Federated Threat Data Sharing with the Collective Intelligence Framework (CIF)



Similar documents
SES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012

CTS2134 Introduction to Networking. Module Network Security

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection

Security in the Sauce Labs Cloud

APPLICATION PROGRAMMING INTERFACE

FORBIDDEN - Ethical Hacking Workshop Duration

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

Network Security Platform 7.5

Next Generation IPS and Reputation Services

McAfee Network Security Platform 8.2

ProCurve Manager Plus 2.2

Guideline on Auditing and Log Management

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

White Paper. Intrusion Detection Deploying the Shomiti Century Tap

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

CSCI 4250/6250 Fall 2015 Computer and Networks Security

ISP Systems Design. ISP Workshops. Last updated 24 April 2013

Critical Security Controls

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

A Quantitative Approach to Security Monitor Deployment

WildFire Cloud File Analysis

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright Palo Alto Networks

Zscaler Internet Security Frequently Asked Questions

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

System requirements for A+

Rebasoft Auditor Quick Start Guide

USER S MANUAL Cloud Firewall Cloud & Web Security

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

Loophole+ with Ethical Hacking and Penetration Testing

Indicator Expansion Techniques Tracking Cyber Threats via DNS and Netflow Analysis

Analysis of Network Beaconing Activity for Incident Response

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Release Notes for Websense Security v7.2

Cymon.io. Open Threat Intelligence. 29 October 2015 Copyright 2015 esentire, Inc. 1

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Linux MDS Firewall Supplement

SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

74% 96 Action Items. Compliance

Class Test 2 - e-security (CSN11102/11117) Semester 2, Session

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

FireEye App for Splunk Enterprise

McAfee Network Security Platform Administration Course


Secure Data Transfer

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

Cyber Essentials Questionnaire

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Filter. SurfControl Filter 5.0 for SMTP Getting Started Guide. The World s #1 Web & Filtering Company

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Firewalls & Intrusion Detection

Protecting Your Organisation from Targeted Cyber Intrusion

Bypassing CAPTCHAs by Impersonating CAPTCHA Providers

How To Protect A Dns Authority Server From A Flood Attack

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

Amazon Elastic Beanstalk

CS5008: Internet Computing

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Access Control Rules: URL Filtering

Networks and Security Lab. Network Forensics

Networks & Security Course. Web of Trust and Network Forensics

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Web Traffic Capture Butler Street, Suite 200 Pittsburgh, PA (412)

Metasploit ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of

Kaspersky Lab Mobile Device Management Deployment Guide

Flow-based detection of RDP brute-force attacks

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Firewalls and Intrusion Detection

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

13 Ways Through A Firewall

Guardian Digital WebTool Firewall HOWTO. by Pete O Hara

Proactive Detection and Automated Exchange of Network Security Incidents

Discovery Guide. Secret Server. Table of Contents

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

Deploying Secure Internet Connectivity

Windows Remote Access

Advanced Honeypot System for Analysing Network Security

SECURITY DOCUMENT. BetterTranslationTechnology

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu (Amd66) On Ubuntu 4.5 On A Windows Box

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

F-Secure Messaging Security Gateway. Deployment Guide

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY

Know Your Foe. Threat Infrastructure Analysis Pitfalls

TABLE OF CONTENTS NETWORK SECURITY 2...1

What makes Panda Cloud Protection different? Is it secure? How messages are classified... 5

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

NEFSIS DEDICATED SERVER

Transcription:

Federated Threat Data Sharing with the Collective Intelligence Framework (CIF) Gabriel Iovino (REN-ISAC), Kevin Benton (REN-ISAC), Yoshiaki Kasahara (Kyushu University), Yasuichi Kitamura (APAN) TIP2013 Honolulu, HI 2013/1/16 TIP 2013 1

Funding and Support Current CIF work is funded by: U.S. National Science Foundation OCI SDCI award: SESv3, Indiana University, and REN-ISAC members Past contributions have also been provided by: U.S. Department of Justice, and Internet2 In addition, this Inter-Federation project was supported by: U.S. National Science Foundation IRNC award: TransPAC3 Asia Pacific Advanced Network (APAN)

What is CIF? CIF is a cyber threat intelligence management system. CIF allows you to combine known malicious threat information from many sources and use that information for identification (incident response), detection (IDS) and mitigation (null route). The most common types of threat intelligence warehoused in CIF are IP addresses, domains and urls that are observed to be related to malicious activity. CIF helps you to aggregate, normalize, store, post process, query, share and produce data sets of threat intelligence. 2013/1/16 TIP 2013 3

Aggregation CIF can parse data from a wide variety of sources Delimited text, XML, JSON, Zip archives Most other text formats can be parsed as well by providing a regex statement Threading for scalability Simple config files for new data sources 2013/1/16 TIP 2013 4

Sample Feed Config severity = medium confidence = 65 detection = daily feed = "http://mirror1.malwaredomains.com/files/domains.txt" impact = 'malicious domain' source = 'malwaredomains.com' restriction = need-to-know alternativeid_restriction = public guid = everyone [domains] values = 'null,null,address,description,alternativeid,null' delimiter = '[\t \f]' period = daily 2013/1/16 TIP 2013 5

Normalization Data points are tagged to allow them to be filtered later Assessment/Impact What type of threat is this? (botnet infrastructure, phishing domain, spamming host, etc) Confidence How confident is the observation? (e.g. is it from an automated process that has false positive?) Severity How serious is this threat? Is it part of an active attack? Does seeing this indicator mean you are compromised? Conversely, is this is a known good host that will cause problems if you block it? 2013/1/16 TIP 2013 6

