VAST: A Unified Platform for Interactive Network Forensics

 
VAST: A UNIFIED PLATFORM
FOR INTERACTIVE NETWORK
FORENSICS
 
Matthias Vallentin
 
 Vern Paxson
  
Robin Sommer
UC Berkely
 
      UC Berkely/ICSI      
 
ICSI/LBNL
 
By Roy Guillen
 
1
 
TABLE OF CONTENTS
 
Introduction
Current Solutions/Tools for Forensics
What is VATS
How does VATS work?
Questions
 
2
 
PROBLEM
 
Security Incidents are happening more frequently.
12 Large scale data breaches already in 2017 – Worst So Far (IdentityForce)
Ex. Xbox, Arby’s, Verifone, UNC Healthcare, FAFSA: IRS Data Retrieval Tool.
2016 – Record year for data breaches (Bloomberg Technology)
1093 data breaches – Costs companies 73.7 billion dollars
Ex. Yahoo, Playstation, HP, Oracle, Verizon, Department of Health, Myspace
It is estimated that it costs companies roughly 20% in revenue for a large scale breach.
(CorporateEncryption)
 
4
 
BREACH TIMELINE
 
 
5
Compromise
Forensics
 
Time
 
Detection
 
QUESTIONS THAT NEED TO BE ANSWERED
 
When a breach occurs companies want the following questions answered:
How did it happen?
Why did it happen?
How long has it been happening for?
Who is responsible for the breach?
How do we prevent this from happening again?
 
6
 
HOW DO WE ANSWER THOSE QUESTIONS?
 
Interactive data exploration
Interactive Query Refinement
High-Dimensional Search
Disparate Data access
Temporal
Spatial
 
7
WHAT IS HOLDING US BACK?
Massive data volumes
50-100k events/sec
10s TBs/day
8
 
EXISTING SOLUTIONS
 
MapReduce (Hadoop)
Scalability
Batch-oriented: no iterative, exploratory analysis
In-Memory Cluster Computing (Spark)
Efficient & Complex analysis
Thrashing when working set does not fit in aggregate memory
 
9
 
INTRODUCING VAST
 
VAST
Visibility Across Space and Time
Architecture
Performance: concurrent & modular design
Scaling: intra-machine & inter-machine
Typing: Strong and Rich
Implementation
Composition: high-level bitmap indexing framework
Adaptation: fine-grained component  flow-control
Asynchrony – finite state machines for query execution
 
10
 
KEY COMPONENTS TO VAST
 
1. Import – parses data from source into events and assigns them an unique ID
2. Archive – stores compressed events and provides a key-value interface
3. Index – to accelerate queries by keeping a partitioned secondary index
referencing events in the archive.
4. Export – spawns queries and relay them to sinks of various output formats.
(Supports JSON, ASCII, PCAP, BRO, KAFKA)
 
11
 
KEY COMPONENTS USED IN INGESTION
 
12
QUERYING IN VAST
Data model consists of types
Types define the physical interpretation of data
Values combine a type with a data instance
An event is a value with additional metadata
Ex time stamp, id, key value pair,.
Schemas describe access structure of one or more types
EX. POSTS
Utilizes Boolean Algebra to query
13
 
QUERYING WITH VAST
 
14
 
ADDITIONAL FEATURES OF VAST
 
Varying Indexes
Integral, Temporal, String, Network, Container
Caching
If hits for expression A || B exist then A && D only needs to look up D
VAST does not consume resources unless needed
Continuous Queries
Exporter subscribes to Importer and filters events matching a predefined query.
Can be used to alert operators of potential breaches
 
15
 
CONCLUSION
 
VAST provides users with many abilities to help with forensics:
Stores and Indexes vast quantities of data
Can archive an entire networks activity with high fidelity
Supports rapid queries through the use of bitmap indexing
Used in conjunction with current tools like SPARK, VAST can greatly decrease the time of
forensics after a breach.
 
16
 
QUESTIONS?
 
