Insider Threat The Visual Conviction
|
|
|
- Douglas Arnold
- 10 years ago
- Views:
Transcription
1 Copyright Copyright (c) 2007 (c) 2007 by by Raffael Marty Insider Threat The Visual Conviction Raffael Marty, GCIA, CISSP Manager ArcSight, Inc. FIRST June 2007 Seville
2 Copyright (c) 2007 by Raffael Marty Who Am I? Raffael Marty, GCIA, CISSP Manager ArcSight, Inc. Log management, correlation Regulatory compliance Intrusion Detection IBM Research IT Security PriceWaterhouse Coopers Open Vulnerability and Assessment Language (OVAL) board member Common Event Enumeration (CEE) founding member
3 Copyright (c) 2007 by Raffael Marty Who Am I? Passion for Visual Security Event Analysis
4 Copyright (c) 2007 by Raffael Marty My Books / Book Contributions Applied Security Visualization Paperback: 350 pages Publisher: Addison Wesley (February, 2008) ISBN: How to Cheat at Configuring Open Source Security Tools Paperback: 504 pages Publisher: Syngress Publishing (May 1, 2007) ISBN: Security Data Visualization Paperback: 256 pages Publisher: No Starch Press (August 25, 2007) ISBN: Snort IDS and IPS Toolkit Paperback: Publisher: Syngress Publishing (April 20, 2007) ISBN:
5 Copyright (c) 2007 by Raffael Marty Agenda Visualization Insider Threat Theory Log Data Processing Open Source Visualization Tools Visualization Exercise with AfterGlow Simple I-Threat Visualizations DuPont Information Leak SAP Fraud Detection
6 Copyright (c) 2007 by Raffael Marty Agenda Insider Detection Process (IDP) Applying IDP (Exercise) Insider Threat Solution Round Up
7 Copyright (c) 2007 by Raffael Marty Disclaimer IP addresses and host names showing up in event graphs and descriptions were obfuscated/changed. The addresses are completely random and any resemblance with well-known addresses or host names are purely coincidental.
8 Visualization Copyright (c) 2007 by Raffael Marty
9 Copyright (c) 2007 by Raffael Marty A Picture is Worth a Thousand Log Entries Detect the Expected & Discover the Unexpected Reduce Analysis and Response Times Make Better Decisions
10 Copyright (c) 2007 by Raffael Marty Text or Visuals? What would you rather look at? Jun 17 09:42:30 rmarty ifup: Determining IP information for eth0... Jun 17 09:42:35 rmarty ifup: failed; no link present. Check cable? Jun 17 09:42:35 rmarty network: Bringing up interface eth0: failed Jun 17 09:42:38 rmarty sendmail: sendmail shutdown succeeded Jun 17 09:42:38 rmarty sendmail: sm-client shutdown succeeded Jun 17 09:42:39 rmarty sendmail: sendmail startup succeeded Jun 17 09:42:39 rmarty sendmail: sm-client startup succeeded Jun 17 09:43:39 rmarty vmnet-dhcpd: DHCPINFORM from Jun 17 09:45:42 rmarty last message repeated 2 times Jun 17 09:45:47 rmarty vmnet-dhcpd: DHCPINFORM from Jun 17 09:56:02 rmarty vmnet-dhcpd: DHCPDISCOVER from 00:0c:29:b7:b2:47 via vmnet8 Jun 17 09:56:03 rmarty vmnet-dhcpd: DHCPOFFER on to 00:0c:29:b7:b2:47 via vmnet8 Jun 17 09:56:03 rmarty vmnet-dhcpd: DHCPREQUEST for from 00:0c:29:b7:b2:47 via vmnet8 Jun 17 09:56:03 rmarty vmnet-dhcpd: DHCPACK on to 00:0c:29:b7:b2:47 via vmnet8 Jun 17 10:00:03 rmarty crond(pam_unix)[30534]: session opened for user root by (uid=0) Jun 17 10:00:10 rmarty crond(pam_unix)[30534]: session closed for user root Jun 17 10:01:02 rmarty crond(pam_unix)[30551]: session opened for user root by (uid=0) Jun 17 10:01:07 rmarty crond(pam_unix)[30551]: session closed for user root Jun 17 10:05:02 rmarty crond(pam_unix)[30567]: session opened for user idabench by (uid=0) Jun 17 10:05:05 rmarty crond(pam_unix)[30567]: session closed for user idabench Jun 17 10:13:05 rmarty portsentry[4797]: attackalert: UDP scan from host: / to UDP port: 192 Jun 17 10:13:05 rmarty portsentry[4797]: attackalert: Host: / is already blocked Ignoring Jun 17 10:14:09 rmarty portsentry[4797]: attackalert: UDP scan from host: / to UDP port: 68 Jun 17 10:14:09 rmarty portsentry[4797]: attackalert: Host: / is already blocked Ignoring Jun 17 10:14:09 rmarty portsentry[4797]: attackalert: UDP scan from host: / to UDP port: 68 Jun 17 10:14:09 rmarty portsentry[4797]: attackalert: Host: / is already blocked Ignoring Jun 17 10:21:30 rmarty portsentry[4797]: attackalert: UDP scan from host: / to UDP port: 68 Jun 17 10:21:30 rmarty portsentry[4797]: attackalert: Host: / is already blocked Ignoring Jun 17 10:28:40 rmarty vmnet-dhcpd: DHCPDISCOVER from 00:0c:29:b7:b2:47 via vmnet8 Jun 17 10:28:41 rmarty vmnet-dhcpd: DHCPOFFER on to 00:0c:29:b7:b2:47 via vmnet8 Jun 17 10:28:41 rmarty vmnet-dhcpd: DHCPREQUEST for from 00:0c:29:b7:b2:47 via vmnet8 Jun 17 10:28:45 rmarty