+ All Categories
Home > Documents > Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/...

Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/...

Date post: 08-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
61
Behavioral Security - DeepSec 2011 1 Behavioral Security: 10 steps forward & 5 steps backward DeepSec 2011 Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec
Transcript
Page 1: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security - DeepSec 2011 1

Behavioral Security: 10 steps forward & 5 steps backward DeepSec 2011

Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec

Page 2: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Agenda

Behavioral Security - DeepSec 2011 2

Threat Landscape 1

Behavioral Security Overview

Traditional rules based behavioral security

Machine Learning – Supervised and Unsupervised

Machine Learning for behavioral security

Real world examples

Conclusion

2

3

4

5

6

7

Page 3: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Threat Landscape

Behavioral Security - DeepSec 2011 3

Motivation?

Page 4: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Threat Landscape

2010-2011 Trends

Behavioral Security - DeepSec 2011

Social Networking + social engineering = compromise

Attack Kits get a caffeine boost

Targeted Attacks continued to evolve

Hide and Seek (zero-day vulnerabilities and rootkits)

Mobile Threats increase

4

Page 5: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Threat Landscape

Why is it hard to stop attacks?

From:

A mass distribution of a relatively few threats e.g.

Storm made its way onto millions of machines across the globe

To:

A micro distribution model e.g.

The average Vundo variant is distributed to 18 Symantec users!

The average Harakit variant is distributed to 1.6 Symantec users!

286M+ distinct new threats discovered last year!

What are the odds a security vendor will discover all these threats?

Behavioral Security - DeepSec 2011 5

Many reasons, one being: Malware authors have switched tactics

Page 6: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Changes at the byte-level evade traditional file-based pattern-matching engines

Analyzing the Problem

“Unique” threats are unique at the byte-level

6 6 Behavioral Security - DeepSec 2011

Hacker develops threat

Hacker uses Tool to

obfuscate executable Tool generates clones

that differ at the

byte-level

This is my first virus that I

plan to use to steal key and

passwords from

unsuspecting victims.

Kjjkjjj sdkjhkjsj398jid

9-2 -02-00 3984—2 3—

030984 1299-04 1-03---0-

23li jkjdunjjdpe d.

Ijis kks my alsiep siilf that pasje ata see ps stwe ake

adas pasowallsie

sppfr ausupeasect ffi

Ijis kks my alsiep siilf that pasje ata see ps stwe ake

adas pasowallsie

sppfr ausupeasect ffi

Ista asbin lsiked lipole

alskk askf hwpks

pollasjjfklg toalkkst

pooldajao sjfkg asklfa klla oek

Page 7: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Examples of Threat Cloning Malware Generators & Obfuscators

Behavioral Security - DeepSec 2011 7

Page 8: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

To the Cloud…

Presentation Identifier Goes Here 8

Page 9: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Examples of Threat Cloning Misleading Applications

• Re-Skinning – Binary File is unchanged except for user-visible strings

Behavioral Security - DeepSec 2011 9

Number of Clones: 49

Page 10: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Bytes change. But how about the behaviors of these threats ?

Password Stealers

will continue to steal passwords

…behaviors don’t change..

Behavioral Security - DeepSec 2011 10

Analyzing the Problem Are these “unique” threats really unique ?

Spam Bots

will continue to send Spam

Rogue AntiVirus

will continue to popup misleading

messages

Page 12: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Detection is “after” the fact

– After the sample has run on the system, you analyze the impact and conclude if the action taken was malicious and then remediate the threat and reverse its persistent system changes.

• Prevention is “before” the fact

– You conclude that the action that a sample is about to take is malicious and hence prevent the action from happening in the first place. You remediate the threat and minimal system settings change(restore) is needed.

• Protection

– Both detection based and prevention based technologies can offer protection.

• Challenges:

– Detection based approach: Can all changes be reversed? File modified on disk?

– Prevention based approach: Which action do you block and inspect? What is the performance overhead?

• Debatable!

– Blocked the 5th event and hence prevented 6th most impactful event!

Behavioral Security - DeepSec 2011 12

Clarifying the terminology

Detection vs. Prevention vs. Protection

Page 13: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Legacy rules based behavioral security

Behavioral Security - DeepSec 2011 13

Page 14: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Rules to identify malicious activity and take action

Behavioral Security - DeepSec 2011 14

The Legacy Solution

Rules based behavioral security

Page 15: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

The legacy solution Rules based behavioral security

• Simple and intuitive model (Expert System)

– Domain Experts know how to distinguish between good and bad

– They analyze the malware, spot the trends/patterns and write rules

– Product ships with default set of rules & rules are updated regularly

– The product may also have an ability to let users express new rules in the product

• Applicability

– Many security products, especially enterprise products use this model

– Maybe the only answer for some threat scenarios

• Pros

– Broader coverage for variants, Precise reasoning for detection, Name the threat, Relevant Actions

• Cons

– Scalability, Domain Expertise

Low error rate?

15 15 Behavioral Security - DeepSec 2011

Page 16: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Fact:

– Behavioral variants are far less than file variants

• New SHA256 = a file variant OR really a new malware?

