BACKGROUND IMAGE: Baks/iStock

E-Handbook:

Security analysis principles and techniques for IT pros

Get started Bring yourself up to speed with our introductory content.

Tactics for security threat analysis tools and better protection

Threat analysis tools need to be in top form to counter a deluge of deadly security issues. Here are tips for getting the most from your analytics tool.

At its core, security threat analysis is all about using mathematical and scientific principles to find threats...

in huge data sets. When threats were largely static and long-lived, organizations could rely on simple signature-based techniques to find them. But threats are now dynamic and short-lived, so organizations are forced to switch to finding anomalies and determining their significance. The enormous increase in the volume of security data sets has also necessitated heavy reliance on automation. The intersection of these two -- anomaly detection and automated analysis of huge data sets -- is where security threat analysis now resides.

Each security analytics platform or service uses math and science techniques to detect known and unknown threats. Here are some tips for ensuring you get the most out of the security analytics tool you're using.

Combine security threat analysis techniques

Combining analytical techniques improves results because each technique finds certain types of anomalies differently than others.  You should use a security analytics platform or service that supports a variety of techniques and uses each one for the right reasons. For example, many techniques are statistics-based; these are generally best at finding simple anomalies -- such as a sudden, massive increase in network activity between an internal database server and an external host.

Other security threat analysis techniques use machine learning, which is a form of data science that enables computers to make decisions without having explicit instructions for how to make them. Machine learning employs statistical techniques and computer algorithms to make models of benign and malicious activity and then refines those models based on new information. Machine learning is great at defining patterns of activity and identifying future activity that matches those patterns. So, for example, if security analytics uses machine learning to identify a certain type of malware infection, it can use that pattern to find new malware infections.

Provide access to context information

Finding anomalies in a large data set is generally easy; finding the most important anomalies in a large security data set is incredibly challenging. Security analytics can't work well unless it determines the significance of each event with context. It must have up-to-date context information on every user, device, app, data set and other logical entity in the enterprise. For example, consider users. Just knowing each user's basic role could affect which behaviors are deemed suspicious. Other valuable sources of context include threat intelligence feeds and reputation services, which indicate the likely intent of external IP addresses, domains and websites.

Context enables security threat analysis to better differentiate benign anomalies from malicious ones, which reduces false positives and negatives. Context also helps estimate the relative importance of each malicious anomaly so responses can be prioritized. Make sure that your security analytics platform or service has access at all times to the latest internal and external context information.

Assist people with manual analysis

Although security threat analysis is intended to automate as much of threat identification and prioritization as possible, people often need to do their own analysis. Security analytics platforms and services can facilitate this by providing data visualization capabilities. Data visualization goes far beyond having a console for viewing information on anomalies. For example, data visualization should use advanced graphing techniques that help to highlight anomalies that might otherwise go unnoticed. These graphing techniques, in effect, are another form of security analytics. A strong security analytics platform or service will use a variety of graphing techniques and determine which ones are most helpful in each situation.

Next Steps

Two steps to using cloud and making security monitoring continuous

Hungry for more? Read our guide to selecting security analytics tools

Fighting back against ransomware attacks: Detection, prevention, recovery

This was last published in July 2017

Dig Deeper on SIEM, log management and big data security analytics

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Which of the security tactics suggested here do you think will be most -- or least -- effective for your company, and why?
Cancel
I couldn’t believe it at first as well, we were struck by WannaCry too… luckily, we were very much ready for this kind of scenario after some unpleasant incidents we had in the past. For this reason alone we had software installed so it called it a day, and it is a machine learning based technology. I really do believe old technologies such as signature based are wicker and not prepared for contemporary threats.
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close