cecr (“seeker”) - centralized event correlation and response

36
CECR (“Seeker”) - Centralized Event Correlation and Response Ramon Kagan, Chris Russel York University, Toronto

Upload: salma

Post on 11-Jan-2016

39 views

Category:

Documents


0 download

DESCRIPTION

CECR (“Seeker”) - Centralized Event Correlation and Response. Ramon Kagan, Chris Russel York University, Toronto. Agenda. How and why Automated Incident Response enhances an Information Security program Initial Phase: Detection and Compliance systems - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: CECR (“Seeker”) - Centralized Event Correlation and Response

CECR (“Seeker”) - Centralized Event Correlation and Response

Ramon Kagan, Chris Russel

York University, Toronto

Page 2: CECR (“Seeker”) - Centralized Event Correlation and Response

Agenda

• How and why Automated Incident Response enhances an Information Security program

• Initial Phase: Detection and Compliance systems

• Implementation of Centralized Event Correlation and Response (CECR) system– Detection and Compliance

– Correlation and Classification

– Automated Response

Page 3: CECR (“Seeker”) - Centralized Event Correlation and Response

Context: York University

• Located in Toronto

• Canada’s third largest University

– 60,000+ students

– 10,000+ staff and faculty

– 25,000+ network drops

• In 2003, 2 FT information security staff positions (now 3)

Page 4: CECR (“Seeker”) - Centralized Event Correlation and Response

“Traditional” Incident Response

• Preparation

• Identification

• Containment

• Eradication

• Recovery

• Lessons Learned

(From SANS Step-by-Step Incident Response)

Page 5: CECR (“Seeker”) - Centralized Event Correlation and Response

August 2003

Page 6: CECR (“Seeker”) - Centralized Event Correlation and Response

Short-Circuited Incident Response

• Information Security becomes “Worm Management Services”

• No time for normal response procedures

• We adapted and made it through, but…

– Is this really security?

– What are we missing in the noise and mayhem of constant worm attacks?

Page 7: CECR (“Seeker”) - Centralized Event Correlation and Response

Prevention

• Don’t let these things happen in the first place

• Lots of products to buy

– Firewalls, IPS, Anti-Virus, Silver Bullets, etc.

• These are all good things but not without their challenges

Page 8: CECR (“Seeker”) - Centralized Event Correlation and Response

Prevention Challenges in the Academic Environment

• Porous and increasingly fuzzy perimeter– Dialup, Wireless, VPN, Mobile devices, etc.

Where does the firewall go now?

• Political hurdles to implement controls– I want my dancing pigs!

• Increase in operational management overhead

• $$$++

Page 9: CECR (“Seeker”) - Centralized Event Correlation and Response

Detection and Response are Essential Too

• Why?– Prevention measures require increasing amounts of

money and strong policy, diminishing returns

– They cannot prevent everything

– What if they fail?

• How useful is a bank vault without an alarm and police response?– Ultimately it can only buy time

Page 10: CECR (“Seeker”) - Centralized Event Correlation and Response

Automated Detection and Response

• Improving detection and response speed

– Makes best use of and complements existing prevention measures

– Better ROI than additional prevention?

– Allows a 24/7/265 response absent staff

– Frees up incident handlers to focus on less obvious/potentially more serious matters

Page 11: CECR (“Seeker”) - Centralized Event Correlation and Response

Where Automated Detection and Response Matter• BotNets

– compromised host waits for commands

– Detect it first and take it out before it spreads behind your perimeter

• Spyware (Marketscore, etc)

• Leveraged/Low and Slow Hacking– Automated correlation can help detect things

otherwise below the radar

• Large virus/worm infestation– Can scale to greatly assist with a future large-scale

event

Page 12: CECR (“Seeker”) - Centralized Event Correlation and Response

Detection

• Gather as much information as possible from anywhere you can

• Syslog

• Flow logs

• IDS/IPS/Firewall logs

• Honeypots

Page 13: CECR (“Seeker”) - Centralized Event Correlation and Response

Syslog

• Login attempts

• Port scans

• Local exploits

• Anti-virus alerts

Page 14: CECR (“Seeker”) - Centralized Event Correlation and Response

Flow logs

• Network traffic patterns

• Scanning detection

• Anomaly detection

• Historical context and forensic information

Page 15: CECR (“Seeker”) - Centralized Event Correlation and Response

IDS/IPS/Firewall Logs

• Scanning

• Invalid access

• Hacking attempts

Page 16: CECR (“Seeker”) - Centralized Event Correlation and Response

Honeypots

• Great for internal detection

– No need for expensive hardware

– much cheaper than gigabit (multi-gig?) IDS sensors at every router

• By definition, very few false positives

• Darknets or Honeynets

Page 17: CECR (“Seeker”) - Centralized Event Correlation and Response

Compliance

• Agent-based compliance detection

• Network-side vulnerability scanning– Nessus or other commercial tools

– NOXscan: FAST scanner for Microsoft vulnerabilities used by many worms (MS04-007, MS04-011, MS05-039)

http://infosec.yorku.ca/tools/

Page 18: CECR (“Seeker”) - Centralized Event Correlation and Response

Correlation and Reaction

• Map events to an IP or MAC

• Map IP or MAC to user, support group, network drop, etc.

