The Critical Role of Netflow/IPFIX Telemetry in the Next- Generation Network Security Infrastructure



Similar documents
Cisco dan Hotel Crowne Plaza Beograd, Srbija.

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

NetFlow/IPFIX Various Thoughts

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

NetFlow Security Monitoring with Cisco Threat Defense Matthew Robertson, Security Technical Marketing Engineer BRKSEC-2073

STEALTHWATCH MANAGEMENT CONSOLE

Threat Defense with Full NetFlow

Cisco IOS Flexible NetFlow Technology

Invisible attacks visible in your network. How to see and follow the tracks?

Threat Defense with Full NetFlow

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

Introduction to Cisco IOS Flexible NetFlow

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

Configuring Flexible NetFlow

STEALTHWATCH MANAGEMENT CONSOLE

Cisco Cyber Threat Defense - Visibility and Network Prevention

About the Authors. About the Authors

Network as an Sensor & Enforcer

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Network Performance + Security Monitoring

Flow Analysis. Make A Right Policy for Your Network. GenieNRM

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Using Lancope StealthWatch for Information Security Monitoring

and reporting Slavko Gajin

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

Flow Based Traffic Analysis

QRadar Security Intelligence Platform Appliances

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance

Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to CHAPTER

Netflow Collection with AlienVault Alienvault 2013

Flow Analysis Versus Packet Analysis. What Should You Choose?

Introduction to Netflow

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

NetFlow-Lite offers network administrators and engineers the following capabilities:

Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to CHAPTER

CISCO IOS NETFLOW AND SECURITY

Scalable Extraction, Aggregation, and Response to Network Intelligence

Concierge SIEM Reporting Overview

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

Securing and Monitoring BYOD Networks using NetFlow

NetFlow The De Facto Standard for Traffic Analytics

How-To Configure NetFlow v5 & v9 on Cisco Routers

Network Monitoring and Management NetFlow Overview

Gaining Operational Efficiencies with the Enterasys S-Series

Chapter 9 Firewalls and Intrusion Prevention Systems

Comprehensive Advanced Threat Defense

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

BlackRidge Technology Transport Access Control: Overview

Cisco IOS Flexible NetFlow Command Reference

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Defending Against Cyber Attacks with SessionLevel Network Security

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

Securing Cisco Network Devices (SND)

Network Management & Monitoring

Take the NetFlow Challenge!

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

Deploying Firewalls Throughout Your Organization

Network Security Monitoring: Looking Beyond the Network

Firewalls and Intrusion Detection

co Characterizing and Tracing Packet Floods Using Cisco R

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

Bridging the gap between COTS tool alerting and raw data analysis

Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

Security Toolsets for ISP Defense

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Configuring NetFlow. Information About NetFlow. Send document comments to CHAPTER

Enhancing Flow Based Network Monitoring

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

Network traffic monitoring and management. Sonia Panchen 11 th November 2010

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

Advanced Threat Protection with Dell SecureWorks Security Services

NetFlow v9 Export Format

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

INTRODUCTION TO FIREWALL SECURITY

Monitoring and analyzing audio, video, and multimedia traffic on the network

NETWORK SECURITY (W/LAB) Course Syllabus

Cisco NetFlow Generation Appliance (NGA) 3140

Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope

QRadar SIEM 7.2 Flows Overview

Covert Operations: Kill Chain Actions using Security Analytics

Defending Against Data Beaches: Internal Controls for Cybersecurity

Advanced Threats: The New World Order

Configuring NetFlow-lite

CONTENTS. Cisco Cyber Threat Defense v2.0 First Look Design Guide 2

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Breaking the Cyber Attack Lifecycle

Effective Methods to Detect Current Security Threats

Beyond Monitoring Root-Cause Analysis

The Hillstone and Trend Micro Joint Solution

Transcription:

The Critical Role of Netflow/IPFIX Telemetry in the Next- Generation Network Security Infrastructure Ken Kaminski, Technical Solutions Architect Northeast Cisco Systems CISSP, GAWN, GPEN, GCIA, GCFA, GMOB June 2015 1

Introduction Big Picture Netflow Fundamentals Design Adding Context

Introduction Big Picture 3

NetFlow eth0/1 eth0/2 10.2.2.2 port 1024 10.1.1.1 port 80 Start Time Interface Src IP Src Port Dest IP Dest Port Proto Pkts Bytes TCP Flags Sent Sent 10:20:12.221 eth0/1 10.2.2.2 1024 10.1.1.1 80 TCP 5 1025 SYN,ACK,PSH 10:20:12.871 eth0/2 10.1.1.1 80 10.2.2.2 1024 TCP 17 28712 SYN,ACK,FIN 4

