network behavioral anomaly detection dragon securtiy ...download.zcu.cz/public/prezentace/seminare...

37
“There is nothing more important than our customers” Network Behavioral Anomaly Detection Dragon Securtiy Command Console – DSCC Zdeněk Pala ECIE certified engineer ECI certified instructor 26.5.2010

Upload: others

Post on 06-Apr-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

“There is nothing more important than our customers”

Network Behavioral Anomaly DetectionDragon Securtiy Command Console – DSCC

Zdeněk Pala

ECIE certified engineer ECI certified instructor

26.5.2010

Page 2: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved. 2

IDS Technologies

How can an intrusion be identified?

• Pattern Matching:

- Look for patterns in the data filed that indicate an attack

- Signatures

• Protocol Analysis:

- Look for header values that indicate an attack

- Do the headers match the RFC

• Behavior Based:

- Does the current traffic pattern match the normal pattern

- Flow Based

Page 3: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved. 3

Network Behavior Anomaly Detection (NBAD)

• Works with flow data

• Constantly monitors traffic to detect changes in

network traffic flows

• Optimal for detection of Day-Zero attacks

• Can be adjusted to customers special needs

3

Page 4: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved. 4

NBAD methods

• Behavior sentries

- Checks for volume changes in behavior that occurs in regular seasonal patterns

- If a behavior change occurs, an alarm will be generated

- Behavioral sentries can be deployed in environments with consistent or repetive amounts of traffic

- Example: Typically a mail server communicates with 100 hosts in the night, suddenly it starts communicating with 1000 hosts instead

• Anomaly sentries

- Checks for activity changes of the entities inside a view

- Detects new or unknown traffic or changes in the amount of time an object is active

- If an anomaly is detected, an alarm will be generated

- Behavioral sentry -> volume based

- Anomaly sentry -> activity based (% changes)

- Example: A monitored host inside a network would start to communicate all the time with an external network instead of 16% of its time

4

Page 5: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved. 5

• Threshold sentries

- Monitors traffic and objects that exceeds a configured threshold

- Useful for monitoring utilized bandwith or number of clients connected to a server

- Example: Create an alert if more than 100 connections are established with a certain server in the network

• Security/policy sentries

- Monitors traffic inside a view for policy violations at network or application level

- Monitors for violations of usage policies

- If any traffic is detected, that meets the sentry criteria, an alarm will be generated

- The security/policy sentry is a derivate of the threshold sentry but with a threshold of one

- Example: A user attempts to make a SSH connection to a server, which he is not entitled to do

• Custom sentries

5

On Off

NBAD methods

Page 6: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

“There is nothing more important than our customers”

Real data

Some examples from customer

6

Page 7: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

VoIP – non local traffic

7

Page 8: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

What applications VoIP talking non local

8

Page 9: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

Snmp traffic

9

Page 10: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

SNMP talkers

10

Page 11: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

SNMP anomaly?

Page 12: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

Detail of SNMP communication

12

Page 13: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

SSH

Page 14: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

Whom was he talking ssh?

14

Page 15: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

HTTP profile to servers

15

Page 16: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

HTTP traffic to servers

16

Page 17: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

Comparison

17

Page 18: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

UDP/TCP port 0

18

Page 19: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

UDP/TCP port 0 top talkers

19

Page 20: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

Suspicious ICMP

20

Page 21: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

ICMP replies without request

21

Page 22: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

Chatting applications

22

Page 23: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

P2P applications

23

Page 24: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

P2P applications used

24

Page 25: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

Streaming

25

Page 26: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

Others default detected anomalies

• HostScans

• TCPPortScan

• UDPPortScan

• Suspicious_ICMP_Type_Code

• Tcp_Udp_Port_0

• Large_DNS_Packets

• Long_Duration_Flow

• Zero_Payload_Bidirectional_Flows

• Unidirectional_UDP_and_misc_Flows

• Unidirectional_ICMP_Flows

• Unidirectional_ICMP_Reply

• Unidirectional_TCP_Flows

• Illegal_TCP_Flag_Combination

• Large_ICMP_Packets

26

Page 27: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

“There is nothing more important than our customers”

The need for correlation

NBAD is one of the information sources

27

Page 28: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved.

With SIEMWithout SIEM

The need for SIEM

Firewalls

IDS / IPS

Routers /switches

Host systems

Servers & applications

Present

Prioritize

Correlate

Normalize

Administrators

Store

SIEM

Page 29: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved. 29

Building the Magnitude

• Credibility: How credible is the evidence. Credibility of the witnesses, if multiple witnesses report same attack, credibility of overall offenses in increased

• Severity: How much of a threat is the attacker, network, offense …..to my enterprise. Affected by object weights, asset values, category (type) of attacks, actual vulnerability of targets, and number of targets

• Relevance: Based on the weight of Networks and Assets, how relevant is this offense or violation to you. Is it occurring in areas of the network that are not as important to you.

Page 30: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved. 30

Main Features

30

• Network Survaillance

• Assets

• Offenses

• Events

• Flows

• Reporting

• Administration Configuration

Page 31: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved. 3131

Integrate additional external data

• User name

• User group

• Switch / port location

• Used authentication mechanism: 802.1x, MAC,...

• Connection type(s): wired / wireless / VPN...

• Assessment server information (i.e. Nessus..)

• Whatever you got that can be related to the system...

Integration & inline view of identity mapping data:

Page 32: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved. 32

The Attacker’s Identity

Page 33: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved. 33

Approve Servers

Page 34: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved. 34

Attackers Identity Information

Page 35: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

“There is nothing more important than our customers”

Time for real-time demo

Page 36: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

© 2010 Enterasys Networks, Inc. All rights reserved. 36

Questions?

Page 37: Network Behavioral Anomaly Detection Dragon Securtiy ...download.zcu.cz/public/Prezentace/seminare CIV 2010/enterasys.pdfreport same attack, credibility of overall offenses in increased

“There is nothing more important than our customers”