On the Deficiencies of Active Network Discovery Systems



Similar documents
Ofir Arkin Insightix. A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control

Demystifying the Myth of Passive Network Discovery and Monitoring Systems

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Bypassing Network Access Control Systems

Detecting rogue systems

Bypassing Network Access Control Systems

Insightix Discovery & NAC. Lite Edition. Installation Guide. Version 3.0. May United States. International 945 Concord St.

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

Security of IPv6 and DNSSEC for penetration testers

CMPT 471 Networking II

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

Blended Security Assessments

The Trivial Cisco IP Phones Compromise

IBM Managed Security Services Vulnerability Scanning:

Introduction to Network Discovery and Identity

WhatsUpGold. v3.0. WhatsConnected User Guide

Detection of illegal gateways in protected networks

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

IBM Tivoli Endpoint Manager for Lifecycle Management

Digital Advisory Services Professional Service Description Network Assessment

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

Network and Host-based Vulnerability Assessment

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

SANS Top 20 Critical Controls for Effective Cyber Defense

Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician.

IBM Tivoli Endpoint Manager for Lifecycle Management

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Global Partner Management Notice

How to Leverage IPsonar

May 11, (Revision 10)

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

CDM Hardware Asset Management (HWAM) Capability

Protecting Critical Infrastructure

Dedicated and Distributed Vulnerability Management

Finding Network Security Breaches Using LiveAction Software to detect and analyze security issues in your network

Voice Over IP (VoIP) Denial of Service (DoS)

Passive Vulnerability Detection

Best Practices for Managing Virtualized Environments

Firewall and UTM Solutions Guide

How To Test A Control System With A Network Security Tool Like Nesus

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Nessus and Antivirus. January 31, 2014 (Revision 4)

Abstract. Introduction. Section I. What is Denial of Service Attack?

Lab Configuring Access Policies and DMZ Settings

Linux Network Security

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

co Characterizing and Tracing Packet Floods Using Cisco R

Secure Software Programming and Vulnerability Analysis

PANDORA FMS NETWORK DEVICE MONITORING

Critical Security Controls

Network Access Control in Virtual Environments. Technical Note

Patch Management Hands-On Exercises. Patch Management Hands-on Exercise

Application Visibility and Monitoring >

Network Security Policy

Agent vs. Agent-less auditing

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Dell KACE K1000 System Management Appliance Version 5.4. Patching and Security Guide

Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SIP, Security and Session Border Controllers

Citadel Security Software Inc.

IQware's Approach to Software and IT security Issues

The Risks that Pen Tests don t Find. OWASP 13 April The OWASP Foundation

Gaurav Gupta CMSC 681

Firewalls: An Effective Solution for Internet Security E. Eugene Schultz Payoff

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Firewalls Overview and Best Practices. White Paper

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

BlackRidge Technology Transport Access Control: Overview

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

SUMMIT ASSET MANAGEMENT DATASHEET

How to Grow and Transform your Security Program into the Cloud

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

GFI White Paper PCI-DSS compliance and GFI Software products

FREQUENTLY ASKED QUESTIONS

The Protection Mission a constant endeavor

Network Security: Introduction

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

Name. Description. Rationale

Using WhatsUp IP Address Manager 1.0

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) /24

Vulnerability management lifecycle: defining vulnerability management

How To Understand and Configure Your Network for IntraVUE

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

VIA COLLAGE Deployment Guide

VIA CONNECT PRO Deployment Guide

Complete Protection against Evolving DDoS Threats

CS5008: Internet Computing

System Management. What are my options for deploying System Management on remote computers?

FatPipe Networks

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Response to Questions CML Managed Information Security

Transcription:

On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix

Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized reproduction, use or disclosure of this material, or any part thereof, is strictly prohibited. This material is meant solely for the use by Insightix employees, and authorized Insightix customers. About Insightix Insightix is an innovator of real-time security intelligence and control solutions. Insightix patentpending technologies are used to detect, identify, profile, audit and control ALL devices connected to your network, providing real-time network, endpoint and user intelligence. Insightix discovers an additional 20%- 50% of the devices residing on the enterprise network, devices that otherwise remain undetected, and automatically audits for the security configuration of endpoints based on the asset classification information collected. The Insightix Business Security Assurance (BSA) solution suite provides a 360 view into the actual state of your network security effectively Bridging the Network Security Gap that exists between the actual security state of enterprise networks and what is known to IT. For more information, please visit www.insightix.com. The Deficiencies of Active Network Discovery Systems About Insightix iii

