36
UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Embed Size (px)

Citation preview

Page 1: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

UMBC Resnet IDS and Tipping Point IPS

Mark Cather

Office of Information Technology / UMBC

Page 2: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

UMBC Campus Network

Page 3: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

The UMBC Resnet IDS Implementation

Page 4: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Layout of UMBC Residential Network

Page 5: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Possible Methods for Detecting Infected Resnet Machines

• Scan Machines with a Nessus-type scanner as users login.– Windows SP2 blocks your ability to scan.– Linksys and other NAT routers can block or confuse your scan.– Scanning won’t detect an active virus on the inside of a machine.– Users may get a firewall alert message on their screen as you scan their

system. – Many of the open-source scanning solutions have trouble scaling to a

high rate of logins.

• Install a Host-Side Agent (like Cisco Perfigo SmartEnforcer)– Agent can cause some machines to become unstable.– Agents are not available for all operating systems.– NAT routers will block your ability to connect to the agent.– How do you handle devices like Xbox’s and Playstation2’s?

Page 6: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Possible Methods for Detecting Infected Resnet Machines (cont)

• Use an Intrusion Detection System to Watch Resnet Traffic for Signs of Infected Machines.– Pros

• It can look for infections from any type of device.• It doesn’t trigger the user’s firewall notifications.• It doesn’t require the user to install anything on their computer.• It doesn’t matter if the user has a NAT router.• It doesn’t matter how many devices the user may have behind their

NAT router.– Cons

• It can be difficult to scale.• Developing and maintaining an IDS signature database is difficult

and time-consuming.

Page 7: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

In the End, UMBC Chose to Implement an IDS Solution.

• Our policies don’t allow us to restrict users from installing NAT routers in the Dorm rooms.

• Our users are allowed to use whatever operating systems they like.

• While we felt that scaling an IDS solution to manage our traffic would be difficult, we expected that we would sooner or later catch most of our infected users.

• We feel that this solution offers us greater flexibility in identifying security issues.– We can lockout a user for any defined IDS rule.

Page 8: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

UMBC Residential Network Authentication

• The authentication system is a major component of any lockout system.– Without a robust authentication system, you can not lockout a “User”.

You can only block their machine (by IP or hardware address).

– Many of the options for blocking a machine would cut off all network access to the infected machine.

• User’s then have to call a Helpdesk to report that their network jack is dead. • If a widespread virus gets loose, you could have hundreds of users calling

your helpdesk.

– Some methods of blocking an infected machine involve a browser redirection mechanism.

• If users are regularly made to open web browsers on all their network jacks, this method could work.

Page 9: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

UMBC Resnet Authentication System

• All users must go through a web-based login system before their network jack is enabled.

• During the login process, the users are required to agree the terms of our Acceptable Use Policy.

• They also must agree to take full responsibility for any traffic that comes from their network jack. – This has saved us a lot of trouble with copyright complaints and

NAT abuse cases.

Page 10: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

The Nuts and Bolts of the System

• All of our network jacks are assigned a separate /30 subnet. • This method offers many benefits:

– Rogue DHCP servers are not a problem.

– Users can’t hardcode another user’s IP address and cause an address conflict.

– The users only have one useable IP address per jack. This limits the ability for another person to use another user’s jack.

– We have a router boundary on every jack. This means we can apply ACLs to every network jack in our Resnet.

• The problem is that we end up using 4 addresses for every jack. Since we have about 4200 residents on campus, we are now tying up more than 16000 IP addresses for our Resnet.– This year we had to begin using NAT at our Resnet Border.

Page 11: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Resnet Authentication Process

Page 12: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Where Does the IDS Connect?

Page 13: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

IDS Lockout Implementation

• We use Snort for our Resnet IDS.• The Resnet IDS has a set of rules that are as free of

false positives as we can determine.• It watches as much traffic as it can keep up with. If it

misses something, we figure we will catch them the next time.– Currently we are keeping up with ~60% of our total traffic.

• Users can be locked out for multiple reasons at the same time.

Page 14: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC
Page 15: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

What does the User See?

• When they are locked out, the users abruptly lose their network connections.

• Our users are accustomed to going to our login page whenever they lose access.

• When a locked out user tries to log back in again, they are given a page that indicates that they are locked out and the reasons why they are locked out.

• Each of the reasons listed is a link that further explains the lockout reason and how to fix the problem.

• Once a user thinks they have fixed their problem, they can release their own lockout. (for their first two incidences).

• If a user is locked out for a third time (per year), the user is not allowed to release their own lockout. The user must schedule with OIT to come out to their room and verify that they have successfully cleaned their machine.

Page 16: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

What Benefits have We Seen from the Resnet IDS Implementation?

