IP network security monitoring system based on multiple alerting facilities



Similar documents
Tk20 Network Infrastructure

Cisco Advanced Services for Network Security

Second-generation (GenII) honeypots

PROFESSIONAL SECURITY SYSTEMS

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Critical Security Controls

From Network Security To Content Filtering

INSTANT MESSAGING SECURITY

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Firewalls Overview and Best Practices. White Paper

Host/Platform Security. Module 11

LogRhythm and NERC CIP Compliance

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

Name. Description. Rationale

The Cisco ASA 5500 as a Superior Firewall Solution

A SURVEY ON AUTOMATED SERVER MONITORING


Basics of Internet Security

CMPT 471 Networking II

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Network Security Administrator

Introduction: 1. Daily 360 Website Scanning for Malware

Hands-on Hacking Unlimited

Network Management System (NMS) FAQ

DOMAIN NAME SECURITY EXTENSIONS

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Managing IT Security with Penetration Testing

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Protecting Your Organisation from Targeted Cyber Intrusion

How To Classify A Dnet Attack

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SIP Security Controllers. Product Overview

SANE: A Protection Architecture For Enterprise Networks

A Study of Network Security Systems

Gaining Operational Efficiencies with the Enterasys S-Series

Securing VoIP Networks using graded Protection Levels

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

Network Defense Tools

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

CTS2134 Introduction to Networking. Module Network Security

FISMA / NIST REVISION 3 COMPLIANCE

Top 3 Issues and Questions (in Network Monitoring!) Developing a Network Monitoring Architecture! infotex. Dan Hadaway CRISC Managing Partner, infotex

Secure networks are crucial for IT systems and their

Security Issues with Integrated Smart Buildings

Sygate Secure Enterprise and Alcatel

Quality Certificate for Kaspersky DDoS Prevention Software

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Building A Secure Microsoft Exchange Continuity Appliance

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

PCI Security Scan Procedures. Version 1.0 December 2004

Goals. Understanding security testing

Injazat s Managed Services Portfolio

Network & Information Security Policy

End-user Security Analytics Strengthens Protection with ArcSight

Ovation Security Center Data Sheet

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Windows 7, Enterprise Desktop Support Technician

8. Firewall Design & Implementation

Complete Protection against Evolving DDoS Threats

Technical Standards for Information Security Measures for the Central Government Computer Systems

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

How To Protect Your Network From Attack From A Hacker On A University Server

Database Security in Virtualization and Cloud Computing Environments

Protecting Critical Infrastructure

Ingate Firewall/SIParator SIP Security for the Enterprise

Recommended IP Telephony Architecture

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Introduction to Cyber Security / Information Security

PCI Requirements Coverage Summary Table

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

LoadMaster Application Delivery Controller Security Overview

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Network Service, Systems and Data Communications Monitoring Policy

How To Protect Your Network From Attack From A Network Security Threat

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

74% 96 Action Items. Compliance

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

How Cisco IT Protects Against Distributed Denial of Service Attacks

Mitigating the Security Risks of Unified Communications

Network Access Security. Lesson 10

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Cisco Security Optimization Service

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

NASCIO 2015 State IT Recognition Awards

Architecture Overview

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Concept. Central Monitoring and IP Address Administration

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

Transcription:

