The Evolution of Information Security at Wayne State University



Similar documents
Network Incident Report

Network Instruments white paper

Second-generation (GenII) honeypots

Security Event Management. February 7, 2007 (Revision 5)

PROFESSIONAL SECURITY SYSTEMS

Introduction of Intrusion Detection Systems

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

PART D NETWORK SERVICES

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

Uncover security risks on your enterprise network

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Certified Ethical Hacker (CEH)

Chapter 9 Firewalls and Intrusion Prevention Systems

The HoneyNet Project Scan Of The Month Scan 27

SonicWALL Unified Threat Management. Alvin Mann April 2009

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Cisco IPS Tuning Overview

Campus-wide Firewall Project. Anne Oribello, Brown University

How To Protect Your Network From Attack

Using Ranch Networks for Internal LAN Security

FIREWALL POLICY DOCUMENT

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CSCI Firewalls and Packet Filtering

SonicWALL Global Management System Reporting Guide Standard Edition

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Architecture Overview

Get Your FIX: Flow Information export Analysis and Visualization

INTRUSION DETECTION SYSTEMS and Network Security

How To Protect Your Network From Attack From A Hacker On A University Server

Network Security. Mike Trice, Network Engineer Richard Trice, Systems Specialist Alabama Supercomputer Authority

IDS / IPS. James E. Thiel S.W.A.T.

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Evolutionism of Intrusion Detection

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

Denial of Service (DoS) Technical Primer

March

74% 96 Action Items. Compliance

Security Toolsets for ISP Defense

Tk20 Network Infrastructure

Barracuda Link Balancer

How Cisco IT Protects Against Distributed Denial of Service Attacks

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Network Intrusion Prevention Systems Justification and ROI

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Firewalls (IPTABLES)

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Global Partner Management Notice

Multi-Homing Security Gateway

Network Defense Tools

A Decision Maker s Guide to Securing an IT Infrastructure

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Top 5 Essential Log Reports

Security Information Management (SIM)

Networking: EC Council Network Security Administrator NSA

Vendor Questionnaire

Firewall Defaults and Some Basic Rules

Protecting Critical Infrastructure

NERC CIP Requirements and Lexmark Device Security

Lab Configure IOS Firewall IDS

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Free Network Monitoring Software for Small Networks

Secondary DMZ: DMZ (2)

Chapter 2 Connecting the FVX538 to the Internet

Network Security. Protective and Dependable. Pioneer of IP Innovation

Honeypot as the Intruder Detection System

Intrusion Detection Systems (IDS)

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Blended Security Assessments

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

IPS Attack Protection Configuration Example

How To Protect Your Network From Attack From A Network Security Threat

CS5008: Internet Computing

CYBERTRON NETWORK SOLUTIONS

Network Security Policy

Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015

Chapter 7. Firewalls

Achieving PCI-Compliance through Cyberoam

Reporting and Incident Management for Firewalls

Chapter 8 Security Pt 2

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

SECURITY ADVISORY FROM PATTON ELECTRONICS

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Transcription:

The Evolution of Information Security at Wayne State University Nathan W. Labadie ab0781@wayne.edu Sr. Systems Security Specialist Wayne State University

A Bit of Background Covers mid-2000 to present. Moved from virtually no information security infrastructure to a fairly modernized design. Discussion of growing pains and major steps taken along the way. Where we were, where we are, and where we are going. 2

In The Beginning: 2001 3

In The Beginning: 2001 No real information security infrastructure. Monitoring primarily consisted of SNMP statistics and sniffing our Internet uplink if there was a problem. No major worms or DoS attacks, just the occasional email to the abuse address. Information security was 100% reactive. 4

In The Beginning: 2001 Network anomaly detection consisted of looking for spikes on MRTG graphs. A packet sniffer would be used against the uplink if anything seemed strange. Relatively simple to identify hosts that were using excessive bandwidth or causing problems. 5

In The Beginning: 2001 Not a single network firewall on campus. All information security was done on the host. Editing inetd.conf and disabling telnet was considered good information security. When a host was hacked, it was restored from the last known good backup and put back online. Wash, rinse, repeat. 6

The First Step 7

The First Step: 2001 Began running a Snort IDS against a mirror of our Merit link just to see. Much more malicious activity than we had anticipated. Lots of IRC bots and FTP warez hosts. No major Windows worms, yet. Most importantly, the IDS provided us with statistics and data that could be presented to management. Allowed us to make a case for funding. 8

Firewall Implementation: 2001 Decided on Netscreen firewalls after evaluating performance and cost. Implemented one at the perimeter and another for production services. In many instances, security was still viewed as secondary to user convenience. Most policies still left hosts behind the firewall wide open to attacks. 9

Production Services Firewall: 2001 Added the firewall as the default gateway for the production services network. Initial policy was set to default open. Gained management s approval and worked through the list of hosts on the network. All of the administrators were required to provide a list of rules for their hosts. Required lots of cooperation between departments for successful implementation. 10

