Network Security Monitoring



Similar documents
You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell

Missing the Obvious: Network Security Monitoring for ICS

Security Onion. Peel Back the Layers of Your Network in Minutes. Doug Burks

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Intrusion Detection Systems (IDS)

What happens when you use nmap or a fuzzer on an ICS?

Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory

Network Security Monitoring: Looking Beyond the Network

INTRUSION DETECTION SYSTEMS and Network Security

Network Security Monitoring

Network Security Monitoring Theory and Practice

How To Protect A Network From Attack From A Hacker (Hbss)

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Developing Network Security Strategies

CS : Digital Forensics Fall 2006 Instructors: Lorie Liebrock, Bob Hutchinson and David Duggan

Traffic Monitoring : Experience

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Network Security Monitoring

Hack Proofing Your Organization

Linux Network Security

Intrusion Detection and Incident Response Breakout Session

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

The principle of Network Security Monitoring[NSM]

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Introduction of Intrusion Detection Systems

Architecture Overview

INTRUSION DETECTION SYSTEM

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

NETWORK SECURITY (W/LAB) Course Syllabus

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Security Policy JUNE 1, SalesNOW. Security Policy v v

Dynamic Rule Based Traffic Analysis in NIDS

Intrusion Detections Systems

Intrusion Detection Systems

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

NETWORK SECURITY. Scott Hand. Melanie Rich-Wittrig. Enrique Jimenez

RAVEN, Network Security and Health for the Enterprise

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

ScotGrid. Bolting the door. Network Based Security Mechanisms. David Crooks, Mark Mitchell on behalf of ScotGrid Glasgow

Remote Services. Managing Open Systems with Remote Services

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

Taxonomy of Intrusion Detection System

IDS : Intrusion Detection System the Survey of Information Security

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Intrusion Detection Systems. Darren R. Davis Student Computing Labs

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

COUNTERSNIPE

Firewalls, Tunnels, and Network Intrusion Detection

Cyber Watch. Written by Peter Buxbaum

Network Monitoring for Cyber Security

White Paper. Intrusion Detection Deploying the Shomiti Century Tap

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

New Era in Cyber Security. Technology Development

Things I can do to protect my network from getting Hacked!!!!!! Jazib Frahim, Technical Leader

SonicWALL PCI 1.1 Implementation Guide

S N O R T I D S B L A S T C O U R S E

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

USE HONEYPOTS TO KNOW YOUR ENEMIES

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

PCI Compliance in Multi-Site Retail Environments

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

74% 96 Action Items. Compliance

Network Defense Tools

Closing Wireless Loopholes for PCI Compliance and Security

Security Management. Keeping the IT Security Administrator Busy

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

IDS / IPS. James E. Thiel S.W.A.T.

PCI Wireless Compliance with AirTight WIPS

Intrusion Detection in AlienVault

AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

Second-generation (GenII) honeypots

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

How To Protect Your Network From Attack From Outside From Inside And Outside

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Network Segmentation

Network- vs. Host-based Intrusion Detection

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Network/Internet Forensic and Intrusion Log Analysis

FIREWALLS & CBAC. philip.heimer@hh.se

athenahealth Interface Connectivity SSH Implementation Guide

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

Firewalls & Intrusion Detection

A Review on Network Intrusion Detection System Using Open Source Snort

GE Measurement & Control. Cyber Security for NEI 08-09

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

DEPLOYMENT GUIDE. This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform.

GE Measurement & Control. Cyber Security for NERC CIP Compliance

PCI v2.0 Compliance for Wireless LAN

Concierge SIEM Reporting Overview

Transcription:

CEENET/GEANT Security Workshop Sofia, 2014 Network Security Monitoring An Introduction to the world of Intrusion Detection Systems Irvin Homem irvin@dsv.su.se Stockholm University

Who am I? Of Indian and Portuguese origin; Born and raised in Kenya (East Africa) Worked at Deloitte Eastern Africa (Enterprise Risk Services) MSc. Information & Communication Systems Security at the Royal Institute of Technology (KTH) Currently a PhD student at Stockholm University Automation of Digital Forensics

Cybersecurity is both a National and Economic security issue. Governments worldwide wage clandestine battles everyday in cyberspace. Richard Beijtlich, CSO Mandiant

History Stalking the Wily Hacker (Cliff Stoll, 1988) Accounting error of 75 cents between 2 systems in 1986 Looking for abnormal behavior Todd Heberlein Developed the first network IDS The Network Security Monitor (1988)

Network Security Monitoring The collection, analysis and escalation of indications and warnings to detect and respond to intrusions Simply: A way to find intruders on your network and do something about them before they do too much damage to your systems

Why NSM? Prevention eventually fails 100% security does not exist NSM doesn t prevent intrusions Provides transparency Improve for next time Defense in depth Source: Richard Bejtlich,The Practice of Network Security Monitoring, No Starch Press, 20

Defense in Depth Pfleeger&Pfleeger, Computing in Security, 3rd Edition, Prentice Hall,2003

Source: Richard Bejtlich,The Practice of Network Security Monitoring, No Starch Press, 2013

Why NSM? The time factor. Most attackers seek persistence today Persistence takes time to achieve South Carolina Dept. of Revenue incident Source: Richard Bejtlich,The Practice of Network Security Monitoring, No Starch Press, 2013

The Data we observe.

