Vulnerability Assessment Report Format Data Model



Similar documents
AN XML-BASED DATA MODEL FOR VULNERABILITY ASSESSMENT REPORTS

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

NETWORK PENETRATION TESTING

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

An Introduction to Network Vulnerability Testing

Information Security Organizations trends are becoming increasingly reliant upon information technology in

Dedicated and Distributed Vulnerability Management

EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER

WHITE PAPER. An Introduction to Network- Vulnerability Testing

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

WHITEPAPER. Nessus Exploit Integration

May 11, (Revision 4) Ron Gula Chief Technology Officer

Installing and Configuring Nessus by Nitesh Dhanjani

Security Testing and Vulnerability Management Process. e-governance

Penetration Testing Report Client: Business Solutions June 15 th 2015

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Penetration Testing Workshop

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

Attacks and Defense. Phase 1: Reconnaissance

Digital Pathways. Penetration Testing

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

VULNERABILITY MANAGEMENT

TECHNICAL NOTE 08/04 IINTRODUCTION TO VULNERABILITY ASSESSMENT TOOLS

Introduction to Laboratory Assignment 3 Vulnerability scanning with OpenVAS

WEB Penetration Testing

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

Using Skybox Solutions to Achieve PCI Compliance

I D C E X E C U T I V E B R I E F

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

Patch and Vulnerability Management Program

Current IBAT Endorsed Services

Attack Graph Techniques

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

GFI White Paper PCI-DSS compliance and GFI Software products

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

April 11, (Revision 2)

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

VEA-bility Security Metric: A Network Security Analysis Tool

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments

Cisco IPS Tuning Overview

How To Test For Security On A Network Without Being Hacked

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Continuous Network Monitoring

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

IDS and Penetration Testing Lab ISA656 (Attacker)

Secunia Vulnerability Intelligence Manager (VIM) 4.0

Web Application Vulnerability Testing with Nessus

IDS and Penetration Testing Lab ISA 674

Penetration Testing. Presented by

Pragmatic Metrics for Building Security Dashboards

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

CPNI TECHNICAL NOTE 04/2008 VULNERABILITY ASSESSMENT TOOLS

Risk Analytics for Cyber Security

AUTOMATED PENETRATION TESTING PRODUCTS

Cisco Advanced Services for Network Security

Introduction Jim Rowland, Senior System Architect and Project Manager Daly

The Value of Vulnerability Management*

Penetration Testing Service. By Comsec Information Security Consulting

Threat Advisory: Accellion File Transfer Appliance Vulnerability

Introduction to SquareTrade Security Services

Vulnerability analysis

Goals. Understanding security testing

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Intrusion Detection System (IDS)

Name. Description. Rationale

MANAGING CYBER RISK IN THE SUPPLY CHAIN

Federated Network Security Administration Framework

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Intrusion Detection Systems

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Vulnerability Detection

Experiences from Educating Practitioners in Vulnerability Analysis

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

How To Manage A Network Security Risk

Part Banker. Part Geek. All Security & Compliance.

Evaluation Report. Office of Inspector General

Pentests more than just using the proper tools

Scanless Vulnerability Assessment. A Next-Generation Approach to Vulnerability Management

The SIEM Evaluator s Guide

Detecting rogue systems

Protecting Critical Infrastructure

Security visualisation

IBM Managed Security Services Vulnerability Scanning:

Pentests more than just using the proper tools

Concierge SIEM Reporting Overview

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Guideline on Auditing and Log Management

Cloud Application Security Assessment, Guerrilla Style

Automate PCI Compliance Monitoring, Investigation & Reporting

Transcription:

I3E'2005 Vulnerability Assessment Report Format Data Model Dr.D.Polemi G.Valvis

Issues Attack paradigm Vulnerability exploit life cycle Vulnerability assessment process Challenges in vulnerability assessment process VARF data model Vulnerability diagram Conclusions

Attack Paradigm IP Address 2 IP Address 3 IP Address 1 2.Exploitation 3.Consolidation IP Address 4 1.Reconnaissance 4.Continuation Victim Information gathering Determination of the characteristics of the target network such as network topology, host OS type, listening services Exploitation Compromise of a vulnerable host on the target network Metastasis Consolidation Remove any evidence of the exploitation phase, and to ensure that remote access is available to the attacker Continuation Utilize passive as well as active attack methods to deepen the penetration

Vulnerability Exploit Cycle Novice Intruders Use Crude Exploit Tools Crude Exploit Tools Distributed Advanced Intruders Discover New Vulnerability Automated Scanning/Exploit Tools Developed Widespread Use of Automated Scanning/Exploit Tools Intruders Begin Using New Types of Exploits Source : CERT/CC (http://www.cert.org)

The vulnerability assessment process A.I.D.A. Attention: Do we pay attention to our weak points? We find them by scanning our assets Use vulnerability assessment tools for efficiency In large networks different tools are deployed for more complete coverage Interest: How do we focus on the most interesting issues? Analysis and prioritization A large number of vulnerabilities are of low risk or irrelevant to the specific environment Critical vulnerabilities need to be dealt with priority Decision: Remediation planning Action: Patch management, etc.

