35
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Behavioral Network Security Steinþór Bjarnason Consulting Engineer Security Cisco Europe

Behavioral Network Security - Cisco - Global Home Page · Presentation_ID © 2006 Cisco Systems, Inc. ... Cisco Confidential 1 Behavioral Network Security Steinþór Bjarnason Consulting

  • Upload
    hakhanh

  • View
    230

  • Download
    1

Embed Size (px)

Citation preview

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1

Behavioral Network Security

Steinþór Bjarnason

Consulting Engineer Security

Cisco Europe

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 2

Agenda

� Threats and how to detect them

Threat Telemetry

Processing Telemetry

� Fighting Threats

Responding to a Threat

Rapid Threat Mitigation

� The future of Behavioral Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3

Threat Detection

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4

What is a Threat?

� Definition:

– A probable impending danger or warning of impending danger, e.g. "a terrorist threat"

– An act of coercion wherein a negative consequence is proposed to elicit response

� Looking at the networking field, a ”Threat”means different things to different people

– Enterprise/SMB

– Home user

– Service Provider

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 5

Today’s threats

� Modern threats are stealthy and use encryption in order to hide communication

� The main focus is on stealing data and confidential information

� Also, modern bots/trojans often contain attack code in order to defend themselves against active detection

� There have been cases of large Enterprises being down for up to 2 weeks due to persistent trojan infections

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 6

The Threat Picture – High Level Overview

� Learn from the network …

Netflow, syslog, SNMP, …

IDS events,

Signature extraction, …

� … and from external sources …

Senderbase, Intellishield, other feeds,

� … to defend the network

packet filtering,

routing / blackholing,

static configs,

external

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7

Threat Telemetry

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 8

Inside Network

Security OperationThreat Detection

IDS

IPSInternet

Monitoring Console

ManagementConsole

Telecommuter

Cisco 800

Branch / Regional offices

Cisco 1800/2800

/3800

IDS

DMZ

Management ToolsSyslog, Netflow, SDEE,

ASE, SNMP and Packet Capture

FW/IPS

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 9

Netflow: Keeping a (virtual) finger on the pulse

Input Interface

TOS Byte

Layer 3 Protocol

Destination port

Source port

Destination IP

Source IP

Key Fields Packet 1

Ethernet 0

0

TCP - 6

3.3.3.3

2.2.2.2

23

22078

11000…06E12.2.2.23.3.3.3

2.2.2.2

Dest. IP

E1

Dest. I/F

6

Protocol

0

TOS

1.1.1.1

Source IP Pkts

11000

Traffic Analysis Cache

Flow monitor

1

Traffic

2.2.2.2Dest IP

Ethernet 0Input Interface

Packet Section

Source IP

Key Fields Packet 2

1010101

3.3.3.3

11000…101E1E12.2.2.23.3.3.3

Dest. IP Dest. I/F Input I/F Sec …Source IP Pkts

Security Analysis Cache

Next-Hop Address

Time Stamps

Bytes

Packets

Non Key Fields

Time Stamps

Packets

Non Key Fields

Flow monitor

2

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 10

IronPort SenderBase Network:Using Reputation to enhance Threat detection

View into over 30% of global email traffic

20M+ IP addresses tracked globally

Data from ~120,000 sources; 8 of the 10 largest ISPs

Millions of human reporters & spamtraps

First, Biggest, Best Email & Web Traffic Monitoring Network – Data Makes the Difference

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11

IronPort SenderBase®

Data Makes the Difference

• Complaint Reports

• Spam Traps

• MessageComposition Data

• Global Volume Data

• URL Lists

• Compromised Host Lists

• Web Crawlers

• IP Blacklists & Whitelists

• Additional Data

SenderBaseData

Data Analysis/Security Modeling

SenderBaseReputation Scores

-10 to +10

150 Parameters

Threat Prevention in Realtime

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12

Monitor – Daily Overview 2200 Users

98% of all emails sent to customer

domains were bogus and thus blocked

by the IronPort appliance.

98% of all emails sent to customer

domains were bogus and thus blocked

by the IronPort appliance.

88% of all emails sent to customer

domains were stopped by reputation filters alone.

88% of all emails sent to customer domains were stopped by

reputation filters alone.

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13

Web Reputation in Action

WHERE?

HOW?

WHO?

• URL only just registered

• URL already blacklisted

• URL seeing large traffic

spikes

• Hosts many unique

sites (rock phish kit)

Verdict

BLOCKBLOCK

• IP address recently

started sending email

• Message originated

from dial-up IP address

• Sending IP address

located in Ukraine

• Message leaves trace

of malware tools

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 14

Processing Telemetry

SIM’s and NBA

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15

Correlating the Data

DATA

Information

Complex to manage

Can this be simplified?