– Same malware may be packed differently

– Same malware may be skinned differently

• Answer:

– Analyze the threat?

AUTOMATION COLLECT DATA DATA MINING

Behavioral Security - DeepSec 2011 16

Addressing the challenge

Scalability

0 1 0 1 1 0 0 1 1 1 0 1 1 1 0 1 0 1 1 1 1 0 0 1 1 1 0 1 1 0 1 1

0 1 0 1 1 0 0 1 1 1 0 1 1 1 0 1 0 1 1 1 1 0 0 1 1 1 0 1 1 0 1 1

0 1 0 1 1 0 0 1 1 1 0 1 1 1 0 1 0 1 1 1 1 0 0 1 1 1 0 1 1 0 1 1

Page 17: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Machine Learning - Basics

Behavioral Security - DeepSec 2011 17

Page 18: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• New approach to AI is to get the computer to program itself by showing it examples (data or past experiences) of behavior we want!

– This is the learning approach to AI

Name

Face

– Often hand programming is not possible or not a feasible answer like face detectors, handwriting reader, etc.

Behavioral Security - DeepSec 2011 18

Machine Learning

Learning by Example

Page 19: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Central Question

“How can we build computer systems that automatically improve with experience, and what are the fundamental laws that govern all learning process?”

• What is the learning problem?

A process learns with respect to <T, P, E> if it

Improves its performance P

At task T

Through experience E

“The Discipline of Machine Learning” T. Mitchell (2006)

• Machine Learning algorithms discover the relationships between the variables of a system (input, output and hidden) from direct samples of the system

Behavioral Security - DeepSec 2011 19

Machine Learning

What is Machine Learning?

Page 20: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Computer Science

– How can we build machines that solve problems, and which problems are inherently tractable/intractable?

• Statistics

– What can be inferred from data plus a set of modeling assumptions, with what reliability?

• Cognitive Science

– How does the mind process information in faculties such as perception, language, memory, reasoning and emotion?

• Information Theory

– How can we quantify, process, store and communicate data efficiently?

ML builds on all these questions but is a distinct question

Behavioral Security - DeepSec 2011 20

Information

Theory

Computer

Science

(AI)

Cognitive

Science

Statistics

Machine

Learning

Machine Learning

Building Blocks

Page 21: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Machine Learning

Categories of Machine Learning

• Supervised Learning

– Given example of inputs and corresponding desired outputs, predict outputs on future inputs

• Given input output pairs <xi ,yi>, learn a function f(xi) = yi for all i that makes a good guess at y for unseen x

• Labeled Data*

– Example: Classification, Regression

• Unsupervised Learning

– Given only inputs, automatically discover representations, features, structure, etc.

• Unlabeled Data*

– Example: Clustering, Outlier detection

• Semi Supervised Learning

– Learning from a combination of labeled and unlabeled data

– Example: supervised learning problems like video indexing, bioinformatics

• Applied where there is less labeled data and abundance of unlabeled data *

• Reinforcement Learning

– Given sequence of inputs, actions from a fixed set, and scalar rewards/punishments, learn to select action sequences that maximizes expected reward

– Example: Robotics

Behavioral Security - DeepSec 2011 21

Page 22: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

1) Pick a feature representation for your task

– Inputs and Outputs, Feature identification (power to discriminate)

2) Compile data

3) Choose a machine learning algorithm

4) Train the algorithm

5) Evaluate the results

Probably: go to (1)

-- -- --

-- -- --

-- -- --

Target

data

Cleaned

data

Transformed

data

Patterns/

model

Knowledge Database/data

warehouse

Selection

& Sampling

Preprocessing

& Cleaning

Transformation

& Reduction

Interpretation/

Evaluation Data Mining

Performance

system

Machine Learning

Steps

22 Behavioral Security - DeepSec 2011

Page 23: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• WEKA (University of Waikato)

– Java based, freely available, lots of algorithms built in

• Does not scale well to large data sets

• Orange

– Native + Python, Drag-and-drop UI AND Automation friendly

– Comparable Algorithms

• Input file formats: ARFF file vs. TSV file

Behavioral Security - DeepSec 2011

Tools

Many choices

23

Page 24: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Machine Learning for behavioral security

Behavioral Security - DeepSec 2011 24

Page 25: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Goal

– Train a model to provide automated meaningful information about unknown samples

• Identify class/label (Supervised Machine Learning) Classification

• Identify association (Unsupervised Machine Learning) Clustering

• Application of information extracted

– Classify the sample or provide information to analysts for labeling and writing definitions for detection

– Real time protection

Behavioral Security - DeepSec 2011 25

Machine Learning for behavioral security

Overview

Page 26: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Steps

– Collect samples

– Setup a VM with *monitoring framework*

– Push and run samples in a farm of virtual machines

– Collect sample behavior data

– Recycle the VM

– Extract information into format suitable for data mining

– Train the models

– Test and deploy the models

Behavioral Security - DeepSec 2011 26

Machine Learning for behavioral security

Overall process

Page 27: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Monitoring framework

– Data Collection

– User mode hooking API: Detours (Microsoft)

• Hook the APIs

• Collect the data in the context of the API Hook

– API Info(Name, Parameters), Called-from API, State of the process, etc.

