Page 59 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 59

As a result, rather than becoming security’s silver bullet, the “Big Rules” problem has actually rendered
            SIEM technology relatively impotent for the following reasons:

                 It’s  too  reactive  –  Human-written  rules  can  only  be  developed  against  known  threats  and
                   patterns. In other words, SIEMs can only detect attacks after the fact, causing them to miss new
                   or unknown attack sequences.
                 Too passive – SIEMs are designed for alerting, not responding. They lack the machine-based
                   incident response capabilities that can automatically contain or remediate threats in real time.
                 Too complex – Organizations are burdened with thousands of  security correlation rules that
                   consume inordinate numbers of man-hours and are simply impossible to maintain manually.
                 Too  expensive  –  SIEMs  require  massive  ongoing  investment  in  services,  technology  and
                   personnel  to  cope  with  the  “Big  Rules”  problem,  which  results  in  a  very  high  total  cost  of
                   ownership.
            Is there a way out of this mess? Will SIEM technology ever be able to deliver on its promise to make life
            easier for security professionals? The answers to these questions are yes and yes, and the key to both
            is focusing on attack intent.



            New Opportunity for SIEM Technology: Deciphering Attack Intent

            There is perhaps no better defense against today’s sophisticated cyber-criminals than first understanding
            the intent behind their attack methods, and this presents a significant opportunity for SIEM technology to
            finally right the ship that has been taking on water for years.

            For many organizations, intent classification has remained an impossible task for several reasons:

                 The “Big Rules” problem has kept security teams mired in mundane, tactical work (i.e., writing
                   and maintaining log parsers and correlation rules), leaving no time to focus on higher priority
                   tasks, such as deciphering attack intent.
                 Because  of  complex  infrastructures  and  resulting  Big  Data,  organizations  do  not  have  the
                   resources to decipher the intent of all the different events, clues and signals generated by endless
                   point tools.
                 When security analysts do have time for intent classification, they must analyze suspicious files
                   or behavior manually – a painstaking process that simply cannot keep pace with the rapid volume
                   and variety of machine-generated attacks.

            The good news is that we are seeing new approaches to intent classification automation that arm SIEM
            vendors with the features and functionality needed to automate detection, investigation, remediation and
            mitigation of both known and unknown threats, without rules or manual processes. Three notable areas
            of advancement include:

                 Artificial Intelligence (AI) and natural language processing (NLP) – One of the truest forms
                   of AI, NLP algorithms automatically collect, read and understand threat data, regardless of the
                   source (logs, intelligence feeds, research articles, etc.). Once the meaning of the terms used to
                   describe security-related threats, research results, relevant vulnerabilities, attack vectors etc., is
                   known, their appearances in new sentences will be understood without human involvement.






                                 59
   54   55   56   57   58   59   60   61   62   63   64