Who am I? BlackHat RSA



Similar documents
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Introduction of Intrusion Detection Systems

Deploying HIDS Client to Windows Hosts

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

Lesson 5: Network perimeter security

Intrusion Detection in AlienVault

Fighting Advanced Persistent Threats (APT) with Open Source Tools

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

Chapter 9 Firewalls and Intrusion Prevention Systems

1Juniper. 2How Logtrust. works with Juniper? a security network solution for enterprises and service providers.

IDS / IPS. James E. Thiel S.W.A.T.

Fighting Advanced Persistent Threats (APT) with Open Source Tools

From Network Security To Content Filtering

Know your security in mission critical environments Petr Hněvkovský, Senior Security Consultant, HP Enterprise Security Products

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Introducing IBM s Advanced Threat Protection Platform

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

INTRUSION DETECTION SYSTEMS and Network Security

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Lab exercise: Working with Wireshark and Snort for Intrusion Detection

Suricata IDS. What is it and how to enable it

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Network Security Monitoring

Chapter 15. Firewalls, IDS and IPS

Adding an Extended Access List

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Blended Security Assessments

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Analysis of Network Packets. C DAC Bangalore Electronics City

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Role of Anomaly IDS in Network

Security Monitoring and Architectures for Security Logging

Symantec Security Information Manager Version 4.7

How To Protect A Network From Attack From A Hacker (Hbss)

Open Source Security Tool Overview

Architecture Overview

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

FIREWALL AND NAT Lecture 7a

Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory

Networking for Caribbean Development

Security Correlation Server Quick Installation Guide

Network Security Management

Configuring Snort as a Firewall on Windows 7 Environment

Computer Security: Principles and Practice

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

Security Correlation Server Quick Installation Guide

Overview. Firewall Security. Perimeter Security Devices. Routers

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Configuring Snort as a Firewall on Windows 7 Environment

NETWORK SECURITY (W/LAB) Course Syllabus

Computer Security DD2395

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY

Guideline on Firewall

Firewalls & Intrusion Detection

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

Second-generation (GenII) honeypots

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

FISMA / NIST REVISION 3 COMPLIANCE

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Intrusion Detection Systems

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Course Title: Penetration Testing: Security Analysis

ArcSight Supports a Wide Range of Security Relevant Products

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

The SIEM Evaluator s Guide

Securing Networks with PIX and ASA

Application Note: Junos NAT Configuration Examples

Intrusion Detection Systems

SonicWALL Unified Threat Management. Alvin Mann April 2009

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN

Testing Network Security Using OPNET

Securely Yours LLC Top Security Topics for Sajay Rai, CPA, CISSP, CISM

Dynamic Rule Based Traffic Analysis in NIDS

Intruders and viruses. 8: Network Security 8-1

Security Information Management

Intrusion Detection Systems

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Chapter 11 Phase 5: Covering Tracks and Hiding

BEGINNER S GUIDE to. Open Source Intrusion Detection Tools.

Transcription:

Intrusion Detection

Who am I? Informal Security Education CS - Colby College Honors work in Static Analysis Fortify Software Engineer Architect Product Management HP AlienVault Products BlackHat RSA

What is it?

What are you looking for? Pattern known sequences of behaviors that indicate malicious activity Statistical deviations from normal (anomalous) behavior that could indicate malicious activity

Where are you looking for it? User Activity Application Activity Operating System Activity Network Activity SIEM SIEM / Host-based IDS Host-based IDS Network-based IDS

Where are you looking for it? User Activity Application Activity Operating System Activity Network Activity SIEM SIEM / Host-based IDS Host-based IDS Network-based IDS Why so many products??

Different Data SIEM Host-based IDS Network-based IDS Event logs Operating system events Raw network data

Host-based IDS

Host-based IDS Monitors operating system activity File changes Registry Application / Processes Deployment: Agent Remote Products OSSEC (free) McAfee EPO Symantec HIDS Tripwire

Host-based IDS <var name="sys_users">^apache$ ^mysql$ ^www$ ^nobody$ ^nogroup$ ^portmap$ ^named$ ^rpc$ ^mail$ ^ftp$ ^shutdown$ ^halt$ ^daemon$ ^bin$ ^postfix$ ^shell $ ^info$ ^guest$ ^psql$ ^user$ ^users$ ^console$ ^uucp$ ^lp$ ^sync$ ^sshd$ ^cdrom$ ^ossec$</var>!!! <rule id="40101" level="12">! <if_group>authentication_success</if_group>! <user>$sys_users</user>! <description>system user successfully logged to the system.</description>! <group>invalid_login,</group>! </rule>!

