Flow Visualization Using MS-Excel



Similar documents
Firewall Firewall August, 2003

Websense Web Security Gateway: What to do when a Web site does not load as expected

Using TestLogServer for Web Security Troubleshooting

CMPT 471 Networking II

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

CSE543 - Computer and Network Security Module: Firewalls

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.

About Firewall Protection

INTRODUCTION TO FIREWALL SECURITY

Richard Bejtlich / taosecurity.blogspot.com BSDCan 14 May 04

Firewall Defaults and Some Basic Rules

Assets, Groups & Networks

CSC574 - Computer and Network Security Module: Firewalls

RSA Security Anatomy of an Attack Lessons learned

Network Visiblity and Performance Solutions Online Demo Guide

How to set up popular firewalls to work with Web CEO

Network Security CS 192

Chapter 4 Firewall Protection and Content Filtering

2010 Carnegie Mellon University. Malware and Malicious Traffic

Network Probe User Guide

Chapter 4 Firewall Protection and Content Filtering

CS Computer and Network Security: Firewalls

F-SECURE MESSAGING SECURITY GATEWAY

Visualizing Threats: Improved Cyber Security Through Network Visualization

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

APPLICATION PROGRAMMING INTERFACE

Module: Firewalls. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

1 PC to WX64 direction connection with crossover cable or hub/switch

Cover. White Paper. (nchronos 4.1)

Configuring Security for FTP Traffic

CS Computer and Network Security: Firewalls

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

CIS 433/533 - Computer and Network Security Firewalls

Call Logging Quick Reference User Guide

Configuring PA Firewalls for a Layer 3 Deployment

CIT 480: Securing Computer Systems. Firewalls

Edge Configuration Series Reporting Overview

ESET Mobile Security Business Edition for Windows Mobile

Secure Networks for Process Control

ThreatSTOP Technology Overview

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Overview - Using ADAMS With a Firewall

Microsoft Labs Online

Chapter 3 LAN Configuration

HTTP Reverse Proxy Scenarios

Network Agent Quick Start

Overview - Using ADAMS With a Firewall

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Analysis of Network Beaconing Activity for Incident Response

Introduction to Network Security Lab 1 - Wireshark

Analysis of a DDoS Attack

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

74% 96 Action Items. Compliance

Concierge SIEM Reporting Overview

+ iptables. packet filtering && firewall

Internetwork Expert s CCNA Security Bootcamp. IOS Firewall Feature Set. Firewall Design Overview

Automating Server Firewalls

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

Linux Firewalls (Ubuntu IPTables) II

Web Application Firewall

GlobalSCAPE DMZ Gateway, v1. User Guide

Netflow Collection with AlienVault Alienvault 2013

Hands-on Network Traffic Analysis Cyber Defense Boot Camp

Guardian Digital WebTool Firewall HOWTO. by Pete O Hara

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

Networks and Security Lab. Network Forensics

Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users

Networking for Caribbean Development

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

Chapter 3 Security and Firewall Protection

Source-Connect Network Configuration Last updated May 2009

z/os V1R11 Communications Server system management and monitoring

RESCO MOBILE CRM USER GUIDE. Access your CRM data on any mobile platform ipad, iphone, Android, Windows Phone or Win XP/Vista/7/8

DMZ Network Visibility with Wireshark June 15, 2010

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Chapter 4 Security and Firewall Protection

Chapter 15: Advanced Networks

CHAPTER. Monitoring and Diagnosing

Trend Micro Worry- Free Business Security st time setup Tips & Tricks

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

Network Forensics Network Traffic Analysis

12. Firewalls Content

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

How to Use Red Condor Spam Filtering

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Application-Centric Analysis Helps Maximize the Value of Wireshark

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Lab Conducting a Network Capture with Wireshark

CCProxy. Server Installation

Transcription:

Flow Visualization Using MS-Excel Visualization for the Common Man Presented by Lee Rock and Jay Brown US-CERT Analysts Einstein Program

Background US-CERT Mission Einstein Program > Large volumes of traffic > Architecture limitations Proactive vs. Reactive analysis Slow application certification process

