Incident Object Description and Exchange Format TF-CSIRT at TERENA IODEF Editorial Group Jimmy Arvidsson Andrew Cormack Yuri Demchenko Jan Meijer.

Slides:



Advertisements
Similar presentations
Experimental Internet Resource Allocations Philip Smith, Geoff Huston September 2002.
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E IEPG March 2000 APNIC Certificate Authority Status Report.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Clearinghouse for Incident Handling Tools TF-CSIRT Seminar January 18, 2001 Barcelona Yuri Demchenko.
Managed Incident Lightweight Exchange (MILE) Overview and Participation Kathleen Moriarty Global Lead Security Architect EMC Corporate CTO Office.
© 2003 Carnegie Mellon University slide 1 Building CSIRT Capabilities and the State of the Practice Georgia Killcrece CSIRT Development Team CERT ® Training.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
3GPP Presence Requirements Requirements for Presence Service based on 3GPP specifications and wireless environment characteristics draft-kiss-simple-presence-wireless-
Chapter 1 – Introduction
Requirements for Format for INcident data Exchange (FINE) draft-ietf-inch-requirements-00.txt INCH WG, IETF56 March 19, 2003 Yuri Demchenko Glenn Mansfield.
INCH Requirements (2) IETF INCH-WG, March.2003 Glenn M. Keeni/Yuri Demchenko.
INCH Requirements IETF Interim meeting, Uppsala, Feb.2003.
Applied Cryptography for Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
TERENA News Update TERENA User Services related Activity IETF50, Minneapolis IETF User Services WG Yuri Demchenko, TERENA
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
EGEE is a project funded by the European Union under contract IST JRA3 - Incident Response General Issues Yuri Demchenko MWSG2 June 16, 2004.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
Setting up a Grid-CERT Experiences of an academic CSIRT TERENA Networking Conference May, Lyngby, Denmark Klaus Möller DFN-CERT Services GmbH.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
IODEF Design principles and IODEF Data Model Overview IODEF Data Model and XML DTD pre-draft Version 0.03 TERENA IODEF WG Yuri Demchenko.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Possible elements of the technical standards Pre-sessional consultations on registries Bonn, 2-3 June 2002 Andrew Howard UNFCCC secretariat
GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center
MASS / DKIM BOF IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass MIPA.
IODEF Incident Data Exchange Format Rhodes, 8 June 2004 Jan Meijer.
Chapter 21 Distributed System Security Copyright © 2008.
IODEF and Extended Incident Handling Framework TF-CSIRT Seminar May 31, 2001 Ljubljana.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
Incident Object Description and Exchange Format
Washington, DC December 6, 2006 Formula and Process for Nonbeverage Product (TTB F ) – Briefing for Automated Form Completion.
Relations between IODEF and IDMEF Based on IDMEF XML DTD and Data Model Analysis TERENA ITDWG IODEF Editorial Group Yuri Demchenko.
Doc.: IEEE /0691r0 Submission May 2011 Dorothy Stanley, Aruba NetworksSlide 1 IEEE IETF Liaison Report Date: Authors:
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
ITEM #1 reference to retrieval and archiving is removed.
Fonkey Project Update: Target Applications TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Relations between IODEF and IDMEF Based on IDMEF XML DTD and Data Model Analysis TERENA ITDWG IODEF Editorial Group Yuri Demchenko.
IS3220 Information Technology Infrastructure Security
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
INCident Handling BOF (INCH) Thursday, March IETF 53.
Doc.: IEEE /0085r1 Submission June 2010 Tuncer Baykas, NICTSlide TG1 and System Design Document Notice: This document has been prepared.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Dhc WG 3/2/2004, IETF 59, Seoul. 3/2/2004dhc WG - IETF 59, Seoul2 Agenda Administrivia, Agenda bashing Ralph Droms 05 minutes DHCP Option for Proxy Server.
Building Global CSIRT Capabilities Barbara Laswell, Ph. D
Incident Object Description and Exchange Format
Working at a Small-to-Medium Business or ISP – Chapter 8
56th IETF syslog WG Chair: Chris Lonvick
Cryptography and Network Security
INCH Requirements Glenn Mansfield Keeni Cyber Solutions Inc
draft-ipdvb-sec-01.txt ULE Security Requirements
IS4550 Security Policies and Implementation
CVE.
TG1 and System Design Document
Incident Object Description and Exchange Format
Presentation transcript:

