Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc



Similar documents
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

What legal aspects are needed to address specific ICT related issues?

Fast overview about the CERT-TCC. Helmi Rais CERT-TCC Team Manager

Attacks from the Inside

Detailed Description about course module wise:

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

How To Protect Your Network From Attack From A Hacker On A University Server

Taxonomy of Intrusion Detection System

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

ReadySpace Limited Unit J, 16/F Reason Group Tower, Castle PeakRoad, Kwai Chung, N.T.

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Second-generation (GenII) honeypots

Security Information Management (SIM)

Banking Security using Honeypot

How To Protect A Network From Attack From A Hacker (Hbss)

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Introduction: 1. Daily 360 Website Scanning for Malware

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

CRYPTUS DIPLOMA IN IT SECURITY

Malware Analysis Quiz 6

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Critical Security Controls

Cisco IPS Tuning Overview

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT

How To Perform An External Security Vulnerability Assessment Of An External Computer System

CS 558 Internet Systems and Technologies

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Enabling Security Operations with RSA envision. August, 2009

Name. Description. Rationale

EC Council Certified Ethical Hacker V8

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

Securing Web Applications...at the Network Layer

Application Security Backgrounder

SANS Top 20 Critical Controls for Effective Cyber Defense

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Radware s Behavioral Server Cracking Protection

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

Promoting Network Security (A Service Provider Perspective)

Network Incident Report

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

SURVEY OF INTRUSION DETECTION SYSTEM

A Decision Maker s Guide to Securing an IT Infrastructure

Best Practices For Department Server and Enterprise System Checklist

CEH Version8 Course Outline

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Architecture Overview

Ethical Hacking Course Layout

Chapter 9 Firewalls and Intrusion Prevention Systems

How To Perform A Large Scale Attack On A Large Network

How To Prevent Hacker Attacks With Network Behavior Analysis

McAfee Network Security Platform

INFORMATION SECURITY TRAINING CATALOG (2015)

INTRUSION DETECTION SYSTEMS and Network Security

Honeypot as the Intruder Detection System


AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Concierge SIEM Reporting Overview

Information Security Threat Trends

Cisco RSA Announcement Update

Description: Objective: Attending students will learn:

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Cyber Security and Critical Information Infrastructure

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

19th Annual FIRST Conference

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Korea s experience of massive DDoS attacks from Botnet

Web Vulnerability Scanner by Using HTTP Method

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Security Toolsets for ISP Defense

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Network Instruments white paper

Dan Hubbard VP Security Research

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

US-CERT Overview & Cyber Threats

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

About Botnet, and the influence that Botnet gives to broadband ISP

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

How To Perform A Large Scale Attack On A Large Computer System

Software that provides secure access to technology, everywhere.

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 21

End-user Security Analytics Strengthens Protection with ArcSight

Transcription:

Tunisia s experience in building an ISAC Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc 1

Agenda Introduction ISAC objectives and benefits Tunisian approach SAHER system Intrusion detection Critical system monitoring Web attacks detection Conclusion 2

Introduction Security challenges: Technical issues : Lack of tools for the early detection of threats at the level of the hole national cyberspace Information availability Organizational issues : Information sharing Collaboration and awareness Coordination for Response Establishment of an Information Sharing and Analysis Center : SAHER (Vigilant) 3

Major Objectives of the ISAC «SAHER» Permits the monitoring of the security of the cyberspace, through : Information collection (Monitoring in real time of the backbone networks for DDoS events, worms, botnets, massive scans, hacking activity, etc). Information analysis for early identification of potential big and distributed attacks Information sharing about real and potential threats, vulnerabilities and incidents Early warning and response (Reaction Plan AMEN ) 4

Some specificities of the Tunisian approach Deployment of customized Open source solutions Confidence and trust of partners & mandatory declaration of incidents : Existence of a law (law N 5-2004) that stipulate the mandatory declaration of incidents and guarantees its confidentiality. Free of charge assistance Integrates all the communities (Gov, Banks, ISPs, Data Centers, ) Provides a national knowledge base about threats and potential attack sources and also a research and experimentation framework Provides a tracking and investigation system 5

