Rapid Detection Is Key To Cyber Attacks On Business

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems.

A strategy some large businesses have developed over the past two years has been to quickly identify and isolate these attacks, possibly by shutting down part of a system or network so the hackers won't get days or weeks to root around and grab sensitive corporate data.

This enterprise focus on rapid detection and response to various attacks on networks and computers doesn't replace conventional security tools to prevent attacks. Instead, businesses are relying on both prevention software and detection software.

What's happened most recently is that security software vendors are developing means to evaluate attacks with advanced analytics. That analysis can be fed back into existing prevention systems to help thwart future attacks. Detection becomes part of a security cycle, at least in theory.

"There's a big focus on rapid detection and response in enterprises because prevention often misses the intrusions and malicious activities," said Gartner analyst Avivah Litan in an interview. The focus started in earnest about two years ago following a big increase in data breaches at US retailers, restaurants and hospitals.

"Security officials woke up and realized with $80 billion spent [in 2014] on prevention, a lot of attacks were getting through," Litan said. The main intent is to find attacks early "so that attackers won't get in and sit around for six months and silently steal information, as most attackers do."

James Moar, an analyst at Juniper Research, said the modern state of cybersecurity has evolved. "There is no longer a reliable network perimeter than can be guarded, but rather a series of risks that have to be mitigated or exposed," he said in an email. "In order to protect and secure such an environment, anomaly detection tools are the first step in determining if an attack is underway."

How Detection Helps

What typically happens when an attack is detected is that security managers will isolate it, often by confining the malware or other threat to a portion of a corporate network where, as few endpoints (servers and computers) as possible, can be attacked. For a large company, a network could be comprised of a number of combined smaller networks that can be arranged in a topology that allows many vital business functions to continue even when one portion is shut down.

"Folks in security management are doing a lot more segmenting of their networks these days, so that if they detect something major, they can shut off a portion," said IDC analyst Robert Ayoub, in an interview.

An old deception approach, called a honey pot, is coming back into vogue in networks inside some security groups, he said. "Research organisations and some managed service providers will try to lure [attackers] in to see what attacks are being used. We have seen a lot of renewed interest in deception technology, although there's not yet mainstream adoption."

Computer scientists at Penn State University described a decoy network approach to help deflect a hacker's hits. The researchers created a computer defense system that senses possible malicious probes of the network. Then, attacks were redirected with a network device called a reflector to a virtual network which contained only hints of the real network. The researchers simulated the attack and the defense without using an actual network but plan to deploy it in an actual network.
Detection software usually works by digging up anomalous behaviors. The most evolved detection systems work from a baseline of normal activity on a network or server, computer or other, endpoint device, Litan said.

A profile of normal behaviors by users, the amount and type of data transmitted in a system and other network activity are constantly compared with ongoing transactions using advanced analytics, she said.

"These approaches might even look at a user's activity relative to his colleagues to see if he's doing something unusual," she said. Recently, some security vendors have begun using machine learning to bolster the analytics.

Here's one example of how detection analytics might work: A procurement request made at 3 a.m. in Singapore by an employee based in London could be flagged as questionable. But the security system could check a corporate travel app and see that the employee had a flight and hotel booked in Singapore and then approve the procurement.

Or, a totally different result might occur, depending on corporate policies, such as requiring a manager's approval for the procurement.

Detection Products

Detection products are abundant and are being updated with the newest technology by nearly every security vendor, analysts said. "There are well over a hundred vendors in this space, including all the major names like McAfee, Cisco and Symantec, down to newer ones like Phantom," Ayoub said.

These products are deployed in the U.S. mainly by large banks, retailers, technology and defense-related companies, Litan said. Small and mid-tier companies have the option of hiring a managed service provider to provide detection services as part of a larger package of security products. Such service providers include large telecommunications companies, but also smaller cybersecurity firms like Cybereason and Crowdstrike, among others.

Gartner divides the detection technologies used by enterprises into three relatively new markets that incorporate advanced analytics. Endpoint [threat] detection and response (EDR) was more than a $600 million market in the U.S. in 2016. User and entity behavior analytics (UEBA) was a $100 million market last year. Network traffic analysis (NTA) is a third new area, but Gartner didn't provide an estimate for the size of that market.

These newer detection markets can be compared to a much larger but older detection technology market called security information and event management (SIEM), which Gartner said reached about $1.6 billion in US revenues in 2016. The major distinction between SIEM and the newer technologies is that SIEM is rules based, while newer detection systems rely on advanced analytics which typically, but not always, include machine learning software, Litan said.

Advice to Security Teams

A combination of newer detection tools with older prevention tools is how large enterprises are typically addressing their security needs.

"With security, there's always room for improvement, and you'll never solve all security problems," Litan said. "You can't only have prevention. You have to have detection, but there's no silver bullet."

Jack Gold, an analyst at J. Gold Associates, agreed. "It's not really one or the other," Gold said. "If you can find a hack quickly and shut it down, then you've essentially prevented a breach. The best approach is one that's layered with both prevent and detect. Just to have one or the other isn't as secure as deploying both. Many vendors are moving in that direction as well."

Juniper's Moar said it is "vital" for enterprises to have a detection tool that works well with their prevention and mediation software.

"Having a tool that shows threats is useless if you can't counter those threats," Moar said. "Software that seeks out new connections on the company network, making them visible to security detection and remediation, eliminates this problem."
Before a company buys detection products, Litan said there are a series simple steps that can be taken to tighten up systems. That includes what may seem obvious: remove administrator privileges from end user accounts so that malware can't be distributed throughout a system.

"There's a lot you can do before spending more on detection as you wait for vendors to get smarter. My main piece of advice is you make sure you work closely with the vendors and make sure you have their current version," Litan said.
Litan said vendors are working on developing automated detection tools that may eventually reduce a company's heavy reliance on security analysts to track attacks.

Even so, Ayoub said security remains an ever-expanding field that will continue to rely on people power. "If a security event happens, a company will start collecting data around it, which still requires certain skill sets that aren't generally available. We still need security analysts to track this stuff down."

Computerworld

You Might Also Read:

Directors Report January 2017. Cyber Security Checklist For Management (£):

Technology Can Not Diminish Insider Threats By Itself:

Four Steps To Managing Cyber Security Better:

 

« Just Who Are Russia's Cyber Warriors?
Systemic Cyber Attacks Most Likely In Finance & Energy Industries »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clusit

Clusit

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

Ubiq Security

Ubiq Security

Ubiq has developed a software solution that secures any type of data, on any device, anywhere, with nearly no impact to system performance or user experience.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

Northcross Group (NCG)

Northcross Group (NCG)

NCG provides services to help organizations meet the challenges of regulatory compliance. Our services include support, consultation, tools and accelerators for all parts of an organization.

Patriot Cyber Defense

Patriot Cyber Defense

Patriot Cyber Defense is a Cyber Security and Management Consulting professional services firm.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

Argentra

Argentra

Argentra is a specialist engineering company, we have years of experience developing custom security software and providing security risk consulting.

ImmuneBytes

ImmuneBytes

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.

Virtual IT Group (VITG)

Virtual IT Group (VITG)

VITG is a cyber security-focused Managed Service Provider (MSP).