0% found this document useful (0 votes)
27 views7 pages

WP Ai ML NDR

The white paper discusses how Fortinet leverages artificial intelligence (AI) and machine learning (ML) in its FortiNDR solutions to enhance cybersecurity by addressing common challenges in security operations. It highlights the unique capabilities of network detection and response (NDR) systems, including real-time malware detection, traffic profiling, and anomaly detection through various ML algorithms. FortiNDR Cloud, a SaaS offering, utilizes cloud computing to scale its detection capabilities, providing high-fidelity detections with low false-positive rates while continuously learning from network data.

Uploaded by

198junkemail
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views7 pages

WP Ai ML NDR

The white paper discusses how Fortinet leverages artificial intelligence (AI) and machine learning (ML) in its FortiNDR solutions to enhance cybersecurity by addressing common challenges in security operations. It highlights the unique capabilities of network detection and response (NDR) systems, including real-time malware detection, traffic profiling, and anomaly detection through various ML algorithms. FortiNDR Cloud, a SaaS offering, utilizes cloud computing to scale its detection capabilities, providing high-fidelity detections with low false-positive rates while continuously learning from network data.

Uploaded by

198junkemail
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

WHITE PAPER

Harnessing the Power of Artificial


Intelligence and Machine Learning
with FortiNDR Solutions
Harnessing the Power of Artificial Intelligence and Machine Learning with FortiNDR Solutions WHITE PAPER

Executive Summary
With the explosion of data and computing, adversaries and cybersecurity practitioners are harnessing the power of AI and ML
to achieve their respective objectives. Fortinet applies AI and ML to its SecOps suite of solutions, including FortiNDR network
detection and response and FortiNDR Cloud. Below, you’ll find related use cases of how Fortinet uses AI and ML in these
offerings, highlighting how the technologies solve common cybersecurity challenges and increase coverage related to detection
and response.

AI and ML in Fortinet Cybersecurity Solutions


Fortinet uses AI and ML to solve common security operations center (SOC) challenges related to scale and time to detect.
Fortinet also uses these capabilities to enhance detections in its own products in many ways, such as training different
engines and neural networks for malware detections, profiling traffic on networks (FortiNDR, FortiNDR Cloud, and FortiWeb),
analyzing network operations data (FortiAIOps), using GenAI with FortiAdvisor to interact with customers using natural language
processing, and harnessing ML for face recognition in FortiCamera, to name a few.

What Makes Network Detection and Response Unique?


NDR is one cybersecurity solution that harnesses big data and uses ML to effectively model network traffic. NDR relies on
processing raw network data and flows to capture the metadata of the network to surface attacks. As adversaries cannot
escape the network, traces of activity are always left behind, whether malware lateral movement, deviation of traffic flow,
abnormal application behavior, or the unusual upload of sensitive data. NDR solutions can conduct behavior-based analysis on
the network, using AI and ML to determine if an action is potentially suspicious. This insight helps a human analyst better assess
the situation and prioritize remediation.

NDR sensors NDR Solution


(appliance)
Tap/Span

Customers
Network Traffic Network
(North South)
meta data
Tap/Span

Customers
Network Traffic NDR sensors
(East West) (virtual)

SaaS or On-prem

 Detections
Key Principles:  Threat Hunting
1. Non Intrusive
 Response
2. Copy of network data via span to NDR sensors (hw or virtual)
3. Sensors capture ‘meta data’ used in NDR solution
Span = Copy of network traffic

Figure 1: Architecture of a typical NDR solution

AI and ML Use Cases in the FortiNDR Product Family


Most mature NDR vendors will offer SaaS or cloud-based and on-premises solutions. Fortinet has deployment options for both
FortiNDR Cloud (SaaS-based) and FortiNDR (on-premises). While many customers choose the SaaS or cloud-based deployment
option, some industries need greater data sovereignty and have unique compliance requirements that necessitate an on-
premises solution. Below are several examples, first of how FortiNDR on-premises, and then how FortiNDR Cloud solutions use
AI and ML to enhance detection capabilities.

