September 8, 2015 By Pamela Cobb 3 min read

Remember “The Myth of the Obvious Malware,” and how successful malware is sneaky and engineered to be well-hidden, like a subtle email with an obfuscated link to a malware download? Unsurprisingly, this sneakiness means it is hard to detect without sophisticated analytics and robust forensics capabilities. This is no one-hour story arc as we’ve all seen in television crime dramas; there are no transparent touch screens and witty one-liners before the first commercial break. I guess you could say our best hope is that the cybercriminals … *puts on sunglasses*… haven’t gone phishing.

The Forensics Evidence Doesn’t Lie

Last year, the Ponemon Institute, in conjunction with IBM Security, released a market study on network forensics investigations that broke down the forensics process into five major steps: detection, escalation, containment, recovery and post-mortem. Unsurprisingly, the detection and recovery phases take up the most time in the investigation — a combined 70 percent of the total — since these phases involve the bulk of the heavy lifting in the investigation. Detection, at 35 percent of the total time, is similar to finding the body and all the evidence. Although on television the body is laid out in the first three-minute opening scene, in real life, security forensics investigators are likely spending a good bit of time trying to figure out if a breach or attack actually happened.

In fact, Ponemon reported that only 31 percent of the time did breaches turn out to be real attacks. What a horrible show that would be: You expect to have a crime to solve each week, but only every third episode produced a body and the rest was just forensics investigators drinking coffee while tediously sifting through all possible evidence.

Once the figurative body is found in the network, investigators need to trace back what actually happened. There are a number of tools available to help with this, and many organizations use packet captures (PCAP) to aid in the investigations — 69 percent, in fact. The trouble is that this evidence is nearly as fleeting as the villain of the week since full packet capture is only stored on average for 10 days. But more on that later.

Results May Vary

If a toxicology test is ordered on TV, you can bet the results will be in by the next commercial break. The results are delivered wordlessly to the lead investigator with a meaningful stare and some eyebrow twitches as the analyst withholds the name from the audience for maximum suspense. Frankly, if any security professional attempted to name an attacker only through stares and eyebrow twitches, well… Maybe that’s how we get cybercriminal names like Ch0$3n0ne.

In real life, the Ponemon study shows that, from detection to containment for a breach like the one cited above, the average time to complete a forensics investigation is nearly a full week. It’s even longer for an insider attack. Having those 10 days of packet captures from before is plenty of time, then, to completely solve the crime.

A different Ponemon study, though, shows that malware can stay undetected on the network for up to 225 days. Then that initial attack vector is long gone from the 10 days of PCAP storage records. The trick is to detect the crime before that first commercial break — or, in the real world, within days of it happening.

The Twist Ending

The evidence was right in front of you the entire time: Security intelligence is the key. Detection capabilities that gather all the evidence in logs and network flows and focus in on anomalous behavior are necessary to figure out that an attack has occurred.

To then decipher the evidence, you can’t rely on the bad guys writing their malware in red while the good, regular code is in green. A good incident forensics solution can retrace the step-by-step actions of attackers and reconstruct raw network data while seamlessly integrating with a security intelligence platform and significantly shortening the time to investigate the incident to days instead of weeks.

Although a forensics solution doesn’t provide built-in car chases, dramatic underwater rescues or the opportunity to rough up a perp in interrogation, it does provide a solid — and fast — foundation to do forensics analysis, and it would look pretty cool on a transparent touch screen, too.

Read the complete Network Forensic Investigations Market Study from Ponemon Institute

More from Intelligence & Analytics

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today