Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help



Similar documents
Securing and Monitoring BYOD Networks using NetFlow

NetFlow The De Facto Standard for Traffic Analytics

Network Performance Monitoring at Minimal Capex

NetFlow Tips and Tricks

Network Visibility Guide

Flow Analysis Versus Packet Analysis. What Should You Choose?

Cisco IOS Flexible NetFlow Technology

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Network Monitoring and Management NetFlow Overview

Introduction to Netflow

NetFlow Analytics for Splunk

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

NetFlow: What is it, why and how to use it? Miloš Zeković, ICmyNet Chief Customer Officer Soneco d.o.o.

Gaining Operational Efficiencies with the Enterasys S-Series

Flow Based Traffic Analysis

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

and reporting Slavko Gajin

Secure and Effective IT Infrastructure

Take the NetFlow Challenge!

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

Introduction to Cisco IOS Flexible NetFlow

INTRODUCTION TO FIREWALL SECURITY

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

Analyzing Logs For Security Information Event Management

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

Analyzing Logs For Security Information Event Management

Chapter 9 Firewalls and Intrusion Prevention Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Beyond Monitoring Root-Cause Analysis

Enhancing Flow Based Network Monitoring

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

High-Precision-And-Recall Network Anomaly Detection using Continuous Stream Processing

Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.

On-Premises DDoS Mitigation for the Enterprise

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Scrutinizer. Application traffic analytics, visualization and reporting tool

Network Management Deployment Guide

A FAULT MANAGEMENT WHITEPAPER

with NetFlow Technology Adam Powers Chief Technology Officer

Network Management Back to the Basics. Brad Hale

Introduction of Intrusion Detection Systems

Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope

Huawei Network Edge Security Solution

How-To Configure NetFlow v5 & v9 on Cisco Routers

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Firewalls. Ahmad Almulhem March 10, 2012

Architecture Overview

Networking for Caribbean Development

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Netflow Overview. PacNOG 6 Nadi, Fiji

Configuring NetFlow Secure Event Logging (NSEL)

Secure Cloud-Ready Data Centers Juniper Networks

Cisco IPS Tuning Overview

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

This chapter covers the following topics:

NetFlow-Lite offers network administrators and engineers the following capabilities:

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Integrated Traffic Monitoring

Network Immunity Solution. Technical White paper. ProCurve Networking

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

Application Security Backgrounder

Configuring NetFlow Secure Event Logging (NSEL)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Dell SonicWALL report portfolio

WhatsUpGold. v NetFlow Monitor User Guide

CMPT 471 Networking II

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

SolarWinds Technical Reference

How To Make A Network Safer With Stealthwatch

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Cisco RSA Announcement Update

SolarWinds Certified Professional. Exam Preparation Guide

How To Choose A Network Firewall

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

Internet Security Systems

CHAPTER 1 WhatsUp Flow Monitor Overview. CHAPTER 2 Configuring WhatsUp Flow Monitor. CHAPTER 3 Navigating WhatsUp Flow Monitor

The Time has come for A Single View of IT. Sridhar Iyengar March 2011

Network Monitoring Comparison

Network Instruments white paper

Cheap and efficient anti-ddos solution

Network Management & Monitoring

Edge Configuration Series Reporting Overview

Configuring Flexible NetFlow

CMDB Implementation. - Arvind Parthiban

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Flow Monitor for WhatsUp Gold v16.2 User Guide

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Remote Access Protection

Analyzing Logs For Security Information Event Management Whitepaper

Transcription:

Plugging Network Security Holes using NetFlow Loopholes in todays network security solutions and how NetFlow can help

About ManageEngine Network Servers & Applications Desktop ServiceDesk Windows Infrastructure Event Log & Compliance Security Network Monitoring Server Monitoring Desktop Management Helpdesk Active Directory Windows Event Logs Vulnerability Analysis NetFlow Analysis Application Perf Monitoring Asset Management ITIL Service Desk SQL Server Syslog Management Patch Management Network Config Mgmt End User Experience Remote Control Software License Tracking Exchange Server Firewall Log Analyzer Password Management ManageEngine is an IT management vendor focused on bringing a complete IT management portfolio to all types of enterprises

Network Security Concerns

Network Security Concerns Increasing Network Security Violations 2010 : Major DDoS attacks and arrival of STUXNET 2011 : HB Gary Federal & Sony PSN Hacked - Emails made public and user data stolen Since then : Sony Pictures, Nintendo, Fox Networks, Eve s online, Lockheed Martin, PBS, Honda Canada, Booz Allen Hamilton, C.I.A The list is growing

Network Security Concerns Malwares More Numbers and More Sophisticated Malware 350 300 250 200 150 100 50 0 The start 1971 1990 2011

