Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.



Similar documents
OWASP Logging Project - Roadmap

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

IDS / IPS. James E. Thiel S.W.A.T.

SANS Top 20 Critical Controls for Effective Cyber Defense

Name. Description. Rationale

COSC 472 Network Security

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Intrusion Detection Systems

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

How To Protect A Network From Attack From A Hacker (Hbss)

FISMA / NIST REVISION 3 COMPLIANCE

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

End-user Security Analytics Strengthens Protection with ArcSight

PART D NETWORK SERVICES

Data Management & Protection: Common Definitions

PROFESSIONAL SECURITY SYSTEMS

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Network- vs. Host-based Intrusion Detection

Protecting Critical Infrastructure

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Information Technology Policy

Keyword: Cloud computing, service model, deployment model, network layer security.

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Intrusion Detections Systems

Open Source Security Tool Overview

Protecting Your Organisation from Targeted Cyber Intrusion

Basics of Internet Security

Taxonomy of Intrusion Detection System

Guideline on Auditing and Log Management

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

THE EVOLUTION OF SIEM

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

IDS : Intrusion Detection System the Survey of Information Security

FKCC AUP/LOCAL AUTHORITY

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Where every interaction matters.

Εmerging Ways to Protect your Network

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Defending Against Data Beaches: Internal Controls for Cybersecurity

CRYPTUS DIPLOMA IN IT SECURITY

Bridging the gap between COTS tool alerting and raw data analysis

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

Automate PCI Compliance Monitoring, Investigation & Reporting

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Introduction: 1. Daily 360 Website Scanning for Malware

Global Partner Management Notice

Intrusion Detection Systems (IDS)

INFORMATION SECURITY REVIEW

Notes on Network Security - Introduction

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Overview of computer and communications security

Cyber Security and Critical Information Infrastructure

Security Coordination with IF-MAP

Clavister InSight TM. Protecting Values

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Intrusion Detection from Simple to Cloud

Network Monitoring using MMT:

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Network Security Policy

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Compliance Guide: PCI DSS

Business Phone Security. Threats to VoIP and What to do about Them

The Business Case for Security Information Management

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

I. Introduction to Privacy: Common Principles and Approaches

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Network Based Intrusion Detection Using Honey pot Deception

Network & Information Security Policy

Network Security and the Small Business

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

IBX Business Network Platform Information Security Controls Document Classification [Public]

The SIEM Evaluator s Guide

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Network Security. Network Security Hierarchy. CISCO Security Curriculum

Sample Employee Network and Internet Usage and Monitoring Policy

Security Event Management. February 7, 2007 (Revision 5)

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Transcription:

Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: gdavid13@sts.ro adibuciu@sts.ro

Environment Network/services can be damaged due to : Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information. Types of attacks I) Passive and active attacks a) passive attacks - the intruder observes the information passing through the communication medium, without interfering with the flow and content of messages b) active attacks - the intruder can modify, circumvent or insert false messages into the communication flow.

Environment II) Denial-of-Service Attacks Are typically carried out by overloading the system capacity, and by preventing legitimate users from accessing and using the targeted resource. III) Defacement Attacks A defacement attack is carried out by replacing the victim s web page with a forged page whose content will depend on the criminal purpose. IV) Malware attacks A malicious code (or malware) is any program that can deliberately and unexpectedly interfere with the normal operation of a computer.

Environment V) Cyber intrusion Malevolent can attack a system by appropriating legitimate user identification and connection parameters (e.g passwords), or through deception and exploitation of vulnerabilities. The main methods used to obtain the connection parameters of legitimate users to gain access to systems are: Guessing; Deception (social engineering); Listening to traffic; Introducing a Trojan horse; Cracking encrypted passwords; Spying on users.

Environment VI) Spam and Phishing Spam is the bulk sending of unsolicited e-mail: for commercial or publicity purposes; for purposes of introducing malicious software, such as malware into the system. Phishing refers to an attack using mail programs to trick or coax web users into revealing sensitive information that can then be exploited for criminal purposes. VII) Some communication protocols misuse VIII) Cyberattack methodology The process of committing a cyberattack consists of collecting and searching for the vulnerabilities of the target systems and exploiting them.

Environment Security criteria The capability of a system to continuously deliver services. This depends on the availability of hardware and software resources and as well as services. The capability of a system to prevent unauthorized individuals and processes from accessing data. This concerns the preservation of data confidentiality and integrity. These are ensured by: (i) access control procedures such as identification, authentication and authorization with respect to certain permissions or access rights; and (ii) encryption mechanisms. The capability of a system to allow only authorized individuals and processes to perform data modification. Here, an integrity criterion is necessary. This involves access control, error control and coherency checking procedures. The capability of a system to ensure that specific actions and transactions have actually taken place. This involves traceability, proof, administration, audit and non-repudiation of actions and events. The capability of a system to carry out actions and provide the expected services under appropriate conditions of usage and performance throughout its life span. This involves continuity, reliability, user friendliness and operational soundness.