• It allows us to deal with each individual virus or worm; not every individual infected user.– If we can isolate a signature for a security problem, we can deal

with everyone who has that problem at one time.– The number of users who are infected with a particular problem

does not matter as much.

• It allows the users to fix their own problems (without having to call OIT for assistance).– This speeds up the response time and makes our users happier.

• The same lockout mechanism can be used for administrative security issues.– Copyright Violations and AUP Violations.– Three-Strike rule doesn’t apply to administrative sanctions.

Page 17: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Keeping Snort Up-To-Date

• Keeping Snort up to date is the biggest problem.• There are a couple of mechanisms that we use to obtain

Snort rules:– Self-written

• As we find infected machines, we capture the virus executables. • We usually find the infected machines through outside complaints or

our other IDS / IPS solutions.• The captured virus executables are analyzed to characterize their

activity.• If we need to, we will do some reverse engineering on the virus

executable to see what makes it tick.

– Outside Signature Sources• Bleeding Snort (http://www.bleedingsnort.com/)• Snort.org Signature Tarballs and Mailing Lists.

Page 18: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

UMBC and TippingPoint

Page 19: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Which IDS / IPS?

• During the Summer of 2004, we began the process of finding and procuring a commercial IDS / IPS solution for the campus.

• Up until this point, we had been using Snort as our only IDS solution.– Snort did not scale well. We only analyzed a small percentage of our

outbound WAN traffic or academic / administrative building traffic.

– We could never keep the signatures up-to-date.• There was typically a 1 - 4 week delay between the release of a piece of

malware and the release of a good signature.

– We had no visibility to the interior networks on campus.

– Our Snort system was not tied into anything to proactively block attacks.

– Our incident response group spent their time running from hacked machine to hacked machine. They were not able to keep up with the newly released malware and the previously hacked machines.

Page 20: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Requirements for a Commercial Solution

• Based on the issues we had with our previous IDS, we came up with the following requirements for our IDS evaluation:– Staff Augmentation - The new IDS / IPS had to be automated enough that

we wouldn’t have to spend very much time updating it’s signatures or software.

– Signatures - Someone else should come up with the needed signatures in a timely manner (1 - 2 weeks max). The Signatures should have a very low false positive rate.

– Proactive Action - The new IDS / IPS had to have a component that would automatically block common and obvious attacks.

– Capacity - The new IDS / IPS has to have a minimum capacity of 1Gbps.– Expandability - The new hardware should be able to integrate multiple

sensing and blocking components under one management system.– Reporting - The new hardware should have a reporting feature that easily

identifies infected hosts. – Procurement - Anything we purchased had to be through a state contract.

We did not want to go the the RFP process.

Page 21: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

The TippingPoint UnityOne System has Met All our Needs

Page 22: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Staff Augmentation

• Before the TippingPoint, we would spend all our time on Incident Response.– There were new variants of worms and viruses released every week.– By the time we obtained a signature for a new piece of malware three

more pieces of malware had been released. – The malware had a good 2 - 4 week lead on us obtaining signatures. – Updating and maintaining the Snort server and Snort itself also took

large amounts of time.

• Now, We don’t need to spend any time at all managing the TippingPoint itself.– The TippingPoint system automatically checks and updates it’s

signature files daily. As new firmware for the hardware becomes available, we receive email telling us that an update is available. We can then update the hardware whenever our downtime schedule will allow.

Page 23: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Signatures

• As a part of our service contract, TippingPoint maintains the signature lists. Our system automatically goes out and checks for a new signature file daily. Unless a new security threat is announced, TippingPoint typically come out with new signature sets once a week.

• We have only had one problem with false positives.• TippingPoint writes it’s signatures to detect the abuse of a

vulnerability, not a particular piece of malware.– As an example, a buffer overflow attack on the MS-RPC

interface of a machine could be used by many different pieces of malware (both new and old). TippingPoint has one rule that triggers on buffer overflow attempts, no matter what the source.

Page 24: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Signatures (cont)

• Signatures are grouped into three classifications:– Application Protection

• Worms and Viruses• Buffer Overflow Detection• Spyware• Scan, Sweeps, and Probes

– Infrastructure Protection• DDOS Activity• Network Equipment Attacks• Traffic Abnormalities

– Malformed Packet Headers– TCP flags that make no sense.

– Performance Protection• Peer to Peer File Sharing

Page 25: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Proactive Action

• In the daily signature updates, TippingPoint indicates whether or not a signature is recommended.

• From our experience, signatures that are recommended have an extremely low false positive rate (we’ve never had a false positive on a recommended signature).

• Recommended signatures also are typically related to security threats, not new features or policy based rules.

• We are configured to Block and Notify any traffic that matches a “Recommended” signature.