The mission Information sources Monitoring System ISPs & Data Centers Call center Incident declaration CERTs alerts Security Mailing-lists Antivirus venders alerts Software venders alerts ISAC SAHER Identified events Potential big Threats Massive attacks Virus spread Botnets Intrusion activities Web defacement System breakdown 6

SAHER : The technical platform System developed based on a set of Open Source tools Saher Web: DotTN DotTNWeb Sites Sites monitoring Saher SRV: Internet services availability monitoring (Mail (Mail server, server, DNS, ) SAHER IDS: Massive attack detection SAHER IDS: Massive attack detection Web defacement DoS Web Deterioration of web access Mail Bombing Breakdown of DNS servers DNS POISONING Viral attack Intrusion DDoS 7

SAHER-IDS Main Goals : Set-up a distributed intrusion detection system Detects massive and distributed attacks Detects malware spread Detects known attacks : signature Detects unknown attacks: Anomaly based Context: Based on a set of customized open source tools Distributed environment with a centralized framework Partnership with private and public enterprises Micro-IDS (partners), Macro-IDS ( National level) 8

SAHER-IDS : Principal Monitored network Passive detection Firewall Admin Detection Intrusion detection (NIDS, Honeypots) Anomaly based sensors Monitoring & analysis Event correlation (CALM, Holt-winter, correlation rules, state machine correlation) Risk evaluation Forensics Management Inventory of protected resources Security policy definition Correlation rules definition 9

SAHER-IDS : central node Data base Sensor Sensor Firewall VPN Events gathering unit INTERNET Sensor correlation units Synchronization server Update server Sensor Project participants Government : Ministries Financial institutions : banks Health, Transport, Energy ISP : Private and public Sensor Sensor 10

Gathered information Events : information about intrusion (reported by saher agents) Security indicators: derived from alerts Attacks (possibility that a machine is being attacked) Compromise (possibility that a machine has been compromised ) Alarms : Selected events with a high risk surpassing a defined threshold A set of events resulting from the correlation 11

Correlation Correlation engine Central base Sources Targets Network behavior Attack signature Time Window Massive attacks Potential sources Distributed attacks Infection areas Threats knowledge base IDS IDS IDS IDS Vertical correlation (Reduce false positive) Horizontal correlation (different sensors) Cross-correlation (different detection tools) 15 Shell - SQL script for correlation 12

SAHER-SRV Main Goals : Monitors critical nodes of the cyberspace Detects critical nodes slowdown Context: Works in a passive way Monitors ISPs and telecom operator nodes Detects and alerts in real-time 13

SAHER-SRV : principal Checks the availability of critical services Mail : SMTP & POP/IMAP DNS Routers Various tests (Checkers) Server Availability Service availability Service integrity Correlation Intrusion detection system 14

SAHER-Web Main Goals : Detects web defacement attacks Detects web sites slowdown Clear visibility on the national web space Context: Works in a passive way Monitors more than 6 000 web site Reduces/eliminates false positives Detects and alerts in real-time 15

SAHER-Web : Web defacement analysis component Initialize Check Validate Initialize (Site S) { P = download_page (S) I = MD5(P) } Check (fingerprint I, Site S) { P = download_page (S) I = MD5(P ) IF I =I then do_nothing Else } Validate (Site S) { IF authorized_modification then Initialize (S) ELSE report_incident(s) } if static_site then generate_alert(s) // Sound, Visual, e-mail else deep_analysis(s_profile, S) Validte (S) 16

SAHER-Web : List of Tests Comparaison tests Full/ Partial (dynamic sites) Images : Full / Partial Keyword analysis (Hacked, Defaced, Owned, Own3d,.) HTML code & Components size HTML to Image Convert the web page to an image Compares images to a threshold 17

