Comprehensive Advanced Threat Defense

Similar documents
Advanced Threat Protection with Dell SecureWorks Security Services

Defending Against Cyber Attacks with SessionLevel Network Security

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

Unified Security, ATP and more

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Content Security: Protect Your Network with Five Must-Haves

Fighting Advanced Threats

A New Perspective on Protecting Critical Networks from Attack:

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Protecting Your Organisation from Targeted Cyber Intrusion

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Cisco Advanced Malware Protection

Breach Found. Did It Hurt?

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

ENABLING FAST RESPONSES THREAT MONITORING

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Combating a new generation of cybercriminal with in-depth security monitoring

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats

Cisco Cyber Threat Defense - Visibility and Network Prevention

Introducing IBM s Advanced Threat Protection Platform

Speed Up Incident Response with Actionable Forensic Analytics

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

The Hillstone and Trend Micro Joint Solution

How To Manage Security On A Networked Computer System

Protect Your Business and Customers from Online Fraud

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Breaking the Cyber Attack Lifecycle

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

RAVEN, Network Security and Health for the Enterprise

McAfee Network Security Platform

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

DYNAMIC DNS: DATA EXFILTRATION

Bridging the gap between COTS tool alerting and raw data analysis

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Where every interaction matters.

CyberArk Privileged Threat Analytics. Solution Brief

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

SIEM is only as good as the data it consumes

Cisco Advanced Malware Protection for Endpoints

You ll learn about our roadmap across the Symantec and gateway security offerings.

Symantec Advanced Threat Protection: Network

Teradata and Protegrity High-Value Protection for High-Value Data

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

QRadar SIEM and FireEye MPS Integration

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Perspectives on Cybersecurity in Healthcare June 2015

Comprehensive real-time protection against Advanced Threats and data theft

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

How Do Threat Actors Move Deeper Into Your Network?

Concierge SIEM Reporting Overview

Covert Operations: Kill Chain Actions using Security Analytics

The Purview Solution Integration With Splunk

Data Center security trends

Zak Khan Director, Advanced Cyber Defence

A New Era of Cybersecurity Neil Mohammed, Sales Engineer

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Agenda , Palo Alto Networks. Confidential and Proprietary.

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Whitepaper. Advanced Threat Hunting with Carbon Black

Spear Phishing Attacks Why They are Successful and How to Stop Them

After the Attack. The Transformation of EMC Security Operations

Detect & Investigate Threats. OVERVIEW

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

IBM Security IBM Corporation IBM Corporation

Bio-inspired cyber security for your enterprise

SANS Top 20 Critical Controls for Effective Cyber Defense

Security Intelligence Services.

Cisco Advanced Malware Protection for Endpoints

Cisco RSA Announcement Update

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Enterprise Cybersecurity: Building an Effective Defense

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Endpoint Threat Detection without the Pain

Using Network Forensics to Visualize Advanced Persistent Threats

TRITON APX. Websense TRITON APX

Firewall and UTM Solutions Guide

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Security Analytics for Smart Grid

RSA Security Analytics

Cybersecurity and internal audit. August 15, 2014

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Strengthen security with intelligent identity and access management

Analyzing HTTP/HTTPS Traffic Logs

RSA Security Anatomy of an Attack Lessons learned

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Transcription:

1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1

INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions, and plenty of marketing hype and spin on the topic, but it s the science and the art of defending yourself against sophisticated, persistent adversaries who can get past (or have already gotten past) your security defenses. We like to define advanced threat defense in terms of the adversary rather than the attack technique used to remind ourselves that what we are really up against is a person or, more likely, a group of people who are specifically targeting your organization, and will use whatever attack vectors and techniques necessary to achieve their objectives. This paper describes a comprehensive, network- based approach to Advanced Threat Defense. PAGE 2 PAGE 2