vmnet-dhcpd: DHCPACK on to 00:0c:29:b7:b2:47 via vmnet8 Jun 17 10:30:47 rmarty portsentry[4797]: attackalert: UDP scan from host: / to UDP port: 68 Jun 17 10:30:47 rmarty portsentry[4797]: attackalert: Host: / is already blocked Ignoring Jun 17 10:30:47 rmarty portsentry[4797]: attackalert: UDP scan from host: / to UDP port: 68 Jun 17 10:30:47 rmarty portsentry[4797]: attackalert: Host: / is already blocked Ignoring Jun 17 10:35:28 rmarty vmnet-dhcpd: DHCPINFORM from Jun 17 10:35:31 rmarty vmnet-dhcpd: DHCPINFORM from Jun 17 10:38:51 rmarty vmnet-dhcpd: DHCPREQUEST for from 00:0c:29:b7:b2:47 via vmnet8 Jun 17 10:38:52 rmarty vmnet-dhcpd: DHCPACK on to 00:0c:29:b7:b2:47 via vmnet8 Jun 17 10:42:35 rmarty vmnet-dhcpd: DHCPINFORM from Jun 17 10:42:38 rmarty vmnet-dhcpd: DHCPINFORM from
11 Why a Visual Approach Helps A picture tells more than a thousand log lines Reduce analysis and response times Quickly visualize thousands of events Make better decisions Situational awareness Visualize status of business posture Visual display of most important properties Be more efficient Facilitate communication Use graphs to communicate with other teams Graphs are easier to understand than textual events Copyright (c) 2007 by Raffael Marty
12 Copyright (c) 2007 by Raffael Marty Insider Threat Visualization Huge amounts of data More and other data sources than for the traditional security use-cases Insiders often have legitimate access to machines and data. You need to log more than the exceptions. Insider crimes are often executed on the application layer. You need transaction data and chatty application logs. The questions are not known in advance! Visualization provokes questions and helps find answers. Dynamic nature of fraud Problem for static algorithms. Bandits quickly adapt to fixed threshold-based detection systems. Looking for any unusual patterns
13 Graph Types Simple Charts Copyright (c) 2007 by Raffael Marty Bar Charts Pie Charts Line Charts Frequency Where outside on_server past_screening on_server outside past_screening Where Scatter Plots 3D Scatter Plots Link Graphs
14 Graph Types Multivariate Graphs Copyright (c) 2007 by Raffael Marty Link Graphs I like this word! Parallel Coordinates TreeMaps
15 Multivariate Graphs Link Graphs Copyright (c) 2007 by Raffael Marty
16 Link Graphs Data Mapping Copyright (c) 2007 by Raffael Marty Raw Event: [**] [1:1923:2] RPC portmap UDP proxy attempt [**] [Classification: Decode of an RPC Query] [Priority: 2] 06/04-15:56: : > :111 UDP TTL:64 TOS:0x0 ID:0 IpLen:20 DgmLen:148 DF Len: 120 Different node configurations: SIP Name DIP SIP DIP DPort RPC portmap SIP SPort DPort Name SIP DIP RPC portmap
17 Copyright (c) 2007 by Raffael Marty Tree Maps What is this? UDP TCP UDP DNS SNMP HTTP All Network TCP Traffic SSH FTP
18 Copyright (c) 2007 by Raffael Marty Tree Maps 20% 80% UDP TCP Configuration (Hierarchy): Protocol
19 Copyright (c) 2007 by Raffael Marty Tree Maps UDP TCP UDP DNS SNMP HTTP TCP SSH FTP Configuration (Hierarchy): Protocol -> Service Size: Count Color: Protocol
20 Tree Maps Advanced Usage Copyright (c) 2007 by Raffael Marty More than three dimensions Probably less than 5 dimensions Color and Size Additional dimensions Not shown in the main hierarchy
21 Copyright (c) 2007 by Raffael Marty Parallel Coordinates Action Rule SIP Asset Role DIP Flag n dimensions Size proportional to occurrence Selection propagates
22 Questions and Answers Copyright (c) 2007 by Raffael Marty
23 Copyright (c) 2007 by Raffael Marty Thank You Raffael Marty Manager Solutions ArcSight, Inc. Security Data Visualization
24 Insider Threat Theory Raffael Marty, GCIA, CISSP Manager ArcSight, Inc. FIRST June 2007 Seville
25 Agenda Visualization Insider Threat Theory Log Data Processing Open Source Visualization Tools Visualization Exercise with AfterGlow Simple I-Threat Visualizations DuPont Information Leak SAP Fraud Detection
26 Insider Threat Definition "Current or former employee or contractors who intentionally exceeded or misused an authorized level of access to networks, systems or data in a manner that targeted a specific individual or affected the security of the organization s data, systems and/or daily business operations" [CERT: Definition of an Insider]
27 Insider Threat Three Types of Insider Threat Information Theft Fraud Sabotage
28 Insider Threat Information Theft Information Theft is concerned with stealing of confidential or proprietary information. This includes things like financial statements, intellectual property, design plans, source code, trade secrets, etc.
