Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Facebook Builds its Own Threat Information Framework

1/04/2014 by

W1siziisijiwmtqvmtavmjgvmtuvndcvmdavnzi0l2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0


Keeping ahead of web-based threats requires a mechanism to continually search for new types of attacks while understanding existing ones. However, data fragmentation and threat complexity plagues efforts to keep track of all the data related to malware, phishing and other risks – differences in how threats are discussed, categorized or even named vary from platform to platform and vendor to vendor. Facebook is taking steps to solve the issue for itself with the release of ThreatData.

ThreatData is a framework for collating information on internet threats and making it accessible for both real-time defensive systems and long-term analysis. It’s a bespoke effort comprised of three high-level parts: feeds, data storage and real-time response.

“When we began sketching out a system to solve this problem, we encountered issues others have faced: every company or vendor uses their own data formats, a consistent vocabulary is rare and each threat type can look very different from the next,” said Facebook security staffer Mark Hammell, in a blog. “With that in mind, we set about building what we now call ThreatData.”

Feeds first of all collect data from various sources and are implemented via a light-weight interface. The data can be in nearly any format and is transformed by the feed into a simple schema that the company calls the ThreatDatum. To build the database, Facebook is using feeds from VirusTotal, malicious URLs from multiple open source blogs and malware tracking sites; vendor-generated threat intelligence we purchase; Facebook’s own internal sources of threat intelligence; and browser extensions for importing data as a Facebook security team member reads an article blog, or other content.

Once a feed has transformed the raw data, it is fed into two existing data repository technologies: Hive for long-term data analysis and Scuba short-term. Hive storage answers questions like, “Have we ever seen this threat before?” and “What type of threat is more prevalent from our perspective: malware or phishing?” Scuba meanwhile offers the opposite end of the analysis spectrum, answering questions like, “What new malware are we seeing today?” and “Where are most of the new phishing sites?”

This article has been extracted from http://www.infosecurity-magazine.com, please click on this link to read the article in full http://www.infosecurity-magazine.com/view/37749/facebook-builds-its-own-threat-information-framework/

Montash is a multi-award winning, global IT recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Scientific Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

For more information please visit www.montash.com

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...