Network Security Concerns Malwares More Numbers and More Sophisticated More numbers and more sophisticated malwares Symantec s 2011 Internet Security Threat Report states: In 2010, Symantec encountered more than 286 million unique variants of malware. Targeted, custom malwares appearing. STUXNET is just the beginning The era of the zero-day malware and attacks is here

Network Security Concerns Telecommuting & Erosion of Perimeter Percentage of US workers Telecommuting 35 30 25 20 15?? 10 17% 5 7.5% 0 1994 2004 2014

Network Security Concerns Telecommuting & Erosion of Perimeter More number of telecommuters per enterprise Increasing number of enterprise users have mobile devices like laptops & tablets Disappearing perimeter Users connect over VPN, 3G, Public Wi-Fi, etc. from home or mobile devices Less secure transactions - Susceptible to malwares and Trojans

Network Security Concerns Telecommuting & Erosion of Perimeter More number Percentage of telecommuters of US workers Telecommuting per enterprise 35 30 Increasing number of enterprise users have mobile 25 devices like laptops & tablets 20 15?? Disappearing perimeter Users connect over VPN, 3G, 10 Public Wi-Fi, etc. from home 17% or mobile devices 5 0 7.5% Less secure transactions 1994 - Susceptible 2004 to malwares 2014 and Trojans

Network Security Concerns Faster Networks More Business Localization Increasing Network Bandwidth The fastest Ethernet will soon move from 10 Gigabit to 100 Gigabit Ethernet Newer applications and services added everyday Business localization Increased users and thus higher volume of network traffic More unknown applications are encountered

Network Security Concerns Faster Networks More Business Localization Increasing Network Bandwidth The fastest Ethernet will soon move from 10 Gigabit to 100 Gigabit Ethernet Newer applications and services added everyday Business localization Increased users and thus higher volume of network traffic More unknown applications are encountered

Network Security Concerns Star Topology Complex Meshed Networks Networks are no longer based on the simple STAR topology Distributed networks in MESH topology Huge number of devices and nodes interconnected Traffic moves in multiple directions through different nodes

Network Security Concerns Complex Meshed Networks Networks are no longer based on the simple STAR topology Distributed networks in MESH topology Huge number of devices and nodes interconnected Traffic moves in multiple directions through different nodes

Network Security Concerns Meshed Networks Complex Meshed Networks Networks are no longer based on the simple STAR topology Distributed networks in MESH topology Huge number of devices and nodes interconnected Traffic moves in multiple directions through different nodes

Loopholes in current network security systems

The Loopholes Internet IDS Internal Network M A L W A R Signature Anomaly Blocked E R E A L W A M Non Signature Anomaly Undetected

The Loopholes More targeted, custom made, STUXNET like malwares IDS and IPS is based on signatures, a known characteristic of some particular attack Increasing number of zero day attacks whose signatures has not yet been documented Firewalls are ineffective against zero-day malwares as they block only traffic defined by the user

The Loopholes Telecommuters Access the Internet from public Wi-Fi spots & unknown networks Personal computers are easier to attack and infect Users carry infected devices into the network or connect via VPN - Malware spreads across the LAN Packet inspection technologies are impractical for use in LAN due to the number of nodes to be monitored IDS not feasible for internal network monitoring

The Loopholes Telecommuters Access the Internet from public Wi-Fi spots & unknown networks Personal computers are easier to attack and infect Users carry infected devices into the network or connect via VPN - Malware spreads across the LAN Packet inspection technologies are impractical for use in LAN due to the number of nodes to be monitored IDS not feasible for internal network monitoring

The Loopholes With malwares in your LAN, your network could be the one hosting an attack or sending spam STUXNET spread across 100,000 computers and never used Internet as the stream Each time STUXNET infected a system, it connected to 2 public domains to report about the infected machines Egress traffic accounting can help with early detection IDS and IPS does only ingress traffic accounting

The Loopholes 10 Gigabit network is now standard & 100 Gigabit network is around the corner Organizations now have more traffic and applications Packet Inspection is rendered ineffective due to the volume of traffic involved High performance and scalable packet inspection tools are highly expensive

The Loopholes 10 Gigabit network is now standard & 100 Gigabit network is around the corner Organizations now have more traffic and applications Packet Inspection is rendered ineffective due to the volume of traffic involved High performance and scalable packet inspection tools are highly expensive

The Loopholes Localization and branching of enterprises means more users and many services Firewall rules are used to block any undesired traffic but web service traffic (port 80) is allowed in most networks Sophisticated attacks use port 80 with the ACK bit set so that traffic appears to be legitimate web transactions Such traffic surpasses the firewalls and enters your network