29 Insider Threat Information Theft Hard to stop: Cell Phones / ipods / USB sticks Hard copies (printer) Information is intangible. How do you protect that?
30 Insider Threat Information Protection Information Extrusion Detection Leak Prevention Document Management Policies and Procedures Awareness Document Classification
31 Insider Threat Fraud Fraud deals with the misuse of access privileges or the intentional excess of access levels to obtain property or services unjustly through deception or trickery.
32 Insider Threat Type of Fraud Real estate Insurance Tax Bank Occupational Financial Statement
33 Insider Threat Fraud Detection Various different approaches User Identification Transaction verification / checks and balances Separation of Duties
34 Insider Threat Sabotage Sabotage has to do with any kind of action to harm individuals, organizations, organizational data, systems, or business operations.
35 Insider Threat Sabotage Information Destruction Denial of Service Theft Harm to organization of individuals
36 Insider Threat Sabotage Detection How can you detect this? Wouldn t it be too late if you detected sabotage?
37 Insider Threat Personae Why are They Important? Understand who is behind the crime. Know what to look for Stop insiders before they become a problem
38 Insider Persona Information Thieves Former employees or employees on their way out Three types Financially motivated Employees taking information to new job (starting new company) Embarrass former employee (organization or individual) Using their access privileges and in some cases compromised accounts Mostly committed crime from within workspace
39 Insider Persona Fraudsters Current employees Using their own account and access privileges Generally have system administration or privileged access While financially motivated, fraudsters are in general not in financial need Generally no sophisticated attack methods (such as exploits) Mostly committed crime from within workspace
40 Insider Persona Saboteur Former employees Revenge for negative event (fired, no bonus, new boss, etc.) Generally (used to) have system administration or privileged access No authorized access when committing crime Mostly using compromised accounts, some using backdoor accounts Some using technically sophisticated means (scripts as logic bombs, etc.) Some took preparatory action
41 Questions and Answers
42 Thank You Raffael Marty Manager Solutions ArcSight, Inc. Security Data Visualization
43 Insider Threat Log Data Processing Raffael Marty, GCIA, CISSP Manager ArcSight, Inc. FIRST June 2007 Seville
44 Agenda Visualization Insider Threat Theory Log Data Processing Open Source Visualization Tools Visualization Exercise with AfterGlow Simple I-Threat Visualizations DuPont Information Leak SAP Fraud Detection
45 What Tools Are You Using For Log Processing?
46 How To Generate A Graph... Normalization... Device Parser Event Visualizer Jun 17 09:42:30 rmarty ifup: Determining IP information for eth0... Jun 17 09:42:35 rmarty ifup: failed; no link present. Check cable? Jun 17 09:42:35 rmarty network: Bringing up interface eth0: failed Jun 17 09:42:38 rmarty sendmail: sendmail shutdown succeeded Jun 17 09:42:38 rmarty sendmail: sm-client shutdown succeeded Jun 17 09:42:39 rmarty sendmail: sendmail startup succeeded Jun 17 09:42:39 rmarty sendmail: sm-client startup succeeded Jun 17 09:43:39 rmarty vmnet-dhcpd: DHCPINFORM from Jun 17 09:45:42 rmarty last message repeated 2 times Jun 17 09:45:47 rmarty vmnet-dhcpd: DHCPINFORM from Jun 17 09:56:02 rmarty vmnet-dhcpd: DHCPDISCOVER from 00:0c:29:b7:b2:47 via vmnet8 Jun 17 09:56:03 rmarty vmnet-dhcpd: DHCPOFFER on to 00:0c:29:b7:b2:47 via vmnet8 NH Log File Visual
47 UNIX Tools awk awk F, {printf( %s,%s,$2,$1);} Sed sed 's/fubar/foobar/' filename Grep cat file grep v
48 Regular Expressions What? Text processing Searching Replacing Extracting Example Raf{2}a.l Mart[yi]
49 Regular Expressions Basics ^ Beginning of string $ End of string. Any character [ Start of character list ] End of character list ( Start of expression group ) End of expression group ORs two expressions \ Escape character * Preceding expression occurs zero or more times? Preceding expression occurs zero or one times + Preceding expression occurs one or more times
50 Regular Expressions Examples Searching perl -ne 'print if (/^1/)' file.txt egrep '^1[0-9]+ +K' file.txt Replacing perl -pe 's/^ +//' phonelist.txt sed 's/^$/d' price.txt Extracting perl -pe 's/.*(in=[^ ]*).*/\1/
