Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Stephen S. Yau CSE , Fall Security Strategies.
Authors: Thomas Ristenpart, et at.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
1 Enabling Secure Internet Access with ISA Server.
Security Guidelines and Management
Incident Response Updated 03/20/2015
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS
David Groep Nikhef Amsterdam PDP & Grid Traceability in the face of Clouds EGI-GEANT Symposium – cloud security track With grateful thanks for the input.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Pakiti.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
Web Application Firewall (WAF) RSA ® Conference 2013.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
workshop eugene, oregon What is network management? System & Service monitoring  Reachability, availability Resource measurement/monitoring.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
DoS attacks on transit network - David Harmelin ( ) Denial of Service attacks on transit networks David Harmelin DANTE.
Security in ERP Systems By Jason Rhodewalt & Marcel Gibson.
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Trusted Virtual Machine Images a step towards Cloud Computing for HEP? Tony Cass on behalf of the HEPiX Virtualisation Working Group October 19 th 2010.
Cryptography and Network Security Sixth Edition by William Stallings.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
1 Intrusion Detection “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources.”
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Computer Security By Duncan Hall.
Role Of Network IDS in Network Perimeter Defense.
“Status and Challenges of Security in Distributed Computing” — Stefan Lüders — CHEP2010 Status and Challenges of Security in Distributed Computing Stefan.
Incident Response Christian Seifert IMT st October 2007.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
Trusted Virtual Machine Images the HEPiX Point of View Tony Cass October 21 st 2011.
Jason Ewing. What is an Intrusion Why Detecting Signs of Intrusion is Important? Types of Intrusion Detection Systems (IDS) Approaches for Detection Anomaly.
EGI-InSPIRE RI Pakiti Michal Prochazka, (Daniel Kouril)
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Cloud Security Session: Introduction 25 Sep 2014Cloud Security, Kelsey1 David Kelsey (STFC-RAL) EGI-Geant Symposium Amsterdam 25 Sep 2014.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI SVG F2F Virtual Machines VM images, software run on VMS. 3 rd March 2015.
Threat Modeling for Cloud Computing
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Determined Human Adversaries: Mitigations
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Intrusion Detection Systems (IDS)
Chapter 4: Protecting the Organization
Incident response and intrusion detection
Determined Human Adversaries: Mitigations
6. Application Software Security
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Logging and Monitoring

Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment – Frequent “noise” Clouds make the situation more complex – You address issues caused by random users

Motivation Goals – Efficient IR – Build and maintain good reputation Means – Prevent incidents from happening – Timely response – Efficient handling of incidents Automation of procedures, reporting

Revealing Incidents - Motivation Detecting attack from own monitoring – EGI “FedCloud” incident at CESNET – Network monitoring revealed dDoS attacks from a cloud machine – Further forensics showed compromised Tomcat account (with enabled default password) Report from outside – “We found malicious activity originating from your IP address during ”

Attackers Behavior - Motivation Common scenario – Get user access to a machine via common vectors – (escalate privileges) – Hide traces – Launch a “bot”,... Forensics tries to identify the steps

Setting up Basic Elements Logging and monitoring is crucial for incident response and prevention Consider involvement of cloud users infrastructure vs. vms Basic tools – logs – patch management – VM monitoring – Network monitoring

Log Management

Gathering Logs Make sure key components generate logs Verify that logs are complete – IP, usernames – traceability Think about policies Collect logs centrally (syslog) – Attackers wipe logs – Easy evaluation Provide support for VMs – Pre-configured images, documentations, …

Processing Logs Check logs automatically – Logwatch, … – Identify suspicious patterns – successful ssh attacks Logs may be large – Prepare a proper solution (ELK) – Identify what needs to be retained (policies) – Prepare storage

Patch Monitoring

Patch Monitoring using Pakiti Patch monitoring, detects known vulnerabilities Client - server architecture In production use by EGI CSIRT, Nagios probe against WNs

Pakiti in EGI New vulnerabilities assessed EGI CSIRT / SVG → Critical or High-rated. Sites are requested to address the issue, Update package(s) and/or apply mitigations. 7 bussiness days for new vulnerabilities, 2 days for re-occurences Sites failing to address the issue may be suspended Results available to sites/NGIs (limited access)

Pakiti GUI

Patch Management in EGI

Monitoring of Cloud Machines be faster then attackers

VM Assessment Users are creative Identify common attack vectors – Default/weak passwords – Testing accounts Develop procedures and policies – Regular audits Integrate with general issue handling – automation

VM Assessment at CESNET Regular network scans of cloud machines – SSH accounts – Tomcat accounts – open “amplifiers” Policies being updated – VMs are contained after found vulnerable

Network Monitoring

Why Monitor Network? Everybody leaves traces in network traffic (you can’t hide). – Identification of attack attempts – Identify successful attacks – Incident analysis Outcomes improve knowledge about network

Monitoring using Flows Passive monitoring collecting metadata – No support needed from users/customers Flow contains key information about every connection – Source, destination IP, ports, times, protocols, … – No content data (mostly) Very valuable for forensics and attack analysis

Collecting Flows Several solutions available "NetFlow Architecture 2012" by Amp 32 (wikipedia.org)

Using Network Monitoring Data Automated processing – Successful phishing, network attacks, suspicions IPs, … Auxiliary processing

Questions ?