Note: this blog is a mirror of my HP Labs Blog, on the same topic, accessible at: http://h30507.www3.hp.com/t5/Research-on-Security-and/bg-p/163

Sunday, July 28, 2013

Big Data for Security: On Using DNS Logs for Security Threat Detection


I am particularly interested in the area resulting from the intersection of the following topics: big data for security, big data analytics, distributed programming and data analysis solutions, security and cloud.

 

In particular I am interested in public case studies, business cases and trials involving the usage of (large amounts of) DNS data to detect new security threats and issues.

 

Here are some key related work and approaches:

·         EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis;

·         Large scale DNS analysis





·         DNS-based Detection of Scanning Worms in an Enterprise Network



  

--- Posted by Marco Casassa Mont (here and here)  ---

--- NOTE:  use this mirror blog if you prefer posting on an external blog site  ---

--- NOTE:  my original HP blog can be found here  ---

My Updated Work and Personal Web Sites


I recently updated my personal and HP Labs web sites with news, deliverables and achievements, in the space of Security, Cloud and Big Data:

·         My HP Labs Web Page

·         My Personal Web Page

 

--- Posted by Marco Casassa Mont (here and here)  ---

--- NOTE:  use this mirror blog if you prefer posting on an external blog site  ---

--- NOTE:  my original HP blog can be found here  ---

My Tweets of the Week (22-26 July 2013)


My tweets of the week (22-26 July 2013) at https://twitter.com/MCasassaMont:

 


·         Three different roads to the 3-nanometer chip - theregister.co.uk/2013/07/25/pro #in

·         With big data comes big responsibility - ft.com/cms/s/0/1c3e27 #in

·         “Big Data” Is Not “Big Data” Unless It Gives You Actionable Insight - searchengineland.com/big-data-is-no #in


·         Researchers spot new breed of infected Android apps in the wild - infoworld.com/t/android/rese #in

·         Graph analysis will make big data even bigger - infoworld.com/d/big-data/gra #in

·         CFOs Ignore Big Data at Their Peril - online.wsj.com/article/SB1000 #in

·         Competing businesses encouraged to share incident data as the attackers do - scmagazineuk.com/competing-busi #in

·         FTSE 350 companies demonstrate very poor security manners - scmagazineuk.com/ftse-350-compa #in

·         Stop 80 percent of malicious attacks now - infoworld.com/d/security/sto #in

·         SDN 101: Software-defined networking explained in 10 easy steps - infoworld.com/slideshow/1117 #in

·         Big Data Security Analytics: It Takes a Village - networkworld.com/community/node #in

·         Software employment rises 45% in 10 years, as angst in engineering grows - computerworld.com/s/article/9240 #in

·         Happy birthday, OpenStack! Now change - networkworld.com/news/2013/0722 #in

·         True tales of (mostly) white-hat hacking - infoworld.com/d/security/tru #in

·         Five Roles You Need on Your Big Data Team - blogs.hbr.org/cs/2013/07/fiv #in

·         SIM card DES flaw could affect up to 500 million users - scmagazineuk.com #in

·         Are we in an enterprise startup bubble? - infoworld.com/t/startups/are #in

 

--- Posted by Marco Casassa Mont (here and here)  ---

--- NOTE:  use this mirror blog if you prefer posting on an external blog site  ---

--- NOTE:  my original HP blog can be found here  ---

 

Friday, July 19, 2013

On Big Data for Security


I am currently focusing my R&D work in the space of “Big Data for Security”.

This is a fascinating area and, currently, a green field.

 

How to effectively leverage huge amount of collected IT information (ranging from IT logs to application and service information as well as external intelligence)  to identify new security threats, issues and provide valuable information to organisations to mitigate current and foreseeable risks?

 

HP already has core assets in the security and “Big Data” space: HP ArcSight suite (SIEM solution for event logging, storage and correlation); HP Vertica (highly parallelised, columnar database solution for storage and analytics of structured big data) and HP Autonomy (storage, indexing and retrieval of massive amount of unstructured data).

 

I am currently exploring how these capabilities could be fully leveraged in the context of big data for security, in particular in a few security verticals and types of critical security data. In addition, I am interested in exploring how the massive amount of required computation and analytics can be performed by adopting innovative solutions in the cloud (private and hybrid cloud).

 

I am looking for public use cases, case studies and requirements in this space, in particular for analytics based on big security data and anecdotes on how “big data” has been helping to address security issues.

 

 

--- Posted by Marco Casassa Mont (here and here)  ---

--- NOTE:  use this mirror blog if you prefer posting on an external blog site  ---

--- NOTE:  my original HP blog can be found here  ---

 

HP Labs Research


HP Labs has updated its Research web page, providing an overview of its 5 key research focus areas. More information is available here.

 

--- Posted by Marco Casassa Mont (here and here)  ---

--- NOTE:  use this mirror blog if you prefer posting on an external blog site  ---

--- NOTE:  my original HP blog can be found here  ---

On HP Moonshot Server Solutions


Recently HP launched the HP Moonshoot server solutions.

An interesting video titled “Meet the Innovators behind HP Moonshoot” is available online, here.

 

--- Posted by Marco Casassa Mont (here and here)  ---

--- NOTE:  use this mirror blog if you prefer posting on an external blog site  ---

--- NOTE:  my original HP blog can be found here  ---