• Initiate a response as appropriate to the incident type, severity and context

• Do this very fast!

• Enter CECR… large drop in incidents within 3 months after implementation

Page 19: CECR (“Seeker”) - Centralized Event Correlation and Response

Implementation

Page 20: CECR (“Seeker”) - Centralized Event Correlation and Response

Lots of info, so what

• All this great information being gathered

• How to sift through it

• How to react to it

• How to record our actions

Page 21: CECR (“Seeker”) - Centralized Event Correlation and Response

Manual Handling

• Manual correlation

• Manually enter each incident (ELOG)

• Basic reporting available

• Very time consuming to enter all the tickets

Page 22: CECR (“Seeker”) - Centralized Event Correlation and Response

Manual Handling

• Needed to increase correlation speed

• Needed better reporting

• Needed a way to distinguish incident types more easily

• Needed a tool that portrayed a process

• Needed a way to enter incidents automatically

Page 23: CECR (“Seeker”) - Centralized Event Correlation and Response

Impetus for Change

• In a single word - LAZINESS

• September 2004 - Outbreak of virus activity on our dialup network

• Two problems– Mapping users to IP/Mapping IP to network segment

- time consuming

– Entering all those tickets - even more time consuming and oh the pain

Page 24: CECR (“Seeker”) - Centralized Event Correlation and Response

CECR v1.0

• Shell script designed to accomplish two menial tasks

– Correlate incidents to users

– Submit tickets to RTIR automagically

• Great first step for dealing with mass breakouts

– Allowed for initial automation of specific triggers

Page 25: CECR (“Seeker”) - Centralized Event Correlation and Response

CECR v1.0

• Limitations– Not abstracted and difficult to manipulate for

extension

– Haphazard script to ease the pain

– Wasn’t really designed for more central usage

– Unable to effectively take actions based on incident severity

Page 26: CECR (“Seeker”) - Centralized Event Correlation and Response

CECR v2.0

• Rewritten in Perl

• Designed for extension and real-time updating

• Able to conduct many more tasks– Different actions depending on severity

– Plugins can be added at any time

– Exclusions now possible

– Repeat notification removed - limited to once daily

– Automated contact to end-users/support groups

Page 27: CECR (“Seeker”) - Centralized Event Correlation and Response

Framework of CECR v2.0

Central Processor

Sensors

Correlation Plugins

Action Plugins

Logging and Ticket Creation

Automated Notification

Reporting Process

Page 28: CECR (“Seeker”) - Centralized Event Correlation and Response

Components of CECR v2.0

• Reporting Process

– Wrapping scripts around some IDS sources

• Argus not “tail-able”

• Vulnerability scanner results

– Logsurfer+ for real-time processing of others

• Pix log trends - context cognition

• snort

Page 29: CECR (“Seeker”) - Centralized Event Correlation and Response

Components of CECR v2.0

• Central Process

– Perl script - the coordinator

• Param: incident type, IP, time, port (optional)

• Two configuration files– Actions - what action to take per incidentIncident type:Action:RTIR Category:Reason

Tag:Email file:Exclusion List– Contacts - whom to contact for non-user accessRegex domain:email:RTIR support group

Page 30: CECR (“Seeker”) - Centralized Event Correlation and Response

Components of CECR v2.0

• Correlation plugins

– 6 plugins

– Correlate IP (depending on connection):

• Username

• MAC

• Port

• TTY (dialup)

Page 31: CECR (“Seeker”) - Centralized Event Correlation and Response

Components of CECR v2.0

• Action Plugins

– 5 plugins

– Conduct various tasks including

• Account lockout

• Deregistration

• Disconnection from network

• Quarantine

Page 32: CECR (“Seeker”) - Centralized Event Correlation and Response

Components of CECR v2.0

• Automated notification

– Template based emails by incident type

– Contact either username (LDAP verified) or contact listed in contacts file

– Notification sent to infosec group of incident

• In event of no contact information, infosec email states as such

Page 33: CECR (“Seeker”) - Centralized Event Correlation and Response

Components of CECR v2.0

• Logging & Ticket Creation

– All actions and decisions are logged via syslog for audit purposes

– E-mail notification to RTIR to automagically create tickets in appropriate queues

– Time based record of event maintained to limit repeat notification

Page 34: CECR (“Seeker”) - Centralized Event Correlation and Response

RTIR

• CERT sponsored add-on to RT from Best Practical - opensource with support availability

• Queues helped define process

• Manual insertion still required, but contributions existed for e-mail ticket creation - the light!!

Page 35: CECR (“Seeker”) - Centralized Event Correlation and Response

CECR v2.0

• Net Results– Extendable framework for ever changing

landscape

– Force multiplier allowing handlers to worry about more significant events

– 24x7x365 monitoring of known issues

– Automated tracking of events - allows for statistics

Page 36: CECR (“Seeker”) - Centralized Event Correlation and Response

Questions?