Will the real Advanced Threat technology please stand up?

August 12, 2015 Sam Curry

A concept image of a magnifying glass with a wooden handle on a textured white surface showing the word authentic but magnifying the word fake resembling counterfeitting

In my previous blog post, I concluded that infrastructure breach was inevitable due to a fundamentally intelligent, Human opponent; and that the real mission for security until such time as we create true artificial intelligence is to prevent information breaches.  The goal as I summarized it was not to create another generation of technology that got trapped in the inevitable content race of any purely technology play but rather to enable Defenders to stand up and win the race against attacks over-and-over again.  This begs the question of what’s needed to support this team of people and ultimately what does an “Advanced Threat” technology actually look like.

Let’s start with support for the Humans in the fight to protect information.  To do that, I will draw on a simple analogy: a child learning to write.  When a child learns to write, there is a tremendous amount of frustration.  The mechanical skills of writing get pulled to the front before anything else.  The knuckles go white.  The sweat breaks out, and torturous letters slowly appear on a page.  At this rate, it’s impossible even when assuming excellent language skills for a child to write a long, insightful dissertation.  The same is true of an adult learning to type late.  The reason for this is that all the energy of the potential writer is going into how to write rather than into what is being written.

The mistake here is to think of this as merely subtractive from the time available to write.  It doesn’t just make the task longer; it makes the task utterly impossible.  It doesn’t matter how much time you give our hypothetical child or adult; until they master the tools, they won’t advance the object to which it is applied.

For too long, this has been the single biggest obstacle to security departments.  Right off the bat, we have to have the means for security practitioners to apply their knowledge to their craft without focusing on how they do this.  The tools for working events and incidents, for collaboration, for learning over time and for thinking, leaping from high-level idea to high-level idea with crashing down to the mundane questions of how to get data or how to collaborate are critical.

So let’s say that data mining tools, traffic analysis tools, workflow management tools and then the pairing of this to risk insight, business data and having contingencies ready for making decisions and carrying out plans all have to exist.  Then we can talk about Advanced Threat tools.

The existing perimeter and endpoint technologies have failed.  The reason for that failure is inevitable: intelligent opponents by default create their attacks and tools to bypass the basic security kit in organizations.  Now this does not mean that anyone should throw out firewalls and Antivirus, or at least not for the foreseeable future.  They remain important tools for stopping basic threats and for filtering some of the noise.  They provide layers that slow down (but don’t stop) attackers and buy time in the race to protect information, but they are not where the focus of any security department should be in actually stopping attacks.

There’s a new generation of technologies emerging claiming to be “Advanced Threat” products from whitelisting and micro-virtualization to network behavioral analysis and payload sandboxing.  Which of these is just young technology and which is truly advanced? To tell that, we have to first define what an Advanced Threat product is (as opposed to a new, young but fundamentally Basic Threat product is).

An Advanced Threat is one that is designed to by default evade and not be caught by existing machine-based security technology and controls for a sufficient window of time that it can only really be stopped by Human beings.  By definition, this means that Advanced Threat solutions have to give a significant edge in reducing the window of opportunity available to attackers by in some way shortening the defenders timelines or making them meaningfully more efficient at processing events.

This means that an Advanced Threat solution should survive the following inevitable challenges:

  • Legitimate Software Evolution: Advanced threat solutions must weather changes in how legitimate software evolves over time to take advantage of new features and new techniques, even when some of those come from the bad guys.  For example, back in the day, key loggers were defined as “anything that shims the keyboard” because nothing legitimate did this.  In the 2003 timeframe, the technique crossed the line as a development tool, and all the worlds IM vendors started shimming keyboards and setting off false alarms.
  • Malware Evolution: this might seem obvious, but I have seen countless products claim to have “foolproof” behavioral analysis for spotting bad behavior.  What they actually have is something with a shelf life because bad guys adapts.  This means that advanced threat solutions must weather changes in how illegitimate software evolves to look normal over time.

If a technology becomes successful, and winds up in the same situation with ineffective content races as the traditional kit, then I have news for the vendor: you’re just “new,” not advanced.  Content updates aren’t a bad thing in-and-of-themselves, but they have to be a meaningless sop to deal with the Malware Evolution bullet above.  They have to really help make people more effective at stopping attacks: pull the needle from the haystack, find new needles, process needles faster, enumerate the damage done by needles more quickly, equip teams to deal with the aftermath of the needle quicker and better.

The post Will the real Advanced Threat technology please stand up? appeared first on Arbor Insights - Our People, Products and Perspective.


Previous Article
Threat Never Takes A Vacation – Are We There Yet?
Threat Never Takes A Vacation – Are We There Yet?

How many of you have participated in a long-drive vacation? Depending on the...

Next Article
Comment on Threats never take a vacation by Threat Never Takes A Vacation, Part II: Summer Camp - Arbor Insights
Comment on Threats never take a vacation by Threat Never Takes A Vacation, Part II: Summer Camp - Arbor Insights

[…] week I shared a story around vacation preparation, and being prepared...