Presentation Title: When Anti-virus Doesn t Cut it: Catching Malware with SIEM



Similar documents
End-user Security Analytics Strengthens Protection with ArcSight

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Security Information & Event Management (SIEM)

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Netzwerkvirtualisierung? Aber mit Sicherheit!

Network Instruments white paper

RSA Security Analytics

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

SANS Top 20 Critical Controls for Effective Cyber Defense

Endpoint Threat Detection without the Pain

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Find the needle in the security haystack

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

A Case for Managed Security

Getting Ahead of Malware

Maintaining, Updating, and Protecting Windows 7

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

ReadySpace Limited Unit J, 16/F Reason Group Tower, Castle PeakRoad, Kwai Chung, N.T.

Concierge SIEM Reporting Overview

Managed Antivirus Quick Start Guide

Ecom Infotech. Page 1 of 6

Next Generation IPS and Reputation Services

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

TNote125 Student Locator Framework Notification Diagnostics

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

The Benefits of an Integrated Approach to Security in the Cloud

CALNET 3 Category 7 Network Based Management Security. Table of Contents

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era

Modular Network Security. Tyler Carter, McAfee Network Security

QRadar SIEM 6.3 Datasheet

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

APPLICATION PROGRAMMING INTERFACE

Network Management and Monitoring Software

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Driving Company Security is Challenging. Centralized Management Makes it Simple.

The SIEM Evaluator s Guide

Networking for Caribbean Development

Stronger than Firewalls And Cheaper Too

Server Monitoring: Centralize and Win

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Cisco & Big Data Security

Carbon Black and Palo Alto Networks

FIREWALL INTELLIGENCE. 1 Copyright 2014 Juniper Networks, Inc.

FIVE PRACTICAL STEPS

Defending Against Cyber Attacks with SessionLevel Network Security

AVeS Cloud Security powered by SYMANTEC TM

Clavister InSight TM. Protecting Values

Cisco RSA Announcement Update

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Enabling Security Operations with RSA envision. August, 2009

Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Why The Security You Bought Yesterday, Won t Save You Today

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Information Technology Policy

THE EVOLUTION OF SIEM

What Do You Mean My Cloud Data Isn t Secure?

WhatWorks in Detecting and Blocking Advanced Threats:

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014

Security Analytics The Beginning of the End(Point)

Basic Computer Security Part 2

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Managed Security Service Providers vs. SIEM Product Solutions

Defining, building, and making use cases work

Endpoint Protection Small Business Edition 2013?

WHITE PAPER Big Data Analytics. How Big Data Fights Back Against APTs and Malware

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

Is Your Network a Sitting Duck? 3 Secrets to Securing Your Information Systems. Presenter: Matt Harkrider. Founder, Alert Logic

After the Attack: RSA's Security Operations Transformed

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

SORTING OUT YOUR SIEM STRATEGY:

Hunting for the Undefined Threat: Advanced Analytics & Visualization

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Security strategies to stay off the Børsen front page

Integrating MSS, SEP and NGFW to catch targeted APTs

Security Administration R77

Verve Security Center

Transcription:

LISA 10 Speaking Proposal Category: Practice and Experience Reports Presentation Title: When Anti-virus Doesn t Cut it: Catching Malware with SIEM Proposed by/speaker: Wyman Stocks Information Security Manager NetApp 919-476-5252 Wyman.Stocks@netapp.com

Report Proposed Topic: When Anti-virus Doesn t Cut it: Catching Malware with SIEM Malware is a problem that cuts across most every industry that uses computers today. It is also a good example of a threat that most companies assume is stopped at the perimeter. However, this presentation will discuss the danger of relying simply on desktop or perimeter security to catch an insidious threat like malware. SIEM is short for Security Information & Event Management. Simply put, these are event correlation engines for logs. These systems help your limited security staff make sense of millions of events per day. They put many log types into one console which reduces training and analytical time. Conficker was a wake-up call for us. I head a small team responsible for comprehensive security across over dozens of sites with over 12,000 end user devices (desktops, laptops, mobile devices, etc.) We followed standard protocol and rolled out the patch within 24 hours. Everything seemed fine. Unfortunately, like many large companies, the patch didn t hit every one of the thousands of the devices it needed to. A few months later, we were alerted by a third party that large amounts of Conficker traffic were coming from our network. Our initial reaction was one of disbelief because we had rolled out the patches, our anti-virus software was widely deployed and updated almost daily and we had intrusion detection including the SIEM. We pressed the 3 rd party for evidence. They were a little reluctant, but finally sent us some logs. Their logs matched what we saw in our SIEM. We found many malware-infected machines that anti-virus wasn t catching. Our reaction turned from disbelief to concern because the traffic was leaving our firewalls. To root out the problem, we used a combination of event correlation, automation and process. 1. We dedicated teammates to reviewing the logs. For example, we found generic bots and machines that were infected sending out spam. We started looking for excessive port 25 traffic. We found that by correlating certain network behaviors using session data and SIEM intelligence, we could detect malware. 2. We leveraged our SIEM to contact users immediately via email when malware was detected. 3. We set up a protocol for users to follow, giving them exact instructions on what to do to fix the problem Our analysts worked almost daily with our anti-virus vendor collecting and submitting samples to automate the cleaning of these infected workstations. In the press we read there were only about five or six variants of Conficker. Our experience was there were many strains of each of those variants that anti-virus did not catch until we sent samples into our vendor.

Result: We reduced daily average from 30-50 infections to less than 10 per day in just 2-3 weeks. Today we are building more visibility into the network so that we can capture malware before it even gets to the end user. Various indicators were used to find infected computers. These included things like traffic to known Command and Control (C2) servers (where malware gets instructions on what to do next), unusual network behavior on particular protocols, and other clues found during the course of investigations. Several lessons were learned along the way that helped us understand not just the capabilities, but also the limitations of using SIEM technology. First, timestamps become extremely important when you have most of the logs from your enterprise in one console. If you are not aware of time differences, you will miss key pieces of data. Secondly, once you get past the initial wave of a certain type of crisis; the false positive rate goes up. This is mainly owing to thresholds being lowered on what actually triggers a correlation event. Thirdly, you have a learn things about your network that may not be that useful in order to get to the useful info. An example of that is in the course of investigating spambots you find out just how many people actually still use external SMTP servers for their personal mail. These are false positives and it is mildly useful in telling the story, but not that useful in protecting the company s network. Going forward we have several initiatives that came out of this. One initiative is putting more emphasis on feeding our prevention measures by using data from detection and response activities. We also realized we need to build more visibility into our network. This will allow us to validate events without having to rely too much on interviewing end users and administrators. Another initiative will be to be more diligent in doing historical look-backs to see how long activity has been on our network. This will feed our detection capability as well as our response plans. It will also allow us to start thinking more in terms of attribution over the long term rather than just fixing problems one at a time. In addition, we ll review how we use SIEM (security information and event management) and log management and discuss how to use the two together to monitor and catch other types of security threats. While not a silver bullet, SIEM has been a huge time saver for our small team, as our systems generate about 50 million events per day. Tags: security, case study, malware, SIEM, anti-virus, managed security service, information security

Presentation Outline Proposed Topic: When Anti-virus Doesn t Cut it: Catching Malware with SIEM What is SIEM? o Security Information & Event Management o Simply a correlation engine for event logs o Helps you make sense of 50 million events per day The wakeup call o External org informally notifies us of Conficker traffic o Volume is more than normal for a company of our size Initial Reactions o Disbelief We rolled out the patches We have AV and a SIEM Asked for more info from external org o Concern After looking at evidence Traffic was leaving our firewalls Response o Use SIEM to identify network behavior indicative of a bot infection o Validate and engage end users manually After two weeks, this was too labor intensive False positive rate was very low o Automate notification to end users with instructions for clean up o Get as many unique samples as possible and pass to AV vendor Results o Drop in daily detection rate of between 30-50 to less than 10 o <insert pretty chart> What did we look for? o Known Command and Control servers (C2) o Unusual volume on a particular protocol o Other indicators found during investigations SIEM automation lessons learned o Timestamps must be sync d across enterprise o Short VPN connections cause problems in identifying the correct user o When volume drops, you can have a higher false positive rate o You have to learn things about your network that may not be that useful Next steps o Feeding prevention measures

o o Building in more visibility Historical look-backs to determine attribution