cecr (“seeker”) - centralized event correlation and response ramon kagan, chris russel york...

36
CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Upload: aditya-vanstone

Post on 14-Dec-2015

225 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

CECR (“Seeker”) - Centralized Event Correlation and Response

Ramon Kagan, Chris Russel

York University, Toronto

Page 2: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Agenda

• How and why Automated Incident Response enhances an Information Security program

• Initial Phase: Detection and Compliance systems

• Implementation of Centralized Event Correlation and Response (CECR) system– Detection and Compliance

– Correlation and Classification

– Automated Response

Page 3: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Context: York University

• Located in Toronto

• Canada’s third largest University

– 60,000+ students

– 10,000+ staff and faculty

– 25,000+ network drops

• In 2003, 2 FT information security staff positions (now 3)

Page 4: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

“Traditional” Incident Response

• Preparation

• Identification

• Containment

• Eradication

• Recovery

• Lessons Learned

(From SANS Step-by-Step Incident Response)

Page 5: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

August 2003

Page 6: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Short-Circuited Incident Response

• Information Security becomes “Worm Management Services”

• No time for normal response procedures

• We adapted and made it through, but…

– Is this really security?

– What are we missing in the noise and mayhem of constant worm attacks?

Page 7: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Prevention

• Don’t let these things happen in the first place

• Lots of products to buy

– Firewalls, IPS, Anti-Virus, Silver Bullets, etc.

• These are all good things but not without their challenges

Page 8: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Prevention Challenges in the Academic Environment

• Porous and increasingly fuzzy perimeter– Dialup, Wireless, VPN, Mobile devices, etc.

Where does the firewall go now?

• Political hurdles to implement controls– I want my dancing pigs!

• Increase in operational management overhead

• $$$++

Page 9: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Detection and Response are Essential Too

• Why?– Prevention measures require increasing amounts of

money and strong policy, diminishing returns

– They cannot prevent everything

– What if they fail?

• How useful is a bank vault without an alarm and police response?– Ultimately it can only buy time

Page 10: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Automated Detection and Response

• Improving detection and response speed

– Makes best use of and complements existing prevention measures

– Better ROI than additional prevention?

– Allows a 24/7/265 response absent staff

– Frees up incident handlers to focus on less obvious/potentially more serious matters

Page 11: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Where Automated Detection and Response Matter• BotNets

– compromised host waits for commands

– Detect it first and take it out before it spreads behind your perimeter

• Spyware (Marketscore, etc)

• Leveraged/Low and Slow Hacking– Automated correlation can help detect things

otherwise below the radar

• Large virus/worm infestation– Can scale to greatly assist with a future large-scale

event

Page 12: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Detection

• Gather as much information as possible from anywhere you can

• Syslog

• Flow logs

• IDS/IPS/Firewall logs

• Honeypots

Page 13: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Syslog

• Login attempts

• Port scans

• Local exploits

• Anti-virus alerts

Page 14: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Flow logs

• Network traffic patterns

• Scanning detection

• Anomaly detection

• Historical context and forensic information

Page 15: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

IDS/IPS/Firewall Logs

• Scanning

• Invalid access

• Hacking attempts

Page 16: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Honeypots

• Great for internal detection

– No need for expensive hardware

– much cheaper than gigabit (multi-gig?) IDS sensors at every router

• By definition, very few false positives

• Darknets or Honeynets

Page 17: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Compliance

• Agent-based compliance detection

• Network-side vulnerability scanning– Nessus or other commercial tools

– NOXscan: FAST scanner for Microsoft vulnerabilities used by many worms (MS04-007, MS04-011, MS05-039)

http://infosec.yorku.ca/tools/

Page 18: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Correlation and Reaction

• Map events to an IP or MAC

• Map IP or MAC to user, support group, network drop, etc.

• Initiate a response as appropriate to the incident type, severity and context

• Do this very fast!

• Enter CECR… large drop in incidents within 3 months after implementation

Page 19: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Implementation

Page 20: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Lots of info, so what

• All this great information being gathered

• How to sift through it

• How to react to it

• How to record our actions

Page 21: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Manual Handling

• Manual correlation

• Manually enter each incident (ELOG)

• Basic reporting available

• Very time consuming to enter all the tickets

Page 22: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Manual Handling

• Needed to increase correlation speed

• Needed better reporting

• Needed a way to distinguish incident types more easily

• Needed a tool that portrayed a process

• Needed a way to enter incidents automatically

Page 23: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Impetus for Change

• In a single word - LAZINESS

• September 2004 - Outbreak of virus activity on our dialup network

• Two problems– Mapping users to IP/Mapping IP to network segment

- time consuming

– Entering all those tickets - even more time consuming and oh the pain

Page 24: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

CECR v1.0

• Shell script designed to accomplish two menial tasks

– Correlate incidents to users

– Submit tickets to RTIR automagically

• Great first step for dealing with mass breakouts

– Allowed for initial automation of specific triggers

Page 25: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

CECR v1.0

• Limitations– Not abstracted and difficult to manipulate for

extension

– Haphazard script to ease the pain

– Wasn’t really designed for more central usage

– Unable to effectively take actions based on incident severity

Page 26: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

CECR v2.0

• Rewritten in Perl

• Designed for extension and real-time updating

• Able to conduct many more tasks– Different actions depending on severity

– Plugins can be added at any time

– Exclusions now possible

– Repeat notification removed - limited to once daily

– Automated contact to end-users/support groups

Page 27: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Framework of CECR v2.0

Central Processor

Sensors

Correlation Plugins

Action Plugins

Logging and Ticket Creation

Automated Notification

Reporting Process

Page 28: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Components of CECR v2.0

• Reporting Process

– Wrapping scripts around some IDS sources

• Argus not “tail-able”

• Vulnerability scanner results

– Logsurfer+ for real-time processing of others

• Pix log trends - context cognition

• snort

Page 29: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Components of CECR v2.0

• Central Process

– Perl script - the coordinator

• Param: incident type, IP, time, port (optional)

• Two configuration files– Actions - what action to take per incidentIncident type:Action:RTIR Category:Reason

Tag:Email file:Exclusion List– Contacts - whom to contact for non-user accessRegex domain:email:RTIR support group

Page 30: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Components of CECR v2.0

• Correlation plugins

– 6 plugins

– Correlate IP (depending on connection):

• Username

• MAC

• Port

• TTY (dialup)

Page 31: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Components of CECR v2.0

• Action Plugins

– 5 plugins

– Conduct various tasks including

• Account lockout

• Deregistration

• Disconnection from network

• Quarantine

Page 32: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Components of CECR v2.0

• Automated notification

– Template based emails by incident type

– Contact either username (LDAP verified) or contact listed in contacts file

– Notification sent to infosec group of incident

• In event of no contact information, infosec email states as such

Page 33: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Components of CECR v2.0

• Logging & Ticket Creation

– All actions and decisions are logged via syslog for audit purposes

– E-mail notification to RTIR to automagically create tickets in appropriate queues

– Time based record of event maintained to limit repeat notification

Page 34: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

RTIR

• CERT sponsored add-on to RT from Best Practical - opensource with support availability

• Queues helped define process

• Manual insertion still required, but contributions existed for e-mail ticket creation - the light!!

Page 35: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

CECR v2.0

• Net Results– Extendable framework for ever changing

landscape

– Force multiplier allowing handlers to worry about more significant events

– 24x7x365 monitoring of known issues

– Automated tracking of events - allows for statistics

Page 36: CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Questions?