Page 26: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Capacity• TippingPoint’s hardware comes in a couple of different sizes:

– 50Mbps, 100Mbps, 200Mbps, 400Mbps, 1.2Gbps, and 2Gbps.– A 5Gbps product will be available in mid-March.

• The TippingPoint UnityOne systems monitor and protect in both directions at the same time.

– They detect and protect your users from the outside and the outside from your users.

• The hardware with a capacity of 200 Mbps or more is broken up into multiple segments.– The 200Mbps product has 2 segments.– The 400Mbps - 2Gbps products have 4 segments.– Segments can be a mix of UTP and Fiber, but they must be ordered

from the factory in the desired configuration. The configuration can not be changed later.

– The segments are isolated from each other. No traffic can pass from one segment to another.

• The amount of traffic that a unit can handle is the total across all it’s segments, in both directions.

Page 27: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

TippingPoint UnityOne Appliance

Page 28: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Expandability• The product line consists of two parts:

– The UnityOne IPS Appliance• This is the unit that comes in sizes from 50Mbps - 2Gbps.• Depending on capacity, a single appliance can have as many as four

segments. • In the case of UMBC, we have purchased a 1.2Gbps Appliance. The

appliance is in between the following network areas and the campus core:– Residential Networking– Wireless Networking– Remote Access Networking– Academic and Administrative Building Networking

– The UnityOne Security Management Server• This appliance manages one or more IPS appliances (up to ~25 IPS

appliances).• The SMS is what manages the signature files and firmware updates.• All the log messages from all the IPS appliances are collected together on

the SMS. The SMS produces incident reports and allows you to filter / search through all the log messages.

Page 29: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Reporting

• All of the log messages for all the UnityOne IPS appliances are viewable through the SMS.

• You can search or sort any way you would like.• Columns in the display can be aggregated to show the number of

incidences per rule, the number of rules broken per source or destination or any other value you would like.

• The client for the SMS system is Java based and works on Windows, Macintosh, Sun and Linux systems.

• The only client version that is fully supported is the Windows version.

• Canned reports are also available. • Custom reports can be written as needed.

Page 30: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Procurement

• Dell resells the whole TippingPoint product line through their contract.

• When we purchased our hardware, last July, the list pricing was as follows:– 50Mbps - $9,995– 200Mbps - $24,995– 400Mbps - $42,995– 1.2Gbps - $64,995– 2Gbps - $89,995– Security Management Server - $9,995

Page 31: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Threat Suppression Engine

• The Threat Suppression Engine is what makes this product perform.

• The pattern matching rules for all blocking and traffic shaping signatures are downloaded into hardware ASICs.

• This is how they can pump through 2Gbps, at full line rate, and the number of rules in service won’t impact performance.

Page 32: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

High Availability

• The UnityOne products are not active layer-2 or layer-3 devices. They say that they are a “bump in the wire”.

• Layer-2 Fallback– In the case of the major software issue or unit overload, the unit

directly forwards traffic across the segments at layer-2.

• Zero Power High Availability– In the event of a complete power loss, the copper interfaces can

be setup to directly bridge within each segment.

• Two units can be installed in parallel.– The two devices can be setup to pass state information.– Since the devices don’t interact with spanning tree of routing

protocols, any standard network redundancy solutions will continue to work as they do now.

• All units have hot-swappable dual power supplies.

Page 33: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

We Have Had Problems…• Blue Status Indicator

– The TippingPoint products do some of their own checks to see if something is a false positive.

– There is a bug in the version of firmware, that we are running, that incorrectly logs a caught false-positive as a memory error.

• Load Issue– When we first received our hardware, we set it to permit/notify us

on all rules.– Since permit/notify traffic needs to go through the main process

(rather than the high-speed ASICs), the processor overloaded.

Page 34: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Problems (cont)

• Novell Outage - – Rule 7120 blocks TCP traffic that is not RFC compliant.– Novell traffic is not compliant with RFC standards.– They reuse sequence numbers.

• Mail messages with Viruses will be detected.– When the mail message with the virus is detected, the TCP

session for that message download will be cutoff.– In some cases, mail clients download all their messages over

one connection.– When that connection gets cut off, the user’s mail client will

hang.

Page 35: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Future Directions

• In the next 12 - 18 months, I would like to tie the output of the TippingPoint into our Resnet Lockout system.

• We need to find a good way to setup a resnet-style lockout and remediation system in our academic/administrative building network segment.– This could also be triggered by the log output of the

TippingPoint.

Page 36: UMBC Resnet IDS and Tipping Point IPS Mark Cather Office of Information Technology / UMBC

Thank You

Mark Cather

Assistant Director of Networks and Security

Office of Information Technology / UMBC

[email protected]