog.selabs.uk SE Labs tested a variety of anti-malware (aka ‘anti-virus’; aka ‘endpoint security’) products from a range of well-known vendors in an effort to judge which were the most effective. Each product was exposed to the same threats, which were a mixture of targeted attacks using well-established techniques and public email and web-based threats that were found to be live on the internet at the time of the test. The results indicate how effectively the products were at detecting and/or protecting against those threats in real time. 2 Home Anti-Malware Protection July - September 2020 MANAGEMENT Chief Executive Officer Simon Edwards CONTENTS Chief Operations Officer Marc Briggs Chief Human Resources Officer Magdalena Jurenko Chief Technical Officer Stefan Dumitrascu Introduction 04 TEstING TEAM Executive Summary 05 Nikki Albesa Zaynab Bawa 1. Total Accuracy Ratings 06 Thomas Bean Solandra Brewster Home Anti-Malware Protection Awards 07 Liam Fisher Gia Gorbold Joseph Pike 2. Threat Responses 08 Dave Togneri Jake Warren 3. Protection Ratings 10 Stephen Withey 4. Protection Scores 12 IT SUPPORT Danny King-Smith 5. Protection Details 13 Chris Short 6. Legitimate Software Ratings 14 PUBLICatION Sara Claridge 6.1 Interaction Ratings 15 Colin Mackleworth 6.2 Prevalence Ratings 16 Website selabs.uk Twitter @SELabsUK 6.3 Accuracy Ratings 16 Email [email protected] Facebook www.facebook.com/selabsuk 6.4 Distribution of Impact Categories 17 Blog blog.selabs.uk Phone +44 (0)203 875 5000 7.
    [Show full text]
  • Consumer Security Products Performance Benchmarks (Edition 2) Antivirus & Internet Security Windows 10
    Consumer Security Products Performance Benchmarks (Edition 2) Antivirus & Internet Security Windows 10 January 2020 Document: Consumer Security Products Performance Benchmarks (Edition 2) Authors: J. Han, D. Wren Company: PassMark Software Date: 13 January 2020 Edition: 2 File: Consumer_Security_Products_Performance_Benchmarks_2020_Ed_2.docx Consumer Security Performance Benchmarks 2019 PassMark Software Table of Contents TABLE OF CONTENTS ......................................................................................................................................... 2 REVISION HISTORY ............................................................................................................................................ 3 REFERENCES ...................................................................................................................................................... 3 EXECUTIVE SUMMARY ...................................................................................................................................... 4 OVERALL SCORE ................................................................................................................................................ 5 PRODUCTS AND VERSIONS ............................................................................................................................... 6 PERFORMANCE METRICS SUMMARY ................................................................................................................ 7 TEST RESULTS ................................................................................................................................................
    [Show full text]
  • RECOMMENDED MERGER of AVAST PLC with NORTONLIFELOCK INC
    NOT FOR RELEASE, PUBLICATION OR DISTRIBUTION, IN WHOLE OR IN PART, DIRECTLY OR INDIRECTLY, IN, INTO OR FROM ANY JURISDICTION WHERE TO DO SO WOULD CONSTITUTE A VIOLATION OF THE RELEVANT LAWS OR REGULATIONS OF SUCH JURISDICTION FOR IMMEDIATE RELEASE THIS ANNOUNCEMENT CONTAINS INSIDE INFORMATION 10 August 2021 RECOMMENDED MERGER of AVAST PLC with NORTONLIFELOCK INC. to be effected by means of a Scheme of Arrangement under Part 26 of the Companies Act 2006 Summary Further to the announcements made by NortonLifeLock Inc. (“NortonLifeLock”) and Avast plc (“Avast” or the “Company”) on 14 July 2021, the boards of NortonLifeLock and Avast are pleased to announce that they have reached agreement on the terms of a recommended merger of Avast with NortonLifeLock, in the form of a recommended offer by Nitro Bidco Limited (“Bidco”), a wholly- owned subsidiary of NortonLifeLock, for the entire issued and to be issued ordinary share capital of the Company (the “Merger”). It is intended that the Merger will be effected by means of a Court- sanctioned scheme of arrangement under Part 26 of the Companies Act (the “Scheme”). The boards of NortonLifeLock and Avast believe the Merger has compelling strategic logic and represents an attractive opportunity to create a new, industry leading consumer Cyber Safety business, leveraging the established brands, technical expertise and innovation of both groups to deliver substantial benefits to consumers, shareholders and other stakeholders. Under the terms of the Merger, Avast Shareholders will be entitled to receive: for each Avast Share held: USD 7.61 in cash and 0.0302 of a New NortonLifeLock Share in respect of their entire holding of Avast Shares (the “Majority Cash Option”).
    [Show full text]
  • Ten Strategies of a World-Class Cybersecurity Operations Center Conveys MITRE’S Expertise on Accumulated Expertise on Enterprise-Grade Computer Network Defense
    Bleed rule--remove from file Bleed rule--remove from file MITRE’s accumulated Ten Strategies of a World-Class Cybersecurity Operations Center conveys MITRE’s expertise on accumulated expertise on enterprise-grade computer network defense. It covers ten key qualities enterprise- grade of leading Cybersecurity Operations Centers (CSOCs), ranging from their structure and organization, computer MITRE network to processes that best enable effective and efficient operations, to approaches that extract maximum defense Ten Strategies of a World-Class value from CSOC technology investments. This book offers perspective and context for key decision Cybersecurity Operations Center points in structuring a CSOC and shows how to: • Find the right size and structure for the CSOC team Cybersecurity Operations Center a World-Class of Strategies Ten The MITRE Corporation is • Achieve effective placement within a larger organization that a not-for-profit organization enables CSOC operations that operates federally funded • Attract, retain, and grow the right staff and skills research and development • Prepare the CSOC team, technologies, and processes for agile, centers (FFRDCs). FFRDCs threat-based response are unique organizations that • Architect for large-scale data collection and analysis with a assist the U.S. government with limited budget scientific research and analysis, • Prioritize sensor placement and data feed choices across development and acquisition, enteprise systems, enclaves, networks, and perimeters and systems engineering and integration. We’re proud to have If you manage, work in, or are standing up a CSOC, this book is for you. served the public interest for It is also available on MITRE’s website, www.mitre.org. more than 50 years.
    [Show full text]