Copyright Justin C. Klein Security Intelligence From What and Why to How.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Protecting Cyber-TA Contributors: Risks and Challenges Vitaly Shmatikov The University of Texas at Austin.
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
©2009 Justin C. Klein Keane PHP Code Auditing Session 3 – Tools of the Trade & Crafting Malicious Input Justin C. Klein Keane
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 SIEM Based Intrusion Detection Jim Beechey March 2010 GSEC Gold, GCIA Gold, GCIH,
System Security Scanning and Discovery Chapter 14.
Wireless and Switch Security NETS David Mitchell.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Copyright 2010 Justin C. Klein Keane Using Kojoney Open Source Low Interaction Honeypot to Develop Defensive Strategies and Fingerprint Post-Compromise.
Assessing Vulnerabilities ISA 4220 Server Systems Security James A. Edge Jr., CISSP, CISM, CISA, CPTE, MCSE Sr. Security Analyst Cincinnati Bell Technology.
Deploying Tools for Cleaning Personal Information University of Pennsylvania School of Arts and Sciences Justin C. Klein Keane Sr. Information Security.
Computer Security: Principles and Practice
IBM Security Network Protection (XGS)
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Lecture 11 Intrusion Detection (cont)
Network security policy: best practices
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
Presented By: Shashank Bhadauriya Varun Singh Shakti Suman.
Website Hardening HUIT IT Security | Sep
China Science & Technology Network Computer Emergency Response Team Botnet Detection and Network Security Alert Tao JING CSTCERT,CNIC.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
Copyright Justin C. Klein HECTOR Security Intelligence Platform Developed for: University of Pennsylvania School of Arts & Science.
Drupal Security Securing your Configuration Justin C. Klein Keane University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Honeypot and Intrusion Detection System
Web Application Firewall (WAF) RSA ® Conference 2013.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Chapter 5: Implementing Intrusion Prevention
AppSec USA 2014 Denver, Colorado CMS Hacking 101 Hacking and Securing Popular Open Source Content Management Systems.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Network Security: Lab#5 Port Scanners and Intrusion Detection System
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Securing Your Enterprise with Enterprise Manager 10g Amir Najmi Principal Member of Technical Staff System Management Products Oracle Corporation Session.
Microsoft Management Seminar Series SMS 2003 Change Management.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
Integrated Mobile Marketing Platform Emergic mConnector Integrated -Mobile Marketing Platform Presented By: Sales Person Name ID: Mobile:
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
IS3220 Information Technology Infrastructure Security
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
INTRODUCTION Sam Wachira
IDS Intrusion Detection Systems
Click to edit Master subtitle style
Copyright Justin C. Klein Keane
Intrusion Detection Systems (IDS)
Intrusion Prevention Systems
Intrusion Detection system
Presentation transcript:

Copyright Justin C. Klein Security Intelligence From What and Why to How

Copyright Justin C. Klein What is Security Intelligence? Business intelligence principles applied to security data Apply data to decision making More than just metrics – Soft data points included as well Security data abounds – Making useful decisions based on data is tough

Copyright Justin C. Klein Sample Sources of Data Host based intrusion detection alerts Darknet data (network traffic) Port scans Honeypots (attempted logins, attack toolkits, etc.) Vulnerability scans Public vulnerability alerts and disclosures System event logs Incident response reports Etc.

Copyright Justin C. Klein Why  Anecdotal evidence often guides security  “Best practice” is often indefensible  Change your password every 60 days - why???  Security isn't really engineering, or science  No hard and fast rules (or laws)  Analysis should guide decision making  Security intelligence gathers data points to support analysis

Copyright Justin C. Klein Security Intelligence vs. Vulnerability Remediation Traditional InfoSec relies on vulnerability scanning Ideally: – Find problems, fix them, find more, rinse, repeat In reality: – Scanner generates a report full of extraneous and incorrect details, no reliable severity or impact – report ignored – rinse, repeat

