UFCFFY-15-M¶

Cyber Security Analytics¶

01: Introduction¶

Prof. Phil Legg¶

About Me¶

Professor in Cyber Security

Co-Director: UWEcyber ACE-CSE

Programme Leader: MSc Cyber Security

Module Leader: Cyber Security Analytics; Security Data Analytics and Visualisation

Research: Cyber Security, Machine learning, Visualisation - insider threat, security analytics, adversarial AI, explainable AI

2Q17 / plegg.me.uk / @dr_plegg

Module Information¶

Delivery (2022-2023)¶

Academic Staff:

  • Phil Legg (PL)
  • Thomas Win (TW)

Techincal instructors:

  • Eseosa Oshodin
  • Rida Zehra
  • James Vickers
  • Owen Jones

Schedule¶

  • Lecture: Wednesday 09:00-10:00 - 4Q56 - PL
  • Practical Lab: Wednesday 10:00-12:00 (UFCFFY-15-M Sep P_oc/01pt) - 4Q50/51 - TW
  • Practical Lab: Wednesday 15:00-17:00 (UFCFFY-15-M Sep P_oc/02 and UFCFFY-15-M Jan P_oc/01pt) - 4Q69 - PL
  • Practical Lab: Thursday 13:00-15:00 (UFCFFY-15-M Jan P_oc/02) - 4Q69 - TW

Please consult your personal UWE timetable for which session you are allocated.

Assignment¶

This module is assessed by a portfolio that is worth 100% of the marks.

  • Task 1 (Week 2, 20%): Practical coding task on Data Science for Cyber Security.
  • Task 2 (Week 4, 20%): Practical coding task on Machine Learning for Cyber Security.
  • Task 3 (Week 6, 30%): Practical research task on Security Data Analytics.
  • Task 4 (Week 9, 30%): Video overview of your portfolio.

Submission date: Tuesday 2nd May 2023 @ 14:00 (5-day grace period applies).

Submissions are to be made via Blackboard (full details to follow).

Module Overview (Weeks 1-6)¶

  1. Wednesday 1st February: Introduction / Role of Cyber Security Analytics
  2. Wednesday 8th February: Security Operations and Frameworks (Task 1 Release)
  3. Wednesday 15th February: Security Monitoring and Analysis
  4. Wednesday 22nd February: Machine Learning for Cyber Security (Task 2 Release)
  5. Wednesday 1st March: Visualisation for Cyber Security
  6. Wednesday 8th March: Mid-module review (Task 3 Release)

Module Overview (Weeks 7-12)¶

  1. Wednesday 15th March: NO LECTURE
  2. Wednesday 22nd March: Case Studies: Malware Analysis / Cyber Security Analytics Research
  3. Wednesday 29th March: Case Studies: Insider Threat Detection (Task 4 Release)

Easter Break


  1. Wednesday 19th April: NO LECTURE
  2. Wednesday 26th April: Case Studies: Text Analytics
  3. Wednesday 3rd May: Future of Cyber Security Analytics / Module Recap (Assignment Submission)

Schedule is subject to change

Feedback¶

  • Please make use of the online Q&A form to post your course questions (also linked on Blackboard).
    • I will collate and respond to these questions via course announcements so that all students can benefit by the response.
  • Please do regularly check your emails to observe course annoucements.
  • Please do continue to work on tasks outside of sessions so that you bring questions to the lab sessions.
  • Please work through the non-assessed labs - they will help you with the assessed labs!
  • You will receive formative feedback on your work during lab sessions, please use this to develop your final submissions.
  • You will receive summative feedback at the end of the course on return of your assignments.

Slide Material¶

  • Module slides are developed in Python/Jupyter and use the Reveal.js HTML framework.
  • Mobile friendly (touch optimisation)
  • Press 'Escape' to view the slide deck
    • Sub-slides go down, main themes go across.

Other useful resources¶

  • CyBOK: Security Operations and Incident Response
  • CyBOK: Malware and Attack Technologies
    • This course is aligned to these two CyBOK Knowledge Areas.
  • Certification: CompTIA Cybersecurity Analyst (CySA+)
    • This course covers many of the topics related to this industry certification.
  • Employability: UK Cyber Security Council
    • This resources covers career paths that align with the skills developed in this modules.

01: Role of Cyber Security Analytics¶

In this session we will cover:

  • What is the role of a Cyber Security Analyst?
  • Roles, responsibilities, skills required, job opportunities
  • Why is Data Science important to Cyber Security?
  • What kind of tools exist to integrate Data Science and Cyber Security?

