Security Toolsets for ISP Defense



Similar documents
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

TDC s perspective on DDoS threats

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

How Cisco IT Protects Against Distributed Denial of Service Attacks

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

State of Texas. TEX-AN Next Generation. NNI Plan

WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli

Service Provider Solutions. DDoS Protection Solution. Enabling Clean Pipes Capabilities

Exercise 7 Network Forensics

Distributed Denial of Service Attack Tools

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

DDoS Overview and Incident Response Guide. July 2014

Cisco Network Foundation Protection Overview

NSC E

Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard. January Cristian Velciov. (+40)

Introduction of Intrusion Detection Systems

Denial of Service Attacks

How To Protect Your Network From Attack From A Hacker On A University Server

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Internet Content Provider Safeguards Customer Networks and Services

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

Networking for Caribbean Development

Firewalls, Tunnels, and Network Intrusion Detection

How To Set Up Foglight Nms For A Proof Of Concept

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Secure Software Programming and Vulnerability Analysis

DDoS Mitigation Techniques

Safeguards Against Denial of Service Attacks for IP Phones

IDS / IPS. James E. Thiel S.W.A.T.

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

On-Premises DDoS Mitigation for the Enterprise

8 steps to protect your Cisco router

Approaches for DDoS an ISP Perspective.

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

SolarWinds Certified Professional. Exam Preparation Guide

Network Instruments white paper

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Overview. Firewall Security. Perimeter Security Devices. Routers

How To Block A Ddos Attack On A Network With A Firewall

CS 356 Lecture 16 Denial of Service. Spring 2013

FortiDDos Size isn t everything

Implementing Secure Converged Wide Area Networks (ISCW)

Firewalls & Intrusion Detection

Campus LAN at NKN Member Institutions

Denial of Service Attacks, What They are and How to Combat Them

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Second-generation (GenII) honeypots

Security and Access Control Lists (ACLs)

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

SECURING APACHE : DOS & DDOS ATTACKS - I

Network Management and Monitoring Software

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Seminar Computer Security

Modern Denial of Service Protection

Firewalls and Intrusion Detection

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Firewall Design Principles Firewall Characteristics Types of Firewalls

Flow Based Traffic Analysis

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Payment Card Industry (PCI) Executive Report. Pukka Software

IBM. Vulnerability scanning and best practices

MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION

Distributed Denial of Service protection

Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.

DDoS Protection on the Security Gateway

Network Immunity Solution. Technical White paper. ProCurve Networking

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

1 Introduction. Agenda Item: Work Item:

Introduction to Network Discovery and Identity

Distributed Denial of Service (DDoS)

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Intro to Firewalls. Summary

1 Introduction. Agenda Item: Work Item:

How To Classify A Dnet Attack

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Network Management & Monitoring

Finding Network Security Breaches Using LiveAction Software to detect and analyze security issues in your network

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Transcription:

Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security)

What s our goal? To provide protection against anomalous traffic for our network and it s customers. 2

What is anomalous traffic? Infiltration of viruses. Spreading of Worms. Denial of Service Attacks. Effects of route theft. Port scanning. Network enumeration. Effects of an exploited vulnerability. 3

What defines protection? There are 5 different components that must be acted upon in order to reduce the effects of anomalous traffic. Component 1: Prevention Component 2: Prediction Component 3: Detection Component 4: Mitigation Component 5: Prosecution 4

What is prevention? Prevention entails the ability to prevent someone from launching an anomalous attack from/or against your network. Prevention on the backbone includes some of the following items. 1. Spoof Prevention at the edge. 2. Control plane protection. 3. Route suppression and dampening. 4. Routing protocol protection. 5

How is this implemented? 6

Prevention Toolsets Configuration Auditing Global access-list audits. Route-map audits. VTY, CON, and AUX audits. Service audits. AAA audits. Router configurations are downloaded 4 times daily to a data warehouse. Queries are performed against approved templates to perform exception reports. 7