51 Regular Expressions Advanced Greedy vs. non-greedy Apr 17 08:22:27 rmarty kernel: OutputIN= OUT=vmnet8 SRC= DST= LEN=258 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=138 DPT=138 LEN=238 perl -pe 's/.*(out=.*).*/\1/ OUT=vmnet8 SRC= DST= LEN=258 TOS=0x00 PREC=0x00 TTL=64 perl ID=0 -pe DF PROTO=UDP 's/.*(out=.*?) SPT=138 DPT=138 LEN=238.*/\1/ OUT=vmnet8
52 Regular Expressions Advanced Crazy example: Creates an index of links from a HTML file s/<[ ]*[Aa][ ]*[Hh][Rr][Ee][Ff]/<a href/g :loop /<a href *= *"[^#]/{; x; s/[^\n]*/&; ;/ s/\([0-8]\{0,1\}\)\(9*\);[^1]*\(.\)\1[^;]*\2\(0*\)[^;]*;\(.*\)/\3\4\5/ x; G; s <a href *= *\("\([^"]\+\)"[^>]*>\)\([^\n]*\(\n\)\)\([^\n]*\)\(.*$\) < =\1[\5] \3\5\4\6\4[\5] \2<br> h; s/[^\n]*\n// x s/\n.*// b loop; } s/< /<a href/g; /<\/[Bb][Oo][Dd][Yy]>/{ G s/\(<\/[bb][oo][dd][yy]>[^\n]*\)\n[^\n]*\n*\(.*\)/<hr>\2\1/; }
53 PERL Simple tools: (Stolen from: 10/13/ :25: , , ,2071,135 I want to get the country of the source address (first IP in the log): cat pflog.csv perl -M'Geo::IPfree' -na -F/,/ -e '($country,$country_name)=geo::ipfree::lookup($f[1]);ch omp; print "$_,$country_name\n"' And here the output: 10/13/ :24: , , ,,echo request,europe
54 Data Sources
55 Different Data Sources PCAP Firewall (PF) IP Tables and why its logging is bad Argus Snort
56 PCAP Packet Captures Binary format tcpdump nnlr <file>
57 PF Firewall OpenBSD Firewall Feb 18 13:39: rule 71/0(match): pass in on xl0: > : S : (0) win <mss 1460,nop,wscale 0,nop,nop,timestamp > (DF) Reading the file/interface (which is in pseudo PCAP): tcpdump nnli pflog Make sure you are using the OpenBSD tcpdump!!
58 Argus man 8 argus Argus is an IP transaction auditing tool that categorizes IP packets which match the boolean expression into a protocol-specific network transaction model. Argus reports on the transactions that it discovers, as they occur.
59 Argus Output 10 Apr 06 10:55:46 * tcp ?> RST Timestamp Protocol SourceIP. SourcePort Directon DestiationIP. DestinationPort PacketsIn and PacketsOut BytesIn and BytesOut Status
60 Parsers
61 Parsers Parser? To analyze or separate (input, for example) into more easily processed components. (answers.com) Interpret Data Knows data format Re-use don t re-invent! The UNIX Paradigm: Work in a pipe! Some available on:
62 AfterGlow Parsers tcpdump2csv.pl Takes care of swapping response source and targets tcpdump -vttttnnelr /tmp/log.tcpdump./tcpdump2csv.pl "sip dip [ sport" sendmail_parser.pl Reassemble conversations: Jul 24 21:01:16 rmarty sendmail[17072]: j6p41gqt017072: from=<[email protected]>, size=650, class=0, nrcpts=1, Jul 24 21:01:16 rmarty sendmail[17073]: j6p41gqt017072: to=ram, ctladdr=<[email protected]> (0/0), delay=00:00:00, xdelay=00:00:00, mailer=local, pri=30881, dsn=2.0.0, stat=sent
63 AfterGlow Parsers Argus2csv.pl ragator -r file.argus -nn -A -s +dur -s +sttl -s +dttl./argus2csv.pl src dst pkts pf2csv.pl Parsing OpenBSD pf output tcpdump nnli pflog./pflog.pl src dst rule snortalert2csv.pl cat alert./snortalert2csv.pl name src dport
64 AfterGlow Log Analysis Tools These tools are part of AfterGlow mergelogs.pl./merge_logs.pl lookup.csv file.csv lookup.csv Account Sharing,9 AV disabled,10 Backdoor Access,10 Customer Data Access,2 file.csv rweiss,av disabled wcwu,account Sharing bgrosof,backdoor Access Output: rweiss,av disabled,10 wcwu,account Sharing,8 bgrosof,backdoor Access,10
65 AfterGlow Log Analysis Tools anonymize.pl cat file./anonymize.pl -c 1 -p user Original: rweiss,av disabled wcwu,internal Recon bgrosof,source Code Access Anonymized: user1,av disabled user2,internal Recon user3,source Code Access
66 Questions and Answers
67 Thank You Raffael Marty Manager Solutions ArcSight, Inc. Security Data Visualization
68 Insider Threat Open Source Tools Raffael Marty, GCIA, CISSP Manager ArcSight, Inc. FIRST June 2007 Seville
69 Agenda Visualization Insider Threat Theory Log Data Processing Open Source Visualization Tools Visualization Exercise with AfterGlow Simple I-Threat Visualizations DuPont Information Leak SAP Fraud Detection
70 What are some tools? AfterGlow Treemap2
71 AfterGlow 1.x - Perl Parser CSV File AfterGlow Graph LanguageFile Grapher Supported graphing tools: GraphViz from AT&T (dot, neato, circo, twopi) LGL (Large Graph Layout) by Alex Adai
72 AfterGlow 1.x Parser CSV File AfterGlow Graph LanguageFile Grapher aaelenes,printing Resume abbe,information Encrytion aanna,patent Access aatharuy,ping digraph structs { graph [label="afterglow 1.5.8", fontsize=8]; node [shape=ellipse, style=filled, fontsize=10, width=1, height=1, fixedsize=true]; edge [len=1.6]; } "aaelenes" -> "Printing Resume" ; "abbe" -> "Information Encryption" ; "aanna" -> "Patent Access" ; "aatharuv" -> "Ping" ;
