123ArticleOnline Logo
Welcome to 123ArticleOnline.com!

ALL » Computers >> View Article

100,000 Tweets In 1 Day – How One Company Discovered A Security Breach Using Big Data Analytics

By Expert Author: Lauren Ellis

As the recent breach involving millions of Target customer credit cards illustrates, security breaches leave a pattern of activity that is mathematically unusual. As cyber criminals increasingly use the cloud as an attack vector, these attacks also create anomalous activities that indicate something is wrong. In mathematical terms, they produce outliers that are several standard deviations away from normal user activity. A breach is usually at the edge of the bell curve and stands out as unusual.

The challenge for today’s companies is to identify these anomalous events quickly and then take immediate steps to investigate, take action, and limit the damage. With billions of transactions to look at, how do companies find the needles in very large haystacks? They need scalable cloud analytics to analyze large volumes of transaction data and automatically find anomalous activity.

Interesting Usage Anomalies Actually Evidence of Breaches
Using Skyhigh’s cloud analytics, Fortune 2000 companies have identified security breaches and taken corrective action before they threatened their businesses. Here are some of the most creative attacks we’ve uncovered:

Malware stealing data via Twitter – At a large financial institution, Skyhigh identified a single IP address at the company that was sending over 100,000 tweets per day. The corporate Twitter account only had few thousand tweets since inception. Investigating further, they discovered that it was malware exfilterating data 140 characters at a time via a Twitter account.

Command and control using GoToMyPC – At a retail company, Skyhigh identified a single device attempting to connect to GoToMyPC 11 million times in a single week. After investigating, they discovered the computer was infected with malware and attempting to connect so it could be used to infiltrate the company.

Blocked attempts to use Facebook – At an energy company, a single device made 3.8 million attempts to access Facebook, all of which were blocked. The computer was infected with malware and was attempting to connect to exfiltrate data from the company.

Author :
Lauren Ellis is a research analyst covering the technology industry’s top trends & topics, focusing on Cloud Security, Cloud Computing, Data Loss Prevention etc.,

Total Views : 54Word Count Appx. : 345See All articles From Author

Computers Articles

1. Sony Repair Centre London With Minimal Price
Author: Sony Repairer

2. Samsung Repair Centre London With Year Warranty
Author: Samsung Repairer

3. Normal Issues That Are Faced By A Mcafee User That Directly Lead To The Tech Support!
Author: Madison Hernandez

4. Why 400-101 Ccie Routing And Switching Is A Great Ticket To Success?
Author: Eugene

5. Be The Best It Professional With 303-200 Linux Enterprise Professional
Author: Eugene

6. Significance Of Epson Printer Tech Support For Customer
Author: Alexandra Williams

7. Salesforce Importance On Career Building
Author: Ennoble Technologies

8. Aquel Alquiler De Coche En Alicante Esquema Arrejunta Esa Véneta
Author: Jonna Rischbieth

9. Get Repair Service With Minimal Price & Warranty.
Author: Sony Repairer

10. Samsung Repair Centre London With 12 Months Warranty.
Author: Samsung Repairer

11. Intel Ssd 320 Series 8mb Data Recovery
Author: Khan Mash

12. Un Alquiler Coches Alicante Se Raicea Aquel Gabán Logogrífico Dejante Ese Empiema Se Indemniza Aquel
Author: Ivey Mott

13. Is Mcafee The Only Answer To Cyber Crime? On The Off Chance That Yes, How Its Technical Support Coul
Author: Madison Hernandez

14. Ese Alquiler De Coche En Alicante Inventa Este Mapache Portuense
Author: Octavio Mayorga

15. Samsung Repairs In Uk, With 12 Months Warranty
Author: Samsung Repairer

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: