Building a Campus Dshield Randy Marchany IT Security Lab VA Tech Blacksburg, VA 24060

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Advertisements

Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
MONITORING THE CONNECTICUT EDUCATION NETWORK Aliza Bailey 10/20/2010.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
Network Security Testing Techniques Presented By:- Sachin Vador.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Controls for Information Security
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
PBA. Observations  Growth, projects, busy-ness –Doing an incredible amount of work  Great Quality of work  Concern about being perfect  Attitudes.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Unify and Simplify: Security Management
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Module 14: Configuring Server Security Compliance
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
1 Managing A Global Corporate Protection Infrastructure Jeannette Jarvis Association of Anti Virus Asia Researchers November 26, 2004.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Chapter 2 Securing Network Server and User Workstations.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
1 Flexible, High-Speed Intrusion Detection Using Bro Vern Paxson Computational Research Division Lawrence Berkeley National Laboratory and ICSI Center.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 4 Network Security Tools and Techniques.
IS3220 Information Technology Infrastructure Security
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
OPEN SOURCE NETWORK MANAGEMENT TOOLS
Your Partner for Superior Cybersecurity
OIT Security Operations
Critical Security Controls
Security Standard: “reasonable security”
Continuous Monitoring: A Big data Challenge
Securing the Network Perimeter with ISA 2004
NETWORK SECURITY LAB Lab 9. IDS and IPS.
Building a Security Operations Center
Intrusion Detection Systems (IDS)
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Identity & Access Management
Implementing Client Security on Windows 2000 and Windows XP Level 150
IS4680 Security Auditing for Compliance
Cloud Security AWS as an example.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Building a Campus Dshield Randy Marchany IT Security Lab VA Tech Blacksburg, VA

VT Defense-in-Depth Strategy Layer 1: Blocking Attacks: Network Based Layer 2: Blocking Attacks: Host Based Layer 3: Eliminating Security Vulnerabilities Layer 4: Supporting Authorized Users Layer 5: Tools to minimize business losses

Putting the Pieces Together RDWEB – locate any device in our network DSHIELD – Collect Firewall logs SNORT – Sensors monitoring for patterns SAFETYNET – “pull” vulnerability scanner CHECKNET – “push” vulnerability scanner REMEDY – Trouble Ticket system used by Help Desk CENTRAL SYSLOG – collects syslogs

IDS Infrastructure Campus Systems VT Dshield Dshield MySQL DB SNORT Base MySQL DB CheckNet Failure DB CheckNet WWW Nessus Scanners SafetyNet MySQL DB Remedy Trouble Ticket System CIRT Help Desk IPS SNORT Sensors Central Syslog Servers

VA Tech Defense in Depth Layer 1: Blocking Attacks: Network Based – Network Intrusion Prevention Systems – Discovery and mitigation – Firewalls – Secure Web Filtering – Secure , Anti-Spam

VA Tech Defense in Depth Layer 2: Blocking Attacks: Host Based – Personal firewalls – Spyware removal – Scan & Block/Quarantine Networks – Antivirus

VA Tech Defense in Depth Layer 3: Eliminating Security Vulnerabilities – Vulnerability management & remediation – Patch management – Configuration management – Security configuration compliance – Application security testing

Putting the Pieces Together REN-ISAC weather reports Dshield.org IPS Netflows UCONN netreg VSC scanners

You Already Belong to a “Dshield” Default setting for Windows XP Personal Firewall sends copies of your firewall logs to Why not belong to one that you know about?

Dshield – Internet Storm Center Internet Storm Center concept was developed after analysts noted that time zones provided an early warning system for some attacks Attacks originating in Asia occurred 12+ hours before hitting North America – People coming to work and logging in their computers

Dshield Similar to weather reporting infrastructure Mapping probes similar to mapping weather fronts Admins could look at the data real-time and use this info to prepare for an attack Similar to looking at a weather map to prepare for tomorrow’s weather

Weather Report vs. Internet Storm Ctr Small sensors in as many places as possible recording basic weather info Regional weather stations providing tech support, summarize and display it for local meteorologists National weather centers summarize and map regional data to provide overall weather picture Small IDS tools send logs to regional/campus site Regional site provides automated support and reporting tools Global Analysis & Coordination Centers provide early warning to network community of impending/ongoing attacks

DShield Configuration Hardware – DEC 2650, 2GB RAM, 785GB disk Software – Red Hat Enterprise – Apache WWW server – PHP – MySQL – Dshield base system from Internet Storm Center

The Good News, The Bad News Good News Dshield code is already set to do the functions shown later You do some local mods and you’re ready to go Software can handle the load Fairly universal feeds Good reporting tool Bad News Code is hard to get Basic documentation Convincing your environment to feed your dshield Need to tailor firewall configurations Needs an analyst to interpret the results

References Randy Marchany – VA Tech IT Security Lab – 1300 Torgersen Hall, VA Tech – Blacksburg, VA – ,

IDS/IPS States BLOCK NO BLOCK ALERT GOOD NO ALERT BAD GOOD if Failover BAD if not

VA Tech Defense in Depth Layer 4: Supporting Authorized Users – ID and access management – File Encryption – Secure communications – PKI – VPN – IPSEC based VPN – SSL VPN – Secure remote access

VA Tech Defense in Depth Layer 5: Tools to minimize business losses – Security information management – Business transaction integrity monitoring – Security skills development (training) – Forensic tools – Regulatory compliance tools – Business recovery – Backup