– Log the information

• Extract features: Logs ARFF files

– API Called

– Has UI/Window

– Does Network Communication

• IRC

• HTTP

– Registered in AutoStart locations

– Creates Windows Tasks (jobs)

– Modifies PE Files

– Creates PE Files

– Injects into Trusted Processes

Behavioral Security - DeepSec 2011 27

Supervised Machine Learning

For real-time protection

Page 28: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 28

Supervised Machine Learning For real-time protection

Page 29: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security - DeepSec 2011 29

Example

Data to Models

…click here if demo GODs act up!..

Page 30: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Monitoring and Blocking hook points

– May or may not be the same

• Some hooks points are merely for state/information collection

– Work done in API Hooks

• Collect information

• Transform information into feature vector

• Evaluate against model

• Allow or Deny

Behavioral Security - DeepSec 2011 30

Lab to field

Apply Classifiers

Page 31: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Which APIs to hook?

– Higher level API (CreateProcess @ kernel32.dll)

– Lower level API (NtCreateProcess? NtCreateThread?, Ldrpxxx?)

– Higher level APIs (exports by kernel32) provide fine grain control

– Many high level APIs map to few lower level APIs (functionally)

– Lower level APIs provide a more comprehensive view

• Block Action:

– Failing an API

• Out parameter

• Return code

– Terminate Thread/process

Behavioral Security - DeepSec 2011 31

Lab to field

Apply Classifiers

Page 32: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Machine Learning for behavioral security

Behavioral Security - DeepSec 2011 32

Reality check…

Page 33: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Practical Challenges

– Samples fail to run in automation

• Good Samples fail to run in automation

– more commonly than Malicious samples

– Dependency, Configuration, etc.

– GUI automation

• Malicious Samples deliberately fail to run in automation

– VM Aware

– Automation Aware

• Check own file name (example: sysdate.exe)

• Check parent process (Threat: Trojan.Tracur)

• Check application settings (Threat: Adware.InstantBuzz)

• Check commonly used applications (MS Office)

• Samples may be stale: C & C Down

– System state sensitivity

• Valid Samples: Missing depencies like Java, .NET, etc.

• Malicious Samples: Missing targeted applications like Adobe Reader, QuickTime, etc.

Behavioral Security - DeepSec 2011 33

Automation

Reality check

Page 34: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Machine Learning Challenges

– Imbalanced data sets

– Missing features

– Anomalous feature values

• outlier or deliberately manufactured?

• Some tricks observed in malware*:

– Non-standard ImageBase

– Large values in .DATA/SizeofRawdata

– Bogus values in LoaderFlags

Behavioral Security - DeepSec 2011 34

Machine Learning

Reality check

*Scan of the Month 33: Anti Reverse Engineering Uncovered

By Nicolas Brulez - 0x90(at)Rstack(dot)org

Page 35: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• NPTs (Non Process Threat)

– Trusted process -> Malicious Behavior

– File vs. Process

– Code vs. Data

• Malicious PDF Browser or Adobe reader

• Malicious JAR files Browser or java.exe

• Malicious MSI files msiexec.exe

– DLLs

• Regsvr32

• Rundll32

• Svchost.exe

• IE/Explorer Extensions

How to automate these?

How/where is protection enforced?

What is remediated?

Behavioral Security - DeepSec 2011 35

Stealthy Malware

Malicious Payloads

Page 36: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Conclusion & Food for thought!

Behavioral Security - DeepSec 2011 36

Page 37: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

• Volume of malware by unique file fingerprint != New Malware

– Behaviorally malware is not evolving at every instance

– Scalability can be handled with Automation

– Be aware of pitfalls of automation

– Automation + domain knowledge

– Use domain experts effectively

• Challenge

– What if the Malware is a valid application with configuration file?

– Solution: Opportunity for Creative Feature Engineering?

Behavioral Security - DeepSec 2011 37

Recap

Scaling to the Malware population

Page 38: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security - DeepSec 2011 38

Thank You!

Sourabh Satish [email protected]

Page 39: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security - DeepSec 2011 39

Page 40: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security - DeepSec 2011 40

Page 41: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 41

Page 42: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 42

Page 43: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 43

Page 44: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 44

Page 45: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 45

Page 46: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 46

Page 47: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 47

Page 48: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 48

Page 49: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security - DeepSec 2011 49

Page 50: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 50

Page 51: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 51

Page 52: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 52

Page 53: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 53

Page 54: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 54

Page 55: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 55

Page 56: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 56

Page 57: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 57

Page 58: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 58

Page 59: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 59

Page 60: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security 60

Page 61: Behavioral Security: 10 steps forward & 5 steps backward · Sourabh Satish Distinguished Engineer/ Chief Architect, Symantec . Agenda Behavioral Security - DeepSec 2011 2 1 Threat

Behavioral Security - DeepSec 2011 61

Go back…


Recommended