Pro s and Con s Pro s: Visualization allows for rapid analysis Patterns are easy to identify Flexibility in analysis Most enterprises have MS Office (Excel) Con s: Excel plotting engine is limited Max of 65K records (recommend <= 50K) Data must be imported and formatted Memory management is an issue

Data Preparation Steps Data Pull Data Reduction Importing Data Data Formatting Sample analysis slides

Data Pull Analysts have several options when trying to pull interesting datasets. Several methods we find useful are: Collecting data during non-business hours Reduces traffic from users; helps expose automated sessions Search for outbound traffic only Reduces noise from scanning, etc. Filtering for packets with the PSH/ACK flags set in the initial flags field Focuses the traffic on sessions where data is actually transferred Filtering for packets with the SYN flag set in the initial flags field Focuses on sessions initiated by your organization Limit traffic to records under 5K bytes Most cyclical sessions (beaconing) happen in this range Traffic should be refined to provide the best possible dataset for analysts to work with.

Data Reduction To further enhance the concentration of suspicious data, analysts should: Remove replies from servers (responses to inbound server requests) Looking for genuine outbound traffic Remove loud, common talkers (instant messenger, web crawlers, etc) Reduces the noise, especially in web traffic Whitelists and blacklists are helpful for filtering This is an iterative approach Analyze, Research, Remove.

Importing Data Data is imported from a pipe delimited text file

Data Formatting Columns within the spreadsheet should be aligned to each field of the flows, Einstein data is formatted to encompass: Source IP Destination IP Source Port Destination Port Protocol Packets Bytes Flags Start Time Duration End Time Sensor Type Initial Flags

Data Formatting Cont. US-CERT analysts use two methods to format the Einstein time fields into a format that is able to be plotted: A: Use the - - legacy-timestamps switch to place the time in a MM/DD/YYYY HH:MM:SS format from the default MM/DD/YYYYTHH:MM:SS.MMM B: Utilize the replace function in excel to remove the milliseconds from the time and replace the T placeholder with a space:

Analysis Workflow Plot Zoom Highlight AutoFilter

Plot Creating charts from the selected data, allows for quick pattern identification

Zoom You can zoom in to specific data points, by changing the scale of the axis Right click on the axis Select Format Axis Click on the Scale tab Adjust scale as desired Works for both axis Remember to remove

Highlight By hovering over a data point in the series an analyst can locate the point in the rest of the records by filtering for the displayed information

AutoFilter Method A Drop down list: Select the desired value from the drop down list Method B Custom Filter: Select data by using Excel s built in boolean logic search functions

Sample Analysis Slides Scatter Plot Analysis Byte Based Patterns Duration Based Patterns sport vs. dport Patterns IP Based Patterns Application Pattern

Byte Based Patterns

Duration Based Patterns

sport vs. dport

IP Integer Patterns ARIN ARIN

Comprehensive View

Case Study

Multi-day View Workday Week end Workday Workday

Case Study Conclusion After notifying the agency in question, the machines that were generating this traffic were found and forensically examined. The malware turned out to be a keystroke logger that posted data to a specific website and retrieved commands embedded on the same site. Prior to this incident, there was no malware associated with this site.

Additional Analysis Determining application patterns Identifying specific applications Working with gateway traffic Structured gateway Proxy gateway Gateway mannerisms

Application Patterns

Structured Gateway

Proxy Gateway

Gateway Mannerisms

Future Directions Split view analysis Coloring data Application coloring sport colored by app Gateway coloring to IP

Split View

Coloring Example Green = HTTP, Dark Green = HTTPS, Blue = DNS, Red = Other

Application Coloring Green = HTTP, Blue = DNS, Red = Other

Color sport vs Application

Colorization Example GW2IP

Contact Info Technical comments or questions US-CERT Security Operations Center Email: soc@us-cert.gov Phone: +1 888-282-0870 Media inquiries US-CERT Public Affairs Email: media@us-cert.gov Phone: +1 202-282-8010 General questions or suggestions US-CERT Information Request Email: info@us-cert.gov Phone: +1 703-235-5111 For more information, visit http://www.us-cert.gov

Questions?