Network Security Monitoring



Similar documents
You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell

Network Security Monitoring

Missing the Obvious: Network Security Monitoring for ICS

COUNTERSNIPE

Out-of-Band Security Solution // Solutions Overview

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Architecture Overview

Snort Installation - Ubuntu FEUP. SSI - ProDEI Paulo Neto and Rui Chilro. December 7, 2010

Critical Security Controls

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

Intrusion Detection in AlienVault

Endpoint Threat Detection without the Pain

Protecting Your Organisation from Targeted Cyber Intrusion

EZ Snort Rules Find the Truffles, Leave the Dirt. David J. Bianco Vorant Network Security, Inc. 2006, Vorant Network Security, Inc.

Network Monitoring for Cyber Security

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Intrusion Detections Systems

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Network/Internet Forensic and Intrusion Log Analysis

Blacklist Example Configuration for StoneGate

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Bio-inspired cyber security for your enterprise

Network Security: Workshop

Advanced Threats: The New World Order

IDS / IPS. James E. Thiel S.W.A.T.

Comprehensive Advanced Threat Defense

A New Perspective on Protecting Critical Networks from Attack:

Intelligence Driven Intrusion Detection

Hillstone Intelligent Next Generation Firewall

Open Source in Government: Delivering Network Security, Flexibility and Interoperability

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Know Your Enemy Lite: Proxy Threats - Socks v666

Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study

Flow Analysis Versus Packet Analysis. What Should You Choose?

Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory

CTS2134 Introduction to Networking. Module Network Security

Analysis of Network Beaconing Activity for Incident Response

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

Lab exercise: Working with Wireshark and Snort for Intrusion Detection

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

From Network Security To Content Filtering

On-Premises DDoS Mitigation for the Enterprise

Security Event Management. February 7, 2007 (Revision 5)

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

Endpoint Security - HIPS. egambit, your defensive cyber-weapon system. You have the players. We have the game.

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

74% 96 Action Items. Compliance

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013

Security Analytics for Smart Grid

Suricata IDS. What is it and how to enable it

Unknown threats in Sweden. Study publication August 27, 2014

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

Context Threat Intelligence

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

SANS Top 20 Critical Controls for Effective Cyber Defense

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Performing Advanced Incident Response Interactive Exercise

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Uncover security risks on your enterprise network

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

IT Security Strategy and Priorities. Stefan Lager CTO Services

Exercise 7 Network Forensics

Technical Note. ForeScout CounterACT: Virtual Firewall

Network Instruments white paper

Speed Up Incident Response with Actionable Forensic Analytics

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Centre for the Protection of National Infrastructure Effective Log Management

NERC CIP Version 5 and the PI System

Effective Methods to Detect Current Security Threats

Cisco IPS Tuning Overview

Lesson 5: Network perimeter security

The following topics describe how to manage policies on the Management Center:

Chapter 11 Cloud Application Development

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Network Security Monitoring: Looking Beyond the Network

RSA Security Analytics

D&D of malware with exotic C&C

Passive Vulnerability Detection

Carbon Black and Palo Alto Networks

Unified Security, ATP and more

Rashmi Knowles Chief Security Architect EMEA

Concierge SIEM Reporting Overview

Name. Description. Rationale

STONEGATE 5.2 I NSTALLATION GUIDE I NTRUSION PREVENTION SYSTEM

Open Source Software for Cyber Operations:

Implementing Cisco Intrusion Prevention System 7.0 (IPS)

Cyber Security Metrics Dashboards & Analytics

What happens when you use nmap or a fuzzer on an ICS?

The SIEM Evaluator s Guide

Transcription:

Network Security Monitoring Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

Where is the security button? Securing a computer or a network of computers is hard! Vendors will gladly say, buy my widget and your data will be secure There is no single solution that will ensure that your systems don t get hacked

Need proof? $6.7m in South African cyber bank robbery https://nakedsecurity.sophos.com/2012/01/20/hackers-snat ch-6-7m-in-south-african-cyber-bank-robbery/ SONY GOT HACKED HARD... http://www.wired.com/2014/12/sony-hack-what-we-know/...cyberspy Attack Hacked Southeast Asian Targets... http://www.bloomberg.com/news/articles/2015-0412/decade-long-cyber-spying-campaign-hacked-southeastasia-targets

What to do? Accept that being compromised is inevitable Understand which resources you want to protect Database servers? Students? End-users in accounting department? All of the above? Monitor resources very closely!

