internet storm center briefing 20100513

14
Rick Wanner - ISC Handler [email protected] A brief briefing… The Internet Storm Center

Upload: rick-wanner

Post on 09-Jun-2015

459 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Internet Storm Center briefing 20100513

Rick Wanner - ISC Handler

[email protected]

A brief briefing…

The Internet Storm Center

Page 2: Internet Storm Center briefing 20100513

Rick Wanner B. Sc, I.S.P.,

ITCPClient Technology Manager, Corporate Security at

SaskTel

Masters Student at SANS Technology Institute

(www.sans.edu)

Independent contractor/Volunteer with

SANS/GIAC

ISC Handler since 2008

[email protected]

Page 3: Internet Storm Center briefing 20100513

The Internet Storm Center

• The ISC is composed of approximately 40 volunteer

handlers which coordinate a group of volunteer

intrusion analysts and malware specialists.

• Daily “Handler on Duty”

Daily diary/blog published at http://isc.sans.edu/

The Internet Storm Center acts as a distributed early

warning system for the Internet

The ISC acts as an intermediary with ISPs worldwide.

Sponsored by the SANS Technology Institute

(http://www.sans.edu).

Page 4: Internet Storm Center briefing 20100513

ISC = DSHIELD +

Contributors + Handlers

From: isc reader

To: [email protected]

Subject: Recent attack.

....

DShield Data

Reader Reports

ISC Handlers

User Logs

Page 5: Internet Storm Center briefing 20100513

Dshield-We want your logs!

The ISCs principal inputs come from

Dshield.org and Internet users

Dshield.org is fueled by log contributions

by Internet users and corporations.

All logs are scrubbed before they are

submitted.

Src IP, src port, destination port

Page 6: Internet Storm Center briefing 20100513

Dshield Collection clients

Clients installed on firewalls, IDS, and

gateway routers/firewalls

Developed by SANS and third parties

Log transfer via HTTP or SMTP

Page 7: Internet Storm Center briefing 20100513

Role of the Handler

Analysis:

Assign meaning to submissions and data

Correlate between the inputs and known data

Solicit further information from sources

Prioritize each incident

Overall impact

Ability of the ISC to contribute

Number of submissions

Size of the affected user population

Page 8: Internet Storm Center briefing 20100513

Role of the Handler, cont…

Incident handling:

Identify

Contain

Eradicate

Recover

Lessons Learned!

Page 9: Internet Storm Center briefing 20100513

Diaries are Dynamic

RevisedDiaries

Initial Diary

DiaryWorthy?

Initial Observation

AdditionalObservations

Immediate publication of new event to solicit feedback from readers and provide the earliest possible alert.

Page 10: Internet Storm Center briefing 20100513

Other output

FightBack functionality

Send automated abuse on behalf of

users

Very specific attacks only

AS specific reports

Anti-virus distribution list

Page 11: Internet Storm Center briefing 20100513

Microsoft Patch Tuesday

Second Tuesday is the top day for visits to

the ISC

What we add:

Overview

Independent rating

History

Page 12: Internet Storm Center briefing 20100513

October is Cyber Security

Awareness Month

In 2009, ISC chose securing common ports

and protocols as the theme.

2008, theme was “Incident Handling”

Preparation, Identification, Containment,

Eradication, Recovery, Lessons Learned

2007, ISC published security awareness tips

Page 13: Internet Storm Center briefing 20100513

Support the ISC!

Send us your logs:

http://www.dshield.org/howto.html

Read the ISC:

http://isc.sans.edu/

Send us your observations:

http://isc.sans.edu/contact.html

[email protected]

Send us your malware:

http://isc.sans.edu/contact.html

Page 14: Internet Storm Center briefing 20100513

Thanks!

Questions??

For future questions please

contact

[email protected]