Network Security Monitoring: Beyond Intrusion Detection. By: rewtninja



Similar documents
Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

Endpoint Protection Solution Test Plan

First Global Data Corp.

FINRA Regulation Filing Application Batch Submissions

Considerations for Success in Workflow Automation. Automating Workflows with KwikTag by ImageTag

FundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs

Traffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel

Cloud Services MDM. Windows 8 User Guide

Corente Cloud Services Exchange (CSX) Corente Cloud Services Gateway Site Survey Form

Mobile Device Manager Admin Guide. Reports and Alerts

CenterPoint Accounting for Agriculture Network (Domain) Installation Instructions

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

Internet and Social Media Solicitations: Wise Giving Tips

Setup PPD IT How-to Guides June 2010

Network Security Trends in the Era of Cloud and Mobile Computing

New in this release. Sphere (October 2013)

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Serv-U Distributed Architecture Guide

esafe SmartSuite Release Notes

Cloud Services Frequently Asked Questions FAQ

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Alexsys Team 2 Service Desk

Help Desk Level Competencies

HarePoint HelpDesk for SharePoint. For SharePoint Server 2010, SharePoint Foundation User Guide

Job Profile Data & Reporting Analyst (Grant Fund)

GUIDANCE FOR BUSINESS ASSOCIATES

ESSS Vendor Evaluation Form WhiteCanyon Software

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

Citizen Service Management

Wireless Light-Level Monitoring

NASDAQ BookViewer 2.0 User Guide

RE: Operational Standards for the Cancer Waiting Times Commitments

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated

PROMOTING THE USE OF VIDEO CONFERENCING. How to get the absolute best from Video Conferencing by encouraging and increasing usage.

HIPAA HITECH ACT Compliance, Review and Training Services

Enrollee Health Assessment Program Implementation Guide and Best Practices

2. When logging is used, which severity level indicates that a device is unusable?

Meeting Minutes for January 17, 2013

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy

ScaleIO Security Configuration Guide

Better Practice Guide Financial Considerations for Government use of Cloud Computing

Business Marketing Self-Assessment Checklist. The fast and simple way to identify your most critical marketing needs.

DSS: tool for Europe-wide esignature interoperability. November 2015 Miguel Alvarez Rodríguez- ISA Unit

SaaS Listing CA Cloud Service Management

Regions File Transmission

Student Academic Learning Services Page 1 of 7. Statistics: The Null and Alternate Hypotheses. A Student Academic Learning Services Guide

DIGITAL MARKETING STRATEGY CHECKLIST

Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents

TAKING OWNERSHIP OF HEALTH CARE

Verification statement

Junos Pulse Instructions for Windows and Mac OS X

Getting Started Guide

Merchant Processes and Procedures

NAVIPLAN PREMIUM LEARNING GUIDE. Analyze, compare, and present insurance scenarios

Key Steps for Organizations in Responding to Privacy Breaches

STUDIO DESIGNER. Accounting 3 Participant

Best Practices on Monitoring Hotel Review Sites By Max Starkov and Mariana Mechoso Safer

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER

Interworks Cloud Platform Citrix CPSM Integration Specification

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

BES12 Jumpstart Program Description ( Jumpstart Program Description )

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)

PENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers

Plus500CY Ltd. Statement on Privacy and Cookie Policy

How to deploy IVE Active-Active and Active-Passive clusters

NHPCO Guidelines for Using CAHPS Hospice Survey Results

Real life experience implementing monitoring & services management Andreas Tsangaris, CTO, PERFORMANCE

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, Infoblox NIOS Page 1 of 8

Performance Test Modeling with ANALYTICS

Transcription:

Netwrk Security Mnitring: Beynd Intrusin Detectin By: rewtninja

Agenda Overview f NSM Benefits f NSM NSM vs IDS Limitatins f NSM Free slutins fr implementing NSM DEMO

Whami? Security enthusiast SecOps fr an int l sftware/clud cmpany. We are hiring! <Insert Certificatins Here>