The Loopholes Localization and branching of enterprises means more users and many services Firewall rules are used to block any undesired traffic but web service traffic (port 80) is allowed in most networks Sophisticated attacks use port 80 with the ACK bit set so that traffic appears to be legitimate web transactions Such traffic surpasses the firewalls and enters your network

The Loopholes Meshed networks include more nodes than the STAR topologies of the old times Traffic between sites choose the best path and do not always traverse through a center node Packet analysis / inspection technology not be feasible at all nodes Multiple locations and hence data collection for packet inspection at each point is difficult

The Loopholes Meshed networks include more nodes than the STAR topologies of the old times Traffic between sites choose the best path and do not always traverse through a center node Packet analysis / inspection technology not be feasible at all nodes Multiple locations and hence data collection for packet inspection at each point is difficult

The Solution

The Solution Enter NetFlow Technology developed by Cisco Systems - initially used as a switching path Primary network IP traffic accounting technology All major vendors now support flow export : NetFlow - Cisco, Adtran, 3COM sflow - Alcatel, HP, Brocade, Enterasys, Dell IPFIX - Nortel / J-Flow - Juniper

The Solution About NetFlow Captures specific information from network IP Traffic and stores to the device s NetFlow cache Traffic information exported as UDP packets to the configured destination 7 Key fields defines a flow as one unique conversation in NetFlow

The Solution About NetFlow Source Interface (ifindex) Protocol Source IP Address Destination IP Address Source Port Destination Port ToS

The Solution Edge Router Core Network NetFlow enabled interface UDP NetFlow NetFlow Collector

The Solution Edge Router Core Network NetFlow enabled interface UDP NetFlow NetFlow Collector

The Solution ManageEngine NetFlow Analyzer Without NetFlow Analysis Traffic Traffic Traffic Traffic Traffic Traffic Traffic Traffic Traffic Traffic Traffic Traffic Traffic Traffic Traffic Traffic Traffic Traffic With NetFlow Analysis TCP ESP Kazaa HTTP Src IP Cnvrstn IPv4 DSCP Octets 80 DP GRE Torrent Telnet Dst IP Host IPv6 ToS Time 23

The Solution ManageEngine NetFlow Analyzer Leverages on the flow data exported from your network devices Reports on traffic, applications, hosts, conversations, QoS, etc. Easy to use GUI and extensive graph options for quick understanding and fast problem drill down

The Solution Source Port Source IP Address Who? Destination Port What? Destination IP Address Protocol When? Packet Count Usage? Flow Start and End time Octet count ToS QoS? TCP Flags QoS? Protocol NextHop Input and Output Interface Path? Source AS Information Route? (ifindex) Destination AS Information

The Solution Advanced Security Analytics Module Flow based network behavior analysis tool Add-On to ManageEngine NetFlow Analyzer and leverages on its agentless data collection capabilities Uses the NetFlow or sflow data received by NetFlow Analyzer for internal and external threat detection Continuous Stream Mining Engine TM detects network anomalies in real-time

The Solution Advanced Security Analytics Module Flow based network behavior analysis tool Add-On to ManageEngine NetFlow Analyzer and leverages on its agentless data collection capabilities Uses the NetFlow or sflow data received by NetFlow Analyzer for internal and external threat detection Continuous Stream Mining Engine TM detects network anomalies in real-time

The Solution NetFlow Data Advanced Security Analytics Module NetFlow Analyzer Flow based network behavior analysis tool Add-On to ManageEngine Continuous Stream NetFlow Mining Analyzer and Engine leverages on its agentless data collection capabilities Advanced Security Analytics Uses the NetFlow or sflow data received by NetFlow Analyzer for internal and external threat detection Events Continuous Stream Mining Engine TM detects network anomalies in real-time User

Plugging Loopholes

Detect Hacking Attempts Network Hacking Reconnaissance Methods Port Scans DNS Lookup Ping Sweeps Traceroute Except port scan, all the traffic is detectable as it is using NetFlow data ASAM analyzes NetFlow data and detect scans TCP Scans like SYN scan, reverse scan, Xmas-Tree scan

Detect Hacking Attempts Network Hacking Reconnaissance Methods Port Scans DNS Lookup Ping Sweeps Traceroute Except port scan, all the traffic is detectable as it is using NetFlow data ASAM analyzes NetFlow data and detect scans TCP Scans like SYN scan, reverse scan, Xmas-Tree scan

Stopping Zero-Day Malwares Identify the Top N and baseline your network behavior Change in traffic patterns can be identified using NetFlow data Sudden increase in traffic, spike in UDP traffic, etc. Get alerted when such changes occur

Stopping Zero-Day Malwares Identify the Top N and baseline your network behavior Change in traffic patterns can be identified using NetFlow data Sudden increase in traffic, spike in UDP traffic, etc. Get alerted when such changes occur