Contents Abstract... 1 1 Introduction... 2 2 Strengths of Active Network Discovery... 3 3 Weaknesses of Active Network Discovery... 3 3.1 Incomplete Discovery... 3 3.1.1 Network Obstacles... 3 3.1.2 Information Enumeration Failure... 4 3.2 Lack of Real-Time Discovery... 4 3.3 Network Performance Degradation... 4 3.3.1 Regular Operation of an ANDS and Network Performance Degradation... 4 3.3.2 Running the Active Network Discovery Process at Off-Peak Hours... 5 3.3.3 Faster Scan, Higher Risk... 5 3.4 Stability Issues with Scanned Network Elements... 6 3.5 Stability Issues with Networking Devices... 6 3.6 Active Scan Free Networks... 7 3.7 Incomplete Network Topology Map... 7 4 Distributed Active Network Discovery... 8 4.1 Active Network Discovery Clusters... 8 4.2 Active Network Discovery Proxies... 9 5 Conclusion... 11 iv Contents The Deficiencies of Active Network Discovery Systems

Abstract This paper discusses the deficiencies of active network discovery technology. It starts by defining active network discovery, and addresses the advantages and disadvantages of the technology. It then demonstrates why active network discovery cannot live up to its expectations, and is unable to deliver the promise of complete, accurate and granular network discovery and monitoring. The Deficiencies of Active Network Discovery Systems Abstract 1

1 Introduction Active network discovery is a technology that uses stimuli (packets) to provoke a reaction from network elements. Based on the responses, or lack thereof, received from the queried network elements, knowledge regarding a network and its elements is gathered. Traditionally, an Active Network Discovery System (ANDS) queries its targets from a single location on the network, where it is installed. The information an ANDS attempts to collect may include the following: An inventory of network elements and their properties Information on network services and their version Information related to the configuration of a network and/or its elements Topology related information 1 Vulnerability analysis related information 2 An ANDS may operate in one or more of the following ways: Query only the local IP subnet to which it is attached Receive a manually compiled list of IP addresses and/or IP subnets against which to operate Start by querying the local IP subnet to which it is attached, and then query remote IP subnets after learning of their existence, using information extracted from local routers or other elements on the local IP subnet 1 Not every active network discovery system provides network topology information. 2 Not every active network discovery system provides vulnerability analysis information. 2 Introduction The Deficiencies of Active Network Discovery Systems

2 Strengths of Active Network Discovery Active network discovery has several advantages: An ANDS queries network elements for specific parameter values needed for the active network discovery process The initiation of an active network discovery scan or a specific query can be controlled. An ANDS may allow complete control over the parameter values to be queried and the time when the queries are to be performed The pace of an active network discovery scan can be controlled An active network discovery scan can cover the entire IP address range of an enterprise 3 Weaknesses of Active Network Discovery Although associated with important advantages, an ANDS faces a number of critical weaknesses, which affect its discovery capabilities. This section demonstrates why active network discovery cannot live up to its expectations, and is unable to deliver the promise of complete, accurate and granular network discovery. 3.1 Incomplete Discovery 3.1.1 Network Obstacles An ANDS detects network elements that are operational ("up") on a network at the time of the discovery. This is assuming that the packets sent by an ANDS are able to reach the probed elements, and that the probed elements answer the type of query sent. Network obstacles such as network firewalls, host-based firewalls, load balancers, and NAT devices, often prevent probe packets from reaching their target network elements. As a result, those network devices remain undiscovered, and the results of the active discovery are incomplete. For example, a host-based firewall is installed by default with Microsoft Windows XP, Service Pack 2. The presence of hosts running Microsoft Windows XP with Service Pack 2, with the host-based firewall enabled, would not be discovered by an ANDS. The trend of including a host-based firewall as part of an operating system installation is not limited to the newest Microsoft Windows operating systems (i.e., Microsoft Windows 2008 Server family of operating systems); it has become increasingly common in other operating systems as well, including FreeBSD, OpenBSD, NetBSD, the various Linux distributions, Mac OS X, and so on. The Deficiencies of Active Network Discovery Systems Strengths of Active Network Discovery 3