73 AfterGlow 1.x Features Generate Link Graphs Filtering Nodes Based on name Based on number of occurrences Fan Out Filtering Fan Out: 3 Coloring Edges Nodes Clustering
74 AfterGlow 1.x Features Node Sizes Auto adjustment Variables
75 AfterGlow 1.x Property File Color Definition Coloring: color.[source event target edge sourcetarget]= <perl expression returning a color name> contains input-line, split into tokens: color.event= red if ($fields[1] =~ /^192\..*) Filter nodes with invisible color: color.target= invisible if ($fields[0] eq IIS Action )
76 AfterGlow 1.x Hello World Input Data: a,b a,c b,c d,e Output: a b c d e Command: cat file./afterglow c simple.properties t \ neato Tgif o test.gif simple.properties: color.source= green if ($fields[0] ne d ) color.target= blue if ($fields[1] ne e ) color.source= red color= green
77 AfterGlow 1.x Property File Threshold Threshold: threshold.[source event targe]=<value>
78 AfterGlow 1.x Property File Clustering and Node Sizes Clustering: cluster.[source event target]= <perl expression returning a cluster name> Node Sizes: size.[source event target]= <perl expression returning a number> Maxnodesize=<value> sum.[source event target]=[0 1]
79 AfterGlow 1.x Property File Variables Variables Definition: # Watch Lists variable=@privileged=( "aaerchak" ); Use: color.target="gold" if (grep(/$fields[0]/,@privileged)); There are no limits on what you do with the variables keyword! You can put entire scripts in there!
80 AfterGlow 1.x Running AfterGlow cat data./afterglow.pl c file.prop neato -Tgif -otest.gif Usage: perl afterglow.pl [-adhnstv] -a : turn off labelelling of the output graph with the configuration used -b lines : number of lines to skip (e.g., 1 for header line) -c conffile : color config file -d : print node count -e length : edge length -f threshold : source fan out threshold -g threshold : event fan out threshold (only in three node mode) -h : this (help) message -l lines : the maximum number of lines to read -m : the maximum size for a node -n : don't print node labels -o threshold : omit threshold (minimum count for nodes to be displayed) Non-connected nodes will be filtered too. -p mode : split mode for predicate nodes where mode is 0 = only one unique predicate node (default) 1 = one predicate node per unique subject node. 2 = one predicate node per unique target node. 3 = one predicate node per unique source/target node. -s : split subject and object nodes -t : two node mode (skip over objects) -v : verbose output -x : text label color
81 AfterGlow 1.x Some Property File Examples # Variable and Color variable=@violation=("backdoor Access", "HackerTool Download ); color.target="orange" if (grep(/$fields[1]/,@violation)); color.target="palegreen" # Node Size and Threshold maxnodesize=1; size.source=$fields[2] size=0.5 sum.target=0; threshold.source=14; # Color and Cluster color.source="palegreen" if ($fields[0] =~ /^111/) color.source="red" color.target="palegreen" cluster.source=regex_replace("(\\d\+)\\.\\d+")."/8"
82 AfterGlow AfterGlow Demo
83 Treemap Input TM3 file (I am going to use a simple, but practical form!) Tab delimited Two special header lines Target System DIP DIP Action STRING STRING STRING Financial System pass Financial System block Financial System pass Mail Server block Mail Server block
84 Treemap Input - Header First Header Line: Column Names Second Header Line: Data Types Count Target System DIP DIP Action INTEGER STRING STRING STRING
85 Treemap Treemap2 Treemap2 Demo
86 Agenda Visualization Insider Threat Theory Log Data Processing Open Source Visualization Tools Visualization Exercise with AfterGlow Simple I-Threat Visualizations DuPont Information Leak SAP Fraud Detection
87 Questions and Answers
88 Thank You Raffael Marty Manager Solutions ArcSight, Inc. Security Data Visualization
89 Copyright Copyright (c) 2007 (c) 2007 by by Raffael Marty Insider Threat Simple ithreat Example Raffael Marty, GCIA, CISSP Manager ArcSight, Inc. FIRST June 2007 Seville
90 Copyright (c) 2007 by Raffael Marty Agenda Visualization Insider Threat Theory Log Data Processing Open Source Visualization Tools Visualization Exercise with AfterGlow Simple I-Threat Visualizations DuPont Information Leak SAP Fraud Detection
91 Copyright (c) 2007 by Raffael Marty DuPont Case In February of 2007 a fairly large information leak case made the news. The scientist Gary Min faces up to 10 years in prison for stealing 16,706 documents and over 22,000 scientific abstracts from his employer DuPont. The intellectual property he was about to leak to a DuPont competitor, Victrex, was assessed to be worth $400 million. There is no evidence Gary actually turned the documents over to Victrex.
92 DuPont Case How it Could Have Been Prevented Copyright (c) 2007 by Raffael Marty What s the Answer?
93 DuPont Case A Simple Solution Log Log Collection Collection Copyright (c) 2007 by Raffael Marty
94 DuPont Case A Simple Solution Copyright (c) 2007 by Raffael Marty
95 DuPont Case A Not so Targeted Solution Copyright (c) 2007 by Raffael Marty user Size: #accesses server
96 Questions and Answers Copyright (c) 2007 by Raffael Marty
97 Copyright (c) 2007 by Raffael Marty Thank You Raffael Marty Manager Solutions ArcSight, Inc. Security Data Visualization
98 Copyright Copyright (c) 2007 (c) 2007 by by Raffael Marty Insider Detection Process Raffael Marty, GCIA, CISSP Manager ArcSight, Inc. FIRST June 2007 Seville
99 Copyright (c) 2007 by Raffael Marty Agenda Insider Detection Process (IDP) Applying IDP (Exercise) Insider Threat Solution Round Up
100 Insider Threat Detection Process Overview Copyright (c) 2007 by Raffael Marty Intro Precursors Scoring Precursors Visualizing Watch Lists Advanced Scoring
101 Insider Threat Detection Process Intro Copyright (c) 2007 by Raffael Marty The following Insider Threat Detection Process is Ongoing research A proposed approach Not a guarantee for success Probably going to fail in your environment A lot of work to execute Incredibly interesting and generates nice graphs Related Work: (no visualization, but uses precursors) ELICIT: A System for Detecting Insiders Who Violate Needto-know, Mark Maloof and Greg Stephens
102 Insider Threat Detection Process Precursors Copyright (c) 2007 by Raffael Marty A precursor is an activity that when observed, flags the associated user as a potential insider. Some research calls this detectors. Examples: Printing off-hours Downloading Hacker Tools Accessing documents outside of user s role Use of anonymous proxy
103 Insider Threat Detection Process Scoring Precursors Copyright (c) 2007 by Raffael Marty Each precursor can be assigned a score which reflects the extent to which the precursor classifies someone as an insider. Factors to consider: Impact of action If I actually new some math, I would use a Bayesian Inference network for this ;-) Rate of False Positives Is this okay for some user roles?
104 Insider Threat Detection Process Visualization Copyright (c) 2007 by Raffael Marty User -> Precursor -> Score Find outliers Based on groups of users with similar behavior Based on scores
105 Insider Threat Detection Process Visualization Groups of Users Copyright (c) 2007 by Raffael Marty
106 Insider Threat Detection Process Visualization User Scores Copyright (c) 2007 by Raffael Marty
107 Insider Threat Detection Process Watch Lists Copyright (c) 2007 by Raffael Marty Keep track of specific users Privileged accounts Contractors Terminated Employees
108 Insider Threat Detection Process Advanced Scoring Copyright (c) 2007 by Raffael Marty Based on the watch lists, adjust the precursor scores for these users. For example, a user name on the terminated employees list: +5!
109 Insider Threat Detection Process Advanced Watch List Application Copyright (c) 2007 by Raffael Marty Do role-based behavior assessment based on watch lists Color users based on watch list Quickly spot groups, outliers, anomalies
110 Insider Threat Detection Process Scoring and Coloring based on Watch Lists Copyright (c) 2007 by Raffael Marty
111 Insider Threat Detection Process Precursor Categories Copyright (c) 2007 by Raffael Marty Problem of scoring so far: Repetitive not so bad behavior escalates a user immediately. Group precursors: 1. Minimal or no impact 2. Signs of a setup for a malicious act 3. Malicious behavior, normal for some users 4. Malicious behavior, this should _never_ happen 5. The insider crime itself
112 Insider Threat Detection Process User Tiers Copyright (c) 2007 by Raffael Marty User can accumulate a max of 20 points per category Categorize users based on score: Nothing to worry about just yet On a bad track of going malicious Very likely has malicious intentions Malicious Insiders
113 Questions and Answers Copyright (c) 2007 by Raffael Marty
114 Copyright (c) 2007 by Raffael Marty Thank You Raffael Marty Manager Solutions ArcSight, Inc. Security Data Visualization
IT Data Visualization
IT Data Visualization Raffael Marty, GCIA, CISSP Chief Security Strategist @ Splunk> SUMIT, Michigan - October 08 Raffael Marty Chief Security Strategist @ Splunk> Looked at logs/it data for over 10 years
DAVIX Visualization. Workshop
V DAVIX Visualization D X Workshop V DAVIX Visualization D X Workshop Jan. Monsch at iplosion. com Raffael. Marty at secviz. org Chief Security Strategist @ Splunk> Passion for Visualization http://secviz.org
Network Security Management
Network Security Management TWNIC 2003 Objective Have an overview concept on network security management. Learn how to use NIDS and firewall technologies to secure our networks. 1 Outline Network Security
DAVIX Visualization Bootcamp 25C3
DAVIX Visualization Bootcamp 25C3 Visualize Your Network! Jan P. Monsch Marius Ciepluch About Your Hosts Jan P. Monsch DAVIX Project Initiator & Lead Engineer Marius Ciepluch DAVIX User & Workshop Assistant
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Cloud-based Log Analysis and Visualization
Cloud-based Log Analysis and Visualization DeepSec 2010, Vienna, Austria mobile-166 My syslog Raffael Marty - @zrlram Raffael (Raffy) Marty Founder @ Chief Security Strategist and Product Manager @ Splunk
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm, Network IDS devices use passive network monitoring extensively to detect possible threats. Through passive
Passive Vulnerability Detection
Page 1 of 5 Passive Vulnerability Detection "Techniques to passively find network security vulnerabilities" Ron Gula [email protected] September 9, 1999 Copyright 1999 Network Security Wizards
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Insider Threat Control: Using a SIEM signature to detect potential precursors to IT Sabotage. CERT Insider Threat Center
Insider Threat Control: Using a SIEM signature to detect potential precursors to IT Sabotage CERT Insider Threat Center April 2011 NOTICE: THIS TECHNICAL DATA IS PROVIDED PURSUANT TO GOVERNMENT CONTRACT
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis
Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security
How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security PART 1 - COMPLIANCE STANDARDS PART 2 SECURITY IMPACT THEMES BUILD A MODEL THEMES MONITOR FOR FAILURE THEMES DEMONSTRATE
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
Intrusion Detection Systems
Intrusion Detection Systems Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/
Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)
Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS) Internet (In)Security Exposed Prof. Dr. Bernhard Plattner With some contributions by Stephan Neuhaus Thanks to Thomas Dübendorfer, Stefan
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
Host Discovery with nmap
Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default
Firewall Implementation
CS425: Computer Networks Firewall Implementation Ankit Kumar Y8088 Akshay Mittal Y8056 Ashish Gupta Y8410 Sayandeep Ghosh Y8465 October 31, 2010 under the guidance of Prof. Dheeraj Sanghi Department of
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Assets, Groups & Networks
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Innominate mguard Version 6
Innominate mguard Version 6 Application Note: Firewall Logging mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str.
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
How To Protect Your Network From Attack From A Hacker On A University Server
Network Security: A New Perspective NIKSUN Inc. Security: State of the Industry Case Study: Hacker University Questions Dave Supinski VP of Regional Sales [email protected] Cell Phone 215-292-4473 www.niksun.com
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
How to protect your home/office network?