IP network security monitoring system based on multiple alerting facilities Eng. Laurenţiu BOICESCU, Ph.D Eng. Daniel GHEORGHICĂ, Prof. Ph.D Eng. Victor CROITORU * Rezumat. Datorită complexităţii şi numărului mare de atacuri asupra reţelelor IP de comunicaţii, securizarea completă a acestora devine o sarcină dificilă, imposibil de realizat fără sisteme specializate. Soluţia propusă în cadrul acestei lucrări este crearea unui sistem de centralizare şi analiză a rapoartelor de securitate, pentru simplificarea operaţiilor de monitorizare a securităţii. Cuvinte cheie: securitate, monitorizare, eveniment, incident, vulnerabilitate, reţea, alertă. Abstract. Due to the complexity and large number of attacks on IP communications networks, securing them becomes a difficult task, impossible without specialized systems. The solution proposed within this paper is to create a system for centralization and security reports analysis, to simplify security monitoring operations. Key words: security, monitoring, event, incident, vulnerability, network, alert. I. Introducere The evolution of computer systems performance, ease of implementation and low costs made possible an almost exponential growth of IP telecommunications networks. The result was a global infrastructure for communications, known today as the Internet, allowing automation of operations across all business areas and remote control of computer systems. Due to the wide spreading of this technology for interconnection, it was preferred rather to adapt it to the new needs and trends in communications than creating a new stack. This approach, while allowing communications networks adapt to the new requirements, leads to an increase in complexity of devices used, hinders management and increases their likelihood of failure. Politehnica University of Bucharest, Faculty of Electronics, Telecommunications & IT. IP networks can be used for: remote control of energy facilities; remote video surveillance; smart house solutions; entertainment ( IPTV, Internet radio); real time services (VoIP, videoconferencing); access to information databases, etc. Mobile networks development trends are also IP oriented. It is expected that the fourth generation of mobile networks will be based on the same protocol stack ("All IP Network") [1]. Accordingly, IP networks and all hardware and software communication mechanisms used are always in the attention of hackers and computer terrorists. Due to the complexity of the systems used, there is always a possibility of discovering new vulnerabilities, which can result in security breaches. In this context, security monitoring is required for communications networks. TELECOMUNICAŢII Anul LII, nr. 2/2009 3

Laurenţiu BOICESCU, Daniel GHEORGHICĂ, Victor CROITORU In addition, all network elements may be monitored in order to easily detect any operational problems and remedy them. This work aims to: summarize the security problems and their solutions; present a security monitoring system for communications networks, with multiple alerting facilities. The proposed system architecture will be presented without insisting on practical implementation issues. 2. Performance management Performance management refers to the process of setting objectives and regularly checking the progress towards achieving these objectives. It is a continuous process of monitoring system performance indicators, also called key performance indicators (KPI - Key Performance Indicator) they completely characterize processes and systems dynamics. Any discrepancy results in a change of process parameters in order to meet desired objectives. Performance management has a wide range of applications, like software performance, business and corporate performance, employee performance, etc. [2]. In IP networks, performance management requires the monitoring of desired performance indicators (in this case, security indicators), followed by their analysis and the modification of operating parameters of the networks in order to achieve certain quality indicators. The monitoring systems aim to provide advanced functions for automatically analyzing performance indicators and alerting human factor in case of their degradation. 3. IP network security - intrusion detection The Internet Protocol Suite (widely used nowadays TCP/IP) lacks basic security mechanisms such as authentication and encryption. This vulnerability is exploited by attacks such as connection hijacking, by forging addresses and source routing, or DNS (Domain Name System) poisoning. A special category of attacks implies flooding some systems with irrelevant data, resulting in drastically reducing the performance of these systems, if not completely blocking them. These are known as Denial of Service (DoS) attacks. Also, the vulnerabilities of software mechanisms are exploited by viruses and other malicious programs (in some cases, these programs are designed to create the vulnerabilities themselves in order to ease access in the targeted systems). Another serious security issue is the vulnerability of web interfaces to session hijacking attacks. Because web communication protocols are stateless, the user's identity information is stored through web sessions. General purpose web servers allow minimal session security features, in order to allow access to all users, regardless of the software used. Without additional security mechanisms, hijacking sessions is possible, allowing attackers gain access to the configurations of these systems, or worse, to sensitive corporation data. Most service provider applications include remote configuration features, through platform independent web interfaces. Although the advantages of these capabilities are clear (simple tools for configuration management, available from any remote locations without exposing management ports to the Internet), if not designed correctly, they may also provide easy to use security vulnerabilities. As the obligativity of securing these applications falls back to the programmer, it is strongly recommended to implement existing mechanisms rather than creating new ones. Existing mechanisms available to the general public (OpenSource) have the advantages of testing, constant improvement and cumulative experience of developer communities [3]. Each type of vulnerability is punctually remedied by a specific type of software system: an anti-virus program actively eliminates viruses, network traffic is 4 TELECOMUNICAŢII Anul LII, nr. 2/2009

