Whose IP Is It Anyways: Tales of IP Reputation Failures



Similar documents
Next Generation IPS and Reputation Services

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

Software that provides secure access to technology, everywhere.

Reduce Your Network's Attack Surface

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

The Growing Problem of Outbound Spam

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Zscaler Internet Security Frequently Asked Questions

ThreatSTOP Technology Overview

SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015

Cisco & Big Data Security

Security Intelligence Blacklisting

Unified Security Management and Open Threat Exchange

DYNAMIC DNS: DATA EXFILTRATION

10 Smart Ideas for. Keeping Data Safe. From Hackers

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Intercept Anti-Spam Quick Start Guide

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

INinbox Start-up Pack

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Introduction: 1. Daily 360 Website Scanning for Malware

Domain Name Abuse Detection. Liming Wang

FILTERING FAQ

McAfee - Overview. Anthony Albisser

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

Firewalls, IDS and IPS

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Agenda , Palo Alto Networks. Confidential and Proprietary.

Application Firewalls

Threat Spotlight: Angler Lurking in the Domain Shadows

IBM Security X-Force Threat Intelligence

SPEAR PHISHING UNDERSTANDING THE THREAT

AVG AntiVirus. How does this benefit you?

Concierge SIEM Reporting Overview

RSA Security Analytics

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products.

When Reputation is Not Enough. Barracuda Security Gateway s Predictive Sender Profiling. White Paper

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

How To Ensure Your Is Delivered

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Windows Server 2003 End of Support. What does it mean? What are my options?

APPLICATION PROGRAMMING INTERFACE

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo

WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA

Endpoint Threat Detection without the Pain

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall

ReadySpace Limited Unit J, 16/F Reason Group Tower, Castle PeakRoad, Kwai Chung, N.T.

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Speed Up Incident Response with Actionable Forensic Analytics

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Security Analytics for Smart Grid

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

WhatWorks in Detecting and Blocking Advanced Threats:

Basheer Al-Duwairi Jordan University of Science & Technology

Articles Fighting SPAM in Lotus Domino

Preetham Mohan Pawar ( )

DNS Traffic Monitoring. Dave Piscitello VP Security and ICT Coordina;on, ICANN

All Information is derived from Mandiant consulting in a non-classified environment.

EVILSEED: A Guided Approach to Finding Malicious Web Pages

Commtouch RPD Technology. Network Based Protection Against -Borne Threats

Using SIEM for Real- Time Threat Detection

Akamai to Incapsula Migration Guide

Security Information & Event Management (SIEM)

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Migration Project Plan for Cisco Cloud Security

IBM Advanced Threat Protection Solution

An Efficient Methodology for Detecting Spam Using Spot System

Rational AppScan & Ounce Products

How To Secure A Website With A Password Protected Login Process (

Securing Your Business s Bank Account

Effective Open-Source Spam Filtering

IT Sicherheit im Web 2.0 Zeitalter

Secure Your Mobile Workplace

Introducing IBM s Advanced Threat Protection Platform

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Streamlining Web and Security

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Managing Web Security in an Increasingly Challenging Threat Landscape

We Know It Before You Do: Predicting Malicious Domains

Transcription:

Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe

What is reputation? 2

House banners tell a story 3

Reputation however Is learned 4

Game of Thrones You wear crests and carry banners Reputation is often learned by word of mouth Reputation might also be called Gossip Today on the Internet We communicate via IP addresses We cannot look at a web connection and see a family crest We lookup reputation in third-party systems 5

We have been conditioned to use IP reputation We have assigned reputation since we started network security Trusted Inside DMZ Good Actors Untrusted Outside Partner Network Bad Actors Script Kiddies, Activists, State Sponsored Adversaries 6

Our first exposure to IP reputation We deployed firewalls and created our first IP Reputation System Outside Inside 7

Fighting SPAM with reputation A good taste of success with IP Reputation Dynamic IP Blocking Real Time Blackhole Lists Trusted Senders Domain Keys Sender Policy Framework 8

IP Reputation can improve security Browsing the web Visit a site that downloads an executable Process alert based on an AV engine Blacklist the IP Address Good candidate for IP Reputation blacklist 9

Reputation solves everything It s not so easy 10

List effectiveness decays with age 100% IP Reputation List Quality 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Time 11

So what else is complicating IP reputation? How about website ownership? How often can you track ownership easily? 12