 
17
Slide Note
Embed
Share

"VAST is a comprehensive platform designed for interactive network forensics, addressing the increasing frequency of security incidents and large-scale data breaches. It aims to provide solutions for detecting, analyzing, and preventing breaches efficiently, with features like data exploration, query refinement, and high-dimensional search capabilities."

  • Network Forensics
  • Security Incidents
  • Data Breaches
  • Interactive Platform
  • Breach Detection

Uploaded on Sep 30, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. VAST: A UNIFIED PLATFORM FOR INTERACTIVE NETWORK FORENSICS Matthias Vallentin Vern Paxson Robin Sommer UC Berkely UC Berkely/ICSI ICSI/LBNL By Roy Guillen 1

  2. TABLE OF CONTENTS Introduction Current Solutions/Tools for Forensics What is VATS How does VATS work? Questions 2

  3. PROBLEM Security Incidents are happening more frequently. 12 Large scale data breaches already in 2017 Worst So Far (IdentityForce) Ex. Xbox, Arby s, Verifone, UNC Healthcare, FAFSA: IRS Data Retrieval Tool. 2016 Record year for data breaches (Bloomberg Technology) 1093 data breaches Costs companies 73.7 billion dollars Ex. Yahoo, Playstation, HP, Oracle, Verizon, Department of Health, Myspace It is estimated that it costs companies roughly 20% in revenue for a large scale breach. (CorporateEncryption) 4

  4. BREACH TIMELINE Detection Compromise Forensics Time 5

  5. QUESTIONS THAT NEED TO BE ANSWERED When a breach occurs companies want the following questions answered: How did it happen? Why did it happen? How long has it been happening for? Who is responsible for the breach? How do we prevent this from happening again? 6

  6. HOW DO WE ANSWER THOSE QUESTIONS? Interactive data exploration Interactive Query Refinement High-Dimensional Search Disparate Data access Temporal Spatial 7

  7. WHAT IS HOLDING US BACK? Massive data volumes 50-100k events/sec 10s TBs/day 8

  8. EXISTING SOLUTIONS MapReduce (Hadoop) Scalability Batch-oriented: no iterative, exploratory analysis In-Memory Cluster Computing (Spark) Efficient & Complex analysis Thrashing when working set does not fit in aggregate memory 9

  9. INTRODUCING VAST VAST Visibility Across Space and Time Architecture Performance: concurrent & modular design Scaling: intra-machine & inter-machine Typing: Strong and Rich Implementation Composition: high-level bitmap indexing framework Adaptation: fine-grained component flow-control Asynchrony finite state machines for query execution 10

  10. KEY COMPONENTS TO VAST 1. Import parses data from source into events and assigns them an unique ID 2. Archive stores compressed events and provides a key-value interface 3. Index to accelerate queries by keeping a partitioned secondary index referencing events in the archive. 4. Export spawns queries and relay them to sinks of various output formats. (Supports JSON, ASCII, PCAP, BRO, KAFKA) 11

  11. KEY COMPONENTS USED IN INGESTION 12

  12. QUERYING IN VAST Data model consists of types Types define the physical interpretation of data Values combine a type with a data instance An event is a value with additional metadata Ex time stamp, id, key value pair,. Schemas describe access structure of one or more types EX. POSTS Utilizes Boolean Algebra to query 13

  13. QUERYING WITH VAST 14

  14. ADDITIONAL FEATURES OF VAST Varying Indexes Integral, Temporal, String, Network, Container Caching If hits for expression A || B exist then A && D only needs to look up D VAST does not consume resources unless needed Continuous Queries Exporter subscribes to Importer and filters events matching a predefined query. Can be used to alert operators of potential breaches 15

  15. CONCLUSION VAST provides users with many abilities to help with forensics: Stores and Indexes vast quantities of data Can archive an entire networks activity with high fidelity Supports rapid queries through the use of bitmap indexing Used in conjunction with current tools like SPARK, VAST can greatly decrease the time of forensics after a breach. 16

  16. QUESTIONS? 17

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#