Advanced approach to network security and performance monitoring



Similar documents
Effective Methods to Detect Current Security Threats

CS5008: Internet Computing

Effective Methods to Detect Current Security Threats

McAfee Network Security Platform

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

Detecting Threats Via Network Anomalies. Paul Martini Cofounder and CEO iboss Cybersecurity

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Denial of Service Attacks

Secure Cloud-Ready Data Centers Juniper Networks

CS 356 Lecture 16 Denial of Service. Spring 2013

A Layperson s Guide To DoS Attacks

Cybercrime Metrics and Threat Data: Warsaw - Poland

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope

Flow Based Traffic Analysis

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer

Rashmi Knowles Chief Security Architect EMEA

Security Toolsets for ISP Defense

D m i t r y S l i n k o v, C I S M SWISS C Y B E R S TO R M Black market of cybercrime in Russia

Firewall Firewall August, 2003

Attack and Defense Techniques

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Concierge SIEM Reporting Overview

Security Intelligenece: tracking obfuscated and unrecognized attacks Check Point Software Technologies Ltd.

Malicious Network Traffic Analysis

FortiDDos Size isn t everything

PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT

Development of a Network Intrusion Detection System

First Line of Defense

How To Understand A Network Attack

How Attackers are Targeting Your Mobile Devices. Wade Williamson

The Hillstone and Trend Micro Joint Solution

24/7 Visibility into Advanced Malware on Networks and Endpoints

Stop DDoS Attacks in Minutes

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Quality Certificate for Kaspersky DDoS Prevention Software

Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection. Oğuz YILMAZ CTO Labris Networks

DPI and Metadata for Cybersecurity Applications

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Jort Kollerie SonicWALL

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Security Services. 30 years of experience in IT business

Cheap and efficient anti-ddos solution

NSC E

Innovations in Network Security

FlowMon. Complete solution for network monitoring and security. INVEA-TECH

Network Performance Monitoring at Minimal Capex

Secure Software Programming and Vulnerability Analysis

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

Analysis of a DDoS Attack

Security strategies to stay off the Børsen front page

Network/Internet Forensic and Intrusion Log Analysis

QRadar SIEM and FireEye MPS Integration

Application Security Best Practices. Wally LEE Principal Consultant

JUST FOR THOSE WHO CAN T TOLERATE DOWNTIME WE ARE NOT FOR EVERYONE

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Analysis of Network Packets. C DAC Bangalore Electronics City

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Nemea: Searching for Botnet Footprints

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

with NetFlow Technology Adam Powers Chief Technology Officer

Network attack and defense

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

DDoS Overview and Incident Response Guide. July 2014

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Redefining SIEM to Real Time Security Intelligence

DDoS Protection on the Security Gateway

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Security A to Z the most important terms

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

How To Create Situational Awareness

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

First Line of Defense

Unified Security, ATP and more

Stop DDoS Attacks in Minutes

Applications erode the secure network How can malware be stopped?

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

IBM SECURITY QRADAR INCIDENT FORENSICS

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

Acquia Cloud Edge Protect Powered by CloudFlare

APPLICATION PROGRAMMING INTERFACE

DoS/DDoS Attacks and Protection on VoIP/UC

Modular Network Security. Tyler Carter, McAfee Network Security

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Transcription:

Advanced approach to network security and performance monitoring Michal Drozd TrustPort Threat Intelligence Product Manager 18 slides

Agenda Network monitoring Security and performance problems Common technology Advanced possibilities of network monitoring What is possible to detect Where are limitations Business models 2

Why Are We Here? It seems every week brings a new headline about a major data breach: 40 million credit card numbers compromised. 80 million customers and employees affected by a data breach. 8.8 to 18 million non-customers affected by latest corporate hack. Roughly 55% of the incidents involved APTs. DDoS, SCADA, 3...and so on.

