How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On



Similar documents
Flow Analysis Versus Packet Analysis. What Should You Choose?

Firewall Firewall August, 2003

Flow-level analysis: wireshark and Bro. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis

The Open Source Bro IDS Overview and Recent Developments

An Overview of the Bro Intrusion Detection System

PROFESSIONAL SECURITY SYSTEMS

NSC E

The Bro Network Intrusion Detection System

Bro at 10 Gps: Current Testing and Plans

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Source-Connect Network Configuration Last updated May 2009

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

NEFSIS DEDICATED SERVER

Network Traffic Evolution. Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

CTS2134 Introduction to Networking. Module Network Security

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

How to (passively) understand the application layer? Packet Monitoring

Websense Web Security Gateway: What to do when a Web site does not load as expected

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

How To Test The Bandwidth Meter For Hyperv On Windows V (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2

Live Traffic Monitoring with Tstat: Capabilities and Experiences

Internet Management and Measurements Measurements

Intrusion Detection Systems (IDS)

The Bro Network Security Monitor. Broverview

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Intrusion Detection System

Firewall Testing Methodology W H I T E P A P E R

Firewalls and Network Defence

Firewalls. Pehr Söderman KTH-CSC

Quality Certificate for Kaspersky DDoS Prevention Software

Optimal Network Connectivity Reliable Network Access Flexible Network Management

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Introduction of Intrusion Detection Systems

Deploying ACLs to Manage Network Security

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Network Monitoring using MMT:

Signature-aware Traffic Monitoring with IPFIX 1

Installing and Configuring Websense Content Gateway

74% 96 Action Items. Compliance

Dynamic Rule Based Traffic Analysis in NIDS

Policy on ARCS eresearch Services Firewall Configuration Requests

FortKnox Personal Firewall

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

GlobalSCAPE DMZ Gateway, v1. User Guide

INTRODUCTION TO FIREWALL SECURITY

Snort Installation - Ubuntu FEUP. SSI - ProDEI Paulo Neto and Rui Chilro. December 7, 2010

Internet Services. Amcom. Support & Troubleshooting Guide

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

Determine if the expectations/goals/strategies of the firewall have been identified and are sound.

Network Security 2. Module 2 Configure Network Intrusion Detection and Prevention

SNMP OIDs. Content Inspection Director (CID) Recommended counters And thresholds to monitor. Version January, 2011

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

APV9650. Application Delivery Controller

and reporting Slavko Gajin

DPtech ADX Application Delivery Platform Series

VMware vcenter Log Insight Getting Started Guide

Internet Traffic Measurement

VMware vcenter Log Insight Getting Started Guide

Detecting UDP attacks using packet symmetry with only flow data

Network Based Intrusion Detection Using Honey pot Deception

Deployment Guide July-2014 rev. a. Deploying Array Networks APV Series Application Delivery Controllers for Microsoft Lync Server 2013

IBM. Vulnerability scanning and best practices

The Bro Network Security Monitor. Broverview. Bro Workshop NCSA, Urbana-Champaign, IL. Bro Workshop 2011

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Overview - Using ADAMS With a Firewall

Application Latency Monitoring using nprobe

FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0

Content Delivery Networks

Network Defense Tools

Network Traffic Analysis

Understanding Slow Start

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

Overview - Using ADAMS With a Firewall

Analysis of a DDoS Attack

An apparatus for P2P classification in Netflow traces

A perspective to incident response or another set of recommendations for malware authors

WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc.

Workshop VLAB WMWARE. F5 Networks : Nicolas BERTHIER WestconSecurity : Romain MOREL 11 / 1 / 2010

Configuration Guide BES12. Version 12.2

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

Chapter 8 Router and Network Management

Configuration Guide BES12. Version 12.3

Intrusion Detection in AlienVault

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

F-SECURE MESSAGING SECURITY GATEWAY

UNMASKCONTENT: THE CASE STUDY

Arbor s Solution for ISP

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

SonicOS 5.9 One Touch Configuration Guide

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Question: 3 When using Application Intelligence, Server Time may be defined as.

