24
A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager Infocomm Security Group , NUSCERT Computer Centre National University of Singapore [email protected] NOTE: Updated slides available online at https://selftest1.nus.edu.sg:9876/ppt/steven_sim_FIRST_2006.pdf

A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

A strategy for Inexpensive Automated Containment

of Infected or Vulnerable Systems

Steven Sim Kok LeongAssistant Manager

Infocomm Security Group, NUSCERTComputer Centre

National University of Singapore

[email protected]

NOTE: Updated slides available online at https://selftest1.nus.edu.sg:9876/ppt/steven_sim_FIRST_2006.pdf

Page 2: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

Agenda

• NUS IT infrastructure• The awakening • A first step• Exploring alternatives• The evolution• Track record• What’s next?• Closing

Page 3: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

The NUS IT infrastructure

• Not-for-profit• Multi-gigabit, high speed network• 35,000 students and 6,000 staff• 30,000 concurrent online nodes• Plug-and-play networks• Wireless networks• Heterogeneous and diverse IT

Page 4: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

The awakening

• That blasted worm• Expensive and labor-intensive containment• Bottleneck in incident management• Need to process re-engineer

– detection– containment– alert (response)– eradication (remediation)

Page 5: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

A first step

• Acceptable Use Policy– Legal counsel– IT steering committee– Student union

• Detection: Statistical-based anomaly IDS– simple– low overheads– minimal false positives

• Containment– switch-port disconnection

• Alert (Response)– win-popup alerts

• Eradication (Remediation)– users not easily reached

Page 6: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

The evolution

Statistical-anomaly IDS Blackhole Mechanism

Host switch-port manually disconnected by network team

User discovers network disconnection

User approaches helpdesk Helpdesk identifies and fixes security issues

Release Mechanism

User gets alerted where possible through Windows

messenging service

• The process

Host switch port manually reactivated by network team

Helpdesk informs user his network connectivity is fixed

Page 7: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

A first step

• Limitations– a DoS attack on innocent users– require OOB to alert users– difficulty with remediation– tendency for user to change ports– manual and fairly labor-intensive

Page 8: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

Exploring alternatives

• Commercial containment products– route blackholing– admission control

• Benefits– robust– efficient

Page 9: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

Exploring alternatives

• Limitations– costly

• expensive ($$)• tremendous effort

– overhaul of all unsupported switches• agent dependent

– integration with detection feeds not available• lack of consideration for false negatives

– in-house developed detection mechanisms

Page 10: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

The evolution

• Detection– statistical anomaly-based IDS– honeynets– vulnerability scanners

• Containment– DHCP blackholing– internal intruders quarantined

• botnet irc servers blocked• Alert (Response)

– win-popup to infected machines– abuse contact of external origin auto-alerted

• Eradication (Remediation)– self-help

Page 11: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

The evolution

Statistical-anomaly IDS

Honeynets Blackhole Mechanism

Host quarantined

User accesses Internet websites User gets redirected to self-help page

User performs remedy including self assessment

Release Mechanism

Host gets released in next batch release

User gets alerted via email

User gets alerted where possible through email or

Windows messenging serviceVulnerability Scanners

• The process

Page 12: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

Self-help

Page 13: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

• Email on release

Page 14: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

The evolution

• Email alert to external abuse

Page 15: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

The evolution

• Beneficial features– cost and effort

• cost of implementation• ease of implementation

– user management• managing user expectations• empowering users

– minimal false negatives• efficacy of current antivirus detection pattern can be determined• new antivirus-undetected malicious trojans, backdoors and worms can be discovered

Page 16: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

The evolution

• Limitations– does not handle non-DHCP based hosts

• rely on switch-port disconnection– longer time window of infection/vulnerability

• need to be improved upon– loopholes to circumvent DHCP blackhole and remediation steps

• mitigated through monitoring of re-infections

– self-help is Windows specific• eradication for other OS infections handled onsite.

Page 17: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

Track record

VIDS Detections

0

5000

10000

15000

20000

25000

30000

35000

Jan '05 Feb '05 Mar '05 Apr '05 May '05 Jun '05 Jul '05 Aug '05 Sep '05 Oct '05 Nov '05 Dec '05

Month

No.

of I

ntru

sion

s

Page 18: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

Track recordHoneynet Detections

0

200

400

600

800

1000

1200

1400

1600

Aug '05 Sep '05 Oct '05 Nov '05 Dec '05

Month

No.

of i

nter

nal i

ntru

sion

s

Internal intrusions

Internal intruders

Page 19: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

Track record

Blackholed/Quarantined systems

0

100

200

300

400

500

600

Jan '05 Feb '05 Mar '05 Apr '05 May '05 Jun '05 Jul '05 Aug '05 Sep '05 Oct '05 Nov '05 Dec '05

Month

No.

of q

uara

ntin

ed M

AC

add

ress

es

Page 20: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

Track record

• Some signatures created that is based on discovered binaries in containment

– TSPY_AGENT.AX - BKDR_NORUNORG.A – TSPY_AGENT.AK - BKDR_SERVU.AS– TROJ_DROPPER.GG - BKDR_SERVU.AZ– TROJ_SMALL.AHE - BKDR_HACDEF.AQ– TROJ_AGENT.XT - BKDR_SHELL.B– TROJ_AGENT.XU - WORM_NETSKY.DAM– TROJ_AGENT.XV - WORM_SOBER.DAM– WORM_RBOT.BWC - WORM_MYTOB.DAM– WORM_RBOT.BZC - WORM_LOVGATE.DAM– HKTL_PROCKILL.I - WORM_MYDOOM.DAM

Page 21: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

What’s next?

• Enhance containment for non-DHCP based systems

– new server allowed on network after risk accessed and managed (this includes administrative, network and host vulnerability assessments)

– existing server switch-port disconnected from network should any periodic network vulnerability assessment fail

Page 22: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

Acknowledgements

The development of the automated incident containment strategy would not be possible without the support and assistance from the following people:- Ms Yong Fong Lian (IT Security Manager)- Dr Ma Huijuan (IT Security Engineer)- Mr Gong Wei (IT Network Engineer)

Page 23: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

Closing

Containment strategy- Inexpensive- Simple- Easy to develop - Easy to implement- Easy to maintain- Effective

Page 24: A strategy for Inexpensive Automated Containment of …...A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager

“The virus may be spreading despite the control measures already taken. Far more human and animal exposure to the virus will occur if strict containment does not isolate all known and unknown locations where the bird flu virus is currently present.”

Dr Juan Lubroth