Legality and Privacy concerns Never do NSM on non private networks Always check the legality within your jurisdiction Wiretap Act (US Code 18 2511)... not unlawful for an operator, officer, employee or agent of wire or electronic communication service to intercept, disclose, or use that communication in the normal course of his employment Also not unlawful if one is party to a communication, or prior consent is given. In the EU, a little more strict Consult local law + Workers unions/councils + Privacy experts/unions

Types of NSM Data Full content Source: Richard Bejtlich,The Practice of Network Security Monitoring, No Starch Press, 2013

Types of NSM Data (2) Extracted content HTML from webpages Images Downloaded files PDFs Exe s Docs Emails

Types of NSM Data (3) Session data Source: Richard Bejtlich,The Practice of Network Security Monitoring, No Starch Press, 2013

Types of NSM Data (4) Transaction data Source: Richard Bejtlich,The Practice of Network Security Monitoring, No Starch Press, 2013

Types of NSM Data (5) Statistical data Source: Richard Bejtlich,The Practice of Network Security Monitoring, No Starch Press, 2013

Types of NSM Data (6) Metadata Data about data WhoIS IP / Domain name FIRE Finding Rogue networks Source: Richard Bejtlich,The Practice of Network Security Monitoring, No Starch Press, 2013

Types of NSM Data (7) Alert data Events trigger rules to fire alerts Mainly logs from snort or suricata Can be aggregated and presented in interfaces like Snorby and Sguil Source: Richard Bejtlich,The Practice of Network Security Monitoring, No Starch Press, 2013

Main Categories of NSM / IDS Host based IDS Snapshotting; Known File Hashes; System Files, config files Log all user activity and system calls E.g: OSSEC Network Node IDS Examine traffic on a particular node

Main Categories Network based IDS Promiscuous mode; listens to all network traffic Snort, Suricata, Bro Hybrid Combination of NIDS and HIDS

Placing your NIDS sensors (1)

Placing your NIDS sensors (2)

Getting Physical Access to Network Traffic From Switches Port Mirroring (Dell/Juniper) / Switched Port Analyzer (Cisco) One to one copy of traffic on switch ports is duplicated onto a dedicated port Using Network Taps Dedicated physical device put in between physical transmission media (cables) Copy traffic to dedicated port(s). One to one interface. Capturing traffic directly on a host or intermediate device E.g Firewalls / Routers but not very efficient due to lack sufficient storage Endpoints, especially servers. In Cloud infrastructures??

IDS Essential Mechanisms Signature based Signatures created by vendors, or sysadmins Based on previous knowledge of indicators in packets of an attack Depends on constant updates Fails with previously unheard of attack vectors / Zero day s Anomaly based Trained on normal network behavior Detects deviations from the norm Packets graded with Normalcy scores / abnormal threshold Stateful Protocol Analysis / State based Initial state Compromised state

Security Onion History: Originator Doug Burks Started in 2008 Followed the Ubuntu release schedule (more or less) Picked up a lot in 2011 Now has Ubuntu packages for the main tools (directly from Ubuntu ppa ) Get it here: https://code.google.com/p/security onion/

Easy wizard setup next, next, next

Security Onion toolbox (1) Source: Richard Bejtlich,The Practice of Network Security Monitoring, No Starch Press, 2013

Security Onion toolbox (2) Supporting tools: PF_RING (For process based load balancing) SOup (Security Onion Update) Salt (Like Puppet configuration management Salt Master/Salt minion) BPF (Berkley Packet Filters)

Salt Manually configuring multiple sensors? 5, 10, 50 sensors? Configuration management and updates Salt master + Salt minions Remote command execution E.g: Salt * command.run <mycommand> Sets up authentication automatically Updated rule sets at master periodically polled by minions User Management Users and SSH keys managed from master and pushed out to minions

Data Types Network based IDS alerts SNORT/ Suricata Host based IDS alerts OSSEC Syslog data syslog ng Asset data Bro/ PRADS Session data Argus/ Bro / PRADS Transaction data [http/ftp/dns/ssl and more] logs from Bro Full content data netsniff ng

IDS Silver Bullet CAN Add a greater degree of integrity to the rest of you infrastructure Trace user activity from point of entry to point of impact Recognize and report alterations to data Automate a task of monitoring the Internet searching for the latest attacks Detect when your system is under attack Detect errors in your system configuration Make the security management of your system possible by non expert staff CANNOT Compensate for a weak identification and authentication mechanisms Conduct investigations of attacks without human intervention Compensate for weaknesses in network protocols Compensate for problems in the quality or integrity of information a system provides Analyze all the traffic on a busy network Detect all packet level attacks Deal with some of the modern network hardware and features

NSM / IDS Drawbacks Encryption VPNs and Wireless networks Complicated network architecture can obscure transparency E.g: NAT ing Mobile platforms may never use a segment monitored by the NSM platform Massive network traffic can overwhelm sensors Privacy and legal concerns may limit capabilities

References The Practice of Network Security Monitoring Richard Bejtlich Understanding Intrusion Detection Systems SANS Reading Room, 2001

Thank you Questions?