Disclaimer? The standard blah blah blah

Why Mnitr? NSM Principle 1: Sme intruders are smarter than yu are

Why Mnitr? NSM Principle 2: Intruders are unpredictable

Why Mnitr? NSM Principle 3: Preventin eventually fails

Cute Bears! But what is NSM? Cllectin, analysis, and escalatin f indicatins and warnings t detect and respnd t intrusins. NSM is a way t find intruders n yur netwrk and d smething abut them befre they damage yur enterprise. It is mre than just waiting fr an alert t trigger, Successful NSM peratins are always cllecting multiple frms f NSM data, using sme f it fr matching activities (via IDS and related systems) and hunting activities (via human review f NSM data) Mre inf / Credits The practice f Netwrk Security Mnitring R. Bejtlich http://tasecurity.blgspt.cm Mandiant CSO blg http://www.securitynin.net

Benefits f NSM Imprve Detectin f the fllwing: Ptential netwrk intrusins Netwrk resurces abuse Malware Data exfiltratin/leakage Imprve Incident Respnse Imprve Evidence Cllectin - Law enfrcement, Legal Imprve security visibility int netwrk Additinal tl against Advance Persistent Threats (APT) Retrspective Security Analysis: checking yur ld #NSM data fr Indicatrs Of Cmprmise that yu didn't knw were applicable at the time the intruder acted

I have an IDS, what makes NSM better? NSM takes IDS int a whle new level Better data fr analysis, validatin, escalatin Alert Data - Pinter t the data that triggers an anmaly. Usually by a tl such as IDS Transactin Data - Fcuses n understanding the requests and replies exchanged between tw netwrk devices.(e.g. HTTP,FTP,SMTP) Sessin Data - Cnversatin Flw. Netwrk cnnectins t and frm a device Full Cntent Data - Full accunting fr every data packet transmitted between tw endpints. Statistical data Descriptive infrmatin that characterizes netwrk activity, like cunts f varius aspects f cnversatins Lg data eg. Syslg, OS/Firewall/Ruter lgs

NSM vs IDS Data Cmparisn Alert Data Pinter t the data that triggers an anmaly. Usually by a tl such as IDS Data NSM IDS Transactin Data - Fcuses n understanding the requests and replies exchanged between tw netwrk devices.(e.g. HTTP,FTP,SMTP) YES YES YES NO Sessin Data Cnversatin Flw. Netwrk cnnectins t and frm a device Full Cntent Data - Full accunting fr every data packet transmitted between tw endpints. Statistical Data - Descriptive infrmatin that characterizes netwrk activity, like cunts f varius aspects f cnversatins YES YES YES NO NO NO

NSM vs IDS Wrkflw cmparisn IDS NSM

NSM vs IDS All these NSM data makes it easier fr an analyst t validate alerts and make decisins r escalatins In the case f IDS, when an analyst des nt have enugh infrmatin n a particular alert, they tend t just ignre it.

OK.. But what are NSM Limitatins? Blind t Encrypted Traffic Cmmercial web filtering slutins have the capability t decrypt SSL and fflad decrypted SSL traffic int a prt where yu can cnnect the NSM slutin SSL Gateway SSLSniff / ViewSSLD? Cnsideratins when inspecting SSL traffic. Mbile platfrms Privacy / Legal prhibited by laws frm ther cuntries Cmpliance - sx/pci. Extreme traffic vlume may verwhelm NSM platfrms

What NSM Slutins are freely available ut there? SecurityOnin www.securitynin.net Ubuntu Linux OS, Open Surce - free GNU GPL v2.0 Leverages mature pen surce security prducts Snrt/Suricata, Br, OSSEC Elsa, Snrby, Squert Sguil, Netsniff-ng, Argus Etc Actively maintained Develper is the Deputy CSO f Mandiant (APT reprt)

Basic SecOnin Architecture Standalne Distributed

NSM Deplyment Cnsideratins Netwrk traffic HD Space (lts f) Span vs Inline

DEMO! Enugh f the bring stuff! :-D Let s see the thing

Credits / References / Add l Reading Richard Bejtlich www. tasecurity.blgspt.cm Dug Burks www.securitynin.net Securitynin Mailing List The practice f Netwrk Security Mnitring Applied Security Mnitring

Questins?