GIS Application in Firewall Security Log Visualization. Juliana Lo



Similar documents
1 Log visualization at CNES (Part II)

Getting Started with Clearlogin A Guide for Administrators V1.01

Integrating Juniper Netscreen (ScreenOS)

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011

F-SECURE MESSAGING SECURITY GATEWAY

Sisense. Product Highlights.

High Level Design Distributed Network Traffic Controller

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks

Cyber Security Analytics. Su Zhao Yuan-Jen Lee Ching-Tang Lin Yufeng Mao

Configuring User Identification via Active Directory

Centerity Monitor. Technical Guide: Centerity VCE VBlock Monitoring V6.15

Juniper Secure Analytics Release Notes

GFI Product Manual. Administration and Configuration Manual

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

Endpoint Security Console. Version 3.0 User Guide

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Startup guide for Zimonitor

SonicWALL Global Management System Reporting Guide Standard Edition

ManageEngine Exchange Reporter Plus :: Help Documentation WELCOME TO EXCHANGE REPORTER PLUS... 4 GETTING STARTED... 7 DASHBOARD VIEW...

Live Guide System Architecture and Security TECHNICAL ARTICLE

Information Technology Policy

Where can I install GFI EventsManager on my network?

GFI Product Manual. Deployment Guide

SonicWALL Global Management System Reporting User Guide. Version 2.5

- Introduction to Firewalls -

govroam Web Interface User Guide

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy

Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users

BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist

Where can I install GFI EventsManager on my network?

SonicWALL Global Management System Reporting Guide Standard Edition

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Security Correlation Server Quick Installation Guide

External Authentication with Netscreen 25 Remote VPN Authenticating Users Using SecurAccess Server by SecurEnvoy

Understanding Syslog Messages for the Barracuda Web Filter

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

How To Block Unauthorized Internet Access through Proxies

File Share Navigator Online 1

Analyzing large flow data sets using. visualization tools. modern open-source data search and. FloCon Max Putas

How to Make the Client IP Address Available to the Back-end Server

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

Solutions to Trust. NEXThink V5 What is New?

System Administration Training Guide. S100 Installation and Site Management

Secret Server Splunk Integration Guide

Configuration Guide. Websense Web Security Solutions Version 7.8.1

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

CIS 433/533 - Computer and Network Security Firewalls

Brocade Virtual Traffic Manager and Oracle Application Server 10G Deployment Guide

Plesk 11 Manual. Fasthosts Customer Support

Cymon.io. Open Threat Intelligence. 29 October 2015 Copyright 2015 esentire, Inc. 1

Datacenter Transformation

User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright Palo Alto Networks

Adobe Marketing Cloud Bloodhound for Mac 3.0

ExtraHop and AppDynamics Deployment Guide

Product Manual. Administration and Configuration Manual

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

Example. Represent this as XML

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Network Monitoring Comparison

Pearl Echo Installation Checklist

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

How To Use Arcgis For Free On A Gdb (For A Gis Server) For A Small Business

Introduction to Junos Space Network Director

Web-Based Configuration Manual System Report. Table of Contents

PROFESSIONAL SECURITY SYSTEMS

Web based training for field technicians can be arranged by calling These Documents are required for a successful install:

Manual. Netumo NETUMO HELP MANUAL Copyright Netumo 2014 All Rights Reserved

Module: Firewalls. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

HTML5. Turn this page to see Quick Guide of CTTC

ServerPronto Cloud User Guide

Geo-Localization of KNIME Downloads

Technology and Cost Considerations for Cloud Deployment: Amazon Elastic Compute Cloud (EC2) Case Study

Administrator s Upgrade Guide.

Step by Step: vcenter Syslog Collector installation

DiskPulse DISK CHANGE MONITOR

Configuring Web services

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES

Integrating LANGuardian with Active Directory

Background on Elastic Compute Cloud (EC2) AMI s to choose from including servers hosted on different Linux distros

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management How to forward logs...

APPLICATION PROGRAMMING INTERFACE

PRIVACYWARE Adaptive Security Analyzer 2.0

Virtual Appliance Setup Guide

Quickstart guide to Configuring WebTitan

Firewall Rulebase Analysis Tool

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

CSE543 - Computer and Network Security Module: Firewalls

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6

Network Load Balancing

Cloud-based Log Analysis and Visualization

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

WatchGuard Dimension v1.1 Update 1 Release Notes

CS Computer and Network Security: Firewalls

LogLogic Trend Micro OfficeScan Log Configuration Guide

ΕΠΛ 674: Εργαστήριο 5 Firewalls

SECURITY DOCUMENT. BetterTranslationTechnology

Transcription:

GIS Application in Firewall Security Log Visualization Juliana Lo

Presentation Outline vwhat is a firewall vproblem definition vproject goal, objectives, constraints vframework and system components vsolution vconclusions

Firewall Definition A firewall is a hardware or software designed to permit or deny network traffic based on a set of rules Protect networks from unauthorized access.