THE THREAT LIFECYCLE It is important to understand that advanced, targeted attacks are not instantaneous events. They are complex processes with multiple phases that occur over a period of time. As shown in Figure 1, we break the threat lifecycle down into four major phases: 1. Infiltration 2. Command and Control Communication 3. Lateral Propagation 4. Data Exfiltration Figure 1. Threat Lifecycle PAGE 3 PAGE 3

Infiltration Phase If the adversaries are external threat actors, they normally need to get access to, and then gain control over, one of your organization s computing assets. There are many ways they can accomplish this. They could use a classic server- side exploit technique such as SQL injection or a fuzzing attack. They could guess, buy, or hack or crack one of your users VPN login credentials (username and password). Or they could use social engineering to exploit a user s trust and naivety to snare login credentials. They may launch a spear- phishing attack to deceive one of your users into visiting a malicious website that will exploit their browser or open a document that will exploit an application on their computer or mobile device. If the adversary is an internal user (a trusted insider ), they normally do not have to go through the infiltration phase, as they already have authorized access to your computing and network resources. This ancillary infiltration case, Insider Threat, is also detailed in Figure 1. Command and Control ( C2 ) Communication Phase Once an external adversary has gained unauthorized access and control ( compromised ) over one of your computing assets, Victim 0 ; they will typically exercise complete remote control over that compromised asset. The attacker will normally do that by using remote administration utilities that are already available on the compromised asset or by installing a back door program such as a remote administration trojan (RAT) on the asset, which they will then use to communicate with the asset. This will result in command and control (C2) communication between the compromised asset and the remote C2 server. This communication is bi- directional, with beaconing messages going from the victim to the server and commands being issued from the server to the victim. Lateral Propagation Phase Attackers are ultimately interested in valuable data assets to extract information from. So after they have successfully taken control of Victim 0, they use that device as a starting point to find and infiltrate other connected assets inside your network. They move laterally from network device to network device, compromising more assets; escalating privilege; looking for and staging sensitive, valuable or classified information; and installing more back doors so they can persist in your environment even if you identify and clean up some of the compromised assets. Data Exfiltration Phase Once the attackers have found and staged the data they want to steal, they begin to send it out of the network. They will often try to obfuscate the data by encapsulating, compressing, transforming, or encrypting it in some way. Then they will send it out of the network, either by hiding it in plain sight on standard outbound network channels such as web (HTTP) and email (SMTP), or by trying to circumvent your standard network security systems (such as web and email proxies) by sending it out of the network using non- standard ports and/or protocols. PAGE 4 PAGE 4

THE THREE DIMENSIONS OF NETWORK THREAT INTELLIGENCE There are three components you must understand when you are looking for threats in your network: Content Channels Locations Content What information is being transferred? Content is the information that is flowing over the network. Examples of content include web pages, files, and email attachments. It is important to understand that content and packets are not the same thing. In most cases today, the content is not visible in the packets because it has been buried under multiple levels of encapsulation, encoding, embedding, packing and/or compression. Because most targeted attacks these days involve content- level threats, in the infiltration phase as well as in the data exfiltration phase, it is very important that a network- based ATD system be able to extract, decode and analyze the content traversing the network no matter how deeply or recursively embedded it is. This applies to both inert (non- executable) and active (executable) content objects. Channels How is the information being transferred? Channels are the way in which information is being transferred over the network. Channels include the attributes of the network ports, protocols, and applications that are being used. Channels define the context in which information exchange occurs on the network, and that contextual awareness is often critically important in being able to distinguish normal network activity from abnormal, suspicious, or malicious network activity. Locations Where/who is the information coming from and going to? Locations are everything that relate to the source and destination of the information that s traversing the network. Examples of locations includes not just network-, protocol-, and application- level source and destination information such as TCP/UDP ports, IP addresses, DNS domains, and URLs, but also organizational-, reputational-, and identity- based attributes of the sources and destinations of information. PAGE 5 PAGE 5