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 16

Security Information Management (SIM)

� A SIM consists of 5 major elements:

Topology awareness

Log consolidation

Threat correlation

Incident management

Reporting

Compliance is often an orthogonal process to correlation

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17

“By year-end 2007, 25 percent of large enterprises will employ NBA as part of their network security strategy (0.8 probability)”

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18

Network Behavioral Analysis (NBA)

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19

NBA Algorithmic Analysis

Concern Index™

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20

NBA Behavior-based Analysis

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21

Configuring Tolerance to Behavioral Change

Automatically sets the appropriate tolerance

based on historical

values

Allows manual

adjustment of tolerance, red line moves up and

down based on setting

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 22

NBA Visualization of a Worm Outbreak

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 23

NBA for Traffic Analysis

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 24

Threat Mitigation

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 25

Inside Network

Security OperationNow I know ���� Mitigate

IDS

IPS/FPM

Internet

Monitoring Console

ManagementConsole

Telecommuter

Cisco 800

Branch / Regional offices

Cisco 1800/2800

/3800

IDS

DMZ

Management ToolsSyslog, Netflow, SDEE,

SNMP and Packet Capture

FW/IPS

Firewall Rule

Router ACL

Switch Port

Complex to manage

Can this be simplified?

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 26

Rapid Threat Mitigation

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 27

Problem Statement

Need a secure and reliable communication mechanism to immediately propagate network changes for dynamic requirements

Maintain Network Availability

� Sample Use Cases

Rapid and reliable changes in response to an attack

Facilitate troubleshooting, detailed data analysis

Network analysis tools that take action in the network

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28

Use Case 1: Responding to a ThreatRapid Threat Mitigation

NoC

CIMCIMCIMCIMCIMCIMCIMCIM

Operator configures controller:

- Create Control Information Message

e.g. block udp port 1434, all source and destination addresses, on all routers, switches, all Interfaces

Consumers receive CIMs, act on them and send responses back to the controller

CIMCIM

CIMCIM

CIMCIM

CIMCIM

CIMCIM

Compromised hosts plug into network and start sending packets to the network to attack servers or congest links

- Send CIM to network

Threat detected by threat correlation and detection tools

CIMCIM

X

X

X

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29

Use Case 2: Troubleshooting and Analysis Distributed Sniffing Through Central Console

NoC

CIMCIM

Operator configures controller:

- Create Control Information Message

e.g. Capture 5 MB of traffic flow andtransfer via tftp to NoC with snifferfor further analysis

- Consumer receive CIM

- Starts capturing packets

- Sends CIM acknowledgement backto controller

- When capture completes, sendspacket capture to NOC Sniffer

CIMCIM

- Users call NOC to complain

of slow application

response

- NOC suspects there is a

problem, but needs more

information to troubleshoot

Operator receives packet capture, analyzes it and takes corrective actions

- Send CIM to select targets

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 30

Solution RequirementsMaintain Network Availability

� Required Attributes of Solution

Simple to use, especially in rapid response situations

Scaleable (speed, number of devices)

Ability to apply policies to various network device types

Reliable & Predictable: Immediate feedback on the status of actions

Will not conflict with provisioning system

Solution Requirements SummaryNeed a secure and reliable communication mechanism to immediately propagate network control and policy changes throughout the network to provide rapid security remediation and to facilitate troubleshooting and analysis

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 31

Solution Overview

• Controller

Centrally located server; distributes Control Information Messages (CIMs) throughout the network, listens for responses, provides ‘state of play’ in real-time

• Consumer

Cisco routers and switches; receives CIMs, acts on them, and informs controller of action taken

Uses pre-configured policies which determine responses to CIMs (i.e. block using ACL)

• Integrated distribution and messaging protocol

Rapidly and securely distributes device independent CIMs throughout the network

Control and Status:Configure and send CIM, obtain feedback

Consumers:Uses local rules engine to act on CIMs from Controller

Controller

Intelligence resides in end point devices

CIM

Responses

NMS/Syslog server for logging

Distribution and

Messaging Protocol

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 32

GUI

Controller

Consumers

Manual controller

Automated controller

Manual and Automated

ConsumersController

Distribution and

Messaging Protocols

Control and Reporting API

Threat Correlation & Detection

(Network Behavioral Analysis)

Control and Reporting API

CIM

Responses

Distribution and

Messaging Protocols

CIM

Responses

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 33

The Future of Behavioral Network Security

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 34

The Future of Behavioral Network Security

� We will see more use of NBA solutions in addition to traditonal SIM solutions as both technologies have their specific advantages

� Inter-device security communication will increase dramatically, both in order to enhance detection and also in order to speed up mitigation

� Sharing of security information and threat fingerprints will increase (ref. Ironport Senderbase)

� Threat Defense and Mitigation will need to become more rapid as human reaction times are no longer sufficient. This includes fully automated threat defense....

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 35