3.1.2 Information Enumeration Failure The operation of an ANDS includes processes that need to enumerate configuration information from a number of network elements found on a probed network. The process of enumerating configuration information depends on the availability, and the willingness to communicate, of certain network services that need to operate on the queried network elements. The inability to extract the required configuration information impairs the active network discovery process, resulting in the gathering of only partial knowledge, and incomplete discovery. 3.2 Lack of Real-Time Discovery Active network discovery is a long, drawn-out process. A considerable amount of time is required to probe network elements, and to collect and process the probe replies received. Therefore, active network discovery cannot be performed in real-time and the information it gathers represents only a snapshot of a network and its elements at a given point in time. For example, performing active network discovery against a class C network may take a few minutes, while performing the same scan against a class B network may take over 24 hours. 3.3 Network Performance Degradation 3.3.1 Regular Operation of an ANDS and Network Performance Degradation An ANDS may produce a considerable amount of network traffic when probing and collecting information from network elements, thus consuming a significant amount of network bandwidth. The number of IP addresses that need to be scanned by an ANDS directly affects the amount of network bandwidth consumed by the operation of an ANDS. The active network discovery process may slow down the operation of networking devices, which are present on the path between an ANDS to its probed network elements, by overloading them with a substantial amount of network traffic that needs to be processed. As a result, actively scanning a large number of network elements may considerably slow down a network s performance and operation. 4 Weaknesses of Active Network Discovery The Deficiencies of Active Network Discovery Systems

3.3.2 Running the Active Network Discovery Process at Off-Peak Hours Due to the nature of ANDS operation, several vendors recommend running the active network discovery process at off-peak hours (for example, evenings or nights). This has several disadvantages: The process of information collection, which is performed by an ANDS, can take a considerable amount of time to complete. It may exceed the window of time for the off-peak network operation hours and ultimately interfere with regular network operation. Many systems may be offline when the active network discovery is to be performed. For example, desktops that are shut down at the end of a working day, laptops that are taken home, and so on. This would result in incomplete discovery. In some cases, it is impossible to define off-peak hours. For example, different business processes operate at different times during the day. 3.3.3 Faster Scan, Higher Risk The attempt to compensate for the slowness of the active network discovery process by increasing the pace of the scan may have other consequences. Increasing the pace of the active network discovery process means that more probe packets are sent per a certain timeframe. The number of IP addresses that need to be scanned by an ANDS directly affects the amount of probe packets that an ANDS needs to send more IP addresses to probe means more packets to be sent. As the number of IP addresses increases, and a faster pace of scan is used, packets will be sent by an ANDS at a faster rate. A networking element, such as a switch, can handle a certain amount of packets per second. If the actual number of packets per second that the networking element needs to process is higher than it can handle, it will selectively drop the packets that it is unable to process. Or it may simply crash. This is exactly the case when a large number of IP addresses are to be scanned in a very short time period. A networking element on the path between an ANDS and its targets might be overwhelmed by the sudden rise in the amount of network traffic it needs to handle, selectively dropping packets, as a result of an active network discovery scan. The Deficiencies of Active Network Discovery Systems Weaknesses of Active Network Discovery 5

3.4 Stability Issues with Scanned Network Elements The process of active network discovery may cause operational instabilities to a probed network element, which might then affect the operation of the entire probed network. It is a known fact that some active network discovery scanners may introduce a denial-of-service condition (for example, a reboot, a crash) to some network elements when they probe them for information. This is generally caused by one or more of the following: The pace of the scan and the number of packets sent to a network element during an active network discovery process. The usage of non-rfc compliant probe packets, which some probed network elements cannot withstand due to their unexpected input. The performance of information enumeration from a network element where the output produced by the network element overwhelms the network element and disrupts its service (for example, ARP cache tables with routers). The performance of vulnerability analysis against discovered network elements using real-world exploitation attempts, which may introduce a denial-of-service condition to some network elements. The instability issues are best illustrated when a probed network element, which is a critical network element (such as a router or server), crashes due to an active network discovery probe. For example, a crashed switch would not allow any communications through, affecting all elements that are either directly or indirectly connected to the switch and depend on the switch availability for their regular network operation. 3.5 Stability Issues with Networking Devices Networking devices on the path between an ANDS to its targets may suffer a denial of service condition due to the active network discovery scanning process. One form of a denial of service condition may occur if a networking element on the path between an ANDS and its targets is required to process a higher number of packets per second than it can handle due to the increased number of packets resulting from an active network discovery process. The networking device would either selectively drop packets it is unable to process or simply crash. Switches are not the only networking elements that may suffer a denial of service condition or performance degradation as a result of an active network discovery scan. Another example is that of network firewalls. An active network discovery process may fill up the state table of a firewall in the path between an ANDS and its targets, not allowing the firewall to process any new legitimate communication attempts, which need to pass through the firewall en route to their targets. 6 Weaknesses of Active Network Discovery The Deficiencies of Active Network Discovery Systems

