Infected Host Isolation via Packeteer PacketShaper Ben Freitag Grand Valley State University

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Separate Domains of IT Infrastructure
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Providing secure open- access networks Oliver Gorwits Oxford University Computing Services.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Advanced Internet Bandwidth and Security Strategies Fred Miller Illinois Wesleyan University.
Firewall Slides by John Rouda
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Chapter 8 PIX Firewall. Adaptive Security Algorithm (ASA)  Used by Cisco PIX Firewall  Keeps track of connections originating from the protected inside.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Honeypot and Intrusion Detection System
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
FIREWALKING. KNOW YOUR ENEMY: FIREWALLS What is a firewall? A device or set of devices designed to permit or deny network transmissions based upon a set.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 1 Hosted Network Security EarthLink Complete™ Data.
Lanxin Ma Institute of High Energy physics (IHEP) Chinese Academy of Sciences September 30, 2004 CHEP 2004, Interlaken The Security Protection System at.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
(CISCO) Self-Defending Networks Ben Sangster. Agenda (CISCO) Self-Defending Network Concept Why do we need SDN’s? Foundation of the CSDN? Endpoint Protection.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC.
NetTech Solutions Protecting the Computer Lesson 10.
Discovery 2 Internetworking Module 2 JEOPARDY K. Martin.
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
Role Of Network IDS in Network Perimeter Defense.
Cryptography and Network Security
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Kevin Watson and Ammar Ammar IT Asset Visibility.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Malware and Computer Maintenance
FIREWALL configuration in linux
Managing Secure Network Systems
Instructor Materials Chapter 9: Testing and Troubleshooting
Network Security Marshall Leitem 11/30/04
Click to edit Master subtitle style
PROJECT PRESENTATION ON INTERNET FIREWALLS PRESENTED BY THE GUARDS
Introduction to Networking
Introduction to Networking
Security in Networking
Information Security Session October 24, 2005
Ticketing Systems with RT
Intrusion Detection & Prevention
Intrusion Detection Systems (IDS)
Network hardening Chapter 14.
Presentation transcript:

Infected Host Isolation via Packeteer PacketShaper Ben Freitag Grand Valley State University

Step 1 – Detect the Infected Hosts 1. Cisco IDS Blade 2. Firewall Flows/Server Connections 3. Abnormal Traffic in the Packeteer 4. Complaints from the outside world

Cisco IDS Blade This is the preferred method We use this as a passive monitor to look for infected hosts

Firewall Flows/Server Connections Manual scanning of the connections table in our PIX Blades SMTP Related Virii show up in our mail queues Looks like has the Sasser worm:

Abnormal Traffic in the Packeteer & Complaints from the outside world These are ‘lucky catches’ – would prefer these were caught earlier Packeteer Aspect usually only works with Auto Discovery

Step 2 – Block the host At the top of our Packeteer traffic-tree we have created a Folder & Small partition for Blocking. Within the folder we’ve created several classes depending on the type of violation. These classes have a never-admit policy that redirects them to an internal web-site.

Step 2 (Continued) The Hosts are tied to the classes via a Host Lists for each category: Virus, Abuse, Unauthorized Equipment & Other. The additions can be made via CLI or via simple VB Application created for our Help Desk:

The User Experience When a ‘redirected host’ attempts to view a website off of GVSU’s network – they are greeted with a website similar to:

The User Experience (Cont.) From these websites they can request reactivation or are instructed to call the Help Desk for further assistance. The Help Desk logs these incidents as Trouble Tickets and is separately tracking offending IPs - tying them to MAC address, student name etc.

Problems Can require an enormous amount of time – especially at the beginning of the school year. Does not scale well Not proactive – no real-time way to tie users to IPs.

The Future We are evaluating several appliances to provide Network Admission Control (NAC) services such as Perfigo (Cisco) & Blue Socket.