Logo do repositório
 
Publicação

CyberSOC4AD: integração de tecnologia Semperis e CyberArk no ecossistema SIEM IBM QRadar e Palo Alto Cortex XSOAR do CyberSOC da Altice Portugal

datacite.subject.fosEngenharia e Tecnologia::Engenharia Eletrotécnica, Eletrónica e Informáticapt_PT
dc.contributor.advisorCosta, António Casimiro Ferreira da
dc.contributor.advisorAlegria, José
dc.contributor.authorNunes, Guilherme Nuno Baptista
dc.date.accessioned2023-05-29T17:04:41Z
dc.date.available2023-05-29T17:04:41Z
dc.date.issued2023
dc.date.submitted2022
dc.descriptionTese de Mestrado, Segurança Informática, 2022, Universidade de Lisboa, Faculdade de Ciênciaspt_PT
dc.description.abstractCyberattacks have been increasing, whether in number, vector diversity, targets, and impact. One of the hybrid factors that shifted the most to telecommuting for this increase was COVID-19 which forced a transition to full-time regimes or regimes, leading to an increase in the attack surface. The Advanced persistent threat (APT) has been a great threat for some years now, especially for organizations that use the Active Directory service, as it standardizes the management of all company resources. The use of AD is so widespread that in the information technology industry it is understood that all companies, regardless of its size, use this service for user authentication and authorization, as well as managing their own network. However, defending an organization’s network against a threat of this category remains a challenge that requires a lot of technological resources. It becomes unsustainable in the long run because however many resources a company has, it becomes impossible to have the resources or the ability to detect and defend against all methods available to attackers. An attack can be indefensible if it uses a zero-day vulnerability or through social engineering manages to enter the company’s network. From this moment, the attacker can hide on the network and take as long as he wants to carry out the malicious operation. The most common attack attempts to obtain Domain Administrator privileges, with which backdoors can be created and total control of the system can be obtained. But in this pandemic period, Ransomware has become the main threat to organizations, specially to high profile companies and governmental organizations. It has become usual to ask for ransoms in cryptocurrencies as blackmail to not encrypt or delete an organization’s data. Based on reports from organizations focused on information security, as well as academic documents, it was possible to define a set of attacks that were seen as the most impactful and frequent. Through various criteria, the use cases to be developed and through which technologies would be implemented were defined. At a certain point of the implementation, it was necessary to rethink the entire strategy of defining the use cases, since the technologies initially thought to be integrated, ended up not contributing in the necessary way to the detection of the offenses in question. Finally, the implementation of playbooks was carried out, which allows the automatic resolution of an incident, or even its enrichment until a security analyst carries out its resolution. This work carries out an in-depth research on the main types of attacks currently and proposes to define advanced use cases that allowed the CyberSOC of DCY to be able to detect threats and suspicious behavior occured in Active Directory. The proposed objectives were achieved through a tangible strategy for the organization, with the available sources, more specifically, the Microsoft Windows Security Log provided by Supercharger, CyberArk and Semperis DSP, in conjunction with IBM QRadar and Cortex XSOAR.pt_PT
dc.identifier.tid203502400
dc.identifier.urihttp://hdl.handle.net/10451/57663
dc.language.isoporpt_PT
dc.subjectActive Directorypt_PT
dc.subjectIBM QRadarpt_PT
dc.subjectSemperispt_PT
dc.subjectEventopt_PT
dc.subjectOfensapt_PT
dc.subjectTeses de mestrado - 2023pt_PT
dc.titleCyberSOC4AD: integração de tecnologia Semperis e CyberArk no ecossistema SIEM IBM QRadar e Palo Alto Cortex XSOAR do CyberSOC da Altice Portugalpt_PT
dc.typemaster thesis
dspace.entity.typePublication
rcaap.rightsopenAccesspt_PT
rcaap.typemasterThesispt_PT
thesis.degree.nameMestrado em Segurança Informáticapt_PT

Ficheiros

Principais
A mostrar 1 - 1 de 1
A carregar...
Miniatura
Nome:
TM_Guilherme_Nunes.pdf
Tamanho:
1.16 MB
Formato:
Adobe Portable Document Format
Licença
A mostrar 1 - 1 de 1
Miniatura indisponível
Nome:
license.txt
Tamanho:
1.2 KB
Formato:
Item-specific license agreed upon to submission
Descrição: