Contextual Security with IF-MAP
|
|
|
- Gertrude Ball
- 10 years ago
- Views:
Transcription
1 , pp Contextual Security with IF-MAP Abdelmajid Lakbabi, Ghizlane Orhanou and Said El Hajji, Laboratory of Mathematics, Computing and Applications, Department of Mathematical and Computer Sciences, Faculty of Sciences, University of Mohammed V-Rabat, BP.1014 RP, Rabat, Morocco. Abstract The multi-context attacks are serious challenges to security detection process. Actually, each security solution produces a considerable number of security events, heterogeneous and difficult to correlate. Sensors usually work independently making hard to extract security information related to a multi-step attacks. Therefore, correlation and sharing mechanism becomes the key to deal with such challenging IT security threats. This paper provides an analysis of the current security state and proposes our security architecture based on local and global contextual protections that share security events in a real time IF-MAP approach in response to malicious activities. As to implementation phase we used opensource Omapd as a MAPS central data repository, apache web server and iptables as MAPC clients in perspective to provide real time containment when attacks are detected. Keywords: IF-MAP, Security Context, SIEM, Firewall, correlation, Threat 1. Introduction The Security is a core requirement for every network to protect its infrastructure and its critical applications. Through this paper, we propose to reduce the attack surface of a protected network by using a new contextual security mechanism [1] that makes possible to share critical events; in perspective to approach a real time reaction against the network applications attacks. A network security solution is generally based on a large number of security components like Firewalls, Intrusion Prevention/ Detection Systems IPS/IDS, SIEM [2] solutions and others, while each of those security systems keeps its partial information about the network, and there is currently no standardized way to correlate the information from those single distributed sources. This leads to the following weaknesses: Lack of context aware security The context aware security [3] is the ability of security devices or applications to analyze events in a changing environment, to detect illicit manipulations and to respond accordingly. Insufficient security integration Figure-1 below shows a conventional security with no interaction. Indeed, in traditional security solutions, each device works independently and reports more or less critical events. Moreover, those events are never or not accurately correlated, and in case the correlation job is done, it unfortunately lacks the ability to respond in real -time and contains live attacks, since the correlation task is almost invoked as a scheduled batch processing. ISSN: IJSIA Copyright c 2014 SERSC
2 Furthermore, IT security solutions are in general based on heterogeneous sensors coming from different technologies. To handle this lack of visibility, the majority of security vendors have been focused on proprietary integration between their own solution products using legacy management protocols like (Syslog, SNMP etc., ) that are static and not enough to provide a whole visibility of the attack context by analyzing suspicious connections and reacting to potential deviation from the normal behavior. Figure 1. Conventional Security with No Interaction Basically each sensor entity works on its context with practically no interaction with other sensors of the global security solution. No metadata repository to store security events and logs, and consequently there is no correlation work to analyze and state about suspicious traffic. No real-time standard or mechanism to collect security information from different sensors sources. Lack of intelligent and contextual correlation, then inability to counter distributed or multi-step attacks. From this situation, some important questions rise: With such weaknesses, how is our security being effective? Is there a computer or application infected in the network that could potentially spread malware? On the other side, the attacker has a vast advantage over the defender, since the attacker starts first and has an unpredicted strategy, while the defender should understand that strategy and respond accurately and quickly in a specific application context. From this perspective, the logical action to take is to reduce the gap between the attack and the containment reaction, to achieve that we propose a security solution based on independent protection technologies that each works on its proper security context then reporting information about given connection behavior in real time 2. New Security-Context Architecture As a start point, it is capital to determine the perimeter of our proposition. A network security solution is generally based on a large number of security components like Firewalls, Intrusion Prevention/ Detection Systems (IPS/IDS), SIEM solutions. Each of those security systems keeps its own partial information about the network, and there is currently no 428 Copyright c 2014 SERSC
3 standard way to correlate the information from those single distributed sources and share it in real time approach. Our objective is to address such lack of security coordination by the following improvements: Each sensor entity works on its context, but should share information when it is facing an attack to report and advise the global security management system and indirectly inform the security enforcement point PEP [4] to react and stop the malicious connections. Metadata repository is created to store security events, and consequently correlates and states about suspicious activity. A real-time standard mechanism is used to share security information among different sensors. Intelligent and contextual correlation is performed to counter complex or multi - step attacks. This target solution can be summarized by the following figure (Figure 2): Figure 2. Modern Concentric Security Interaction Our proposition is motivated by the following three principal objectives which will be detailed below: Illustrate the importance of securing each type of resource inside its appropriate security context Local Security Context Correlate the different security events coming from partial contexts to provide the global security context that gives a clear idea about how network resources are being used in real time approach. Share security events and malicious detection in a real time approach using a standard protocol IF-MAP [5]. A security context is used by a system to classify resources, such as applications, processes and files. It allows understanding the application environment then enforcing rules for how and by whom a given resource should be accessed. This concept is fundamental and Copyright c 2014 SERSC 429
4 mandatory to build a good security policy; To better illustrate this concept, let s talk about the security of a web application. With the evolution of web attacks, for example, classical protection of the perimeter using firewalls become inefficient, because the protection should be done inside the web application context, in order to understand what parameters are vulnerable and lock down the web application flaws consequently. This is named WAF (Web Application Firewall) ad it is a good illustration of the contextual security approach. Definitely, the better approach to guaranty a good security for given application is to perform the protection inside this application context Global Security Context (correlated context) Security approach based on local security context will fail to understand and contain multicontext attacks. As an example, let s take a protection system based on Firewall and intrusion detection/prevention systems. Such security solution is unable to protect network servers and applications, since each local tools fail to understand the whole context of a given access tentative; It assumes that attackers are remote, are network-based, and have a limited privileges; Hence after getting access, malicious users can try an escalation of privilege to gain more authorization and perform forbidden activities; Getting a root access is sufficient to bypass those traditional security, and cause damage on the target system. In this security model, the target system is considered as a Black Box, where the attacker is unable to see into the system, but can only try to manipulate it externally as described by the Top ten OWASP attacks especially the SQL, XSS and RFI [6] IF-MAP - The New Security Exchange Mechanism Are relational databases or directories enough to exchange those contextual security events? Why we need a new protocol? The answer is the challenge to collect and correlate data in real time among many applications and systems which requires the ability to accommodate diverse data types, data relationships and many security entities and find data relation schema to satisfy all security needs. Conceptually, to contain multi-context attacks, the new proposed approach, use metadata to improve the situational awareness. The idea behind is that attacks will continue to occur even more and more complex. Consequently, our objective should shift to focus on the user and application behavior, by analyzing the inappropriate uses of applications in the traffic flows to recognize anomalies; From this perspective, we will focus on the integration of the security sensors Firewall, log server, and the SIEM server to handle security events and critical parameters in the user session s context, instead of relying only on the sensors predetermined and static signatures to detect the illicit traffic. Our motivation is to make network security nodes more effective by introducing intelligent integration of legacy security technologies; this new mechanism will replace SNMP, Syslog, proprietary APIs and custom scripts, and thereby reduce integration complexity and helps to react quickly when deviation from normal behavior occurs. This new standard allows sending automatically populate security events among sensors and a central policy management system in real time which makes accurate reaction possible when attacks are detected. 430 Copyright c 2014 SERSC
5 Figure 3. IF-MAP as MAPC/MAPS Exchange Protocol As shown in the Figure 3, the challenge is the heterogeneous and multi-technology based security, that networks are to let network key security products like IPS, SIEM and the NAC policy [7] servers share events in a nearly real time way, we should adopt a new mechanism using IF-MAP to fill the gap between the attack and the containment, since this protocol has a great potential to enables easy and directly integration into an existing IT infrastructure, with extensions both from schema modifications and client reconfiguration perspectives to enhance security and approach real time reaction to threats. 3. IF-MAP security collaboration protocol IF-MAP (open standard) stands for Interface for Metadata Access Points. It is a standard based on the web technology and a central database for the IT-systems where we can store and/or retrieve information from in order to get a real-time representation of the security status of the network and its resources. IF-MAP is based on SOAP (Simple Object Access Protocol) [8] that interacts via HTTPS Request-Response according to client server paradigm. For more security, it uses certificates for each communicating client or server to secure the tunnel. This standard extends the TNC architecture, now providing a standard way to integrate a wide variety of network security devices such as IPS, SIEM servers and firewalls. This allows a smart integration of legacy enforcement check-point to achieve better security. The IF-MAP defines a standard SOAP-based protocol that network security devices can use to communicate with a shared database called a Metadata Access Point (MAP). Using this protocol and database, the network security devices share information, in real-time, about the users, applications and devices connected to the network: who s logged into what device, how healthy the device is, whether it s violating policy. Also, its main purpose is to achieve interoperability for security related data exchange between security components in a network; MAP clients (MAPC) can publish new meta-data to a MAP server (MAPS) and also search for meta-data or subscribe to specific information when new meta-data is published. Copyright c 2014 SERSC 431
6 3.1. IF-MAP Components IF-MAP standard that makes possible to exchange metadata in real time. Its main components are: - MAPS, the IF_MAP server, the central Metadata Access Point that: collects metadata about access decisions can be used to inform dynamic firewall set-up or other network issues interacts with other sensors - MAPC, the IF_MAP client representing Sensors like Firewall/IPS, log server or SIEM server, etc. On the other hand, there are two different data types to store in the MAPS: Identifiers and Metadata. Identifiers act as root hub for information stored in the IF-MAP server. There are identifiers like Identity, IP address, MAC address, Access Request and Device. The other type of data is metadata, which has to be linked to at least one identifier but can also connect two identifiers. Each client has to authenticate itself securely to the MAP Server either with username and password or certificate based authentication. All data is transmitted safely with SSL encryption IF-MAP Features for Security We will present below the main features of the IF-MAP protocol that differentiate it from other existing protocols. - One-to-many Links IF-MAP does support one-to-many links; relationships between identifiers are published (at run-time) as metadata tags on links. This if-map feature allows the schema to be run-time dynamic to leads a search method rather than query. This is a key differentiator of IF-MAP from existing standards. - Search vs. Query Technical specifications give a clear distinction between search and query which make IF- MAP simple and applicable to security events exchange. Specifically, query requires a priori knowledge of the schema (including both labels and structure). Because of the emergent structures involved in coordinated computing like security to search and act on changing data structures. Query is applicable to structured databases and directories while search is more appropriate for MAPs. - MAPs vs Directories MAPs are distributed, not hierarchical, read/write (dynamic), updatable anywhere, searched while directories are distributed, hierarchical, static and centrally updated, queried like DNS and LDAP. - Real-time state vs. Historical data In the security use-cases, systems like Web application Firewall (WAF), Firewall, Intrusion Prevention System (IPS), and Security Event Managers (SEM) subscribe to the MAP and are able to get more information and publish actionable "knowledge" back to the MAP as a result of contextual analytics; Implementation realities including such as persistence, query/search patterns, and computational demands differentiate this standard from historical stores that are suitable for non-transactional systems. 432 Copyright c 2014 SERSC
7 3.3. IF-MAP mechanism and operations The three basic functionalities of IF-MAP protocol are: Publish, Search, and Subscribe. The MAPS server is considered as central information security repository where the clients MAPC can perform the following tasks: o Publish: Clients MAPC can store information for other clients to see on the server MAPS o Search: Clients can search for published data using search patterns o Subscribe: Clients MAPC can receive notification when other clients publish new data via the MAPS. Below Figure-4 illustrates the communication flow between a Map server, a Subscriber and a Publisher. Figure 4. IF-MAP Messages Flow Such mechanism achieves interoperability for security related data exchange as following: o MAPC can publish new meta-data to the MAPS o Search for meta- data o Subscribe to specific meta-data then o Get notified when new meta-data is published. Security notifications are then formatted in xml, encapsulated in SOAP and sent via https, as shown below: <?xml version="1.0" encoding="utf-8" standalone="yes"?> <soap:envelope xmlns:soap=" xmlns:ifmap=" <soap:body> <ifmap:response> <pollresult> <updateresult name="1311"> Copyright c 2014 SERSC 433
8 <resultitem> <ip-address type="ipv4" value=" "/> <mac-address value="03:67:23:45:99:cd"/> <metadata> <meta:ip-session xmlns:meta=" METADATA/2" ifmap-cardinality="multivalue" ifmap-publisher-id="testsession123" ifmap-timestamp=" t14:53:50+02:00"/> </metadata> </resultitem> </updateresult> </pollresult> </ifmap:response> </soap:body> </soap:envelope> Security event xml formatted is then encapsulated in a soap envelop then sent to destination. Such scenario as shown in Figure-5 targets getting near real-time visibility into traffic patterns based on user behavior and applications usage [9]. Figure 5. MAPC MAPS IF-MAP Exchange MAPC can handle the three operations as described below: o o o Subscribe: notify me when (metadata pattern) match -MAPC asks to be advised for searches that match when others MAPC publish new metadata Publish: notify others security components about changes -MAPC Clients store metadata into MAPS for others to consume Search: notify me if (metadata pattern) match 434 Copyright c 2014 SERSC
9 The goal is to assess traffic flows in real time and adjust the firewall policy rules to stop attacks; therefore security rules will be injected based on metadata that defines a n-tuple parameters based on (location, source IP address, destination IP address, protocol, destination port, etc ) to stop malicious traffic. IF-MAP metadata can be associated with either an identifier or with two identifiers to build security state graph as shown in Figure-6 below. Figure 6. Dynamic Security Graph These components can act as sensors adding data to the MAPS repository and act upon information received from other components. IF-MAP provides additional properties and security policy configuration changes over the time to contain threats [9] 4. Implementation and Use Case Our target security architecture aims to implement collaboration between security components in a distributed local and central security context framework as shown below in Figure 7: Figure 7. Global and Local Security Context Architecture Copyright c 2014 SERSC 435
10 To test the local-central security concept, we setup up the following test platform based on open source tools that serves to detect attacks proactively, and then push policy changes to stop penetration in real-time. o Omapd as a IF-MAP server (MAPS) o Apache web server with full logging activated o Iptables firewall as a IF-MAP MAPC o IF-MAP plug-in installed on the Web server This leads to stop the RFI scan before further malicious activity can be performed on the target. In fact, to detect earlier (Remote File Inclusion) scanning activity against vulnerable web servers that supports IF-MAP and can act as MAPC to push the information in real time to the Firewall, then the Firewall can handle this by putting the source IP address in a black-list or just modify the policy access rules to stop the attacker. Such automated actions to virtually patch vulnerable servers and guarantee their protection in real time without administrator intervention as described below in Figure 8: Figure 8. Suspicious http Session Scenario When the scan starts, unusual activity entries in the log files are observed: www[.]<xxx>[.]com/= www[.]<xxx>[.]com/admin/admin.php?site_url= www[.]<xxx>[.]com/bin/qte_init.php?qte_root= As a reaction to that abnormal behavior, our security platform automatically took the following actions: 1. The log server as a MAPC notify the MAPS to report the RFI scan against the apache web server ; this notification is done via the IF-MAP plug-in as poll action according to (figure-4); 2. The MAPS server build a security event that state the source IP address that makes this http request is suspicious then send it to the iptables firewall as Publish Received IF- MAP primitive (as previously stated in figure-4); 3. The iptables Firewall as a MAPC when it retrieves such update from the MAPS server it takes action by black-listing the attacker IP address as detailed bellow: 436 Copyright c 2014 SERSC
11 for x in `grep -v ^# $BLACKLIST awk '{print $1}'`; do echo "Denying $x..." $IPTABLES -A INPUT -s $x -j DROP Where $BLACKLIST is the suspicious IP addresses sent by the server via IF-MAP plug-in. 5. Conclusion To protect devices and applications targeted by complex attacks, collaborative security approach between a central point of correlation and local security becomes the solution key, in this perspective we propose a security platform built on a collaborative security approach between a central point of correlation and local security devices and applications, the local security context on each MAPC device or application becomes the "source of security events" and contributes to build the global security state in real-time in order to achieve the agility and effectively implement security controls. Our proposition has the following strong features: - Deep security is done in local context which the best position to detect violations - Global security correlation is done in the central point to get better visibility about the global security - Use an adapted collaboration mechanism local to global context security That being said, IF-MAP is still not adopted by all security contributors, in case a security component doesn t support it, own scripts should be build to get the security awareness job done. Reference [1] K. Quagliata, Impact of Security Awareness Training Components on Perceived Security Effectiveness, PMP, ISACA JOURNAL, vol. 4, (2011). [2] I. Kotenko, O. Polubelova, A. Chechulin and I. Saenko, Design and Implementation of a Hybrid Ontological, Relational Data Repository for SIEM Systems, (2013). [3] J.-Y. Tigli, S. Lavirotte, G. Rey, V. Hourdin and M. Riviell, Context-aware Authorization in Highly Dynamic Environments, IJCSI International Journal of Computer Science Issues, vol. 4, no. 1, (2009). [4] K. Wu and Z. Bai, A Clientless Endpoint Authentication Scheme Based on TNC, I.J. Information Technology and Computer Science, vol. 2, (2010), pp [5] N. Parthiban, R. Ravi and Dr. B. Shekhar, Generation of security test to find injection attacks by code review, IJCSMC, vol. 3, Issue 3, (2014) March, pp [6] A. Lakbabi, G. Orhanou and S. E. Hajji, Network Access Control Technology Proposition to Contain New Security Challenges, Int. J. Communications, Network and System Sciences, vol. 5, (2012), pp [7] J. White, J. S. Park, C. A. Kamhoua and K. A. Kwiat, Game Theoretic Attack Analysis in Online Social Network (OSN) Services, Conference Proceedings, ASONAM, (2013), pp [8] T. Vollmer, M. Manic and O. Linda, Senior Member, Autonomic Intelligent Cyber Sensor to Support Industrial Control Network Awareness, IEEE Trans. Industrial Informatics, Internet links, (2014). [9] TNC IF-MAP Binding for SOAP Specification Version 2.2 Revision 9, (2014) March 26, Authors Abdelmajid Lakbabi, a security specialist, Ph.D student of computer science at the University Mohammed V Agdal, Morocco. He has spent the last 10 years working in network security field, especially the IT security audits and recommendations. With special focus in network access control, firewalling and intrusion preventions technologies, he deliverers technical presentations and trainings at the university and participates with papers and articles on network security. Copyright c 2014 SERSC 437
12 Ghizlane Orhanou, an Associate Professor in the Computing Sciences Department, Faculty of Sciences, University Mohammed V Rabat, Morocco. She received Ph.D degree in computer sciences from the University Mohammed V Agdal, Morocco in She received in 2001 a Telecommunication Engineer diploma from Telecommunication Engineering Institute (INPT Morocco). Her main research interests include networked and Information systems security. Said El Hajji, Professor in the Mathematics Department since 1991 at Mathematical and Computer Sciences, Faculty of Sciences, University of Mohammed V-Rabat. Responsible of the Mathematics, Computing and Applications Laboratory. He received Ph.D degree from Laval University in Canada. His main research interests include modeling and numerical simulations, security in networked and Information systems. 438 Copyright c 2014 SERSC
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
New Security Perspective for Virtualized Platforms
, July 3-5, 2013, London, U.K. New Security Perspective for Virtualized Platforms Abdelmajid Lakbabi, Said El hajji, Ghizlane Orhanou, Kaouthar Chetioui Abstract Recently, an important transition in IT
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer
IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
From the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer
Orchestrated Security Network Automated, Event Driven Network Security Ralph Wanders Consulting Systems Engineer Orchestrated Security Network! " TCG/ TNC Architecture! " IF-MAP! " Use cases of IF-MAP!