filtered by firewalls, eliminating known DoS threats and not only, and intrusion attempts are identified IDS-es (Intrusion Detection Systems). Next, we will call these applications security agents. Any possible threats detected by these agents are recorded as security events, in a special database. When it's certain that the threats are real, the security events become incidents and are usually communicated to a security officer, in order to decide on the appropriate course of action. In order to easier describe the mechanisms behind the security monitoring system, we will firs refer to the Intrusion Detection Systems. An IDS is based on a system of probes, used to gather security events and transmit them to a core. The core then records them into an internal database, analyzes them and optionally generates filtering rules for the firewall. This way, network gains the ability to detect and block communication-level attacks. Intrusion detection is done by "fingerprinting" network traffic and comparing it with information from the system's internal signature database. If a type of attack is detected, security event is issued and appropriate measures are taken. Additionally, the system can have the ability to learn new attack signatures, by identifying traffic anomalies. Unfortunately, this operation is done with a certain interval of confidence and requires human intervention for the complete analysis of the reports and the registration of the new signature. Otherwise, in networks with dynamic traffic, the system may tag useful traffic as malicious and disrupt the network's activity. As about traffic analysis, the IDS may partially or completely record the data in a file system, for it's later use. In order to wholly secure a communications network and monitor its status, it's necessary to correlate all security mechanisms in a network security manager. Its structure is represented in figure 1. The Event Correlation System(ECS) gathers security events from all agents involved and, based thereon, generates security reports that are entered into a database. Communication with the monitoring system can be done either at the initiative of the event correlator (regularly or at the detection of problems) or on the initiative of the monitoring system [4]. Optionally, the ECS may decide to notify a security agent management system, to update the networks security policies. It was assumed that events can be gathered from all network security systems. Fig. 1. Security Event Manager (SEM). TELECOMUNICAŢII Anul LII, nr. 2/2009 5

Laurenţiu BOICESCU, Daniel GHEORGHICĂ, Victor CROITORU Fig. 2. Security monitoring system architecture. The use of an event correlation system, in tandem with monitoring system and, may improve response times of network security monitoring teams. The advantage of a centralized security monitoring system is the ability to detect slow attacks (stealthy attacks), harder if not impossible to detect through human analysis. Based on the network security policies, security officers create correlation rules which a then used by the ECS for security event analysis. Figure 2 shows the architecture for the communication network security monitoring system. Depending the adopted security policies, one may choose either a distributed system for event analysis (in which case the master ECS is no longer required), or a centralized one. For optimal event corelation between different networks while ensuring the maximum security level, in case of interconnection through Internet, it's recommended to use separate event management systems, in order to limit the exposure of reports on public networks. Using dedicated VPN (Virtual Private Network) sollutions makes from this necessity an optional method for further optimizing the system. This situation corresponds to the distributed system architectures. The usage of a master correlation system allows further centralization of security events and a better annalysis on network status, at the price of greater exposure of data through Internet (without a dedicated network for monitoring). However, this configuration allows a much better detection of security incidents. Additionaly the database of the central SCE allows analysis on security event history, allowing accurate assessments of the risk of the security incidents detected. On the basis of security incidents, network managers can take measures to minimize or even remove the risks detected, by updating the security policies. 4. Security Monitoring System The complete monitoring of data communication networks involves a continuous monitoring of: communications network security; network hardware and software operation; operation of network hardware and software; key performance indicators. 6 TELECOMUNICAŢII Anul LII, nr. 2/2009

Fig. 3. The interconnection between the monitoring system and its external components. Starting from the assumptions of the previous chapter, the overall security of the communications network can be monitored, but it is also possible to punctually monitor security officers (Figure 3). To simplify the communication protocols and improve their security, it's essential that all monitoring operations to be performed by the security events manager. To monitor the security system, there are required mechanisms for controlling the operation of physical devices and software applications. In addition, one can monitor their performance indicators (this category also includes network security indicators). Mandatory requirements of monitoring systems are: modularity - due to the dynamics of technology, the ability to further expand the monitoring system is necessary scalability - the system must be able to monitor large networks, without a significant impact on performance; parallelism - the system must allow the concurrent monitoring of multiple network elements; alerting - once identified a potential problem, the monitoring system will alert the appropriate contacts for its immediate remedy, the most important notification mechanisms are: SMS, SNMP trap and e-mail; security - monitoring operation requires extra attention in this regard, as the monitoring system works as a bridge between the monitored network and managers; Monitoring security is not only information security but also protection against damage to the monitoring system. Sometimes, the possibility to have a redundant monitoring system is essential. In terms of alerts, most important are the SMS, as they offer complete independence of the monitoring system from the monitored communications network. A special category of alerts are the SNMP trap messages. They can not be used to notify the human element, but provide a mechanism for interfacing with any type of equipment, with a universal language. The proposed monitoring solution is based on the Nagios OpenSource system [5], whose internal architecture (Fig. 4) meets the first three requirements mentioned above. In the following, will be referred as TELECOMUNICAŢII Anul LII, nr. 2/2009 7