Why Are We Here? Customers requirements Management requirements Business requirements 1. Increase Network and Service Availability 2. Decrease Staffing & Training Requirements 3. Optimize Network s Bandwidth Utilization and Performance 4. Improve Productivity while Decreasing Operational Costs 2

Business requirements Client services Data centers Cloud Software as a Service (SaaS) Network as a Service (NaaS) Software Defined Networks (SDN) 5

Network monitoring 1. Network performance monitoring & diagnostics: Network flow based monitoring Network performance monitoring Application performance monitoring 2. Network security and network visibility: Detection of known threats (signature-based detection) Detection of unknown threats (APTs, zero-days, internal threats, ) Network behavior anomaly detection Forensic analysis Network security auditing and regulatory compliance 6

Network performance monitoring & diagnostics Problems: What should by analyzed How to analyze and visualize right issue 7

Network Flow Monitoring NetFlow v5 Unidirectional IP statistics L3 L4 1:500 NetFlow v9 Unidirectional IP statistics L2 L7 HTTP NBAR 1:500 Flow (ASNM, ) Bi-directional IP statistics L2 - L7 Application metadata Performance metrics 65535 ports Spectral analysis 1:100 PCAP Bi-directional Full Packet Capture 1:1 8

Network flow performance monitoring (all services) TCP handshake Client request Server response Client Syn Ack Req Probe Server Syn Ack Ack Data Data Data Data RTT ART DTT Delay Round Trip Time (RTT) network delay Application Response Time (ART) application delay Data transfer time (DTT) data transfer duration Delay delay differentiation between packet flows Jitter deviation from true periodicity of a presumed periodic communication 9

Security problems Network security and network visibility: Detection of known threats (signature-based detection) Detection of unknown threats (APTs, zero-days, internal threats, ) Network behavior anomaly detection Forensic analysis Network security auditing and regulatory compliance 10

C&C Trojan PC framework Neme Price Focus cvector Location Info Citadel 2500 5000$ Beta Bot 500$ (botsw) Shylock od 1000$ Carberp 40.000$ Hesperbot ZEUS 5$/bot Stealing credit cards WebInject to browser ( ie. spoof authentication form) Theft of authentication data on selected banking applications WebInjecting, Direct data theft WebInject VNC boot sector Theft of cards and accounts, webinject to the browser Basis of most modern malware SSL email (Yahoo Hotmail, GMAIL) SSL C2 SSL C2, Skype C2 (+ SSL services) SSL C2 Japan, UAE, Austria, Turkey, USA EU, USA Czech Republic, Greece, Portugal UK GLOBAL Cílen na sandbox McAfee, FireEye, Symantec Mobil platform (CarMo multifaktor autentication) Escaped source code(5,7gb) Based on Zeus 11

C&C Trojan Mobile framework ZitMo, SpitMo, CitMo, CarbMo, Perkele, Pincer, 12

Other common and unknown threats Data leakage (misused DNS, SSH, HTTP(s), ) Tunneled traffic (ICMP, DNS, SSH, HTTP(s), ) Protocol anomalies Time consuming port scans Mascaraed brute-force attack (dictionary, brute-force) Preparation for data theft by an employee and other internal threats Breach of internal security rules Misconfiguration in network (Distributed) Denial of Service (DoS, DDoS) Automatic data harvesting (e-shop) Fraud detection (web application) 13

Modern Solution Big Data analysis Advance flow metrics DPI + IDS Machine learning and Artificial Intelligence User Behavior Model Network Behavior Model Network model Host model Service model Performance model 14

Costs Data source mirrored communication Current HW solution up to 10 Gbps From 20 Gbps HW acceleration HW acceleration Up to 300 Gbps / probe Computing servers Data store 15

Business model Security as a Service Services for clients Data source before network gateway backbone probe Data source inside client network internal probe Security cloud Data collector Analyzis Reporting 17

Benefits Permanent overview on the network risk status Time saving on incidents handling All relevant data in one Dashboard Easier prioritization of detected incidents and threats Minimizing damages of security breaches Thanks to early detection and solving Increasing network security Covers the gaps left by common security tools Enables Forensic Analysis Collects evidence for several months 17

Michal Drozd michal.drozd@trustport.com +420 777 792 819 TrustPort a.s. www.trustport.com 18