What is prediction? Prediction is a proactive approach to dealing with anomalous traffic. Prediction does not necessarily forecast when an attack will occur, but can often forecast type, strength, and sometimes the where. The following items should be performed in an effort to predict areas of threat. 1. Analysis of port scanning and enumeration. (Breach) 2. Detection of Distributed Agents. (DOS) 3. Dark Space analysis. (Worms) 8

How is prediction implemented? 9

Prediction Toolsets Data Mining (Correlation Database) Customer X is a financial institution who has just been involved in a blackmail DOS attack. Customer Y another financial institution is attacked 4 days later. With the frequency of DOS attacks correlation is becoming more tedious for human correlation simple DB Mining can be used to make the correlation and potentially alert similar customer types. Correlations can be made on day of week or month most likely, source AS s, type of attack, strength of attack, and duration of attack. 10

Prediction Toolsets (Cont.) Quartering List A C&C is discovered. The addresses is blackholed or sinkholed, but no analysis is being performed. Quartering list typically are automatically generated for abuse to have records of what customers are infected for cleanup, but Quartering list can also provide prediction. Rapid declines in quartering list can determine that a new controller has been added. New DOS attacks can be analyzed to forefront repetitive infected clients. Flow data for these repetitive infected clients can be monitored for discovery of new command and control platforms. 11

Prediction Toolsets (Cont.) Dark Space and Honeynets Dark space and Honeynet can be used to predict trends in worm activity. Dark space collectors that are flow based can utilize source IP and protocol pairs over X amount of time to baseline activity. Honeynets can be used to provide ack responses in order to validate known signatures and alert to new ones. 12

What is Detection? Detection is the ability to make aware the appropriate parties that anomalous traffic is transiting the network. 13

How is detection be implemented? 14

Detection Toolsets Measurement Servers Servers that send out ICMP, UDP, and TCP request to other measurements servers around the networks reporting back latency and packet loss. Can isolate problems within a general region. SNMP Traps Can isolate and correlate over utilization of CPU or Memory on individual nodes. Traffic Analysis Can isolate and correlate that CPU and memory increases are due to a over utilization of backbone links. 15

Detection Toolsets (Cont.) Dark Space Thresholds, DOS Detection, and Route Audits. Can isolate and correlate that over consumption of resources is the direct result of a route change, a worm, or a DOS attack. Additional heuristics can be performed. For denial of service attacks historical BGP records can be utilized to immediately determine the relevancy and determine the customer. 16

Detection Toolsets (Cont.) Dark Space Thresholds, DOS Detection, and Route Audits. Route audits can determine whether or not this was an impact due to operations or perhaps route theft from an outside entity. Accounting logs can be data mined to determine what entries were made. Historical route views can be mined to determine what blocks and what external carrier was is responsible. 17

Process Example 18

What is mitigation? Mitigation is the end-all. Without it, no amount of prediction or detection will benefit the victim of a denial of service attack. Mitigation is the ability to stop an attack, or at the very least minimalize it once it has been detected. The following methods are generally accepted in terms of mitigation. 1. Blackholing 2. Packet Filtering 3. Packet Diversion 19

Perimeter Remote Triggered Blackholes and Packet Filtering 20

Packet Scrubbing 21

Toolsets for Mitigation Dedicated and Centralized Blackhole routers Provides a centralized repository for malicious routes. Provides stability because its not part of the backbone. Can be utilized for sinkholing. Forensics facilities can be homed off it. BGP sessions can be established to other internal systems that require blackhole mitigation. 22

Traffic flows normally when no traffic anomalies are present. 23

Attack Starts 24

Attack is detected by network based netflow detectors. Alerts and route update is sent out to divert traffic. 25

Traffic is diverted to the scrubbing facility. Mitigation thresholds distinguish between valid and non-valid sources. 26

After malicious traffic is scrubbed, valid traffic is delivered back to the customer 27

Prosecution The ability to identify and aide in the prosecution of the attacker. Legal Compliancy Rapid Response Internal/External Communication Links 28

What is supporting data? 29

Thankyou Timothy A Battles AT&T IP Security