2
Harnessing the Power of Artificial Intelligence and Machine Learning with FortiNDR Solutions WHITE PAPER

Artificial neural networks and supervised machine learning


FortiNDR (on-premises) is equipped with patented artificial neural networks (ANN) to scan and analyze files on the network in
real time. Few NDR solutions in the market scan the files from raw traffic and inform users what malware attacks are happening
in their network. Most solutions only offer post-attack recovery recommendations. The benefits of using ANN versus traditional
detection technology like antivirus software include:
n Reducing the time needed to detect, as no signature matching is required. FortiNDR ANN is trained by FortiGuard Labs
experts to identify specific ransomware types, such as CoinMiner Banking Trojan.
n ANN’s learning ability and its automatic adaptation to malware variants on network. ANN can compare similarities between
suspicious files, drawing a conclusion about whether the new file poses a risk to the network.
n The ability to add detection timing and connections to the evaluation criteria. As a result, FortiNDR can determine if an
infected user spreads malware to another and whether there are connections between these hosts. This helps analysts
determine the origin of an attack.
n Other self-learning capabilities based on customer traffic to further detect malware anomalies for both clean and malicious files.

Files Code Verdict


Blocks

Binary Scripts Industroyer

Input layer Output layer


Files Feature Extraction Code Blocks Feature Example Result
Extraction from Files  Average 3000+ Matching  Industroyer = 26
from per file  Match  Trojan features = 5
 Text parser (script),
networks  Count  Ransomware = 2
disassembler (PE)
 De-obfuscate  Prioritize  26+ malware
 Unpack categories
Artificial Neural Network
 Features DB
 6M+ features
 GPU/hardware accelerated

Figure 2: FortiNDR ANN

One-class support vector machines and unsupervised ML


A second example of how FortiNDR (on-premises) uses ML is related to traffic profiling. When capturing raw network traffic,
FortiNDR uses a One-Class Support Vector Machine (SVM) to model traffic, form a baseline, and identify instances that deviate
significantly from that baseline. The One-Class SVM is an unsupervised ML algorithm that requires training by feeding different
types of clean and malicious files to it, baselines customers’ traffic using a specified time interval to learn the “norm” to form
the baseline, and detects deviations from that baseline. This analysis includes different network characteristics such as IP
addresses, geolocations, application behavior, and ports. Different ML profiles or patterns can be built for different network
segments in the FortiNDR configuration. For example, a critical server on a bank’s network should only communicate with
selected hosts via well-defined ports and application behavior. If any deviations are detected, FortiNDR will alert us of this
activity. While the activity might not be a legitimate attack, it can be classified as suspicious traffic that warrants investigation.

3
Harnessing the Power of Artificial Intelligence and Machine Learning with FortiNDR Solutions WHITE PAPER

Traffic Features: ML applied to traffic profiling


IP/port
n Natural language processing of traffic
Protocol/behavior
features such as:
Destination
Packet size User chosen – Protocols and behavior
Geo or pre-defined
features – IPs and ports
Device type/OS
– Geos and OS type
n nCr combinations of features possible
n Baseline (training) using on-prem
Session Tokenization/normalization
DNA stemming and vectorizing
traffic before detection
n Ability for users to give feedback on
anomalies or normal traffic

Similarity User
Baseline
function feedback

Anomalies
detected

Figure 3: FortiNDR and ML applications for traffic profiling

FortiNDR Cloud Examples of AI/ML Use


FortiNDR Cloud, a SaaS NDR offering from Fortinet, captures customers’ network
data. This data is then sent to FortiCloud for detection, modeling, and threat
hunting. The SaaS architecture provides an opportunity to harness cloud computing
to scale in speed, training, and analysis.

