Network Monitoring and Security Measures in Campus Networks



Similar documents
Log Management for the University of California: Issues and Recommendations

Network Performance Monitoring at Minimal Capex

Campus Network Best Practices: Core and Edge Networks

Campus-wide Firewall Project. Anne Oribello, Brown University

How To Protect A Network From Attack From A Hacker (Hbss)

INTRUSION DETECTION SYSTEMS and Network Security

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Five Key Challenges Facing Campus Network Administrators Today

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

OLD DOMINION UNIVERSITY Router-Switch Best Practices. (last updated : )

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Network Security Policy

Recommended IP Telephony Architecture

Large Scale Science, The Science DMZ, SDN/OpenFlow, Security and Cyberinfrastructure Architectures

IT Security Standard: Network Device Configuration and Management

Gigabit Content Security Router

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

A Network Design Primer

Network Security Policy: Best Practices White Paper

Critical Security Controls

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

IDS or IPS? Pocket E-Guide

Information Technology Cyber Security Policy

Bypassing Network Access Control Systems

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Taxonomy of Intrusion Detection System

Early warning for security attacks

How To Manage Security On A Networked Computer System

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Security Toolsets for ISP Defense

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

IBM. Vulnerability scanning and best practices

Missing the Obvious: Network Security Monitoring for ICS

SANS Top 20 Critical Controls for Effective Cyber Defense

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Things I can do to protect my network from getting Hacked!!!!!! Jazib Frahim, Technical Leader

Central Agency for Information Technology

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

How To Extend Security Policies To Public Clouds

Internet infrastructure. Prof. dr. ir. André Mariën

Network Security Policy

Cisco PIX vs. Checkpoint Firewall

Gaining Operational Efficiencies with the Enterasys S-Series

Introduction to Network Monitoring and Management

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

CMPT 471 Networking II

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Gigabit Multi-Homing VPN Security Router

Secure Cloud-Ready Data Centers Juniper Networks

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Threat Management: Incident Handling. Incident Response Plan

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

74% 96 Action Items. Compliance

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Equipment Needed. Connecting to the Internet

Information technology security and system integrity policy.

Southwest Arkansas Telephone Cooperative Network Management Practices

CSCE 465 Computer & Network Security

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

End-user Security Analytics Strengthens Protection with ArcSight

Cisco Nexus 1000V Switch for Microsoft Hyper-V

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

DDoS Overview and Incident Response Guide. July 2014

SonicWALL PCI 1.1 Implementation Guide

whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Designing scalable wireless networks in the campus LAN

Secure Networks for Process Control

Gigabit SSL VPN Security Router

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

ResNet Guide. Information & Learning Services. Here to support your study and research

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Payment Card Industry Self-Assessment Questionnaire

Detecting peer-to-peer botnets

How To Manage Sourcefire From A Command Console

1. Thwart attacks on your network.

Introduction to Network Monitoring and Management

McAfee Network Security Platform

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

Transcription:

Network Monitoring and Security Measures in Campus Networks Network Startup Resource Center These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

How we used to build networks

A long time ago

Mid 1990s

Today

Campus networks... aren't corporate networks The network exists to support the education and research activities of the university Having all resources behind a firewall doesn't scale very well and it's not very useful

Top network performance issues (1) Bottleneck/exit point can't handle the traffic Underpowered firewall for the task Content inspection is computationally expensive Too many requests Peer to Peer? Virus?

Top network performance issues (2) Non-scaleable network design Switching instead of routing As more clients are added, network performance within the campus degrades Broadcasts increase Risks of loops

Top network performance issues (3) NAT NAT requires keeping track of every connection Every packet requires an extra lookup

High Speed Network Performance

Non-scaleable networks As capacity grows, it's increasingly difficult to police a network using firewalls Firewalls are often purchased with nearfuture usage patterns in mind, not long term Hardware and licensing is very expensive at high speeds (USD $500,000/10Gbs) Some end up turning off the more advanced features

Do firewalls help at all (1)? Active attacks and scans aren't as big a problem as they used to be End device security has gotten much better Think W indows XP before and after SP2 Vendors now take patching seriously

Do firewalls help at all (2)? Most devices have their own firewall nowadays There is much more focus on securing end nodes and devices Application security is really what matters

Do firewalls help at all (3)? You will have compromises, hackers and viruses anyway Users download malware, and enable virus to spread Best thing you can do is keep your systems and applications up to date and monitor your network!

Campus networks today! W E N Science DMZ is it?

Science DMZ ArsTechnica

Network Management & Monitoring

Network Management & Monitoring Network Management is the foundation that much of the security framework operates on Use managed equipment! Instrument your network, to make it transparent Traffic analysis Logging give you insight into what is happening on your network

Log management & analysis Many networks do not log output from their network equipment Driving blind Large scale DoS can be hard to distinguish from a network outage L2 loop What does the network equipment say?

Log management & analysis Correlate logs from DHCP servers, authentication servers (RADIUS/LDAP), equipment (switches, routers, access points) and you will have a pretty good idea who's doing what. Don't forget NTP (time synchronization)!

Traffic analysis Many tools available SNMP NetFlow (NfSen) Usage patterns give you an idea of what the baseline on your network is You need to be able to tell the difference between failures and anomalous behaviour Is it an attack? A virus? BitTorrent?

Security Policies You might be thinking at this point... What about P2P? What about YouTube and video sites? How do we limit bandwidth misuse?

Security Policies (2) Some issues do not have technical solutions Just because something isn't allowed (or, not all the time) doesn't mean it's necessarily enforceable This is where an Acceptable Use Policy comes into play But you must have the tools to document abuse

Security Policies (3) BAYU Be Aware You're Uploading Rather than try and block P2P (it's very difficult), use monitoring to find out who is using your network If you have people on your network, you should know who they are (Authentication) If you know who they are, you can send then an email

Security Policies (4) Make sure you have support from the management The AUP should be part of the University Policy Must be consequences for violating the AUP Sometimes, knowing that there is monitoring in place, is enough to make people think twice before acting against the AUP

AUP "All use of the network and computing facilities is monitored an recorded for the purposes of enforcing this AUP. Your use of university facilities implies that you consent to your activity being monitored... Failure to comply with this policy may result in your access to computing facilities being suspended or permanently withdrawn. It may also result in action being taken under the university disciplinary procedure, which could lead to expulsio https://it.uoregon.edu/acceptable-use-policy

Tools NetFlow / NfSen Log collectors/aggregators (LogStash, fluentd) Log analysers: Tenshi, Swatch IDS: Snort, Bro

Discussion Points Who has security hat? Policies for dealing with incidents How do firewalls work? Firewalls should protect critical assets Avoid corporate mindset ACLs to block worst issues/traffic No such thing as a secure network Increase visibility in the network (remove NAT). Shaping and prioritization SSL/TLS, VPNs, evasion techniques