Session 1 Framework Security Threat Responsibility and Policy Architecture Response Flow Preparation.

Slides:



Advertisements
Similar presentations
NETWORK SECURITY ADD ON NOTES MMD © Oct2012. IMPLEMENTATION Enable Passwords On Cisco Routers Via Enable Password And Enable Secret Access Control Lists.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Internet Threats Denial Of Service Attacks “The wonderful thing about the Internet is that you’re connected to everyone else. The terrible thing about.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Information Networking Security and Assurance Lab National Chung Cheng University Network Security (I) 授課老師 : 鄭伯炤 Office: Dept. of Communication Rm #112.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. NANOG 12 Interprovider.
System and Network Security Practices COEN 351 E-Commerce Security.
Computer Security and Penetration Testing
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
COEN 252: Computer Forensics Router Investigation.
Lecture 15 Denial of Service Attacks
Network security policy: best practices
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
APA of Isfahan University of Technology In the name of God.
Storage Security and Management: Security Framework
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Linux Networking and Security
Denial of Service (DoS) Attacks: A Nightmare for eCommerce Jearanai Muangsuwan Strayer University.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Security fundamentals Topic 6 Securing the network infrastructure.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
DoS/DDoS attack and defense
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-1 Lesson 10 Attack Guards, Intrusion Detection, and Shunning.
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
Quiz 2 -> Exam Topics Fall Chapter 10a - Firewalls Simple Firewall - drops packets based on IP, port Stateful - Keeps track of connections, set.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. SANS ‘98 Conference -
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Lab #2 NET332 By Asma AlOsaimi.
Working at a Small-to-Medium Business or ISP – Chapter 8
– Chapter 3 – Device Security (B)
IS4680 Security Auditing for Compliance
– Chapter 3 – Device Security (B)
Intrusion Detection system
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Session 1 Framework Security Threat Responsibility and Policy Architecture Response Flow Preparation

Emergency Response Yan Wang

Agenda  Framework & Technology  Security Monitoring  Response Measure  Case Study & Discussion

Security Threat  Threat Evolution and Trends  Threat Categories  Attacks Fundamental

Evolution of Availability Threats

Exploit Trends

Three Key Threat Categories Reconnaissance Unauthorized discovery and mapping of systems, services, or vulnerabilities Access Unauthorized data manipulation, system access, or privilege escalation Denial of Service Disable or corrupt networks, systems, or services

How do these impact ISPs? Reconnaissance – Happens all the time. It is part of the “ attack noise ” of the Internet (along with low level attacks and backscatter). Access – Break-ins on the edge of an ISP ’ s network (I.e. customer CPE equipment) can impact the ISP ’ s core. DOS – The core threat to an ISP – knocking out customers, infrastructure, and services.

Reconnaissance Methods Common commands and administrative utilities nslookup, ping, netcat, telnet, finger, rpcinfo, File Explorer, srvinfo, dumpacl Public tools Sniffers, SATAN, SAINT, NMAP, custom scripts

Network Sniffer

nmap

Why Do We Care?

Access Methods

Access Methods (cont.)

Denial of Service Methods Resource Overload Disk space, bandwidth, buffers,... Ping floods, SYN flood, UDP bombs,... Software bugs Out of Band Data Crash: Ping of death, fragmentation … Toolkits TRINOO, Tribal Flood Net and friends Distributed attacks for amplification

DoS

DoS type Resource Overload Disk space, bandwidth, buffers,... Ping floods, SYN flood, UDP bombs,... Out of Band Data Crash Ping of death,... Routing Capacity Fill up packet buffers, queues, flow tables, and processing capabilities.

DoS Sequence

DDoS

DDoS Step 1: Crack Handlers and Agents

DDoS Step 2: Install Trojan & Covert Communication Channel

DDoS Step 3: Launch the Attack

DDOS Attack Characteristics DDOS Arrays (handlers and agents) a maintenance intensive. Take time and effort to create. Launching attacks from an agent can be considered a one shot weapon. Once the attack is launched, there is a risk of traceback. If someone traces back to the agent, they could watch and wait to see if the perpetrator returns to the agent.

Attacks Fundamental

Address Resolution Protocol (ARP)

ARP Datagram

Internet Protocol

IP Header

Internet Control Message Protocol (ICMP)

User Datagram Protocol (UDP)

Transport Control Protocol

TCP Header

TCP Establishment and Termination

Packet Spoofing

IP Spoofing

TCP Blind Spoofing

TCP blind spoofing (Cont.)