THREAT DETECTION, PREVENTION, AND INCIDENT RESPONSE REQUIREMENTS A network- based Advanced Threat Defense system should serve two primary roles: 1. Threat Detection and Prevention role protects you from internal and external attacks. 2. Incident Response role helps automate and accelerate your incident response cycle. In the Threat Detection and Prevention role, the key actions for an ATD are to detect and prevent a whole spectrum of malicious activity, regardless of the tactics, including phishing, exploits, malware, command and control communication, lateral propagation, data staging, data leakage, and exfiltration, among others. The key technical requirement here is that the ATD system must be able to identify threats in real time as they occur and be able to take a unilateral prevention action when it sees them. This unilateral prevention capability is important because, in many cases, the ATD system is the only one in the network security infrastructure that can identify the threat with sufficient precision to be able to block it without disrupting normal network traffic. In the Incident Response role, the ATD system must be able to discover compromised systems, investigate live and dormant incidents, and contain targeted attacks before they result in data loss. Implicit in the previous statement is the fact that no ATD system can guarantee that you will never be compromised by an advanced adversary. The key technical requirement in this role is that the ATD system must have some form of historical network memory and be able to search, query, and analyze the recorded information. This gives the incident responders the ability to go back in time and look for things that the system did not know were malicious at the time that they occurred. PAGE 6 PAGE 6

COMPREHENSIVE NETWORK-BASED ADVANCED THREAT DEFENSE CAPABILITIES A comprehensive network- based ATD solution can be broken down into three critical capabilities: Advanced Malware Protection Data Theft Protection Network Security Analytics Figure 2. Comprehensive Advanced Threat Defense PAGE 7 PAGE 7

Advanced Malware Protection The industry may lead you to believe that this is only about advanced malware protection; however, a truly comprehensive ATD solution provides protection against targeted persistent attacks at each phase of the threat lifecycle on the network: before they are downloaded, when they are transferred within the network, to when they are installed on an endpoint. A truly comprehensive ATD solution protects you with these features: Advanced Malware Detection analyzing scores of inbound threats per second as they flow over the network, maintaining a high malware detection rate with extremely low false positives. Rich Malware Execution Forensics detailed description of what the malware did when it executed in the virtual execution environment such as registry, file system and operating system changes, network call- out behavior, etc. Real- Time Threat Prevention analyzing network traffic at multi- gigabit speeds, providing real- time discovery and prevention. Automated Threat Intelligence delivering a continuous stream of finely curated reputational threat intelligence for automatic consumption; a key component in enabling the solution to quickly identify suspicious and malicious activity. Flexible Policy (Rules) Engine operationalizing known advanced threat indicators using open industry standards, like YARA. Wire- Speed Performance analyzing gigabits of network traffic in real time, providing visibility, analysis, and protection from advanced threats before they harm your enterprise. Data Theft Protection A truly comprehensive ATD solution will directly detect and prevent the unauthorized flow of sensitive, valuable, or classified information out of the network. The technical requirements include: Data Exfiltration Prevention using sophisticated rules and techniques to prevent the theft of sensitive and confidential data out of your network. PAGE 8 PAGE 8

Intellectual Property Protection flexible and powerful policy engine to match the characteristics of your intellectual property and block any unauthorized transfers of this data. Compete Content Visibility delivering network visibility, analysis, and control over all protocols, applications, and file types to defend against advanced threats and prevent data theft in real time. Flexible Data Profiling Through a flexible, powerful policy engine, you can define the characteristics of your most valuable data to identify sensitive data and keep it from leaving your network. Actionable Alerts alerts provide comprehensive, actionable information allowing you to rapidly triage and remediate threats. Network Security Analytics A comprehensive ATD solution will provide a historical record of all network activity so you may go back in time to look for things that you didn t know were bad at the time that they occurred. There are many use cases for this capability across all phases of the threat lifecycle. The technical requirements include: Full Metadata Capture collecting details (metadata) about every network transaction. This metadata is stored as historical network memory and leveraged to discover past incursions. Multi- dimensional Analysis analyzing network content against multiple sources of threat intelligence including reputation feeds, custom policies, and threat prevention policies that are updated frequently. Advanced Visualization delivering dynamic summaries and trends of your enterprise, by host, alerts, location, and protocols to understand your organizations threat landscape. Customizable Reporting standard and customizable reports on the rich metadata collected over time. Correlated Alerting correlating alert data for investigation with other transactions potentially related to the threat. A comprehensive, network- based ATD system should combine all three capabilities Advanced Malware Protection, Data Theft Protection, and Network Security Analytics in a seamless, tightly integrated system, under a single management framework. PAGE 9 PAGE 9