What is the role of a Cyber Security Analyst?¶

What do you think Cyber Security Analytics is all about?¶

  • Understanding data related to your organisational security
  • Developing situational awareness: past, present and future
  • Identifying and responding to threats
What kind of data may be useful?
  • Network traffic
  • System logs
  • Application data
  • Email activity
  • Reputation / threat database - blacklists of known threats
  • Open-Source Intelligence (OSINT)

"Cyber Security Analytics is about how data can be used to inform of threats, vulnerabilities and risk that an organisation may be exposed to."¶

It is a defensive strategy to better understand the operational environment of digital assets, and a means to make better informed decisions to protect and defend the organisation.

Cyber Security job roles¶

Entry level¶

  • Cyber security analyst
  • Cyber security specialist / technician
  • Cyber crime analyst / investigator
  • Incident analyst / responder
  • IT auditor

Mid level¶

  • Cybersecurity analyst
  • Cybersecurity consultant
  • Penetration and vulnerabilitiy tester

Advanced level¶

  • Cybersecurity manager / administrator
  • Cybersecurity engineer
  • Cybersecurity architect

Job Opportunities¶

  • Junior Cyber Security Analyst
  • Junior SOC Analyst
  • Junior Information Security Consultant
  • Useful article on SOC analyst job role by CSO online
  • Cyber Security Career Pathways

Example¶

"Senior Threat Analyst - Microsoft"¶

Link

Security Intelligence is a process¶

  • Requirements (Planning and Direction)
  • Collection (and processing) - *SIEMs*
  • Analysis - *ML, AI, data science* - all analysis done in the context of a user case developed in the planning stage.
  • Dissemination
  • Feedback

Security Intelligence vs Cyber Threat Intelligence¶

  • Security intelligence tends to be an inward facing activity - internal observations in our logs.
  • Cyber threat intelligence tends to be an outward facing activity - external threats that we need to prepare for.

Are we dealing with narrative reports or with data feeds? *We need to consider both!*

Network Security Tools¶

  • Network traffic data (e.g., packet captures) can be used to identify what information has been communicated, and therefore what activity has taken place on a network (e.g., access to a particular URL, or downloading of particular files).
  • Firewalls can be used to block inbound/outbound activity based on pre-configured rules (e.g., IP address, port number, etc...).
  • Intrusion Detection Systems (IDS) inspect inbound/outbound network traffic to identify suspicious activity.
  • Intrusion Prevention Systems (IPS) inspect inbound/outbound network traffic to identify suspicious activity and automatically block.

Big Data Security Analytics¶

*“Security is about understanding systems, the people, and the processes that act upon these systems, such that they remain secure”*

Security Data Visualization Skills¶

Data science and security visualisation requires the following blend of skills that combines the ability to hack and manipulate data, the understanding of statistical techniques, and the domain knowledge of what information is relevant and important for the purpose of security.

  • Substantive Expertise – This is the security domain knowledge, which will enable the security practitioner to understand the data, determine what is expected and find anomalies or metrics from visualization.
  • Hacking Skills – Hacking skills are the skills from a data scientist language required for working with massive amount of data that should be acquired, cleaned and sanitized.
  • Math & Statistics Knowledge – This knowledge is critical to understand which tools to use, understand the spread and other characteristics to derive insight from the data.

Data-Driven Storytelling¶

  • Novelty: We may want to observe when something is new within our observation.
  • Outlier: We may want to observe when something not new appears different within our observation.
  • Trend: We may want to observe the historical pattern of observations.
  • Forecasting: We may want to observe how the historical pattern will forecast what may come in the future.
  • Debunking: We may want to observe how our data contradicts an opinion of what may come.

Further reading¶

  • Sarker, I.H., Kayes, A.S.M., Badsha, S. et al. Cybersecurity data science: an overview from machine learning perspective. J Big Data 7, 41 (2020). https://doi.org/10.1186/s40537-020-00318-5
  • Maayan, G. How Data Science Has Changed Cybersecurity. Datasciencedojo (2020).

Practical Session¶

  1. Get started with the UWEcyber Virtual Machine
  2. Use the JupyterLab environment to learn about Python notebooks.
  3. Complete the non-assessed lab exercises to develop your Python skills:
    • 00-Python Primer
    • 01-"Hello, Security Analytics"
    • 02-Network Traffic Analysis
In [ ]: