How to build a Carrier-Grade Defense-Shield. Dr. Antonio Nucci Chief Technology Officer, Narus Inc.



Similar documents
Firewall Market Trends

CIO Update: The Gartner Firewall Magic Quadrant for 2H02

The Hillstone and Trend Micro Joint Solution

Security Toolsets for ISP Defense

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

CISCO IOS NETFLOW AND SECURITY

State of Texas. TEX-AN Next Generation. NNI Plan

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Arbor s Solution for ISP

The Cisco ASA 5500 as a Superior Firewall Solution

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

Protecting against DoS Attacks

Chapter 9 Firewalls and Intrusion Prevention Systems

Hillstone Intelligent Next Generation Firewall

Network Security Demonstration - Snort based IDS Integration -

Internet Content Provider Safeguards Customer Networks and Services

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Guideline on Firewall

Integrated Protection for Systems. João Batista Territory Manager

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Security and Access Control Lists (ACLs)

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006

Braindumps QA

Der Weg, wie die Verantwortung getragen werden kann!

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

DEPLOYING VoIP SECURELY

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Next-Generation Firewalls: Critical to SMB Network Security

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Radware s Behavioral Server Cracking Protection

Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks

DDoS Overview and Incident Response Guide. July 2014

How Cisco IT Protects Against Distributed Denial of Service Attacks

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Cloud Based Secure Web Gateway

How To Protect Your Network From Attack From A Network Security Threat

Cisco IOS Flexible NetFlow Technology

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Report of Independent Auditors

How To Buy Nitro Security

Symantec Security Information Manager Version 4.7

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

5 Steps to Advanced Threat Protection

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Network Immunity Solution. Technical White paper. ProCurve Networking

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Chapter 1 Personal Computer Hardware hours

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

PART D NETWORK SERVICES

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

Security Information & Event Manager (SIEM)

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System

Securing and Monitoring BYOD Networks using NetFlow

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

Deploying Firewalls Throughout Your Organization

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Cisco Advanced Services for Network Security

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

Innovations in Network Security

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Network System Design Lesson Objectives

Network Performance Monitoring at Minimal Capex

SANS Top 20 Critical Controls for Effective Cyber Defense

A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic

Cheap and efficient anti-ddos solution

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

WatchGuard Gateway AntiVirus

The changing face of global data network traffic

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

A Layperson s Guide To DoS Attacks

Transcription:

How to build a Carrier-Grade Defense-Shield Dr. Antonio Nucci Chief Technology Officer, Narus Inc.

Agenda Security Market Landscape Approach to Efficiently and Shortly Detect DDoS/Worms 2

Take a walk on the Security Landscape

Backbone Market Evolution P A S T P R E S E N T F U T U R E Carriers treated data as opaque - Bits were bits - they just passed traffic Security was firewall based - Endpoints were under attack, but not the network itself - Fewer IP security risks (mostly viruses) Security based on Firewalls - Enough to protect the networks Traditional carriers evolve - Data outpaces circuit switched - IP/MPLS Super-core emerges - FM Convergence CodeRed worm changed the threat landscape -Security threats became commercially motivated - Threats targeted network rather than endpoints - Networks are larger and more open - Attacks are highly distributed (DDoS) Security based on IDS/IPS - Appliances start to scale at very high-speed line-rate - Enough to protect the network from DoS/DDoS IF close to the victim - The appliance model is TOO expensive Full IP Convergence: any network, any device - IMS Super-access will emerge - Carriers will monetize IP Services New types of potential threats emerge - Threads will target more and more IP services - Attacks will be more and more distributed - Polymorphic worms will emerge Security based on IP Systems - From Appliances to Systems - Ability to collect information from any network element - Ability to have fine-granularity visibility into traffic - Ability to digest large amount 4 of traffic

Market Snapshot 2001 A b i l i t y t o E x e c u t e Challengers Leaders Cisco Check Point Microsoft Symantec SonicWall Secure Computing Network-1 NetScreen $2.4B Market Single category Borderware WatchGuard Niche Players Visionaries M a t u r i t y o f V i s i o n Gartner Magic Quadrant for Firewalls update 2001 5

Backbone Market Evolution P A S T P R E S E N T F U T U R E Carriers treated data as opaque - Bits were bits - they just passed traffic Security was firewall based - Endpoints were under attack, but not the network itself - Fewer IP security risks (mostly viruses) Security based on Firewalls - Enough to protect the networks Traditional carriers evolve - Data outpaces circuit switched - IP/MPLS Super-core emerges - FM Convergence CodeRed worm changed the threat landscape -Security threats became commercially motivated - Threats targeted network rather than endpoints - Networks are larger and more open - Attacks are highly distributed (DDoS) Security based on IDS/IPS - Appliances start to scale at very high-speed line-rate - Enough to protect the network from DoS/DDoS IF close to the victim - The appliance model is TOO expensive Full IP Convergence: any network, any device - IMS Super-access will emerge - Carriers will monetize IP Services New types of potential threats emerge - Threads will target more and more IP services - Attacks will be more and more distributed - Polymorphic worms will emerge Security based on IP Systems - From Appliances to Systems - Ability to collect information from any network element - Ability to have fine-granularity visibility into traffic - Ability to digest large amount 6 of traffic

Market Snapshot 2004 Challengers Leaders $8B A b i l i t y t o E x e c u t e Cisco Check Point Juniper Microsoft Forntinet Secure Computing NetContinuum WatchGuard F5 StoneSoft ipolicy CyberGuard SonicWall Whale Symantec Teros WatchFire Kavado Much broader category New set of leaders Network Firewall Web Application Firewall Niche Players Visionaries M a t u r i t y o f V i s i o n Gartner Magic Quadrant for Firewalls update 2004 7

Backbone Market Evolution P A S T P R E S E N T F U T U R E Carriers treated data as opaque - Bits were bits - they just passed traffic Security was firewall based - Endpoints were under attack, but not the network itself - Fewer IP security risks (mostly viruses) Security based on Firewalls - Enough to protect the networks Traditional carriers evolve - Data outpaces circuit switched - IP/MPLS Super-core emerges - FM Convergence CodeRed worm changed the threat landscape -Security threats became commercially motivated - Threats targeted network rather than endpoints - Networks are larger and more open - Attacks are highly distributed (DDoS) Security based on IDS/IPS - Appliances start to scale at very high-speed line-rate - Enough to protect the network from DoS/DDoS IF close to the victim - The appliance model is TOO expensive Full IP Convergence: any network, any device - IMS Super-access will emerge - Carriers will monetize IP Services New types of potential threats emerge - Threads will target more and more IP services - Attacks will be more and more distributed - Polymorphic worms will emerge Security based on IP Systems - From Appliances to Systems - Ability to collect information from any network element - Ability to have fine-granularity visibility into traffic - Ability to digest large amount 8 of traffic

A New Category Emerges Technology inflection Rapidly expanding protocols and services (VOIP, Mobile-IP, IMS) Inflections demand next generation performance Today s architectures provide limited scaling Services require capture layer 3,4&7 data at OC48 and OC192 speeds Increasing Demand over time Few entrants, very little competition Technology inflection + market acceptance + little competition = a new category 9

Security Defense-Shield: Requirements Full Control of the Network requires a Unified Vision of the Network Point Solutions can be ineffective for distributed attacks IP Traffic Granularity Centralized Normalization and Correlation of multiple source of data Cutting-edge Algorithms Adaptive Efficient Scalable High-performance 10

Let s take a snapshot at the market Network Visibility Traffic Elements Others IDS/IPS Firewall Switch Router Layer 7 Layer 4 Layer 3 No Full No Full No Partial Full Enterprise Carrier Edge Carrier Core (FM) (FM) Correlation Narus CloudShield Q1 Labs/ArcSight Arbor Peakflow Juniper Netscreen Cisco (5600,NIDS,PCube)

Bounce the Attacks at the Edge: Defense-Shield Attackers Example: DDoS and Worms Attackers Attackers ISP #2 dd e e nn ISP #1 lleeaa CC rree o o CC Attackers Attackers Attackers

Attacking a System is equivalent to Perturbing its Equilibrium-Point Each Element in the Universe obeys to Physical Laws Any perturbation applied to any stable system breaks the system s equilibrium Internet is a Physical System that obeys to Physical Laws Internet Traffic is structured in some ways (invariant component) and very random in others (variant component) Users are methodic and unpredictable at the same time Threads represents a deterministic actions that affect the equilibrium of the system: Strong Temporal Coordination across Attackers (DDoS) Abnormal large host-population contacted by Infected Host (Worm) 13

Detect a perturbation of equilibrium-point Information Entropy: DDoS, Worms, etc, disrupt over time the structure and randomness of key traffic features Information Entropy is a powerful operator to detect a change in traffic distribution on-fly: Skew-distribution: low-entropy / Flat-distribution: high-entropy Information Entropy can be well approximated by well-known data mining algorithms Requires a few CPU cycles X H i = p log2 X p P i Requires bounded memory DDoS & Worms disrupt the key-feature distributions p 14

Change of distributions when under attack, example Worm Key Traffic Features: <SrcIP>, <srcport>, <dstip>, <dstport>, <FlowSize>: A few srcip -> many dstip Specific Application Vulnerability -> ONE dstport (it can be different) Small flows become dominant srcip dstip srcip dstip dstport FlowSize dstport FlowSize 15

High-Level Sketch of the Algorithm: example, Worms Step #1: Based on Layer-4 information Extract the marginal distributions of five key features: o <SrcIP>, <DstIP>, <SrcPort>, <DstPort>, <FlowSize> Compute Entropy for the above marginal distributions Mark malicious flows as suspicious Hosts for which a deviation of the GlobalMetric is observed Generate a flow-filter mask using key features for which a drop in the entropy is observed Example, <SrcIP,DstPort,FlowSize> Step #2: Based on Layer-7 information Apply flow-filter mask to isolate and deeply-analyze ONLY suspicious flows Extract Worm-Signatures ONLY for suspicious hosts Rabin, Longest-Common-SubString, Longest-SubSequenceString, etc 16

Algorithm in action: Tier-1 Wireless Network Anomalies 17

Results from Tier-1 Network (Sasser): TCP Port 445 The 1 st Hour The first uptick in TCP Port 445 traffic happened on 8/31/05 between 9:00 to 10:00 AM This NarusView drilldown on the first hour revealed that TCP Port 445 traffic was generated almost totally by one Subscriber Client X During the first hour, a distinctly deterministic number of sessions (e.g., 4) were set up by subscriber X to numerous IP servers, symptomatic of worm propagation 18

Results from Tier-1 Network (Sasser): TCP Port 445 The 13 th Hour The second significant uptick in TCP Port 445 traffic happened 12 hours later, from 9:00 to 10:00 PM on 8/31/05 This NarusView drilldown on the 13th hour revealed that the number of Subscriber Clients generating TCP Port 445 traffic had grown to 6 On the 13th hour, distinctly deterministic number of sessions (e.g., 4, 14) were set up to numerous IP and Subscriber servers, again symptomatic of worm propagation 19

Results from Tier-1 Network (Sasser): TCP Port 445 The 21 st and 22 nd Hours The third significant uptick in TCP Port 445 traffic happened 7 hours later, from 5:00 to 7:00 AM on 9/1/05 This NarusView drilldown on the 21 st and 22 nd hours revealed that the list of Subscriber Clients generating TCP Port 445 traffic had grown further to 12 During the 21 st and 22nd hours, distinctly deterministic number of sessions continued to be set up to numerous IP and Subscriber servers, symptomatic of worm propagation 20

Thanks Thanks QUESTIONS? Thanks Thanks Thanks Thanks 21