INTEGRATION WITH ENDPOINT SECURITY SYSTEMS The main job of a network- based ATD system is to protect the enterprise s computing assets (endpoints) at the network level from being compromised. The primary way it does this is by decoding and analyzing the network traffic that flows to and from those endpoints, looking for indications of threat and/or compromise within the contextual information that is available on the network. It can also simulate endpoint execution environments by incorporating emulators and/or full virtualized endpoint execution containers ( sandboxes ) for example. However, no matter how good a network- based ATD system is it needs to have access to the contextual information that is available on the actual enterprise endpoints themselves. To do this, the network ATD system should integrate with endpoint defenses. This integration should include the sharing of contextual information about threats and/or threat intelligence. For example, if the network ATD system sees malware inbound to an enterprise endpoint, it does not know if the malware actually executed on the real endpoint. On the other hand, if there is an endpoint security solution that is monitoring and recording the behavior of all executable objects on the endpoint, the network ATD system can query the endpoint security system to determine if the malware actually executed on the target endpoint (or at other endpoints in the enterprise). If the answer is yes, the network ATD system can increase the severity of the malware alert and escalate its priority in the security analyst s workflow. Figure 3. Integration between Network and Endpoint ATD Systems PAGE 10 PAGE 10

THE FIDELIS XPS SOLUTION The Fidelis XPS solution is a comprehensive, network- based Advanced Threat Defense solution consisting of four major components, as shown in Figure 4. Figure 4. The Fidelis XPS Solution These components are described briefly below. For more details, see the Fidelis Solution Overview white paper. Fidelis Insight is a cloud- based aggregation of dynamic threat intelligence derived from multiple public and proprietary sources. Fidelis Insight includes content-, channel-, and location- based threat intelligence. It also includes a secure, high- capacity, virtual execution (sandbox) environment. Fidelis XPS CommandPost is the management system for the Fidelis XPS products and the integration point between the Fidelis XPS solution and other systems in the enterprise network security infrastructure. Fidelis XPS Sensors are the workhorses of the Fidelis XPS solution. They are typically deployed at boundary points on the enterprise network (e.g. at Internet or MPLS access points, in front of the enterprise PAGE 11 PAGE 11

fileshares, etc.). They can be deployed in line with the network traffic or out of band where they receive a copy of the traffic from a network TAP or a switch SPAN port. There are several different types of sensors that are designed for deployment at different points in the physical and logical network infrastructure. The sensors reassemble, decode, and analyze the traffic that traverses the network boundary in real time using Fidelis patented Deep Session Inspection technology, which gives them deep visibility and control over the protocols, application, and content objects that are flowing over the network. This enables the Fidelis XPS sensor to detect threats that are not visible to other network security systems. The Fidelis XPS sensors include an integrated Malware Detection Stack that identifies malware objects flowing over the network using a combination of rule- based behavioral analysis, static and dynamic malware detection technologies. The malware detection stack uses a high speed, multi- threaded architecture that can analyze hundreds of objects per second (per sensor). When a sensor detects a session that triggers a threat detection rule, it takes an action on the session. The action is configurable at the rule level and can be a record- and- alert action or a prevention- and- alert action. The sensors also extract rich network-, protocol-, application-, and content- level metadata from each and every network session that occurs on the network whether the session triggers a threat detection rule or not and sends the metadata to a Fidelis XPS Collector system (if deployed). Fidelis XPS Collector is a database for rich session metadata extracted from all network sessions by the Fidelis XPS sensors. The Collector stores session metadata from one or more Fidelis XPS sensors in a high- speed database and makes it available to analysts via a query and search interface on the Fidelis XPS CommandPost. The Collector supplies historical network memory at a much lower total cost of ownership than a full packet capture system. The Collector corresponds to the index component of a full packet capture system, but the Collector s index is much richer because of the deep protocol, application, and content decoding capabilities of the Fidelis XPS sensors that extract the metadata the richer the index, the higher the probability of detection. PAGE 12 PAGE 12