3.6 Active Scan Free Networks In some organizations, certain corporate networks cannot be actively probed. This is because the effect of running an active network discovery processes against these networks and the network elements they contain cannot be predicted or is believed to disrupt the regular operation of the network or its elements. Usually, these networks contain mission critical systems, the downtime of which would cause significant loss of revenue to the organization. To prevent potential disruption to these networks, such networks are treated as "active scan free". The resulting problem is that it is not possible to determine their contents and the level of their (in)security. A network can become " active scan free" if during an active network discovery scan, a system or systems are brought down due to a certain reason, which may or may not be related to the active network discovery process. 3.7 Incomplete Network Topology Map An ANDS cannot provide a complete and accurate physical network topology map. Several issues contribute to this inability: Not all switches are discovered by an ANDS. Network obstacles preventing probe packets from reaching their destination targets can create "black holes" of information regarding the network and its elements. An ANDS is not always aware of the entire range of IP addresses used by an organization. An ANDS might be manually configured to run against a part of the organization networks only. The Deficiencies of Active Network Discovery Systems Weaknesses of Active Network Discovery 7

4 Distributed Active Network Discovery In an attempt to address some of the weaknesses of active network discovery, vendors are distributing the scan among multiple systems. Two main operational methods exist for distributed scanning: Clusters Proxies 4.1 Active Network Discovery Clusters An active network discovery cluster is composed of a number of machines where the load of the active network discovery scan is divided among those machines, all running from a single location on the network. Figure 1: Active Network Discovery Cluster (Example) 8 Distributed Active Network Discovery The Deficiencies of Active Network Discovery Systems

Unfortunately, running an ANDS in a cluster mode has no real advantage: The network is still scanned from a single location. The network might become saturated faster than when performing the same scan using a single machine because there are multiple machines scanning the network at the same time. The risk for instability with network devices on the path between an ANDS cluster and its targets is higher because more packets are generated in the same amount of time. Using an ANDS cluster would not always speed the discovery. All other weaknesses still apply. 4.2 Active Network Discovery Proxies An active network discovery proxy is composed of a number of machines (including a management system) where the load of the active network discovery scan is divided among those machines, all running from different locations on the network. Typically, an active network discovery proxy is installed per subnet or subnets. There are cases in which an active network discovery proxy is installed per network location (for example, per a remote office or per building). The management system of the active network discovery proxies distributes the scan among the most appropriate scanners usually those proxies closest to the scan targets. Figure 2: Active Network Discovery Proxies (Example) The Deficiencies of Active Network Discovery Systems Distributed Active Network Discovery 9

An active network discovery proxy has some advantages over the traditional implementation of an ANDS: In many cases, active network discovery packets do not pass through routers and firewalls, thus limiting the affect of the load of the scan to the local network(s) they are scanning. Using active network discovery proxies, the scan time should be faster because the scan is performed at the same time by different proxies targeting different IP subnets. Although an active network discovery proxy has some advantages, it still has substantial disadvantages: Pre-knowledge of the discovered network(s) is required prior to deploying active network discovery proxies. This is because each proxy needs to be located per IP subnet or subnets. If there are unknown IP subnets or networks, they will remain unknown. Scan packets may still cause instabilities with scanned network elements. Scan packets may still pass through networking equipment on route to their targets impacting the stability of those networking devices (e.g., switches, routers, or firewalls). If misconfigured, an active network discovery proxy can bring its local network down. The fact that it is local to the network would make its work easier. The fact that an active network discovery proxy needs to be installed per subnet or subnets presents a difficult administrative issue: There are more moving parts deployed at different locations throughout an organization, making their maintenance and control a harder task. The cooperation of many different organizational groups is required for the deployment. All other weaknesses still apply. 10 Distributed Active Network Discovery The Deficiencies of Active Network Discovery Systems

5 Conclusion This paper has examined the strengths and weaknesses of active network discovery technology. It has demonstrated that although active network discovery technology has some strong advantages, it cannot, under any circumstances, perform complete, accurate and granular network discovery due to technological limitations, which are directly related to the active nature of the technology. The Deficiencies of Active Network Discovery Systems Conclusion 11