Copyright Justin C. Klein Why Vuln Centric Security Fails Vulnerability scanning is “dumb” Asset owners don't request scans Defaults to an enforcement approach Vulnerability reports are massive and provide little guidance Ultimately reports get filed in the trash bin

Copyright Justin C. Klein Security Intelligence Goals Add perspective and analysis to security recommendations Provide a good case for change requests Guide targeted campaigns to remediate vulnerabilities Show good ROI for efforts Maximize your limited staff resources Encourage compliance

Copyright Justin C. Klein Use Case #1 Vulnerability disclosed in a well known service Look for spikes in scanning for that service on darknet sensors Quickly identify all machines in the environment running that service Build a contact list and alert admins to patch Implement targeted vulnerability scanning to track remediation

Copyright Justin C. Klein Use Case #2 Attacker observed (malicious IP identified) Query all data sources for other evidence of activity from that IP Darknet probes, honeypot data, IDS logs, etc. Look for attack profile from data sources Alert admins of machines that fit the particular profile Identify vulnerable machines Potentially uncover compromises

Copyright Justin C. Klein Issues with Security Intelligence Problems of big data will crop up quickly Scale complicated development, deployment and debugging Much of the effort of SI will be spent on middleware Interesting data only emerges when all data is aggregated Getting access to other folks' data will be challenging Deliberate initial planning pays off – altering a table of 80 million rows is painful!

Copyright Justin C. Klein Specific Implementation - HECTOR HECTOR is our solution for security intelligence

Copyright Justin C. Klein Open Source HECTOR is based entirely on open source technologies Runs best on a LAMP stack Uses PHP, Perl, Python, MySQL, iptables, Kojoney, OSSEC, NMAP, and more... More info and download at: hector

Copyright Justin C. Klein Principles Guiding Development SAS has no access to network data for NIDS Over 15,000 internet addressable IP's Asset management was a huge challenge Vulnerability disclosure mitigation was ad-hoc Multiple different security data sources (darknet, honeypots, HIDS logs, etc.) were scattered over different systems Needed a way to query data across sources and guide intelligent security decision making

Copyright Justin C. Klein Fundamentals No network span ports or taps required! HECTOR is designed to be an augmented asset management platform All data is tied to hosts Each host includes contact information for users as well as technical support HECTOR designed to allow supplementary data to be linked with hosts, from port scans to incident histories to vulnerability reports

Copyright Justin C. Klein How It Works (Basics) MySQL database aggregates data sources Web front end for querying and reporting Access control via CoSign (or fallback) Hosts are assigned to support groups, support groups assigned a contact address Nightly NMAP scans updates host profiles Vulnerability scan data added to the database HECTOR is extensible – add your own scans

Copyright Justin C. Klein Currently Supports Data Sources OSSEC host based intrusion detection logs Kojoney based SSH honeypots Iptables based darknet sensors NMAP port scans Vulnerability scans (Nikto, Nessus, etc.) Security news outlets (RSS feeds, vulnerability announcements, etc.)

Copyright Justin C. Klein Summary Screen

Copyright Justin C. Klein Intrusion Detection Summary

Copyright Justin C. Klein Alerts Summary

Copyright Justin C. Klein Host Summary

Copyright Justin C. Klein Search for Malicious IP

Copyright Justin C. Klein Sample Report

Copyright Justin C. Klein Scan Schedule

Copyright Justin C. Klein Asset Management

Copyright Justin C. Klein System Configuration

Copyright Justin C. Klein Lessons Learned Internal software development takes a really long time Logistical considerations are always the most difficult challenge As soon as software enters a useful beta it tends to migrate rapidly to essential service Bug fixes tend to weight towards feature use Simple NMAP scans are never simple Remediation tracking is as difficult as vulnerability identification Querying large data sets takes careful planning

Copyright Justin C. Klein Thank

Copyright Justin C. Klein Links to Resources HECTOR download - hector hector NMAP - OSSEC - Kojoney - Kippo - Rsyslog -