Typical NetFlow Deployment NetFlow for Security NetFlow for Core Traffic Matrix NetFlow for Monitoring Managed Services: Application Visibility NetFlow for Peering ISP 5

Thinking Beyond the Perimeter Advanced Persistent Threats and other Modern threats are consistently bypassing the security perimeter as they break the rules. X X X X O X X X O O An advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The intention of an APT attack is to steal data rather than to cause damage to the network or organization. APT attacks target organizations in sectors with high-value information, such as national defense, manufacturing and the financial industry. 6

Defending against Humans http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html

Concept: Kill Chain Reconnaissance Weaponization Delivery Exploitation Command and Control Actions on Objectives Harvesting email addresses, identifying information, etc. Coupling exploit with backdoor into deliverable payload Delivering weaponized bundle to the victim via email, web, USB, etc. Exploiting a vulnerability to execute code in victim system Command channel for remote manipulation of victim Intruders accomplish their original goal: Lateral movement, data exfiltration (collect, encrypt, and extract) http://computer-forensics.sans.org/blog/2009/10/14/security-intelligence-attacking-the-kill-chain/ http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/lm-white-paper- Intel-Driven-Defense.pdf 8

Kill Chain: Post Breach 2. Reconnaissance 1. Command and Control 3.Propagation 4. Data Theft

Goal: Early Phase Detection Late Phase Detection Earlier Phase Detection http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/lm-white-paper-intel-driven-defense.pdf 10

Signals Intelligence Traffic Analysis: Deduce information from communication patterns 11

If ignorant of both of your enemy and yourself, you are certain to be in peril. Sun Tzu Visibility of all host-to-host communication, inside and out, is essential to the maintenance of a strong security posture. 12

NetFlow = Visibility A single NetFlow Record provides a wealth of information Router# show flow monitor CYBER-MONITOR cache IPV4 SOURCE ADDRESS: 192.168.100.100 IPV4 DESTINATION ADDRESS: 192.168.20.6 TRNS SOURCE PORT: 47321 TRNS DESTINATION PORT: 443 INTERFACE INPUT: Gi0/0/0 IP TOS: 0x00 IP PROTOCOL: 6 ipv4 next hop address: 192.168.20.6 tcp flags: 0x1A interface output: Gi0/1.20 counter bytes: 1482 counter packets: 23 timestamp first: 12:33:53.358 timestamp last: 12:33:53.370 ip dscp: 0x00 ip ttl min: 127 ip ttl max: 127 application name: nbar secure-http 13

Behavioural Analysis & Anomaly Detection Behavioural Analysis: Leverages knowledge of known bad behaviour Anomaly Detection: Identify a change from normal 14

Network Behaviour Anomaly Detection (NBAD) Signature Behaviour Anomaly Known Exploits Best Good Limited 0-Day Exploits Limited Best Good Credential Abuse (Insider Threat) Limited Limited Best 15

Botnet Command And Control Internally Propagating Malware Network Reconnaissance Data Leakage Data Hoarding and Data Exfiltration

Relational Flow Maps Forbidden relationship Host Groups Relationship 17

Stop Security Problems BEFORE They Become Crises Security Problems Impact to the Business ( $ ) Worm outbreaks can impact revenue by up to $250k per hour. StealthWatch pays for itself in 30 minutes. attack onset * F500 Media Conglomerate * early warning credit card data compromised Reduces MTTK *attack identified attack identified * * attack thwarted Time * vulnerability closed * CRISIS REGION *vulnerability closed Company with Sec Net Traffic Analysis Company with Legacy Monitoring Tools

Gartner: 'Five Styles of Advanced Threat Defense' can protect enterprise from targeted attacks Aug 2013 1. Network Traffic Analysis techniques (Lancope, Arbor, Cisco AMP) 2. Network Forensics - "full-packet capture and storage of network traffic" (RSA NetWitness) 3. Payload Analysis - sandbox techniques (FireEye) 4. Endpoint Behavior Analysis agent on every endpoint: HIPS, memory monitoring 5. Endpoint Forensics - tools for incident response teams: Endpoint Detection & Response Tools (Bit9 Carbon Black, Cisco AMP, Guidance Encase) Gartner recommends using two of the above five at least General Requirement: analyze network traffic for compromised hosts 19