Trusted Network Connect (TNC)
Trusted Network Connect (TNC) Open Standards for Integrity-based Network Access Control and Coordinated Network Security April 2011 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006 Tel
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
Realize That Big Security Data Is Not Big Security Nor Big Intelligence
G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
BeyondInsight Version 5.6 New and Updated Features
BeyondInsight Version 5.6 New and Updated Features BeyondInsight 5.6 Expands Risk Visibility Across New Endpoint, Cloud and Firewall Environments; Adds Proactive Threat Alerts The BeyondInsight IT Risk
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability 7 Jul 2014 1 Purpose This document is intended to provide insight on the types of tools and technologies that
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
A New Perspective on Protecting Critical Networks from Attack:
Whitepaper A New Perspective on Protecting Critical Networks from Attack: Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network 2014: A Year of Mega Breaches A Ponemon Study published
Security Coordination with IF-MAP
Security Coordination with IF-MAP Matt Webster, Lumeta 28 Sept 2010 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Recap of TNC Explanation of IF-MAP What is IF-MAP?
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
LogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Technical Note. ForeScout CounterACT: Virtual Firewall
ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...
Penta Security 3rd Generation Web Application Firewall No Signature Required. www.gasystems.com.au
Penta Security 3rd Generation Web Application Firewall No Signature Required www.gasystems.com.au 1 1 The Web Presence Demand The Web Still Grows INTERNET USERS 2006 1.2B Internet Users - 18% of 6.5B people
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Self-Defending Approach of a Network
Self-Defending Approach of a Network Anshuman Kumar 1, Abhilash Kamtam 2, Prof. U. C. Patkar 3 (Guide) 1Bharati Vidyapeeth's College of Engineering Lavale, Pune-412115, India 2Bharati Vidyapeeth's College
First Line of Defense to Protect Critical Infrastructure
RFI SUBMISSION First Line of Defense to Protect Critical Infrastructure Developing a Framework to Improve Critical Infrastructure Cybersecurity Response to NIST Docket # 130208119-3119-01 Document # 2013-044B
Compliance Guide: PCI DSS
Compliance Guide: PCI DSS PCI DSS Compliance Compliance mapping using Huntsman INTRODUCTION The Payment Card Industry Data Security Standard (PCI DSS) was developed with industry support by the PCI Security
Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge
Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge This paper will present a case study of Lumeta s participation in an open
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2. Exit Conference...
NEA OIG Report No. R-13-03 Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning to detect vulnerabilities... 2 Area
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
ThreatSpike Dome: A New Approach To Security Monitoring
ThreatSpike Dome: A New Approach To Security Monitoring 2015 ThreatSpike Labs Limited The problem with SIEM Hacking, insider and advanced persistent threats can be difficult to detect with existing product
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
The Evolution of Application Monitoring
The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 [email protected]
The Ontological Approach for SIEM Data Repository
The Ontological Approach for SIEM Data Repository Igor Kotenko, Olga Polubelova, and Igor Saenko Laboratory of Computer Science Problems, Saint-Petersburg Institute for Information and Automation of Russian
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 Introduction What s in a name? SIEM? SEM? SIM? Technology Drivers Challenges & Technology Overview Deciding what s right for you Worst
IF-MAP Use Cases: Real-Time CMDB, and More
IF-MAP Use Cases: Real-Time CMDB, and More Richard Kagan EVP / General Manager Orchestration Systems Business Unit IF-MAP: A Powerful New Standard IF-MAP = Interface to Metadata Access Points An open protocol
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
locuz.com Professional Services Security Audit Services
locuz.com Professional Services Security Audit Services Today s Security Landscape Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System layer.
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Using Extensible Metadata Definitions to Create a Vendor-Independent SIEM System
Using Extensible Metadata Definitions to Create a Vendor-Independent SIEM System Prof. Dr. Kai-Oliver Detken 1, Dr. Dirk Scheuermann 2, Bastian Hellmann 3 1 DECOIT GmbH, Fahrenheitstraße 9, 28359 Bremen,
An Integration Adaptation for Real-Time Datawarehousing
, pp. 115-128 http://dx.doi.org/10.14257/ijseia.2014.8.11.10 An Integration Adaptation for Real-Time Datawarehousing Imane Lebdaoui 1, Ghizlane Orhanou 2 and Said Elhajji 3 Laboratory of Mathematics, Computing
