Download presentation
Presentation is loading. Please wait.
Published byMargery Griffin Modified over 9 years ago
1
Session 1 Framework Security Threat Responsibility and Policy Architecture Response Flow Preparation
2
Emergency Response Yan Wang 2006.09
3
Agenda Framework & Technology Security Monitoring Response Measure Case Study & Discussion
4
Security Threat Threat Evolution and Trends Threat Categories Attacks Fundamental
5
Evolution of Availability Threats
6
Exploit Trends
7
Three Key Threat Categories Reconnaissance Unauthorized discovery and mapping of systems, services, or vulnerabilities Access Unauthorized data manipulation, system access, or privilege escalation Denial of Service Disable or corrupt networks, systems, or services
8
How do these impact ISPs? Reconnaissance – Happens all the time. It is part of the “ attack noise ” of the Internet (along with low level attacks and backscatter). Access – Break-ins on the edge of an ISP ’ s network (I.e. customer CPE equipment) can impact the ISP ’ s core. DOS – The core threat to an ISP – knocking out customers, infrastructure, and services.
9
Reconnaissance Methods Common commands and administrative utilities nslookup, ping, netcat, telnet, finger, rpcinfo, File Explorer, srvinfo, dumpacl Public tools Sniffers, SATAN, SAINT, NMAP, custom scripts
10
Network Sniffer
11
nmap
13
Why Do We Care?
15
Access Methods
16
Access Methods (cont.)
17
Denial of Service Methods Resource Overload Disk space, bandwidth, buffers,... Ping floods, SYN flood, UDP bombs,... Software bugs Out of Band Data Crash: Ping of death, fragmentation … Toolkits TRINOO, Tribal Flood Net and friends Distributed attacks for amplification
18
DoS
19
DoS type Resource Overload Disk space, bandwidth, buffers,... Ping floods, SYN flood, UDP bombs,... Out of Band Data Crash Ping of death,... Routing Capacity Fill up packet buffers, queues, flow tables, and processing capabilities.
20
DoS Sequence
21
DDoS
22
DDoS Step 1: Crack Handlers and Agents
23
DDoS Step 2: Install Trojan & Covert Communication Channel
24
DDoS Step 3: Launch the Attack
25
DDOS Attack Characteristics DDOS Arrays (handlers and agents) a maintenance intensive. Take time and effort to create. Launching attacks from an agent can be considered a one shot weapon. Once the attack is launched, there is a risk of traceback. If someone traces back to the agent, they could watch and wait to see if the perpetrator returns to the agent.
26
Attacks Fundamental
27
Address Resolution Protocol (ARP)
28
ARP Datagram
29
Internet Protocol
30
IP Header
31
Internet Control Message Protocol (ICMP)
32
User Datagram Protocol (UDP)
33
Transport Control Protocol
34
TCP Header
35
TCP Establishment and Termination
36
Packet Spoofing
37
IP Spoofing
38
TCP Blind Spoofing
39
TCP blind spoofing (Cont.)
40
ARP Based Attacks
41
Gratuitous ARP
42
Misuse of Gratuitous ARP
43
A Test in the Lab
44
A Collection of Tools to Do:
45
ARP spoof in Action
46
More on ARP Spoof
47
Selective Sniffing
48
SSL/SSH Interception
51
ICMP Based Attacks-smurf
52
Smurf ’ s Script Kiddy Tool
53
ICMP Unreachable Teardown
54
IP Based Attacks IP Normal Fragmentation
55
IP Normal Fragmentation (Cont.)
56
IP Normal Reassembly
57
IP Reassembly Attack
58
IP Reassembly Attack (Cont.)
59
Ping of Death Attack Denial of Service
61
UDP Based Attacks Looping UDP
62
DoS - Fraggle Attack
63
TCP Based Attacks SYN Attack
64
TCP SYN Flood
66
TCP Session Hijacking
67
TCP DDOS Reflection Attacks
71
Other Attacks
72
Incident Response Team A Computer Security Incident Response Team (CSIRT) is a team that performs, coordinates, and supports the response to security incidents that involve sites within a defined constituency.