Host-based IDS Pro Process level inspection Acute behavioral detection User attribution Cons Easy to disable High Administrative Costs

Network IDS

Network IDS Monitors network activity Protocol Usage Deep Packet Inspection File Identification Deployment: Inline Products Suricata (free) McAfee IntruShield Cisco Juniper

Network IDS alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"et ATTACK_RESPONSE Metasploit Meterpreter Sysinfo Command Detected"; flow:to_client,established; content:"stdapi_sys_config_sysinfo"; depth:60; reference:url,www.nologin.org/downloads/papers/ meterpreter.pdf; reference:url,doc.emergingthreats.net/ 2009563; classtype:successful-user; sid:2009563; rev: 2;)!

Network IDS Pro Difficult to disable Early identification of threats Broad rulesets available Cons Difficult to derive context

SIEM

SIEM Monitors anything you can feed it VPN, Firewall, Application, Email server, door readers, etc Deployment: Central Products ArcSight (HP) IBM (Q1) OSSIM (Free)

Data Normalization Example Juniper SRX Session Denied Raw Log Event! #Sep 25 06:26:09 1.1.3.1 2010-09-25T06:26:10.420 SRX2-NY RT_FLOW - RT_FLOW_SESSION_DENY [junos@2636.1.1.1.2.35 source-address="1.2.3.4" source-port="1234" destination-address="2.3.4.5" destination-port="80" service-name="junos-http" protocol-id="6" icmp-type="0" policy-name="deny" source-zone-name="trust" destination-zone-name="untrust"]!

Data Normalization Example Juniper SRX Session Denied Raw Log Event! #Sep 25 06:26:09 1.1.3.1 2010-09-25T06:26:10.420 SRX2-NY RT_FLOW - RT_FLOW_SESSION_DENY [junos@2636.1.1.1.2.35 source-address="1.2.3.4" source-port="1234" destination-address="2.3.4.5" destination-port="80" service-name="junos-http" protocol-id="6" icmp-type="0" policy-name="deny" source-zone-name="trust" destination-zone-name="untrust"]! NORMALIZED!! Event ID=SESSION_DENY! Date=September 25, 2010 6:26:09! Source IP=1.2.3.4! Source Port=1234! Source Zone=trust! Destination IP=2.3.4.5! Destination Port=80! Destination Zone=untrust! Service Name=Junos HTTP! Protocol=TCP! ICMP Type=Echo! Policy=Deny!

Data Normalization Example Juniper SRX Session Denied Log Event! #Sep 25 06:26:09 1.1.3.1 2010-09-25T06:26:10.420 SRX2-NY RT_FLOW - RT_FLOW_SESSION_DENY [junos@2636.1.1.1.2.35 source-address="1.2.3.4" source-port="1234" destination-address="2.3.4.5" destination-port="80" service-name="junos-http" protocol-id="6" icmp-type="0" policy-name="deny" source-zone-name="trust" destination-zone-name="untrust"]! NORMALIZED!! Event ID=SESSION_DENY! Date=September 25, 2010 6:26:09! Source IP=1.2.3.4! Source Port=1234! Source Zone=trust! Destination IP=2.3.4.5! Destination Port=80! Destination Zone=untrust! Service Name=Junos HTTP! Protocol=TCP! ICMP Type=Echo! Policy=Deny! Necessary for cross-data source correlation Identify similar data from different data sources (User Name, IP Address, etc.) Each data source requires some custom logic Each log has a unique format

Correlation Example Probing! Deny! Deny! Allow! Correlation can be thought of as a state machine