SAHER-Web : List of Tests Example : Image conversion and analysis Zone 1 : (a,b,c,d) Zone 2 : (a,b,c,d ) Zone 3 : (a,b,c,d )? 18

SAHER-Web : List of Tests HTTP protocol response analysis (HEAD) Virus detection (iframe) Java Script Injection Cross-Correlation vulnerability database Vulnerability scanner Intrusion detection system Define a test profile for each website 19

SAHER : Risk evaluation Goal : reduce false positive and provide reliable alerts Solution : Correlation engine Cross-Correlation methods Risk calculation 20

SAHER : Risk evaluation A risk value is assigned to each supervised web site An initial value is given depending on the web site importance: Critical : Risk = 2 Medium : Risk = 1 Low : Risk = 0 Default value = 0, Maximum value = 10 21

SAHER : Risk evaluation Cross-correlation with intrusion detection Risk_calculation_web_ids(Site S) { IF modification_site(s) THEN E[] = security_events_list (IP(S), date(), date() 30 min) IF E[] is not_empty then R = Max ( risk(e[i] ) Risk(S) = Risk(S) + R EndIF EndIF } 22

SAHER : Risk evaluation Cross-correlation with vulnerability scanner Periodic web vulnerability assessment (For critical web sites) Vulnerability classification (Risk) Risk(S) = Risk(S) + Max (Risk (found_vulnerabilities)) 23

SAHER : Risk evaluation Cross-correlation with a vulnerability database (OSVDB) Web server vulnerabilities Web application vulnerabilities CMS vulnerabilities (Joomla, Mambo, xoops, phpbb) Vulnerability Associated risk value Risk(S) = Risk(S) + Max (Risk (known_vulnerabilities)) 24

SAHER : Risk evaluation Mutualized hosting correlation Many websites hosted on the same server (IP) If a website is hacked, the other similar websites are under a high risk For each website hosted on the hacked server Risk (S i ) = (Risk (S i ) + 1) x 2 25

SAHER : CMS issues Content management system Too websites are using open source CMS (joomla, xoops, phpbb, Invision power, ) CMS are the first target for hackers (script kiddies using google search) CMS exploits are rapidly made public Solution Dedicated engine to identify used CMS at the national scale Scan website to identify CMS signature Identify vulnerable website database indicating used technologies and eventual vulnerability 26

SAHER : CMS issues Website description (URL, ISP, IP, Owner, Webmaster, Administrator, Developer, OS, Web server, Technology) For each declared or identified vulnerability: Rvj : is the risk value assigned to the vulnerability Risk (S i ) = Risk (S i ) + Rvj A coordination procedure is launched to inform webmaster/administrator/isp to patch the website. The risk value is kept until the website is patched (manual process) For each hacked website using a particular CMS, all the similar website using the same CMS will be considered under threat 27

SAHER : Performance monitoring A bandwidth measurement is conducted for each site Bandwidth = (Data_amount / download_duration) A threshold is fixed for each website (200 bit/s by default), under this threshold an alert is generated Correlation with the IDS to prevent DoS and DDoS attacks 28

Some Screenshots 29

Screenshot 30

Screenshot 31

Screenshot 32

Future work Deployment of other types of sensors and distribution of the centralized framework to optimize servers load Integrates an incident handling workflow with partners to improve coordination and response Set up a distributed and reactive Honey-Net network to abuse some hacking activities Integrates a hacker profiling module through the profiling of each hacker and try to anticipate about the possible actions and relative alerts Develops an online malicious IP information sharing within the collaboration network and enrich the structured knowledge base, by including information from various sources (Audit report, Pentest report, incident report, events, etc.) 33

Conclusion The ISAC is a set of : Tools : Saher Procedures : Reaction plan, incident handling procedures Watch team : operating 24/7 Incident response Team Communication channels : email, phone, web, press, The ISAC approach is a challenge The use open source tools still a good challenge 34

haythem.elmir@ansi.tn www.ansi.tn 35