Case study #1 We used an IP Reputation feed on our outbound web traffic Malicious sites, anonymous proxy sites, botnet sites, etc. We found we had thousands of false positives We have 6K+ reports for foxnews.com 13

What is really happening Start with the 6K reports for Fox News Examine the DNS resolution for foxnews.com Generated a list of IP s that change over time with very short TTL 20 second TTL 14

Why were some IP addresses flagged foxnews.com 165.254.24.14 4 23.59.191.18 66 unique IPs seen anantara.com.ru Fox News Corp 575 domains seen Akami????? 15

Welcome to CDNs So whose IP s are these? Akamai owns all the IP s So it s not Fox s IP Addresses So the new question, whose reputation am I looking at? 16

So do you trust this traffic? There are going to be several answers in the room today If you are hyper sensitive These IPs have records of nefarious activity If you are an average site My users didn t go to a nefarious domain 17

Lesson learned You need to understand How you want to use IP Reputation Feeds You should expect to have false positives on round 1 If not, someone else made your risk assessment and filtered them out Decide on your own whitelisting i.e. allow Alexia top 1000 Easy for domains, harder for IPs 18

IPs with multiple domains hide more risk 100% 80% Bad IPS Good IPs 60% 40% 20% 0% 1 Domain 2-10 Domains 11-100 Domains 101+ Domains 19

Alert on all botnet activity from firewall logs Sounds like a reasonable IP Reputation problem Botnets communicate with Command & Control (C&C) Servers Buy some feeds on Botnet C&C activity and save the day 20

Case study #2 We used the Botnet IP Reputation feed with our SIEM We created automatic alerts on all outbound connections that matched an IP in the reputation feed We got thousands or email alerts and they are all false positives 21

Botnet C&C and IP Reputation Large group of false positives pointing to Google Specifically many alerts to a few IPs used by App Engine 22

Yep, it s the cloud s fault SaaS presents a new problem for IP reputation Again, many domains behind just 1 IP address In this case an email relay used by several botnets lives on Google App Engine 23

Lesson Learned SaaS providers present a new complication to IP Reputation Bad Guys have been using the cloud for years We can whitelist SaaS providers but is that the right solution? 24

Aggregate IPs from malware monitoring sites Many sites publish malware DNS and IP lists Many solutions will provide local IOCs from malware samples We can take these aggregate lists and filter against our logs 25

Case Study #3 Apply IP Reputation from malware feeds to firewall logs SIEM sends an endless stream of alerts from many users browsing activity Desktop AV reports no issues Desktop investigations find no issues 26

Stolen reputation What went wrong? We applied an IP based malware alert The same Domain versus IP Address problems arise Many malware samples are delivered via compromised sites Some are delivered only via one unique URI 27

Phishing using compromised WordPress sites Monthly Unique URLs 2010-2013* Thousands 1.6 1.4 1.2 1.0 0.8 0.6 0.4 0.2 0.0 Jan Apr July Oct Jan Apr July Oct Jan Apr July Oct Jan Apr July Oct /wp-content/ 6 per. Mov. Avg. (/wp-content/) 28

Phishing campaigns can use hundreds of domains Unique Domains Used per Campaign (2H 2013) 300 250 200 150 100 50 0 29

They are even experimenting with URL Shorteners Unique Domains Used per Campaign 1200 1000 URLs Shortened URLs 800 600 400 200 0 30

Lesson Learned The Bad Guys know we are using IP Reputation They are continually looking for ways to get around our controls They have found it is relatively easy to Steal some Good Reputation 31

Can we implement IP Reputation correctly? That depends We need to ask the question differently How can Reputation improve security? 32

Better ways to get there Domain Reputation More specific than IP Reputation False negative for the paranoid/sensitive Partial solution for CDN issue Partial solutions for SaaS issues No help in stolen reputation Full URL blocking will block legitimate site 33

We need dynamic reputation systems Since IP Reputation and Domain Reputation are less than perfect Reputation get stale fast The Bad Guys move very fast 34

Reputation Best Practices Reputation isn t black and white It s very grey and thus a confidence score is needed on all results Reputation systems need to be active, reach out and touch the net Reputation systems need to be real-time Age is very important System that use Reputation need to query for reputation and confidence scores Reputation scoring must factor in the use case 35

Conclusions

Q & A Michael Hamelin michael.hamelin@us.ibm.com