73
ISP Security ISP need to: Protect themselves Help protect their customers from the Internet Protect the Internet from their customers At any given time there are between 20 to 40 DOS/DDOS attacks on the Net
74
Role of Service Providers
77
ISP Security Actions
78
Policy
79
Avoid extensive damage to data, systems and networks due to not taking timely action to contain an intrusion Minimize the possibility of an intrusion affecting multiple systems both inside and outside an organization because staff did not know who to notify and what actions to take. Avoid negative exposure in the news media that can damage an organization ’ s public image and reputation. Avoid possible legal liability and prosecution for failure to exercise due care when systems are inadvertently or intentionally used to attack others.
80
Preparing to Respond Create an archive of original media, configuration files, and security-related patches for all router and host operating systems and application software versions Ensure that backup tools and procedures are working Create a database of contact information Select and install tools to use when responding to intrusions
81
Preparing to Respond (Cont.) Develop a plan and process to configure isolated test systems and networks when required Keep response plans, procedures and tools up to date Consider performing a practice drill to test tools and procedures
82
CERT Infrastructure Information Platform ( Website ) Tel, Mail Event Processing System Traffic Monitoring System Intrusion Detection System
83
Security System Security System Architecture Infrastructure Identity Authen Clock Synchronization Security Monitoring System Traffic Collection Traffic Analyse and Account emergency response service system information issue system Event Cooperation Leak Scan Distributing IDS IP info
84
CCERT Framework CERNET Committee of Experts Center CCERT Regional CCERT CCERT Expert Team Campus CCERT R&D Secretariat Interprovincial CCERT
85
CCERT R&DLiaisonTraining AnalysisMonitoringService Committee of Experts CCERT Framework
86
Response Flow ① Preparation ② Detection ③ Analysis ④ Decision ⑤ Control ⑥ Announcement ⑦ Statistic
87
Response Flow helpdesk Investigation NOC Traffic analyzing and monitoring Signature based IDS CERNET management CNCERT/CC Other IRTs Users Administrators tools patches Attack signature Incident database Whois info advisories Common Event Important Event
88
What Do ISPs Need to Do?
89
Components of Response Analyze the event Contain the incident Eliminate intruder access Restore operations Update procedures based on lessons learned
90
Analyze Event What systems were used to gain access What systems were accessed by the intruder What information assets were available to those systems? What an intruder did after obtaining access What an intruder is currently doing
91
Contain the Intrusion Gain control of the systems involved Attempt to deny an intruder access to prevent further damage Monitor systems and networks for subsequent intruder access attempts
92
Eliminate Intruder Access Change all passwords on all systems accessed Restore system and application software and data, as needed What other systems might be vulnerable?
93
Restore Operations Validate the restored system Monitor systems and networks Notify users and management that systems are again operational
94
Other Build the Communications Channels to your Peers and Customers Build the Communications Channels to your Vendors
95
Preparation Securing the Router and the Management Plane Securing the Network and Data Plane Securing the Routing Protocol and Control Plane Anycast as a Security Tool Using IP Routing as a Security Tool
96
Terminology
97
Securing the Router and the Management Plane
98
Routers do get Directly Attacked
100
Router Security
101
Global Services You Turn OFF
103
Interface Services You Turn Off
105
Cisco Discovery Protocol
108
Use Enable Secret
109
Securing Access to the Router
110
RISK Assessment
111
Lock Down the VTY and Console Ports
112
VTY and Console Port Timeouts
113
VTY Security
115
Encrypt the Traffic from Staff to Device
116
SSH Support in ISP Code
117
Cisco IOS SSH Configuration
118
SSH Server Implementation
119
SSH Server Configuration Prerequisites
120
SSH Server Configuration
121
SSH Server Configuration (cont.)
122
SSH Server Configuration Summary
123
SSH Client Access
124
SSH Terminal-Line Access
125
Secure Copy (SCP)
127
Staff AAA to get into the Device
128
What is ISP AAA and ISP AA?
129
Separate Security Domains!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.