Incident Object Description and Exchange Format TF-CSIRT at TERENA IODEF Editorial Group Jimmy Arvidsson Andrew Cormack Yuri Demchenko Jan Meijer

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _2 Outlines  TERENA TF-CSIRT and Incident Taxonomy and Description WG - History  IODEF Documents u Discussion of IODEF Requirements Draft – draft-terena-itdwg-iodef-requirements-00.txt u IODEF Model u IODEF XML DTD  How to proceed? u Relation to IDWG u Pilot implementation between CSIRTs (primarily European)  Other documents/areas of interest u Evidence Collection and Archiving (currently - d raft-ietf-grip-prot-evidence- 01.txt) and further standardisation

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _3 Incident Taxonomy and Description WG at TERENA TF-CSIRT - History  Incident Taxonomy and Description WG u Established at BoF and Seminar at 3 rd CERT-COORD meeting on May , 2000 in Vienna –Webpage and charter - –mailing list - –Archive - u Seminar on IODEF – September 28, 2000, Paris u Next meeting – January 18-19, 2001, Barcelona  IODEF BoF at 12 th FIRST Conference in Chicago u 30 attendees u established mailing list u Archive -

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _4 IODEF purposes A uniform incident classification enables applications such as:  uniform statistic generation and exchange, for both domestic use and exchange of data between teams. Over time a distributed incident statistics infrastructure can evolve  trend-analyses for reoccurrence of incidents, victims, attackers, etc.  trend-analyses for relations between scans and attacks and thus begin working on pro-active incident response  uniform internal incident storage  incident handling between teams made easier (only one team needs to classify and analyze the complete incident, the other team can re-use this data)  uniform incident reporting by victims to CSIRTs Main IODEF actors are CSIRTs – not IDS

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _5 IODEF Documents Best Current Practice on Incident classification and reporting schemes.  Version Incident Object Description and Exchange Format Requirements  Submitted as Internet-Draft Incident Object Data Model  To be drafted before January 18, 2001 Incident Object Elements Description and XML Data Type Description (XML DTD)  To be drafted before January 18, 2001

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _6 Incident Object Description and Exchange Format Requirements - draft-terena-itdwg-iodef-requirements-00.txt 1. Abstracts 2. Conventions used in this document 3. Introduction 3.1. Rationale 3.2. Incident Description Terms 4. General Requirements 5. Description Format 6. Communications Mechanisms Requirements 7. Message Contents 8. IODEF extensibility 9. Security considerations 10. Reference

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _ Incident Description Terms Attack Attacker CSIRT Damage Event Evidence Incident Impact Target Victim Vulnerability Other terms: alert, activity, IDS, Security Policy, etc.

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _8 4. General Requirements 4.1. The IODEF shall reference and use previously published RFCs where possible.

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _9 5. Description Format 5.1. IODEF format shall support full internationalization and localization The format of IODEF must support modularity in Incident description to allow aggregation and filtering of data 5.3. IODEF must support the application of an access restriction policy attribute to every element.

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _10 6. Communications Mechanisms Requirements 6.1. IODEF exchange will normally be initiated by humans using standard communication protocols, for example, , WWW/HTTP, LDAP.

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _11 7. Message Contents 7.1. The root element of the IO description should contain a unique identification number (or identifier), IO purpose and default permission level 7.2. The content of the IODEF description should contain the type of the attack if it is known. It is expected that this type will be drawn from a standardized list of events; a new type of event may use a temporary implementation-specific type if the event type has not yet been standardized The IODEF description must be structured such that any relevant advisories, such as those from CERT/CC, CVE, can be referenced.