There are numerous advantages to leveraging cloud computing, AI, and ML, such as:
In 2023, FortiNDR Cloud:
n Autoscaling compute when required, moving away from on-site compute constraints
n Analyzed 11T network events
n Cross-domain data leveraging multiple datasets
n Recorded 146M observations
n Sharing detection models across verticals
n Triggered 463K detections
n Comparing observations across verticals to draw more accurate conclusions
n Had < 1% customer-reported
n Analyzing large amounts of data and applying ML to datasets false-positive rate
n Rapid deployment with SaaS-based ML solutions

The following section outlines detections and observations in FortiNDR Cloud, as well as how AI and ML assist with detecting
anomalies in a customer’s network.

Detections and observations


Detections on FortiNDR Cloud are considered high-fidelity, low false-positive events. A well-designed NDR solution should:
n Not generate too many false positives
n Provide customers with the ability to tune detections to minimize noise
One of the key benefits of a SaaS-based solution such as FortiNDR Cloud is the ability to leverage cloud computing and apply
ML on a next-generation data management solution. Another advantage is that the solution maintains network metadata for at
least 365 days at a lower cost, which is important for customers for threat hunting, as well as applying ML techniques to the
larger dataset over time to aid in detecting anomalies.

4
Harnessing the Power of Artificial Intelligence and Machine Learning with FortiNDR Solutions WHITE PAPER

Different ML algorithms generate “observations” in the FortiNDR Cloud solution, which models normal and malicious traffic in
various ways. There are more than 60 observations currently available in FortiNDR Cloud, with the Fortinet engineering team
adding new observations regularly. ML is applied to identify anomalous behavior and generate observations. These models are
built on the network metadata observed, a unique capability of the Fortinet NDR solution.

Below are a few examples of how ML is applied to identify anomalous behavior and generate observations. These ML models
are built on the network metadata observed, a unique capability of the Fortinet NDR solution.

Detections Observations

Based on well-known rules and signatures detected in traffic ML-based with traffic modeling

High fidelity, low false positives Varying levels of confidence

Ability to tune Continuously learn and fine-tune

Example: Log4J attack Example: Suspicious large data upload

Raw sensor
Sensors
data Detection
engine
UI / portal
Observation engine
Enriched (ML and / or expert
data systems)

Figure 4: Detections and observations data process flow

Detecting exfiltration attempts based on supervised learning


One of the characteristics of a breach is a large or unusual amount of data being transferred out of an organization’s network.
This is covered in MITRE ATT&CK Technique TA0010.

FortiNDR Cloud applies supervised ML using a light gradient boosting model (GBM) to detect suspicious outbound data quantity
transfer, detecting unusually large uploads related to exfiltration attempts. LightGBM ML framework has the following characteristics:
n Faster training speed and higher efficiency
n Lower memory usage
n Better accuracy
n Support of parallel, distributed, and GPU learning
n Capable of handling large-scale data
The ML model used by detection exfiltration is a tree-based model trained against synthetic exfiltration attempts. There are
two models: one is a classification model to identify if exfiltration is occurring, utilizing close to 50 features, including max,
mean, median, and standard deviation of incoming and outgoing bytes to identify outliers. The other is a regression model that
estimates how much of the traffic is exfiltration.

Once the models are built and trained by normal and anomalous datasets, FortiNDR Cloud can apply the same model to new
customer traffic and it will work instantly. No additional training or baseline data is required.

5
Harnessing the Power of Artificial Intelligence and Machine Learning with FortiNDR Solutions WHITE PAPER

Data Weighted data Weighted data Weighted data Gradient-boosted


decision trees are
a machine learning
technique for optimizing

Analysis

Analysis

Analysis

Analysis
the predictive value of a
model through successive
steps in the learning
process.
Decision tree 1 Decision tree 2 Decision tree 3 Decision tree 4 FortiNDR leverages this
(Weak classifier) (Weak classifier) (Weak classifier) (Weak classifier)
technique to detect
suspicious outbound
traffic (exfiltration).

