15
빅빅빅빅 빅빅빅빅 빅빅빅 빅빅빅빅 빅빅빅빅 빅빅빅 빅빅빅 2014. 9. 17

Log-management based on bigdata platform

Embed Size (px)

Citation preview

Page 1: Log-management based on bigdata platform

빅데이터 플랫폼을 고려한 보안관제 아키텍쳐

김도형 매니저

2014. 9. 17

Page 2: Log-management based on bigdata platform

2 /14

Agenda

1. Introduction

2. About MSS

3. MSS Requirement

4. User Experience

5. Wrap-up (Do & Don’t)

6. Q & A

Page 3: Log-management based on bigdata platform

3 /14

Biz

DEVINFRA

SECURITY

Each function should interact and be integrated in your organization.

1. Introduction > DEVOP’s

Page 4: Log-management based on bigdata platform

4 /14

1. Introduction > Example

PHP Configuration, Applica-tion Vul.

Developer, Operator, Security

Personal Information

ID/PASSWORD Attack

Hacking Technology

Page 5: Log-management based on bigdata platform

5 /14

2. About MSS > company overview

History : SK M&C(2008.4) + SK Planet(2011.10) Mission : HUG

Business Area– Digital Contents : T Store, hoppin, T Cloud, Tictoc, Cyworld, Nate, NateOn, Cymera – Integrated Commerce : 11st, Gifticon, Smart Wallet, Paypin, Styletag, T Shopping– Marketing Communication : OK Cashbag, BENEPIA– Location Based Service : T Map, picket, OK Map, NaviCall– Advertising

Affiliates : SK Communications, Commerce planet, M & Service

Page 6: Log-management based on bigdata platform

6 /14

2. About MSS > spotlighted

Page 7: Log-management based on bigdata platform

7 /14

3. MSS Requirement > Workaround

< IT Environment is changing > < Co-operation in your organization >

Page 8: Log-management based on bigdata platform

8 /14

3. MSS Requirement > Cloud Computing & Big data

BIG DATA

Velocity Diversity Volume Analytics

Mobile Web 2.0 Cloud IoT

Privacy

Legacy Security

IncidentManagement

Vague/Fear

?

Page 9: Log-management based on bigdata platform

9 /14

3. MSS Requirement > Architecture(AS-IS)

< IDC #1 > <IDC #2> <IDC #3>

SystemArchitecture

PC 보안

Malware

E-mail 보안

L7 Firewall

<OFFICE>

N-sensor (Firewall, IDS/IPS, DDOS, NTMS)

Application-sensor (WAF)

Authentication & Log-Management

Vul-MNGT(Scanner, Expoit-DB)

People&

Process예방 탐지 분석 대응 개선

침해사고 대응지원시스템

취약점 DB Feed

Web Shell 탐지

웹 변조 감시

악성코드 감시

보안사고 신고

Honey-NetLog-management

침입정보 분석시스템

Page 10: Log-management based on bigdata platform

10 /1410 /14

Firewall

Intrusion Pre-vention System

Anti-Malicious Site

New-Genera-tion Firewall

Antivirus

Traditional Security Solutions

Unable to block malware from allowed addresses

Unable to detect malware

Unable to detect malware thatneeds file-based analysis

Unable to block malware from allowed websites

Unable to detect unknown malware

New Approach

Signature based (Known)

Signature-less (Unknown)

Symptom OrientedResponder-Pro(HBGary)

Autopsy OrientedFire Eye ProtectionFile Comparison

Parity Suite(Bit9)

TrueFalse PositiveTrue NegativeFalse

Filtering & Co-relation

Event & Vulnerability

Multi-dimensional analysis

3. MSS Requirement > New approach

Ref : AhnlabCo-relation, Time series, Function Analysis

Page 11: Log-management based on bigdata platform

11 /1411 /14

The bigger eye-sight for big data analysis rather than security information & Event

Signature based (Known)

End-point(Host, Server)

Sensor(NW, Application)

Filter(NW, Application)

System log

Application log

Transaction log

Signature-less (Unknown)Blacklist Asset_Vul IntelligenceH-Base Behavior

※ 위 변조 방지∙ , 일정기간 보관 (Volume/Size), 정형 / 비정형 , Parsing/ 실시간 분석

Multi-Dimensional analysis (Version2.0)

Log-management (Time sync & conversion, normalization, forward)

Security Intelligence (Visualize & Analytics)

3. MSS Requirement > Progress Direction

< Enterprise Environment >

Security log

< MSS Technology >

FW

IDS

WAF

DDOS

Web-GW

DLP

Etc

Biz awareness

Security awareness

Page 12: Log-management based on bigdata platform

12 /1412 /14

하둡 클러스터 (HIVE)

BI

원천 데이터 서버 및 어플라이언스

File, Syslog, SNMP, NetFlow, JDBC, FTP, SFTP, JMX, JMS 등

Analy-sis

비인가 조회 불가능위변조 시도 시

무결성 확인 가능

공격자

4. User Experience

실시간 데이터 수집 및 저장– 500G 이상 / 일 , 4 만 EPS 이상

– 초당 50 만건 저장 및 Indexing– 압축 : 500G → 89G(83%) – 이중화 구성으로 로그유실 최소화

– 암호화 저장 및 해쉬값 보관

– 다양한 프로토콜 및 Parse 지원

– 에이전트 제공

외부시스템 연동 및 시각화– 다수 분석계로 로그전송

– SDK 제공 및 HDFS 데이터 적재

– BI 솔루션 ETL 수행

강력한 쿼리 및 실시간 분석– No-Sql ( 사용방법 직관적 )

Log-management in SK Planet

Page 13: Log-management based on bigdata platform

13 /1413 /14

Enterprise Architecture

- Enterprise 에 적합한 보안관제 체계 (R&R, System Integration)

Technology

- Don’t Customize ( 시스템 이해 , Partnership)

Process (Communication, Policy)

- 무조건 차단하지 말고 보고서를 쓰지 마라

- CERT 체계를 정비하고 대외 CERT 와 커뮤니케이션 하라

- 사람도 시스템도 믿지 마라 ( 프로세스를 믿고 주기적으로 평가하라 )

- 신고 , 취약점 등 모든 징후를 모두 분석하지 않는다

- 직원의 신분을 노출하지 마라 (Ranger VS Reconnaissance)

People (Mission)

- 사고를 은폐하지 말고 분석 대응하라 ∙ ( 경험과 노하우를 쌓아라 )

- 내 권한을 유지하자 (Constituency, 법적 권한 )

5. Wrap-up > Do & Don’t

Page 14: Log-management based on bigdata platform

14 /1414 /14

6. Q & A

Page 15: Log-management based on bigdata platform

15 /1415 /14

End of Document