Perimeter Firewall: 2001 Operated in passive mode in front of 11,000 hosts on the University network. Initially served no major purposes. Filters were added for compromised hosts. Minor integration with the Snort IDS. All ports were left open by default. Rules were only added by requests from the department administrators. 11

Worms Galore: 2001-2002 A large number of worms and viruses plagued the network from 2001 2002. Code Red, Code Red II, Sadmind, Nimda, etc. Virtually all departments were impacted. Served as a wake-up call to the overall state of security on the University network. 200-250 infected hosts at one point. 12

Worms Galore: 2001-2002 Many of the hosts were backdoored with bots and denial-of-service agents. Experienced DDoS attacks on a daily basis for several weeks. Frequently crippled the network. Disruptions and downtime brought about a fundamental shift in policy. Everyone agreed that changes needed to be made to prevent this from happening. 13

The Next Steps 14

Major Policy Change: 2002 Given a green light to block problematic services at the edge of the network. Primarily included Windows services. Allowed us to focus on problems internal to the University network. Implemented a Nessus server and conducted regular scans for specific vulnerabilities. Administrators were notified of potential problems on their network. 15

Information Security: 2002 - Present Growth and development in 3 major areas: Firewall and IDS. Internal Security. VPN technology. Involved finding a balance: Academic freedom. Information security. Ease of use. 16

Information Security: 2002 - Present 17

Firewall and IDS: 2002-2006 Overall implementation was a success. New problem: where s my firewall? Departments across campus decided they wanted their own departmental firewalls. Standardized on Netscreen firewalls. No standardized process for deciding if a departmentlevel firewall is required. Cost forces many departments to reconsider. Firewall management software allows responsibilities to be delegated. 18

Firewall and IDS: 2006 - Present Port and host-based security was no longer sufficient enough. Migrated to Juniper firewalls with inline IDS capability. Added for both perimeter and production. Allows services to be exposed while still protecting from exploits. Greatly reduced the amount of malicious traffic entering the campus network. 19

VPN Implementation: 2002-2004 VPN functionality was added to allow access restricted by the firewall change. Original VPN required a client install. Terminated at the firewall. Required a separate policy for each user. Was painful to maintain and support. Client only ran on Windows. 20

VPN Implementation: 2004 - Present Migrated from a client VPN solution to a web-based VPN solution. Increased availability and lowered support costs for the VPN. Supports all major operating systems. Provides both a web interface and a Javabased IPSEC client. Ties directly into our campus LDAP directory. Used extensively by both staff and faculty. 21

Internal Security: 2002 - Present Three recourses for compromised hosts on the campus network: Notify the administrator of the problem. Block the host at the edge of the network. Disable the physical port for the host. Recourse depends on the severity of the problem and significance of the host. Process has not changed significantly. 22

Internal Security: 2002 - Present Vulnerability Exposure Risk Level High Low High Low None High High Low Low None 5 4 3 2 1 Notification Sent Immediate Immediate Immediate Immediate IP Blocked Port Disabled Immediate 1 3 6 1 3 6 10 Days Until Action Taken 23

Internal Security: 2003 - Present Nessus server available for internal use. Essentially free to use. Accounts are provided upon request to administrators across campus. Usage is restricted to the admin s subnet. Sweeps of the network are routinely conducted for specific vulnerabilities. Comprehensive scans of production services are conducted every three weeks. 24

Internal Security: 2006 - Present Implemented a honeynet using honeyd. One single host assumes the identity of ~60 different operating systems. Given a /26 network of routable addresses. Extremely useful for finding hosts on the internal network that are scanning. Also useful for finding the latest and greatest when it comes to new worms and scans. Firewall IDS rules are modified accordingly. 25

Internal Security: Present In 2007 we began restricting incoming traffic at the perimeter of the network. Still in progress. Done on a subnet-by-subnet basis. Administrators are give 2-4 weeks notification to register hosts that require external access. Actively encourage users to utilize the VPN. Created a web-based form for requesting rules that need to be added. 26

Internal Security: The Results Total Compromised Hosts 1400 1200 1232 1000 800 767 600 400 422 200 165 231 59 0 2002 2003 2004 2005 2006 2007 27

Information Security: Future Direction Focus is tying together large amount of information from multiple sources. Logs from the honeynet, IDS, firewall, hosts, netflows, taps, etc. Quickly becoming impossible to manage all of the data and logs. Only the most obvious is noticed. Much of the data between 5:30PM and 9:00AM manages to slip through. 28

Information Security: Future Direction Recently settled on QRadar by Q1 Labs. Primarily used for network anomaly detection and security event management. Provides the ability to look back at previous network traffic in the event of a compromise. No longer have to assume worst-case scenario. Ties together multiple information sources into a single interface. 29

Questions? Contact information: Nathan W. Labadie ab0781@wayne.edu 313-577-2126 30