ALL >> Computers >> View Article
100,000 Tweets In 1 Day – How One Company Discovered A Security Breach Using Big Data Analytics
As the recent breach involving millions of Target customer credit cards illustrates, security breaches leave a pattern of activity that is mathematically unusual. As cyber criminals increasingly use the cloud as an attack vector, these attacks also create anomalous activities that indicate something is wrong. In mathematical terms, they produce outliers that are several standard deviations away from normal user activity. A breach is usually at the edge of the bell curve and stands out as unusual.
The challenge for today’s companies is to identify these anomalous events quickly and then take immediate steps to investigate, take action, and limit the damage. With billions of transactions to look at, how do companies find the needles in very large haystacks? They need scalable cloud analytics to analyze large volumes of transaction data and automatically find anomalous activity.
Interesting Usage Anomalies Actually Evidence of Breaches
Using Skyhigh’s cloud analytics, Fortune 2000 companies have identified security breaches and taken corrective action before they threatened their businesses. Here are some of the most creative attacks we’ve uncovered:
Malware stealing data via Twitter – At a large financial institution, Skyhigh identified a single IP address at the company that was sending over 100,000 tweets per day. The corporate Twitter account only had few thousand tweets since inception. Investigating further, they discovered that it was malware exfilterating data 140 characters at a time via a Twitter account.
Command and control using GoToMyPC – At a retail company, Skyhigh identified a single device attempting to connect to GoToMyPC 11 million times in a single week. After investigating, they discovered the computer was infected with malware and attempting to connect so it could be used to infiltrate the company.
Blocked attempts to use Facebook – At an energy company, a single device made 3.8 million attempts to access Facebook, all of which were blocked. The computer was infected with malware and was attempting to connect to exfiltrate data from the company.
Computers Articles1. M V Technologies - One Of The Top Web And App Development Companies In Noida
2. Building Your Own Desktop At Home? Keep An Eye For These Key Components.
Author: Sonu Kumar
3. Contact And Get Browser Support Over The Phone.
Author: kirlin jackeline
4. How Testing Transformation Leads The Way To Digital Transformation
Author: Oliver Moore
5. Use The Antivirus Program In An Efficient Way
Author: murphy felicia
6. How To Personalize Visual Feedback For Touch Points On Windows 10?
Author: Aida Martin
7. How To Unlock All Characters In Super Smash Bros
Author: Jaxson harry
8. How To Get Gamma Container In Escape From Tarkov?
9. How To Skip Vorgeth Fight In Shattered Throne Dungeon In Destiny 2?
Author: Jaxson Harry
10. How To Get Helpful Doge Charm In Call Of Duty: Modern Warfare?
11. How To Reset Any Roku Remote That Has Stopped Responding ?
12. Pepsi And Regal Partnership Starting Early 2020
13. Various Website Development Tips To Help You Get Started
Author: Yogendra Shinde
14. What Are The Techniques For Website Speed Optimisation?
Author: Chris Walker
15. Diagnose And Repair Computer Problems With Active@ Boot Disk
Author: James B Bartlett