Ponemon Report: Cyber Security Incident Response Ponemon report highlighting the value of NBAD - http://www.lancope.com/resources/industry-report/ponemon-institute-reportcyber-security-incident-response-are-we-prepared Network audit trails are the most effective tool for incident response. 80% of respondents indicated that analysis of audit trails from sources like NetFlow and packet captures was the most effective approach for detecting security incidents and breaches. 20

Unsampled NetFlow: Key to the Solution Want Switch to Deliver Unsampled NetFlow at Line-Rate Without Any Data Plane Performance Impact Sampled NetFlow Incomplete Visibility Less than 5% of traffic used to generate NetFlow telemetry Insufficient telemetry for threat detection Unsampled NetFlow No Blind Spots All traffic is used to generate NetFlow telemetry Pre-requisite for effective threat detection

Netflow Fundamentals 22

Source NetFlow Generator Destination NetFlow Key Fields 1 Source IP Address Destination IP Address Source Port Destination Port Layer 3 Protocol TOS byte (DSCP) Input Interface 3 2 NetFlow Cache Flow Information Packets Bytes/packet Address, ports... 11000 1528... FlowCollector 1. Inspect a packets key fields and identify the values 2. If the set of key field values are unique create a cache entry 3. On termination or timeout export a flow record to the collector

Which to Use for Threat Detection? NetFlow v5 NetFlow v9 NetFlow v5 Captures Essential Information Regarding Traffic Patterns Source/dest IP and port Packet counts Byte counts Flow duration I/O interfaces Useful for Layers 3 and 4 Traffic Pattern Analysis NetFlow v9 Extends NetFlow v5 by Adding: Numerous TCP flags/counters Flow direction Fragmentation flags ICMP and IGMP info Header stats Time-to-live DSCP/TOS info Destination routing info Provides Insight to Malformed Packets, Protocol Manipulation, and Direction of Traffic NetFlow v5 Is Useful, However, NetFlow v9 Delivers Deeper Insight

Flexible NetFlow Multiple Monitors with Unique Key Fields Traffic Flow Monitor 1 Flow Monitor 2 Key Fields Packet 1 Source IP 3.3.3.3 Destination IP 2.2.2.2 Source Port 23 Destination Oort 22078 Non-Key Fields Packets Bytes Timestamps Next Hop Address Key Fields Packet 1 Source IP 3.3.3.3 Dest IP 2.2.2.2 Input Interface Ethernet 0 SYN Flag 0 Non-Key Fields Packets Timestamps Layer 3 Protocol TCP - 6 TOS Byte 0 Input Interface Ethernet 0 Traffic Analysis Cache Source IP Dest. IP Source Port Dest. Port Protocol TOS Input I/F 3.3.3.3 2.2.2.2 23 22078 6 0 E0 1100 Pkts Security Analysis Cache Source IP Dest. IP Input I/F Flag Pkts 3.3.3.3 2.2.2.2 E0 0 11000

Flow Exporter The process that will export NetFlow data to a collector Flow Record Definition of the key and non-key fields that will be collected from a flow Key fields: configured using the match option Non-key fields: configured using the collect option Flow Monitor This defines the process that manages the NetFlow cache on the device Configuration links the Flow Exporter and the Flow record definition together A flow monitor is applied to an interface to enable NetFlow on the interface

Versions of NetFlow Version Major Advantage Limits/Weaknesses V5 V9 Flexible NetFlow (FNF) IP Flow Information Export (IPFIX) AKA NetFlow V10 NSEL (Cisco ASA only) Defines 18 exported fields Simple and compact format Most commonly used format Template-based IPv6 flows transported in IPv4 packets MPLS and BGP nexthop supported Defines 104 fields, including L2 fields Reports flow direction Template-based flow format (built on V9 protocol) Supports flow monitors (discrete caches) Supports selectable key fields and IPv6 Supports NBAR data fields Standardized RFC 5101, 5102, 6313 Supports variable length fields, NBAR2 Can export flows via IPv4 and IPv6 packets Built on NetFlow v9 protocol State-based flow logging (context) Pre and Post NAT reporting IPv4 only Fixed fields, fixed length fields only Single flow cache IPv6 flows transported in IPv4 packets Fixed length fields only Uses more memory Slower performance Single flow cache Less common Requires more sophisticated platform to produce Requires more sophisticated system to consume Even less common Only supported on a few Cisco platforms Missing many standard fields Limited support by collectors 27

SFlow sflow Sample-based (packet-sampling) technology RFC-3176 Used to monitor high-speed switched networks Samples 1 out of every n packets Recommended sample rate = 1/128 packets Duplicate sflow PDUs must be handled and removed. Not recommended for security applications