Ensemble prediction
(Strong classifier)

Figure 5: LightGBM boosting tree algorithm applied on suspicious outbound traffic

ML to detect encrypted malicious botnet activity


A second example of ML applications in FortiNDR Cloud is the ability to detect encrypted command and control (C2) outbound
attempts within a customer’s environment. The solution detects known indicators of compromise, such as a well-known set of
botnet servers or URLs related to ransomware campaigns. FortiGuard Labs Applied Threat Research (ATR) team further studies
the behavior of such connections and applies different ML models—one example is SK Learn Classifier—to model different
features within the malicious traffic, such as:

n Beaconing frequency of botnets


n HTTP headers or user agent strings
n Certificates and their characteristics used for SSL encryption
n How long the connection lives
n JA3 client and server headers
n Number of bytes or packets transferred in connection
Using this technique, FortiNDR Cloud can build an accurate model of malicious C2 behavior. In general, C2 networks are not
static and constantly change. Attackers couple dynamic C2 activity with machine-generated Domain Generated Algorithms to
avoid detections.

The benefit of having this C2 supervised learning model when new traffic is observed on network is that if any of the traffic from
the C2 model is routed to a new and unknown destination, FortiNDR Cloud will alert on this anomaly to determine if an SSL C2 is
observed. The confidence of the observations will depend on how well the traffic profile fits into the model. This model also gets
refined over time as the FortiGuard Labs team detects and identifies additional IOCs as new threats are discovered.

Once users are prompted with SSL C2 observations, SOC analysts can conduct further threat hunting on FortiNDR itself based on
the internal query language (IQL) query language, or through other offerings that are part of the Fortinet Security Fabric platform,
such as FortiEDR endpoint detection and response, FortiGate Next-Generation Firewalls, or FortiSIEM to further triage the attack.

6
Harnessing the Power of Artificial Intelligence and Machine Learning with FortiNDR Solutions WHITE PAPER

Beaconing Frequency of Botnet Activity HTTP Header Length


120
350

300 100

250
80
Data Sent (KB)

Header size (KB)


200
60

150

40
100

20
50

0 0
20:05 20:10 20:15 20:20 20:25 20:30 20:35 20:40 20:45 20:50 20:55 21:00 21:05 21:10 21:15 21:20
10 25 50 75 90
Timestamp Desktop Mobile

TTL Connection Times Bytes Transferred by C2 Connections


580 1200000

560
1000000
540

Bytes transferred (log-scale)


Connection TTL (mms)

520 800000

500

600000
480

460
400000

440

200000
420

400
0
0 5 10 15 20

Time

Figure 6: Modeling of malicious botnet behavior

FortiNDR Cloud: Combining unsupervised and supervised learning


The example above examines how FortiNDR Cloud detects botnet communication using SSL data, but botnets can also
communicate via HTTP using redirects. To detect this activity, FortiNDR Cloud relies on a similar method for detecting SSL C2 to
detect HTTP C2 behavior. Leveraging a PageRank unsupervised learning model, FortiNDR Cloud evaluates the trustworthiness of
various webpages while modeling traffic. For example, adversaries can create spoofed domains to redirect botnet C2 traffic via
HTTP to avoid detections. FortiNDR Cloud evaluates these redirected webpages using the PageRank algorithm to measure how
trusted (or new) the webpages are. Once evaluated, FortiNDR Cloud inputs these measures into an additional supervised HTTP
learning model for further analysis. This showcases how Fortinet combines the power of unsupervised and supervised learning to
allow FortiNDR Cloud to determine if observed HTTP connections exhibit botnet C2 behavior and qualify for a new detection.

FortiNDR Solutions Deliver Unique Advantages


FortiNDR and FortiNDR Cloud are two solutions that truly apply ML and AI, whether on-premises or a SaaS-based cloud solution.
This ongoing application of ML and AI helps identify anomalies, as adversaries always leave traces of activity on the network.
NDR solutions offer unique capabilities to security teams as they conduct investigations and perform threat hunting. They can
be combined with other Fortinet Security Fabric platform offerings to create a comprehensive solution to secure any network.

Visit our website for more information.

www.fortinet.com

Copyright © 2024 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product
or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other
conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser
that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any
such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise
revise this publication without notice, and the most current version of the publication shall be applicable.

August 5, 2024 11:44 PM

2635871-0-0-EN

You might also like