Stopping Zero-Day Malwares Session based identification helps track malware Abnormal traffic to many hosts from single host on a single port can be a worm Traffic from IANA reserved addresses or over reserved protocols is malicious traffic ASAM identifies such traffic and creates alerts

Stopping Zero-Day Malwares Session based identification helps track malware Identify the Top N and baseline your network behavior Abnormal traffic to many hosts from single host on a Change in traffic patterns can be identified using single port can be a worm NetFlow data Traffic from IANA reserved addresses or over Sudden increase in traffic, spike in UDP traffic, etc. reserved protocols is malicious traffic Get alerted when such changes occur ASAM identifies such traffic and creates alerts

Internal Network Threat Detection Telecommuting brings malwares into the network An IDS deployment for internal traffic is not feasible NetFlow is light on the bandwidth and device resources Most of your devices come with support for NetFlow or similar flow format Enable flow export and get visibility on both ingress and egress traffic flow

Internal Network Threat Detection Telecommuting brings malwares into the network An IDS deployment for internal traffic is not feasible NetFlow is light on the bandwidth and device resources Most of your devices come with support for NetFlow or similar flow format Enable flow export and get visibility on both ingress and egress traffic flow

Monitoring High Speed Networks Packet inspection software capable of handling 10G network traffic are few and expensive NetFlow data captures just the important information from actual traffic Do traffic analytics using NetFlow information Use packet capture only where absolutely necessary Brings down cost and helps in faster troubleshooting

Monitoring High Speed Networks Packet inspection software capable of handling 10G network traffic are few and expensive NetFlow data captures just the important information from actual traffic Do traffic analytics using NetFlow information Use packet capture only where absolutely necessary Brings down cost and helps in faster troubleshooting

Solution for Meshed Networks The star (hub and spoke) networks are a thing of past Meshed networks today allow traffic to pass through all nodes depending on best path An IDS or packet inspection at each node is not feasible Utilize the already available NetFlow from your network devices in locations like branches

Solution for Meshed Networks The star (hub and spoke) networks are a thing of past Meshed networks today allow traffic to pass through all nodes depending on best path An IDS or packet inspection at each node is not feasible Utilize the already available NetFlow from your network devices in locations like branches

ManageEngine NetFlow Analyzer

ManageEngine NetFlow Analyzer An all software solution for bandwidth monitoring, traffic analytics and anomaly detection Supports all flow formats as well as most of Cisco s performance monitoring technologies Cisco NBAR, CBQoS, IPSLA and WAAS reports Additional features includes AS reporting, capacity planning, support for Cisco ASA NSEL, usage alerts, etc.

What else is NetFlow Analyzer Highly granular traffic reports based on speed, volume, utilization and packets updated in real-time Conversations details for each minute thus helping with the quick troubleshooting of network incidents

What else is NetFlow Analyzer Highly granular traffic reports based on speed, volume, Details utilization protocol and packets distribution, updated in application real-time usage & custom application monitoring Conversations details for each minute thus helping with the Future quick troubleshooting ready with IPv6 of conversation network incidents reports

What else is NetFlow Analyzer Highly granular traffic reports based on speed, volume, Details utilization protocol and packets distribution, updated in application real-time usage & custom application monitoring Conversations details for each minute thus helping with the Future quick troubleshooting ready with IPv6 of conversation network incidents reports

What else is NetFlow Analyzer Highly granular traffic reports based on speed, volume, Details utilization protocol and packets distribution, updated in application real-time usage & custom application monitoring Conversations details for each minute thus helping with the Future quick troubleshooting ready with IPv6 of conversation network incidents reports

What else is NetFlow Analyzer Highly granular traffic reports based on speed, volume, Details utilization protocol and packets distribution, updated in application real-time usage & custom application monitoring Conversations details for each minute thus helping with the Future quick troubleshooting ready with IPv6 of conversation network incidents reports

Advanced Security Analytics Module

ASAM An Overview Security Posture page to list all detected anomalies grouped under problem classes Drill down on each problem for problem analysis or resource analysis In-depth details on each event, source, destination and route Helps you take quick decisions to block IP s or take action on the device level

ASAM An Overview Security Posture page to list all detected anomalies grouped under problem classes Drill down on each problem for problem analysis or resource analysis In-depth details on each event, source, destination and route Helps you take quick decisions to block IP s or take action on the device level

ASAM An Overview

Conclusion An IDS and firewall only system is a thing of the past New age networks face more sophisticated problems A combination of well set firewall rules, an effective IDS/IPS system and NetFlow analysis is the answer

Conclusion

Questions? ManageEngine NetFlow Analyzer is used by over 4000 customers worldwide. Visit our website for details: www.manageengine.com www.netflowanalyzer.com sales@manageengine.com nfs@manageengine.com