Correlation Example Probing! Deny! DENY! Deny! Allow! Event 1!! Event ID=SESSION_DENY! Date=September 25, 2010 6:26:09! Source IP=1.2.3.4! Source Port=1234! Source Zone=trust! Destination IP=2.3.4.5! Destination Port=80! Destination Zone=untrust! Service Name=Junos HTTP! Protocol=TCP! ICMP Type=Echo! Policy=Deny! Each event can match and progress the state

Correlation Example Probing! Deny! DENY! Deny! Allow!! Event ID=SESSION_DENY! Date=September 25, 2010 6:26:09! Source IP=1.2.3.4! Source Port=1234! Source Zone=trust! Destination IP=2.3.4.5! Destination Port=80! Destination Zone=untrust! Service Name=Junos HTTP! Protocol=TCP! ICMP Type=Echo! Policy=Deny! Event 2!! Event ID=SESSION_DENY! Date=September 25, 2010 6:26:10! Source IP=1.2.3.4! Source Port=1234! Source Zone=trust! Destination IP=2.3.4.5! Destination Port=443! Destination Zone=untrust! Service Name=Junos HTTP! Protocol=TCP! ICMP Type=Echo! Policy=Deny! Subsequent events need to match within time window

Correlation Example Probing! Deny! DENY! DENY! Deny! Allow!! Event ID=SESSION_DENY! Date=September 25, 2010 6:26:09! Source IP=1.2.3.4! Source Port=1234! Source Zone=trust! Destination IP=2.3.4.5! Destination Port=80! Destination Zone=untrust! Service Name=Junos HTTP! Protocol=TCP! ICMP Type=Echo! Policy=Deny!! Event ID=SESSION_DENY! Date=September 25, 2010 6:26:10! Source IP=1.2.3.4! Source Port=1234! Source Zone=trust! Destination IP=2.3.4.5! Destination Port=80! Destination Zone=untrust! Service Name=Junos HTTP! Protocol=TCP! ICMP Type=Echo! Policy=Deny! Event 3!! Event ID=SESSION_CREATE! Date=September 25, 2010 6:26:11! Source IP=1.2.3.4! Source Port=1234! Source Zone=trust! Destination IP=2.3.4.5! Destination Port=22! Destination Zone=untrust! Service Name=Junos HTTP! Protocol=TCP! ICMP Type=Echo! Policy=Deny! Subsequent events need to match within time window

Correlation Example Probing! Deny! DENY! DENY! Deny! ALLOW! Deny!! Event ID=SESSION_DENY! Date=September 25, 2010 6:26:09! Source IP=1.2.3.4! Source Port=1234! Source Zone=trust! Destination IP=2.3.4.5! Destination Port=80! Destination Zone=untrust! Service Name=Junos HTTP! Protocol=TCP! ICMP Type=Echo! Policy=Deny!! Event ID=SESSION_DENY! Date=September 25, 2010 6:26:10! Source IP=1.2.3.4! Source Port=1234! Source Zone=trust! Destination IP=2.3.4.5! Destination Port=443! Destination Zone=untrust! Service Name=Junos HTTP! Protocol=TCP! ICMP Type=Echo! Policy=Deny!! Event ID=SESSION_CREATE! Date=September 25, 2010 6:26:11! Source IP=1.2.3.4! Source Port=1234! Source Zone=trust! Destination IP=2.3.4.5! Destination Port=22! Destination Zone=untrust! Service Name=Junos HTTP! Protocol=TCP! ICMP Type=Echo! Policy=Deny! ALARM Probing! Source IP=1.2.3.4! Source Port=1234! Source Zone=trust! Destination IP=2.3.4.5! Destination Port=80,443,22! Protocol=TCP! Fully loaded state machine generates an alarm

SIEM Pro Flexible and complete Cons Expensive to deploy

Example

Example <Unknown> < Unknown> 9:53 AM 9:56 AM 9:59 AM 10:03 AM 10:05 AM 10:16 AM M. Cochran Disconnects from network Infection M. Cochran Reconnects to network Snort detect Mariposa / Paveo CnC Host Identified as Infected M. Cochran Disconnects from network Potential Detection Point: Snort Identify Malicious Binary Potential Detection Point: Symantec Identify Infection Potential Detection Point: OSSEC Reports Infection