Network traffic is interesting for security because... Its ubiquitous most devices connect to it, one can monitor network connected light switches, Windows servers and Mac workstations using the same methodologies It tells the truth if you re monitoring the link of a compromised host, the traffic leaving the host will appear in your network logs, even if the traffic is obscured It has really useful data Malware families and attackers often reuse their attack infrastructure (domain names, IP addresses, SSL certificates, etc.) If you know that certain domains are bad, you can match against them in network traffic and find other affected hosts

What is Network Security Monitoring? NSM is a fresh name for practices that have been around for a long time: Network flow analysis Network intrusion detection A tool that calls itself a network security monitor generally has two functions: Regex packet matching against threat intelligence Protocol parsing, network metadata logging

Sensor inputs and outputs INPUT Traffic captured from your network SPAN Port Physical tap OUTPUT Log files Alert logs for matches against threat intelligence Network metadata logs

Terminology: Threat Intelligence Threat intelligence is a collection of information about an adversary s infrastructure or tactics that can be used to detect the presence of the adversary Threat intelligence can be curated by your organization, bought, or acquired for free on the Internet from groups like Emerging Threats (http://www.emergingthreats.net/open-source/etopenruleset)

Threat Intelligence: (Suricata) alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"et TROJAN Likely Fake Antivirus Download ws.exe"; flow:established,to_server; content:"get"; http_method; content:"/install/ws.exe"; http_uri; nocase; reference:url,doc.emergingthreats.net/2010051; classtype:trojan-activity; sid:2010051; rev:4;

Network Protocol Metadata Data pertaining to the information contained in a network flow, including but not limited to: End-points addresses source address, destination address, source port, destination port Statistics byte counts, connection durations, Protocol information DNS queries, SSL certificate DN s, user-agent strings

Using Network Protocol Metadata Detecting unknown threats Blacklists can only alert you to threats that you (or your community) knows about. Large security organizations often have hunt teams to sift through and analyze this data and look for anomalies Incident response In the case that your organization discovers a breach, its very helpful to have forensic data to understand the scope and timeline of the intrusion

Example Metadata {"timestamp":"2015-0623t18:27:40.634114","event_type":"dns","src_ip":" 10.10.0.241","src_port":53,"dest_ip":"10.10.2.5", "dest_port":54948,"proto":"udp","dns": {"type":"answer","id":10275,"rrname":"wikipedia.o rg","rrtype":"ns","ttl":20864}}

Placing an NSM Sensor First deploy NSM sensors at the Internet edge, then expand to the inside of the network The internet is where most the attackers arrive from The internet is the easiest data exfiltration channel to use (if its available)

Network data acquisition Deciding where to tap in your network: How much traffic does the tap see? Does the tap see both ingress and egress traffic? Is there NAT in your network? Will your tap see traffic pre or post NAT? How will you acquire data? Taps? SPAN?

Network Data Acquisition: Taps A network tap is a hardware device which provides a way to access the data flowing across a computer network. http://en.wikipedia.org/wiki/network_tap Taps are the preferred method for acquiring network data, especially in cases when physical networks are the data source.

Taps: Pros / Cons Pros Taps are passive, they do not alter the contents of the network traffic that you are delivering Taps do not drop packets. When acquiring data from a tap you can be confident of the integrity of the captured data. Cons Expensive Require physical infrastructure (Fiber, network interfaces, tap aggregators)

Network Data Acquisition: SPAN The SPAN feature, which is sometimes called port mirroring or port monitoring, selects network traffic for analysis by a network analyzer from a network switch

SPAN: Pros / Cons Pros Low cost - Often it can be configured on hardware you already have in your network Easy to deploy - Takes no network downtime (TAPs require network links to flow through them) Cons Utilize switch resources, prone to reducing performance on your network infrastructure Prone to modification of network traffic

NSM Sensor: Suricata Open source NSM / IDS / IPS tool Created by the founder of Emerging Threats Compatible with Snort rules Multi-threaded Parses SSL, HTTP, DNS metadata Capable of IPS (inline, blocking bad flows) Multi-threaded, scales to 10GB and beyond

Suricata: Output Logs located at /var/log/suricata: fast.log ( ASCII alert log ) unified2.alert.* ( ASCII alert and packet dump from offending traffic) dns.log (optional log of all DNS queries captured) http.log (optional log of all HTTP sessions captured) tls.log (optional log of all TLS sessions captured)

Suricata: Configuration YAML file at '/etc/suricata/suricata.yml' Used to configure: Rule sets (emerging-malware.rules,...) Monitored interfaces (eth0, eth1,...) Monitored networks ( HOME_NET, DNS_SERVERS...) Capture modes (PF_RING, AF_PACKET,...)

Installing & Configuring Suricata