Challenges in vulnerability assessment process For a complex IT environment most of the analysis work must be done by human Generate large volume of data Different vulnerability assessment tools provide heterogeneous output Effective communication between existing tools suffers by a lack of common ground Area of potential improvement

Challenges in Vulnerability assessment (cont.) Automation opportunity Scanning Vulnerabilities (100%) Analysis and Priotisation Critical Vulnerabilities (< 2%) Remediation Planning Multiple Hosts Manual Analysis Manual Analysis Time to Remediation weeks/months Remediation Actions (0.5%) Large window of exposure: Decreased security level

VARF: An attempt to address those issues The focus of the models is to facilitate the analysis and prioritization stage This model is based on a comparison of: Latest versions of Nessus XML reports and SARA and The latest Intrusion Detection Message Exchange Format (IDMEF) and Incident Object Description and Exchange Format (IODEF) drafts There was effort to reuse IDMEF elements Either directly or by sub-classing them to add functionality The Vulnerability XML report is structured in order to extract the asset information and group the associated vulnerabilities The two main elements provided are the ScanAlert and Report

Vulnerability report model (cont.) VulnerabilityReport Report ScanInformation $ Tool {name,version} Scanner Date ScanAlert ScanInformation $ TargetInformation # TargetInformation # Node Results Summary # Target # Alert to IDS Node OS Date Summary # Services Service # Name Number Protocol Vulnerabilities * $ Tool information # Asset information * Vulnerability information

Vulnerability report model (cont.) Vulnerabilities Vulnerability * Family Name Summary Category Data Classification {origin} Name URL Assessment Severity Risk Family of services affected Category of Attack: Information, Remote Access, Security Note/ Warning/Hole Risk factor (High, ) * Vulnerability information

<ScanAlert> Class <ScanAlert > It is modeled on the IODEF IncidentAlert Provides a different type of functionality The IncidentAlert is used to simply alert someone/something to the occurrence of an incident and provide relevant information (such as raw IDMEF messages) ScanAlert alerts an intrusion detection management system or other management system that a scan is going to be performed As part of this alert, the scanner would provide ScanInformation and TargetInformation (detailed next)

<ScanAlert> Class (cont.) <ScanInformation> It encapsulates information such as the tool that is performing the scan, version of the tool Information about the node that is being used to launch the scan, Time information for documenting scan and a general description <TargetInformation> This element documents the targets of the scan and contain the following items: Address, name

Major <Report> classes <Results> This element is meant to take the place of Nessus Results and SARA Details It is closely tied to the IODEF Attack class, which in turn shares structure with IDMEF Alerts <Target> Use of the IDMEF/IODEF Target class to achieve a standard format for representing the host specific information It includes the <Node> class which contains address and name elements <OS> element (type of operating system), <date> element <Service> This class generically describes network services A network service is defined by name and port It includes the <vulnerabilities> class, since one service may have multiple vulnerabilities

<Vulnerability> Class <Vulnerability> This class describes vulnerability by Name Family of services affected (e.g. FTP) Category of attack (e.g. Information, Access, etc.) It includes the <Classification> and <Assessment> classes and additional data <Classification> Allows the manager who receives the Report messages to be able to obtain additional information Origin (CVE, Bugtruq) of the source, name and URL are included <Assessment> It provides information related to the scanner s assessment of the vulnerability Includes the elements <Risk> and <Severity>

XSL transformations Generate VARF XML HTML presentation Creation of vulnerability diagram: visual representation of association between assets and vulnerabilities

XSL Generate transformations ( ( ( ( ( ( Nessus Server (nessusd) Parser Network Nessus client Vulnerability assessment tool Scanning report: Nessus v2.x XML VARF XML XSL: Nessus v2 -> VARF

HTML presentation Dynamic XSLT (client side XSLT transformations)

HTML presentation (cont.) XSL: VARF XML -> VARF HTML Parser VARF XML VARF-HTML

Vulnerability Diagram XML represents data in tree Hard for human to understand Lessen the burden by visualization Complete vulnerability diagrams Shows all discovered vulnerabilities, but structures are very large Hard to scale Reduced vulnerability diagrams Cut sets of vulnerabilities Which services, if suspended, leave the network secure? Results inform administrator which services are, perhaps, too costly. Vulnerability diagram can be a subset of attack tree Subsequent analysis is possible

Vulnerability Diagram XSLT: VARF XML to Diagram Dot (Dot: Graphviz tool compliant format) Parser Graphviz VARF XML Dot file Vulnerability Diagram

Vulnerability diagram (concept) Target(1) IP address Target(N) IP address Service (1) Service (i) Vulnerability (1) Risk factor CVE ID Vulnerability (m) Risk factor CVE ID Service (1) Vulnerability (1) Service (n) Vulnerability (n) Risk factor CVE ID Risk factor CVE ID

Vulnerability diagram (example of actual results)

Conclusions In order to reduce the window of exposure, the security personnel need a way to set priorities and reduce the volume of vulnerability reports down to the few critical risks that matters. Due to proprietary nature of the reports and lack of standardization, this process is burdensome. Standards based format to report vulnerabilities would allow easier analysis and sharing of information with other data sets from a variety of compliant tools and systems. VARF was motivated from the above and was based on existing standardization efforts. Vulnerability diagrams visualize the vulnerability management effort.