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Transcription:

Michel Laterman

We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply do full packet captures for everything because of size and ethics Throughput logging tool written in C

Monitor receives a full mirror of all traffic that goes to/from the Internet Around 2 Gbps Peak inbound (mostly TCP) Almost constant 0.5 Gpbs UDP (outbound) Used to be 1-2 Gbps about 22 TB of traffic a day 50 GB (compressed) logs generated by Bro per day Bro Collects and rotates logs hourly Another program collects throughput information at 1 min intervals

Dec 16, 2014

TCP Traffic mostly comes from ports 80 & 443 Expected behavior We used small pcap traces to find out what was happening with out UDP traffic Lots of packets from port 123(NTP) coming out of campus (about 60% of UDP traffic) Unpatched servers on campus being used in a DDoS Lots of BitTorrent peers connecting in the trace (about %30 of UDP traffic) 23k peers connecting at 4am on a Sunday

Other Traffic Other traffic is non-ip or IP traffic that does not have a listed protocol. ARP, GRE, ESP traffic Second largest non-udp, non-tcp protocol ICMP Can see all ICMP activity in Bro s Connection log We found a server on campus scanning the Internet We can see many computers scanning the campus Most are from other Academic institutions

What is Bro? Bro is a passive, open-source network traffic analyzer. It is primarily a security monitor that inspects all traffic on a link in depth for signs of suspicious activity. More generally, however, Bro supports a wide range of traffic analysis tasks even outside of the security domain, including performance measurements and helping with trouble-shooting Bro is not a standard IDS More capable than just signature detection Extensive set of logs Turing complete event based scripting language that can be used to analyze traffic

Bro monitors a network connection and generates events based on packets that it sees Events are evaluated by a set of scripts and actions such as raising notifications or logging may be taken

Bro uses analysis trees when decoding protocols Bro does not strictly rule that all TCP connections on port 80 are HTTP but it starts with that assumption PIA Protocol Identifier analyzer

Standard IDS signature detection possible with signature framework Not the preferred tool We use it to detect bittorrent over UDP Intelligence Framework Consume data from incident reports Data in the Intelligence Framework is the atomic piece of intelligence such as an IP address or an e-mail address along with a suite of metadata about it such as a freeform source field, a freeform descriptive field and a URL which might lead to more information about the specific item

DAG card is capable of splitting the incoming stream (and steering) We mirror the stream from the router fully onto 2 streams, and have 24 substreams to Bro workers

Our monitor has libpcap compiled with DAG support; Bro runs on top of that Hourly log rotation handled by broctl 24 workers, 4 proxies Found this to not crash Backups to group fileserver daily with rsync Fileserver backs up to west grid daily Mostly vanilla installation: Log extra info about HTTP requests (req/resp length & duration) Capture loss logging enabled Bruteforce detection included BitTorrent utp detection script deployed logging packet inter-arrival times for HTTP & SSL Connections (ports 80 & 443)

Anomalies: Server makes a few million SSL connections to a server we never heard about SSH attacks ICMP scanning Strange DNS activity Web traffic breakdown Resp. Codes, methods, domains, content-type, HTTPS Breakdown Server name, bytes transferred, connection duration, Video Traffic I m looking at Twitch & Netflix and trying Youtube

Event based language. new_conn(c:connection) http_event(c:connection, event_type:string, detail_string) http_reply(c:connection,version:string, code:count, reason:string) Frameworks allow other actions i.e. logging, notification, summarization, etc.

By default Bro logs as plain text If Bro is ran using broctl, logs are rotated and zipped Writer for sqllite available Writer for elasticsearch available Old writer for DataSeries(binary format) available Our monitor uses plain text logs

How do I handle 50GB/day? Poorly (I m getting better) First attempt was with Python First iteration wrote my own wrapper for records Reading a 1 hour log took ~ 45 min Don t do this Second iteration switched to use Pandas library 3-4 min read per log Load an hour s logs, analyze, repeat 3.5 hours to analyze 1 day Switched to using bash (grep+awk) 1.5-.175 hours to analyze a day Low(ish) memory usage (~8GB max, 24 GB cached). Easy to utilize more processors.

Vern Paxson Bro: A System for Detecting Network Intruders in Real-Time Computer Networks, 31(23 24), pp. 2435-2463, 1999. H. Dreger, A. Feldmann, M. Mai, V. Paxson, R. Sommer Dynamic Application-Layer Protocol Analysis For Network Intrusion Detection Proc. USENIX Security Symposium, 2006 www.bro.org