Good and Bad Firewall Traffic

Bad Firewall Traffic Log File Jun 1 22:01:35 [xx] ns5gt: NetScreen device_id=ns5gt [Root]system-alert-00016: Port scan! From 1.2.3.4:54886 to 2.3.4.5:406, proto TCP (zone Untrust, int untrust). Occurred 1 times. (2004-06-01 22:09:03) Jun 1 22:01:57 [xx] ns5gt: NetScreen device_id=ns5gt [Root]system-alert-00016: Port scan! From 1.2.3.4:55181 to 2.3.4.5:1358, proto TCP (zone Untrust, int untrust). Occurred 1 times. (2004-06-01 22:09:25) Jun 1 22:02:10 [xx] ns5gt: NetScreen device_id=ns5gt [Root]system-alert-00016: Port scan! From 1.2.3.4:55339 to 2.3.4.5:1515, proto TCP (zone Untrust, int untrust). Occurred 1 times. (2004-06-01 22:09:38) Jun 2 11:24:16 fire00 sav00: NetScreen device_id=sav00 [Root]system-critical-00436

Firewall Security Log File Jun 1 22:01:35 [xx] ns5gt: NetScreen device_id=ns5gt [Root]system-alert-00016: Port scan! From 1.2.3.4:54886 to 2.3.4.5:406, proto TCP (zone Untrust, int untrust). Occurred 1 times. (2004-06-01 22:09:03) Jun 1 22:01:57 [xx] ns5gt: NetScreen device_id=ns5gt [Root]system-alert-00016: Port scan! From 1.2.3.4:55181 to 2.3.4.5:1358, proto TCP (zone Untrust, int untrust). Occurred 1 times. (2004-06-01 22:09:25) Jun 1 22:02:10 [xx] ns5gt: NetScreen device_id=ns5gt [Root]system-alert-00016: Port scan! From 1.2.3.4:55339 to 2.3.4.5:1515, proto TCP (zone Untrust, int untrust). Occurred 1 times. (2004-06-01 22:09:38) Jun 2 11:24:16 fire00 sav00: NetScreen device_id=sav00 [Root]system-critical-00436 Important for v System monitoring, compliance, forensics Challenges v Too much information to go through v Can t relate IP address to origin of traffic

Log File Transformation Jun 1 22:01:35 [xx] ns5gt: NetScreen device_id=ns5gt [Root]system-alert-00016: Port scan! From 1.2.3.4:54886 to 2.3.4.5:406, proto TCP (zone Untrust, int untrust). Occurred 1 times. (2004-06-01 22:09:03) Jun 1 22:01:57 [xx] ns5gt: NetScreen device_id=ns5gt [Root]system-alert-00016: Port scan! From 1.2.3.4:55181 to 2.3.4.5:1358, proto TCP (zone Untrust, int untrust). Occurred 1 times. (2004-06-01 22:09:25) Desired Outcome

Project Goal, Objectives, Constraints Goal v Develop a geolocation map application to visualize firewall traffic in near-real time Objectives v Geolocate IP address into locations v Near real-time events Constraints v Project duration - weeks not months v Cost low budget

Development Framework v Data Collection Server to capture firewall traffic v Parsing Engine Parser to extract IP addresses and other information v Geolocation Service Convert IPv4 address into location v Database Service Append features and search for records v Visualization Application to visualize IP locations

System Components v Firewall Source of data Juniper Netscreen firewall v IDE Windows 7 development server for data collection, parsing, geolocation, and data updates v Database CartoDB s PostgreSQL database v Map application Javascript, HTML, CartoDB API, Leaflet, jquery

Solution - Data Automation Step 1 - Firewall Configure system logging messages Enable external data monitor Bad traffic Syslog server

Solution - Data Automation Step 2 Data Collection Install Syslog Watcher software on Windows machine to collect firewall traffic

Solution - Data Automation Step 3 Parser Engine Simple data extraction program Python program extracts time stamp, firewall host, message level, error, from host, and number of occurrences

Solution - Data Automation Step 4 Geolocation Service Program to look up location from IP address Uses MaxMind GeoLite City Database Python API import pygeoip gi = pygeoip.geoip( C:\\geocode\\GeoLiteCity.dat, pygeoip.memory_cache) from_ip = 123.184.114.169 rec = gi.record_by_addr(from_ip) city =rec[ city ] country = rec[ country_name ] latitude = rec[ latitude ] longitude = rec[ longitude ] print city, country, latitude, longitude >>> Shenyang, China,41.7922,123,4328

Solution - Data Automation Step 5 Database Update Program to append new features to CartoDB s PostGRES database Python API from cartodb import CartoDBAPIKey, CartoDBException API_KEY = <api_key ' DOMAIN = <user_name>' TABLE = table_name COLUMNS = 'the_geom,alert,city,code,country,err,event_time,from_ip,latitude,longitude, occur cl = CartoDBAPIKey(API_KEY, DOMAIN) vals = CDB_LatLng(%s,%s),'%s','%s',%s,'%s','%s','%s','%s','%s','%s','%s','%s',%s,%s sql = 'INSERT into %s (%s) VALUES (%s);' % (TABLE,COLUMNS,vals) cl.sql(sql)

Solution - Data Automation Step 5 Database Table View

Solution - Data Automation Step 6 Automated Updates Use Window s Task Scheduler to automate the programs Auto-start every 5 minutes

Solution - Application Development Language: JavaScript Libraries: CartoDB API, Leaflet, jquery Editor: NotePad+ Debugging tool: Google Chrome JavaScript Console

Results - Hits from Last 24 Hours Map Window Layers/Symbols Selectors Dashboard

Results Select a date

Results Clickable Features Click on a feature in the map to show details Top hosts or locations

Results Application Features Pie charts show the distribution of hits by error types and by severity levels

Results Different Symbols Single symbol Number of occurrences Severity Levels

Results Animated temporal map

Results Country breakdowns, last 7 days

Results Top 5 hits from last 7 days

Conclusions Web-based GIS map application Live dynamic data Leverage cloud infrastructure Low-cost solution

Issues and Improvements Geolocation result accuracy Zero accuracy Country centroid

Issues and Improvements IP Evasion Issue v Web proxies, anonymizer software such as Tor Improvements v Add more filters v Handle multiple firewalls

Questions

Juliana Lo Pacific Disaster Center Email: jlo@pdc.org