Fidelis XPS Solution Architecture The Fidelis XPS products are purpose- built for advanced threat defense, and have the following specific architectural capabilities: Broad visibility over all network ports, protocols, and applications Deep visibility into encapsulated, encoded, embedded, compressed, obfuscated content Multi- dimensional dynamic threat intelligence Historical and comprehensive network memory Static and dynamic malware detection and analysis Data theft/exfiltration detection and prevention Open policy, rules, and threat intelligence engine Scalability up to 2.5+ Gbps for each stand- alone appliance (up to 20+ Gbps per blade center chassis) Unilateral real- time prevention (blocking) capability Integrations with leading- edge endpoint- based ATD systems PAGE 13 PAGE 13

FIDELIS XPS A COMPREHENSIVE NETWORK-BASED ATD SOLUTION Visibility and Control over the Entire Threat Life Cycle The Fidelis XPS solution includes technologies and threat intelligence that give visibility and control over each of the four phases of the threat lifecycle (infiltration, command and control communication, lateral propagation, and data exfiltration). Experience shows that this broad spectrum approach significantly increases the probability of seeing the threat before it does irreparable harm to the targeted organization. Multi- Dimensional Dynamic Threat Intelligence Fidelis XPS Deep Session Inspection technology, coupled with the dynamic threat intelligence available in Fidelis XPS Insight, gives the Fidelis XPS solution a unique ability to operationalize all three dimensions of network threat intelligence (content, channels and locations) on network traffic. This multi- dimensional visibility also increases the probability of detecting an advanced threat. Threat Detection/Prevention and Incident Response The architecture of the Fidelis XPS solution, and in particular its unique combination of real- time detection and prevention capability with both selective and non- selective network memory, enables it to add value both in threat detection and prevention and in incident response roles. Integrations with Endpoint Advanced Threat Detection Systems The Fidelis XPS solution has integrations with leading edge endpoint- based ATD systems such as Verdasys Digital Guardian and Bit9 + Carbon Black. These integrations give the Fidelis XPS system access to contextual information that is only available on the endpoint itself. All Three Critical ATD Capabilities in a Single, Tightly Integrated System One of the most distinguishing characteristics of the Fidelis XPS solution is that it integrates all three critical capabilities of network based advanced threat defense (advanced malware protection, data exfiltration protection, and network forensics and analytics) in a single system under a unified management framework, as shown in Figure 4. The benefits of having all three of these capabilities seamlessly integrated into a single system, under a unified management framework include: higher probability of detecting or preventing threats before they result in serious damage; lower incident response costs due to fewer incidents, faster containment and remediation, and lower post- incident charges such as legal, forensics, etc.; and lower network security infrastructure costs as a result of having fewer boxes, lower maintenance, and less analyst oversight. PAGE 14 PAGE 14

ABOUT GENERAL DYNAMICS FIDELIS CYBERSECURITY SOLUTIONS General Dynamics Fidelis Cybersecurity Solutions provides organizations with a robust, comprehensive portfolio of products, services, and expertise to combat today's sophisticated advanced threats and prevent data breaches. Our commercial enterprise and government customers around the globe can face advanced threats with confidence through use of our Network Defense and Forensics Services, delivered by an elite team of security professionals with decades of hands on experience, and our award winning Fidelis XPS Advanced Threat Defense products, which provide visibility and control over the entire threat life cycle. PAGE 15 PAGE 15