Environment CyberDefence - prevent hijacking of computers or computer networks and services; Proactive Cyber Defence - not to blame external conditions for the results obtained; Sun-Tzu or SunWu first introduced the notion of predictability analysis as part of a strategy to overcome (to win);

Environment Large networks generate a huge amount of logs and security events; Firewalls, IDS / IPS systems, web servers, authentication systems and other equipment contribute to the growing number of events that need to be analyzed in order to lead to countermeasures; SEM (Security Event Manager) - a centralized storage and logs interpretation, managing security events generated by network equipments and services; SIEM Security Information and Event Management;

Environment SIEM Capabilities: Data Aggregation: aggregate data from many sources, including network, security, servers, databases, applications, providing the ability to consolidate monitored data and helping to avoid missing crucial events; Correlation: looks for common attributes and links events to each other into meaningful bundles; Alerting: the automated analysis of correlated events and generation of alerts, to notify recipients of immediate issues; Dashboards: tools that take event data and turn it into informational charts to assist in discovering patterns, or identifying activity that is not forming a standard pattern; Compliance: SIEM can be employed to automate the gathering of compliance data, producing reports that adapt to existing security, governance and auditing processes; Retention: SIEM/SIM solutions employ long-term storage of historical data to facilitate correlation of data over time and to provide the retention necessary for compliance requirements;

Solutions Possible solutions for monitoring, analysis and prevention of attacks can be divided into two main categories in terms of licensing: Open source; Enterprise. Open source solutions: Open source solutions: OSSIM Open Source Security Information Management. Integrates the following software components: arpwatch aimed at detecting abnormalities in the OSI layer 2 (MAC); P0f used for passive OS detection and analysis of transitions from one operating system to another; Pads used to detect abnormalities of services; Nessus vulnerability scanner; Tcptrack - Used to obtain information about sessions and to correlate them with other events;

Solutions Ntop used to make a database of network information; Nagios used to monitor resources (hardware and network services); Osiris HIDS; Snort detection system and intrusion prevention; Tcpdump packet analyzer; Syslog server used for collecting logs from network devices; Netflow protocol used for collecting information about IP traffic; HoneyD creates virtual hosts on the network, used as traps for detecting and preventing attacks;

Solutions Enterprise solutions: ArcSight It is a solution that combines traditional security event monitoring with smart correlation and detection of anomalies, using analytical tools and auto repair; CheckPoint Eventia Suite It is a solution for information and security events management; Has two components an analysis component (Eventia Analyzer) and a reporting component (Eventia Reporter); Juniper Security Threat Response Manager Stand alone unit, for integrated network monitoring to ensure detection of threats, log management and compliance with security policy;

Case study

Case Study

Case Study Web servers Report

Case study Type of event: flood Traffic is totaled and recorded in interval 6:14 a.m. to 6:34 a.m. and 7:11 p.m. to 7:19 p.m. respectively

Case study Type of event: flood

Case study Traffic is totaled and recorded in the time slot 7:58 p.m. to 9:44 p.m.

Conclusion Methods to overcome such attacks Alternative routing; Blackholing; Changing public IP address; Monitoring websites with custom scripts developed by internal teams in order to satisfy specific needs; Monitor bidirectional traffic through the internal SIEM platforms; Whenever possible collecting of access and error logs on application servers; Demanding local Internet service providers to block unauthorized traffic; Cooperation with national and international CERTS teams in order to isolate the incidents; Redundancy at the routing level ; At least one loop to be provided by a service provider in order to ensure scrubbing;

Conclusion Lessons to be learned by CERT teams in order to be proactive: - Use methods to study attacks; - Use methods to detect spam sources and to put them on blacklists; - Use methods to detect networks botnets and to understand their behavior; - Use of honeypots in order to study the behavior of the malware and spam; - Exchange information between CERT teams quickly and in standard manner; - Transport information from sources that generate allerts to centralized systems through standardized protocol and using a secure manner;

Conclusion Standardization of protocols for log transmission (syslog); Using of guidelines - NIST 800-92 - log Normalization; Integration of events generated by physical protection systems into the security event correlation; Assessment of compliance (e.g PCI, Sarbanes-Oxley, HIPPA);

Conclusion Standardization at the advisory level Standardization of incident and data exchange (including statistics) Standardization of security event data Standardization for network abuse reporting

Conclusion Use of fast databases able to read and write very fast at the expense of relational type; Examples: Mongodb If you need dynamic queries; if you prefer to define indexes, not map/reduce functions; if you need good performance on a large DB; Cassandra When DB writing processes is far more than reading processes (logging). Writes are faster than reads, so one natural niche is real time data analysis; Membase Any application where low-latency data access, high concurrency support and high availability is a requirement.

Referencies 1.http://en.wikipedia.org/wiki/Security_information_and_event_management 2. itu_cybersudy_2009cgdc-2009-e.pdf 3. itu-understanding-cybercrime-guide.pdf 4. http://cassandra.apache.org/ 5. http://www.mongodb.org/ 6. http://www.apache.org 7. http://www.x-arf.org/specification.htm 8. http://www.arcsight.com/ 9. http://www.checkpoint.com/ 10. http://www.juniper.net 11. http://communities.alienvault.com/community 12. http://www.tcpdump.org/ 13. http://www.balabit.com/ and http://http://www.syslog.org/ 14. http://www.tenable.com 15. http://www.snort.org/ 16. http://www.ntop.org/ 17. http://www.nagios.org/ 18. http://nfsen.sourceforge.net/ based on nfdump 19. http://www.virtuallyinformed.com 20. http://www.itu.int/itu-d/cyb/publications/index.html

Questions? https://www.stsnet.ro https://corisweb.stsisp.ro https://ca.stsisp.ro http://sks.stsisp.ro:11371