How to protect your home/office network? Using IPTables and Building a Firewall - Background, Motivation and Concepts Adir Abraham [email protected] Do you think that you are alone, connected from
The principle of Network Security Monitoring[NSM] C.S.Lee[[email protected]] http://geek00l.blogspot.com
The principle of Network Security Monitoring[NSM] C.S.Lee[[email protected]] http://geek00l.blogspot.com Claim: Before I proceed, I would like to make it clear about the topic I gonna deliver, I'm not
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
B database Security - A Case Study
WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
Perdix: A Query Language for Security Logs
Perdix: A Query Language for Security Logs Orr Bibring [email protected] Justin Prosco [email protected] Angelika Zavou [email protected] Bing Wu [email protected] September 24, 2007 Abstract This
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
----------------------------------------------------------------------------------------------------------------------
The basic commands for the firewall: 1. Command firewalllog -- To check the firewall logs and to find out source, destination, ports, request is passing or blocking and matching firewall rule no. etc superuser@securegate
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
19. Exercise: CERT participation in incident handling related to the Article 13a obligations
CERT Exercises Handbook 223 223 19. Exercise: CERT participation in incident handling related to the Article 13a obligations Main Objective Targeted Audience Total Duration This exercise provides students
Fifty Critical Alerts for Monitoring Windows Servers Best practices
Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
Protection profile of an industrial firewall
Version 1.0 short-term GTCSI July 13, 2015 Preface In the whole document, the acronym ToE (Target of Evaluation) designates the component being evaluated. Text in red differs from the mid-term version
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
FortiGate IPS Guide. Intrusion Prevention System Guide. Version 1.0 30 November 2004 01-28007-0080-20041130
FortiGate IPS Guide Intrusion Prevention System Guide Version 1.0 30 November 2004 01-28007-0080-20041130 Copyright 2004 Fortinet Inc. All rights reserved. No part of this publication including text, examples,
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
PAN-OS Syslog Integration
PAN-OS Syslog Integration Tech Note Revision M 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Log Formats...3 TRAFFIC...3 Descriptions...3 Subtype Field...5 Action Field...6 Flags Field...6
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Project 2: Firewall Design (Phase I)
Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Coimbatore-47, India. Keywords: intrusion detection,honeypots,networksecurity,monitoring
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigate the
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis
Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for
Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.
Scanning Tools The goal of the scanning phase is to learn more information about the target environment and discover openings by interacting with that target environment. This paper will look at some of
CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004
CSE331: Introduction to Networks and Security Lecture 32 Fall 2004 Hackers / Intruders External attacks Typical hacker Exploits carried out remotely Does not have an account on the remote machine Insider
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Threat Advisory: Accellion File Transfer Appliance Vulnerability
Threat Advisory: Accellion File Transfer Appliance Vulnerability Niara Threat Advisories provide timely information regarding new attacks along with how Niara helps companies quickly detect an attack to
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
CS2107 Introduction to Information and System Security (Slid. (Slide set 8)
Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information
CS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 5 is due Thursday (Oct. 22) Part 1 (tracking
10. Exercise: Automation in Incident Handling
107 10. Exercise: Automation in Incident Handling Main Objective Targeted Audience Total Duration Time Schedule Frequency The purpose of this exercise is to develop students abilities to create custom
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
Managing Latency in IPS Networks
Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended
Unix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24
Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key
Ulogd2, Advanced firewall logging
Ulogd2, Advanced firewall logging INL 172 rue de Charonne 75011 Paris, France RMLL 2009, July 8, Nantes Ulogd2, Netfilter logging reloaded 1/ 38 Some words about me NuFW main developper INL co-founder
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
HP ArcSight User Behavior Analytics
Insider Threat HP ArcSight User Behavior Analytics Application Misuse Sensitive Data Access Hakan Durgut ArcSight Specialist Nordics/Baltics 1 The insider threat challenge IT Security focus in on the external
A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006
IBM TRAINING A43 Modern Hacking Techniques and IP Security By Shawn Mullen Las Vegas, NV 2005 CSI/FBI US Computer Crime and Computer Security Survey 9 out of 10 experienced computer security incident in
Networks & Security Course. Web of Trust and Network Forensics
Networks & Security Course Web of Trust and Network Forensics Virtual Machine Virtual Machine Internet connection You need to connect the VM to the Internet for some of the Web of Trust exercises. Make
Firewalls. Pehr Söderman KTH-CSC [email protected]
Firewalls Pehr Söderman KTH-CSC [email protected] 1 Definition A firewall is a network device that separates two parts of a network, enforcing a policy for all traversing traffic. 2 Fundamental requirements
Common Event Format Configuration Guide
Common Event Format Configuration Guide F5 Networks BIG-IP Application Security Manager (ASM) Date: Friday, May 27, 2011 CEF Connector Configuration Guide This document is provided for informational purposes
Flow Visualization Using MS-Excel
Flow Visualization Using MS-Excel Visualization for the Common Man Presented by Lee Rock and Jay Brown US-CERT Analysts Einstein Program Background US-CERT Mission Einstein Program > Large volumes of traffic
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Common Event Format. Imperva SecureSphere July 27, 2009
Common Event Format Imperva SecureSphere July 27, 2009 CEF Connector Configuration Guide Imperva SecureSphere April 26, 2009 Revision History Date Description 04/26/2009 First edition of this Configuration
Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
Lab 2: Secure Network Administration Principles - Log Analysis
CompTIA Security+ Lab Series Lab 2: Secure Network Administration Principles - Log Analysis CompTIA Security+ Domain 1 - Network Security Objective 1.2: Apply and implement secure network administration
Defending Computer Networks Lecture 7: Port Scanning. Stuart Staniford Adjunct Professor of Computer Science
Defending Computer Networks Lecture 7: Port Scanning Stuart Staniford Adjunct Professor of Computer Science Logis;cs Aim to give out HW2 on Thursday Main Goals for Today TCP Portscanning Detec;on of
