Transcript
Page 1: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

Security  Analytics  in  Action  

Josh  Sokol  &  Walter  Johnson  

Page 2: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

Josh  Sokol  ! OWASP  Foundation  Global  Board  Member  ! Creator  of  SimpleRisk  (simplerisk.org)  ! Information  Security  Program  Owner,  National  Instruments  

 Twitter:  @joshsokol  Blog:  http://www.webadminblog.com  

Page 3: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

Walter  Johnson  ! Security  Analyst,  National  Instruments  ! LASCON  Graphics  Guy  ! Likes  long  walks  on  the  beach  and  candlelight  dinners  ! Former  Yakuza  Assassin  

Twitter:  @sirmodok  

Page 4: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

Visibility  (or  lack  thereof)    !  Am  I  under  attack?  ! Which  systems  are  they  attacking?  ! What  kind  of  attacks  are  they  using?  ! Who  is  attacking  me?  ! Were  they  successful?  

Page 5: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

" We  need  to  create  an  ecosystem  of  security  tools  that  work  together  to  answer  these  questions  and  more.  " We  need  tools  that  are  able  to  talk  to  each  other  in  order  to  leverage  siloed  data  for  mutual  gain.  " We  need  a  platform  to  enable  the  analysis  of  and  reporting  on  threats  in  our  environment  in  near  real-­‐time.  

We  need  Security  Analytics!  

Page 6: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

Firewall  

IPS  

NAC  

Malware  Ana

lysis  

Vulne

rability  Mgm

t  

# Tools  Working  in  Silos  

# Proprietary  Protocols  

# “Greedy”  Platforms  

# Duplication  of  Functionality  

Page 7: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

$ Open  API  $ Open  DB  $ Data  Export  

Page 8: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

$ Events  $ Alerts  $ SNMP  $ Syslog  

Page 9: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

Exploitation  –  Parasitism.    The  leech  gains  food  and  nutrients,  but  the  host  gains  nothing  from  having  a  leech  suck  its  blood.  

Page 10: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

You  can  assemble  an  arsenal  of  best-­‐in-­‐breed  tools  that  work  together.      Even  smaller  purchases  can  have  a  large  impact.  

Page 11: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

Question   Data  Do  I  trust  the  source?   Reputation  Data  

How  am  I  being  attacked?   Attack  Data  

What  attacks  are  my  systems  vulnerable  to?   Vulnerability  Data  

What  versions  of  O/S  and  software  am  I  running?   Asset  Data  

Who  is  using  my  systems?   Identity  Data  

Who  should  have  access  to  what?   Data  Classification  

Who  do  I  trust  and  who  trusts  me?   Trust  Hierarchy  

Do  I  have  access?   Authentication  Data  

What  can  I  access?   Authorization  Data  

What  has  been  tested?   QA  Data  

Is  data  crossing  between  two  trust  levels?   Trust  Boundaries  

Page 12: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  Common  feature  for  modern  routers  and  switches.  !  Provides  a  lot  of  data  for  a  reasonable  amount  of  storage.  

!  Data  can  help  make  many  security  decisions  easier.  

Page 13: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  “Security  Flaws  in  Universal  Plug  and  Play”  whitepaper  by  HD  Moore  

!  Over  23  million  IPs  are  vulnerable  to  remote  code  execution  through  a  single  UDP  packet.  

!  Affects  Simple  Service  Discovery  Protocol  (SSDP)  which  runs  on  UDP/1900.  

Question:  Are  people  actively  scanning  my  network  in  order  to  exploit  this  flaw?  

Page 14: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  Source  address  is  external  to  my  network.  !  Destination  address  is  on  my  network.  !  Connection  uses  UDP  (protocol  17)  on  port  1900.  

Page 15: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  A  pattern  search  of  our  NetFlow  data  over  the  past  24  hours  returned  539  results  in  1  minute  and  38  seconds.  

Page 16: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 17: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  Source  address  is  on  my  network.  !  Destination  address  is  external  to  my  network.  !  The  destination  IP  is  listed  on  the  Malware  Domain  List.  

Page 18: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

! Most  of  the  pattern  matches  returned  showed  one  MDL  IP  with  multiple  internal  hosts  connecting  to  it.  