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _12 7. Message Contents - Continue 7.4. IODEF may include a detailed description of the attack that caused the current Incident The IODEF description must include or be able to reference additional detailed data related to this specific underlying event(s)/activity, often referred as evidence The IODEF description MUST contain the description of the attacker and victim The IODEF description must support the representation of different types of device addresses, e.g., IP address (version 4 or 6) and Internet name.

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _13 7. Message Contents - Continue 7.8. IODEF must include the Identity of the creator of the Incident Object (CSIRT or other authority). This may be the sender in an information exchange or the team currently handling the incident The IODEF description must contain an indication of the possible impact of this event on the target. The value of this field should be drawn from a standardized list of values if the attack is recognized as known, or expressed in a free language by responsible CSIRT team member The IODEF must be able to state the degree of confidence in the report information The IODEF description must provide information about the actions taken in the course of this incident by previous CSIRTs.

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _14 7. Message Contents - Continue The IODEF must support reporting of the time of all stages along Incident life-time Time shall be reported as the local time and time zone offset from UTC. (Note: See RFC 1902 for guidelines on reporting time.) The format for reporting the date must be compliant with all current standards for Year 2000 rollover, and it must have sufficient capability to continue reporting date values past the year Time granularity in IO time parameters shall not be specified by the IODEF.

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _15 7. Message Contents - Continue The IODEF should support confidentiality of the description content. The selected design should be capable of supporting a variety of encryption algorithms and must be adaptable to a wide variety of environments The IODEF should ensure the integrity of the description content. The selected design should be capable of supporting a variety of integrity mechanisms and must be adaptable to a wide variety of environments The IODEF should ensure the authenticity and non-repudiation of the message content.

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _16 7. Message Contents - Continue The IODEF description must support an extension mechanism which may be used by implementers. This allows future implementation-specific or experimental data. The implementer MUST indicate how to interpret any included extensions The semantics of the IODEF description must be well defined.

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _17 8. IODEF extensibility 8.1. The IODEF itself MUST be extensible. It is essential that when the use of new technologies and development of automated Incident handling system demands extension of IODEF, the IODEF will be capable to include new information.

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _18 Incident Object Data Model forces/tf-csirt/i- taxonomy/docs/iodef- datamodelv01.html

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _19 IODEF XML Description Example xmldtdv01example.html <incident incid=# msgid=# status={alert, handling/processing, communication/exchange, archive, closed, statistics} permission={public, restricted, internal, ???}> data modification information server $$$$ $$$Time block$$$$ password list compromised all users advised to change passwords

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _20 IODEF XML Description Example - Continue $$$ $$$$ $$$$$ $$$$$ $$$ $$$$ ######### ###########

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _21 IODEF std process – How to proceed further? Best Current Practice on Incident classification and reporting schemes. - Version 1  May be updated as TF-CSIRT internal document 3 documents on Incident Object Description and Exchange Format  To be developed and submitted to IETF u Which WG – IDWG O.K.? Evidence Collection and Archiving at GRIP WG  Problems of current I-D - draft-ietf-grip-prot-evidence-01.txt u No common format defined –No commitment from GRIP  Needs some study of local legislation u Privacy and re-enforcement Implementation  Planned between few European CSIRTs

©2000. Yu.Demchenko. TERENA Incident object Description and Exchange Format Slide2 _22 IDMEF Documents  Currently on the IETF IDWG std process u IDMEF Requirements – withdrawn from I-D ??? u IDMEF Data Model u IDMEF XML DTD u IMDEF ANS.1 MIBII format u Intrusion Alert Protocol  IDMEF is for Intrusion Detection Systems u Main actors - IDS u Root element – Alert –Short life history u Data collected automatically