Laurenţiu BOICESCU, Daniel GHEORGHICĂ, Victor CROITORU the Centralized Monitoring and Alerting System (CMAS), containing as key features the following: simple plugin architecture to ease the implementation of new functions. In its initial configuration, the CMAS only includes functions for command interpretation (allowing further development, as all commands are executed in a Linux shell), storage and processing of monitoring results. All other aspects of monitoring are completely ignored the CMAS core; contact notifications when service or host problems occur and get resolved, with the possibility of escalation; ability to define a network hierarchy, allowing detection of and distinction between elements that are down and those that are unreachable; can define a hierarchy of elements, allowing the distinction between the bad and inaccessible; possibility to implement automated recovery solutions; support for distributed and/or redundant monitoring; optional web interface to access reports from the monitoring system. The monitoring logic is divided in in two components: the monitoring of hosts and services and is based on periodic checks of their status. It includes functionality for parallelized, dependency and cached checks. To enhance performance, when CMAS executes on-demand checks, it'll first check the cache memory to determine if it's data is up-to-date and, only if needed, will run a real check. If the cached information is fresh enough the system will use it without running any other commands, thus allowing for better overall performances. Fig.. 4. Centralized Monitoring and Alerting System. All checks are done through plug-ins. The CMAS core has no internal effective mechanisms for monitoring, as it's based on external mechanisms specifically designed for this purpose. This way, the monitoring system benefits of maximum flexibility, as new features can be included without having to recompile the entire system. For centralized network security monitoring solutions, interconnection of all security event management systems with the CMAS is required. As the monitored systems are usually installed in remote locations, their interconnection with the monitoring system can be made by Private Networks, Internet or even Virtual Private Network (VPN). The most reliable 8 TELECOMUNICAŢII Anul LII, nr. 2/2009

and preferred solution in terms of security is the VPN, but communication can be made through public networks, using additional mechanisms for encryption and authentication. The interconnection model is generally described in figure 3. Apart from the communication medium used, the monitoring of IP network security involves implementing a security event manager within each network, which will notify the monitoring system when security incidents are detected. Communication between the two types of entities should be done on an encrypted connection, using public keys to authenticate agents. The proposed monitoring system offers the following features: IP network security monitoring; alerting through SNMP, SMS, e-mail and WinPopup messages separation of monitored elements in hosts and services access to a web interface for viewing alerts and reports status and performance monitoring features; monitoring in maximum security conditions. The user can access the system's reports via web interface only through an encrypted connection. SMS alerts are sent through a mobile terminal attached to the monitoring system, insuring notification independence from the IP communications network. Additionally, the SMB server can send broadcast messages within the management network, allowing for instant notification of security officers. Communication with other management and monitoring systems is done through the SNMP server [6]. 5. Conclusions If configured properly, a security monitoring system may detect most (if not all) security threats, allowing the human factor to focus on enforcing security and eliminating active and possible threats. As the role of these systems is to maintain a centralized database of all security events detected, it's possible to detect even stealthy, distributed attacks, most times invisible to human eye. Due to the nature of the information used, these systems require more attention in terms of security, as even minor breaches may generate severe network security threats. References [1] http://www.3gpp.org/ [2] Clemm, A. Network Management Fundamentals, Cisco Press, 2006 [3] Boicescu, L. Securitatea conturilor în aplicaţiile web, studiu - uz intern, UPB, 2008 [4] https://dev.prelude-ids.com/wiki/prelude/ [5] http://nagios.sourceforge.net/docs/3_0/ [6] Boicescu, L., Gheorghica, D., Croitoru, V. Sistem de monitorizare a securitatii retelelor IP cu facilitati multiple de alertare, Lucrarile CNEE 2009 (Conferinta Nationala si Expozitia de Energetica), 21-23 octombrie 2009, Vol. II, Editura SIER, Sinaia, România, 2009, pag. 856-861, ISSN 1843-6005. TELECOMUNICAŢII Anul LII, nr. 2/2009 9