Collibra DQ User Guide
2022.10
Search
⌃K

Cyber Anomalies in Real-Time

We've moved! To improve customer experience, the Collibra Data Quality User Guide has moved to the Collibra Documentation Center as part of the Collibra Data Quality 2022.11 release. To ensure a seamless transition, dq-docs.collibra.com will remain accessible, but the DQ User Guide is now maintained exclusively in the Documentation Center.
With increasing number of cyber threats most of the cyber security team doesn’t have the capacity to manually detect, monitor, and defend against all. Effective cyber threat management requires leveraging automation to inform decisions.
OwlDQ framework, provides organizations the ability to load and process diverse security data feeds at scale in order to detect network data anomalies. The OwlDQ alerts can enable network admins to respond to these events in timely manner.
Here we walk through a scenario to detect anomalies with network traffic dataset.
  1. 1.
    IP address Validation
  2. 2.
    Detect the unusual network traffic patterns based on locations.
  3. 3.
    Identify the suspicious packets based on size.
  4. 4.
    Detect the malicious activity based on source and destination IP addresses.

Infosec dataset Preview

Dataset contains Timestamp, Source Workgroup, Source IP, Source Port, Destination Workgroup, Destination IP, Destination Port, Application, Protocol and Packet size information.

IP Address format Validation

Business Check
OwlDQ Feature
Text
Is a valid formatted IP
RULE
AUTO-IP detection
Is the IP address NULL or Missing
BEHAVIOR
AUTO

Source and Destination Workgroups

Business Check
OwlDQ Feature
Text
Does it a usual network traffic based on locations
PATTERN
Source_Workgroup -> Destination_Workgroup

Source and Destination IP Address validation

Business Check
OwlDQ Feature
Text
Does it a usual network traffic based on source and destination IP
PATTERN
Source_IP -> Destination_IP

Packet Size

Business Check
OwlDQ Feature
Text
Is the Packet Size NULL or Missing
BEHAVIOR
AUTO
Packet Size within normal range
PATTERN
Source_IP -> Packet_SizeB

Resulting OwlCheck

-f file:///home/danielrice/owl/bin/demos/infosec/ -d tab \
-fullfile -fq "select * from dataset" -encoding UTF-8 -ds infosecv2 \
-rd "2020-04-04" -dl -dlinc Destination_IP,Packet_SizeB,Source_IP \
-dlkey Source_IP -fpgon -fpginc Destination_Workgroup -fpgkey Source_Workgroup \
-df "yyyy-MM-dd" -loglevel INFO -h 10.142.0.29:5432/owltrunk -owluser admin \
-fpgsupport .000000001 -fpgconfidence 0.4

Which components did we use?

OwlDQ address the issue of efficient network traffic classification by performing unsupervised anomaly detection and use this information to create dynamic rules that classify huge amounts of Infosec data in real time.
By providing Infosec dataset along with anomaly records, OwlDQ outlier and pattern algorithms found the anomaly in the network traffic. It mainly detect the following anomalies.
  1. 1.
    Traffic between Atlanta->Texas
  2. 2.
    The packet size extremely low between Atlanta->Texas
  3. 3.
    Atlanta source IP and Texas Destination IP.
Realtime OwlDQ can provide the alerts on network traffic anomalies which can help network admins to do further deep analysis and take preventative measure which is daunting task with huge amount of data.

Sample Dataset

infosec-anomaly.csv
267KB
Binary