Design 29

NetFlow Deployment Architecture Management/Reporting Layer: Run queries on flow data Centralize management and reporting Flow Collection Layer: Collection, storage and analysis of flow records NetFlow Flow Exporting Layer: Enables telemetry export As close to the traffic source as possible 30

NetFlow Deployment Access Layer 2 Switch Layer 2/3 Switch Access: New network edge Detect threats as enter the network Detect threats inside the switch east-west Layer 2 traffic Fewer false positives Higher-granular visibility Identify the endpoint collect MAC Address 31

NetFlow Deployment Distribution & Core Layer 3 Distribution Switch Distribution & Core: Traditional deployment Minimal recommended deployment Enable at critical points/bottle necks Typically done on a Layer 3 boundary Detect threats internal to the VLAN When deployed on an SVI interface Detect threats as they traverse the internal network Move between subnets Layer 3 Core Switch 32

NetFlow Deployment Edge Router Firewall Edge: Detect threats as they enter and leave the network Monitor communication between branches Gain context from edge devices Application Information Events, NAT & User-ID NSEL Firewalls 33

Aside: Myths about NetFlow Generation Myth #1: NetFlow impacts performance Hardware implemented NetFlow has no performance impact Software implementation is typically significantly <15% processing overhead Myth #2: NetFlow has bandwidth overhead NetFlow is a summary protocol Traffic overhead is typically significantly <1% of total traffic per exporting device 34

Components for NetFlow Security Monitoring Management Console Management and reporting Flow Replicator/ UDP Director UDP Packet copier Forward to multiple collection systems Syslog Collector/Repeater Flow Data Binary Data Format Fast Processing NetFlow Cisco Network Flow Collector Collect and analyze Best Practice: Centralize collection globally Flow Sensor /Netflow Generation Appliance Generate NetFlow data FlowSensor VE Virtual environment 35

NetFlow Collection: Flow Stitching Uni-directional flow records 10.2.2.2 port 1024 eth0/1 10.1.1.1 port 80 Start Time Interface Src IP Src Port Dest IP Dest Port Proto Pkts Sent Bytes Sent 10:20:12.221 eth0/1 10.2.2.2 1024 10.1.1.1 80 TCP 5 1025 10:20:12.871 eth0/2 10.1.1.1 80 10.2.2.2 1024 TCP 17 28712 eth0/2 Start Time Client IP Client Port Server IP Server Port Proto Client Bytes Client Pkts Server Bytes Server Pkts Interfaces 10:20:12.221 10.2.2.2 1024 10.1.1.1 80 TCP 1025 5 28712 17 eth0/1 eth0/2 Bi-directional: Conversation flow record Allows easy visualization and analysis 36

NetFlow Collection: De-duplication Duplicates Router A: 10.2.2.2:1024 -> 10.1.1.1:80 Router B: 10.2.2.2:1024 -> 10.1.1.1:80 Router C: 10.1.1.1:80 -> 10.2.2.2:1024 Router C 10.1.1.1 port 80 Router B Without de-duplication: Traffic volume can be misreported False positive would occur Allows for the efficient storage of flow data Necessary for accurate host-level reporting Does not discard data 10.2.2.2 port 1024 Router A 37

Data Center Netflow Design Notes Most Data Center Switches do not support full unsampled Netflow designed for very high speed networks Example: only Cisco Nexus 7K M1/M2 Modules support full Netflow in hardware (L2/L3), F-Series Cards (F1, F2, F2E, F3) only support Sampled Netflow Cisco Nexus 9K only supports Sflow sampled only Use Flow Sensor/Netflow Generation Appliances (NGA) on SPAN ports at the Data Center Aggregation Layer. This also deals with Netflow Cache size issues on these switches (Example: Nexus 7K 512K). 38

Adding Context 39

Identity Engines as a Telemetry Source Maintain historical session table Correlate NetFlow to username Build User-centric reports Identity Engine Management Console Syslog, REST API Authenticated Session Table 40

Integrating with a SIEM Log alarms and summary info to SIEM Complete visibility throughout network Leverage specialty data handling SIEM Security Events SMC API Syslog SDEE API s to access database Directly access flow data (ex. getflows) Improved scale - collection and retention Decreased cost NetFlow 41

Netflow for Security Vertical Focus Focus on verticals that truly care about APT threats: Financials, Utilities, Government, High Tech, Pharma If you are a customer that is not or does not have fully deployed traditional defenses such as NGFW, NGIPS, Web Security, and others then focus on these 42