ARP Based Attacks

Gratuitous ARP

Misuse of Gratuitous ARP

A Test in the Lab

A Collection of Tools to Do:

ARP spoof in Action

More on ARP Spoof

Selective Sniffing

SSL/SSH Interception

ICMP Based Attacks-smurf

Smurf ’ s Script Kiddy Tool

ICMP Unreachable Teardown

IP Based Attacks IP Normal Fragmentation

IP Normal Fragmentation (Cont.)

IP Normal Reassembly

IP Reassembly Attack

IP Reassembly Attack (Cont.)

Ping of Death Attack Denial of Service

UDP Based Attacks Looping UDP

DoS - Fraggle Attack

TCP Based Attacks SYN Attack

TCP SYN Flood

TCP Session Hijacking

TCP DDOS Reflection Attacks

Other Attacks

Incident Response Team  A Computer Security Incident Response Team (CSIRT) is a team that performs, coordinates, and supports the response to security incidents that involve sites within a defined constituency.

ISP Security ISP need to: Protect themselves Help protect their customers from the Internet Protect the Internet from their customers At any given time there are between 20 to 40 DOS/DDOS attacks on the Net

Role of Service Providers

ISP Security Actions

Policy

Avoid extensive damage to data, systems and networks due to not taking timely action to contain an intrusion Minimize the possibility of an intrusion affecting multiple systems both inside and outside an organization because staff did not know who to notify and what actions to take. Avoid negative exposure in the news media that can damage an organization ’ s public image and reputation. Avoid possible legal liability and prosecution for failure to exercise due care when systems are inadvertently or intentionally used to attack others.

Preparing to Respond Create an archive of original media, configuration files, and security-related patches for all router and host operating systems and application software versions Ensure that backup tools and procedures are working Create a database of contact information Select and install tools to use when responding to intrusions

Preparing to Respond (Cont.) Develop a plan and process to configure isolated test systems and networks when required Keep response plans, procedures and tools up to date Consider performing a practice drill to test tools and procedures

CERT Infrastructure Information Platform ( Website ) Tel, Mail Event Processing System Traffic Monitoring System Intrusion Detection System

Security System Security System Architecture Infrastructure Identity Authen Clock Synchronization Security Monitoring System Traffic Collection Traffic Analyse and Account emergency response service system information issue system Event Cooperation Leak Scan Distributing IDS IP info

CCERT Framework CERNET Committee of Experts Center CCERT Regional CCERT CCERT Expert Team Campus CCERT R&D Secretariat Interprovincial CCERT

CCERT R&DLiaisonTraining AnalysisMonitoringService Committee of Experts CCERT Framework

Response Flow ① Preparation ② Detection ③ Analysis ④ Decision ⑤ Control ⑥ Announcement ⑦ Statistic

Response Flow helpdesk Investigation NOC Traffic analyzing and monitoring Signature based IDS CERNET management CNCERT/CC Other IRTs Users Administrators tools patches Attack signature Incident database Whois info advisories Common Event Important Event

What Do ISPs Need to Do?

Components of Response  Analyze the event  Contain the incident  Eliminate intruder access  Restore operations  Update procedures based on lessons learned

Analyze Event What systems were used to gain access What systems were accessed by the intruder What information assets were available to those systems? What an intruder did after obtaining access What an intruder is currently doing

Contain the Intrusion Gain control of the systems involved Attempt to deny an intruder access to prevent further damage Monitor systems and networks for subsequent intruder access attempts

Eliminate Intruder Access Change all passwords on all systems accessed Restore system and application software and data, as needed What other systems might be vulnerable?

Restore Operations Validate the restored system Monitor systems and networks Notify users and management that systems are again operational

Other Build the Communications Channels to your Peers and Customers Build the Communications Channels to your Vendors

Preparation Securing the Router and the Management Plane Securing the Network and Data Plane Securing the Routing Protocol and Control Plane Anycast as a Security Tool Using IP Routing as a Security Tool

Terminology

Securing the Router and the Management Plane

Routers do get Directly Attacked

Router Security

Global Services You Turn OFF

Interface Services You Turn Off

Cisco Discovery Protocol

Use Enable Secret

Securing Access to the Router

RISK Assessment

Lock Down the VTY and Console Ports

VTY and Console Port Timeouts

VTY Security

Encrypt the Traffic from Staff to Device

SSH Support in ISP Code

Cisco IOS SSH Configuration

SSH Server Implementation

SSH Server Configuration Prerequisites

SSH Server Configuration

SSH Server Configuration (cont.)

SSH Server Configuration Summary

SSH Client Access

SSH Terminal-Line Access

Secure Copy (SCP)

Staff AAA to get into the Device

What is ISP AAA and ISP AA?

Separate Security Domains!