!  Then  there  was  this…  

Page 19: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  Source  address  is  on  my  network.  !  Destination  address  is  external  to  my  network.  !  Destination  is  associated  with  a  malware  event  from  one  of  our  Malware  Prevention  appliances  (scoped  to  1hr).  

Page 20: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  A  pattern  search  of  our  NetFlow  and  MPS  data  over  the  past  hour  returned  134  results  in  2  minutes  and  4  seconds.  

Page 21: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 22: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 23: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  Create  a  list  of  unused  IP  addresses  on  your  network.  !  Look  for  the  internal  systems  making  the  most  connections  to  those  IPs.  

Page 24: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  Source  address  is  on  my  network.  !  Destination  address  is  external  to  my  network.  !  Connection  is  UDP  port  53.  !  Count  the  connections  to  destination  IP  addresses.  

Page 25: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  Source  address  is  on  my  network.  !  Destination  address  is  external  to  my  network.  !  Sum  up  the  number  of  bytes  sent  and  get  the  top  25.  

Page 26: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  Source  address  is  on  my  network.  !  Destination  address  is  on  my  network.  !  Get  the  count  of  connections  any  IP  makes  to  any  other  IP  addresses.  

Page 27: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  Source  address  is  specified  at  runtime.  !  Destination  address  is  any  IP.  !  Show  all  ports  and  bytes  of  data  sent  to  each.  

Page 28: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 29: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 30: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 31: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 32: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

! What  is  connecting  to  that  IP  address?  ! What  is  that  IP  address  connecting  to?  !  Do  I  have  any  alerts  associated  with  that  IP  address?  !  Is  there  any  significant  amount  of  data  loss  from  that  system?  

Page 33: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

! What  is  connecting  to  that  IP  address?  

Page 34: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 35: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 36: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 37: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 38: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

Dewan  Communications  

Facebook  

Page 39: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

! What  is  that  IP  address  connecting  to?  

Page 40: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 41: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 42: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

AWS  

hosted-­‐by.ihc.ru  

Feral  Hosting?  softlayer.com  Dewan  Communications  

Page 43: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  Do  I  have  any  alerts  associated  with  that  IP  address?  

Page 44: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 45: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  Is  there  any  significant  amount  of  data  loss  from  that  system?  

Page 46: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 47: Burning Down the Haystack to Find the Needle:  Security Analytics in Action
Page 48: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

https://code.google.com/p/collective-­‐intelligence-­‐framework/  

Page 49: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  Are  there  alerts  associated  with  this  host  on  my  IPS  or  other  monitoring  devices?    No.  

!  WAFSEC  reputation  data…  

!  McAfee  Threat  Intelligence  data…  

!  This  looks  like  a  false  positive  to  me.  

Page 50: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

!  Should  I  accept  packets  from  random  IP  X?  $ Reputation  Data  $ Attack  Data  $ Vulnerability  Data  $ Asset  Data  $ Trust  Boundaries  

!  Should  I  allow  random  person  X  to  download  a  file  Y?  $ Data  Classification  $ Reputation  Data  $ Authentication  Data  $ Authorization  Data  $ Trust  Boundaries    

Page 51: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

! Block  an  IP  address  with  a  Firewall  or  IPS  system.  ! Create  WAF  rules  based  on  attack  data.  ! Ban  a  system  from  communicating  on  your  network.  ! Require  additional  authentication.  ! Attack  back?  

-­‐  Greg  Hoglund,  Founder  and  Former  CEO  of  HBGary  from  CNBC  “Companies  Battle  Cyberattacks  Using  ‘Hack  Back’  6/4/2013  

Page 52: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

! Many  companies  suffer  from  a  lack  of  visibility  into  critical  security  threats.  

!  Security  analytics  allow  us  to  see  and  react  to  threats.  !  Ideal  tools  are  those  with  both  provider  and  consumer  capabilities.  

!  Combining  tool  data  together  gives  us  the  context  that  we  can  use  to  make  informed  decisions.  

!  Network  flow  data  is  the  “glue”  that  ties  the  events  together  and  helps  to  illustrate  the  attack  progression.  

Page 53: Burning Down the Haystack to Find the Needle:  Security Analytics in Action

Josh  Sokol  Twitter:  @joshsokol  Blog:  http://www.webadminblog.com    Walter  Johnson  Twitter:  @sirmodok