Post Processing Once data points have been collected by CIF, automated post-processing is performed. Extract domains from URLs Resolve A and NS records Lookup BGP autonomous system information Many more Useful for finding related threats e.g. different domains/urls that point to IP addresses in the same autonomous system 2013/1/16 TIP 2013 7

Storage v0 v1 Data stored as JSON entries in database All server components had to be on same device Data stored with Google Protocol Buffers 70% storage savings 11,491,200 records per day Distributed components provide redundancy and scalability 2013/1/16 TIP 2013 8

Producing Data Feeds Feeds generated periodically based on criteria e.g. infrastructure related threats with a confidence score of at least 85 from the last 2 days Command-line client can output human readable and various machine readable formats Useful for automated generation of firewall rules, URL blacklisting, intrusion detection signatures, etc Cached after generation so clients reading the feeds have limited impact on performance 2013/1/16 TIP 2013 9

Querying Queries can be run on IP addresses, domains, URLs, etc. to see all of the records for a given indicator Clients Web Browser Plugin CLI client (Perl) API RequestTracker plugin 2013/1/16 TIP 2013 10

Web Browser Plugin 2013/1/16 TIP 2013 11

Sharing Data Groups Each record is associated with a group Each user is issued an API key to use to query the server, which is also associated with a group Queries only return data associated with the same group as the API key Useful for giving other parties access to some data while keeping sensitive data secret 2013/1/16 TIP 2013 12

Sharing Data between CIF Installations Feeds from a CIF instance can be added as a data source to another CIF instance This permits easy data sharing between organizations Only requires one API key for remote organization instead of one for each of its users Organization can remap or override fields based on policies e.g. increase or decrease confidence numbers, change severity, change alternate ID 2013/1/16 TIP 2013 13

APAN CIF server installation in APAN Tokyo XP Yoshiaki Kasahara, Yasuichi Kitamura kasahara@nc.kyushu-u.ac.jp, kita@jp.apan.net 2013/1/16 TIP 2013 14

Project with REN-ISAC Sharing Security Intelligence data between APAN and REN-ISAC They want to have international collaboration (inter-federation information sharing) as their project Currently APAN doesn t have security response team or something like that Start from servers around me and Kitamura-san Kyushu Univ. and APAN-JP 2013/1/16 TIP 2013 15

What to share? Sharing security-related information from intranet is somewhat sensitive There is no such entity collecting security information among APAN community It is a test-pilot, so let s start from easy one IP addresses of SSH brute-force attackers Easy to collect from sshd log file Almost no false-positive Sharing is actually beneficial 2013/1/16 TIP 2013 16

SSH: Secure Shell SSH (Secure Shell) is intended to replace rlogin and rsh, and provide secure encrypted communications between two untrusted hosts over an insecure network ssh(1) SSH is secure only when the user authentication is properly done Encryption doesn t prevent intruder to use your ID and password (by guessing or other measures) 2013/1/16 TIP 2013 17

SSH brute-force attack Try to intrude via SSH by using frequentlyused ID and password pairs (=dictionary) Fix ID and change passwords Fix password and change IDs Mitigation Use a strong password (or one-time password) Use public key authentication Change port of sshd from tcp/22 Filter attacking IP addresses 2013/1/16 TIP 2013 18

How to filter? (within a host) Normally an intruder needs multiple tries with failure The activities are clearly logged like this: Aug 14 22:39:50 elvenbow sshd[39906]: Invalid user tomcat from 198.101.213.104 Aug 14 22:40:02 elvenbow sshd[39971]: Invalid user tomcat from 198.101.213.104 Aug 14 22:40:47 elvenbow sshd[41218]: Invalid user oracle from 198.101.213.104 Aug 14 22:40:48 elvenbow sshd[41223]: Invalid user test from 198.101.213.104 Aug 14 22:40:56 elvenbow sshd[41235]: Invalid user oracle from 198.101.213.104 Aug 14 22:40:58 elvenbow sshd[41237]: Invalid user test from 198.101.213.104 Parse these lines and extract attacker s IP addresses Add deny rules to any one of filtering facilities such as iptables, ipfw, hosts.deny, etc If the filtering is faster than the correct guess, you win! 2013/1/16 TIP 2013 19

Sharing Information An attacker cannot attack the whole Internet at once, changing target hosts/networks Other sites can block accesses from the attacker detected at one site, by sharing information The more sites, the more protection 2013/1/16 TIP 2013 20

Difference? There are other tools to protect and share information against SSH brute-force attack E.g. http://danger.rulez.sk/index.php/bruteforceblocker/ CIF is a generic tool/framework to handle security intelligence information (not only for SSH attack) Handle various feeds (data source) Malware domain blocklist Dragon Research Group (DRG) SSH blacklist bruteforceblocker Spamhaus etc 2013/1/16 TIP 2013 21

From http://www.ren-isac.net/ses/ 2013/1/16 TIP 2013 22

Our Server Dell PowerEdge R210 II (1U) Intel Xeon E3-1220 (3.10GHz 4C/4T) 8GB RAM SATA 500GB HDD Ubuntu 11.10 Simply we felt it was easier to install and setup than Debian Not sure if it is safe to do-release-upgrade (to 12.04 LTS) Still running CIF 0.01 Need to update to CIF 0.05 2013/1/16 TIP 2013 23

Our Clients The server is pulling SSH attack feeds from 2 servers in Kyushu University 2 servers in APAN-JP 2 servers in PREGINET (Philippines) He joined during APAN 34 th Filtering by attack feed is not configured (yet?) These feeds are shared with REN-ISAC test server 2013/1/16 TIP 2013 24

Topology 2013/1/16 TIP 2013 25

Example Multiple SSH failures from an IP address detected by a server in Japan Results show up on CIF instance in REN-ISAC 2013/1/16 TIP 2013 26

Questions? 2013/1/16 TIP 2013 27