scalable and real-time network forensicsitm.iit.edu/netsecure11/rajeshtalpade_networkforensics.pdf-...

26
NIKSUN © Copyright 2011 Scalable and Real-time Network Forensics Dr. Rajesh Talpade Executive Director Product Management [email protected] March 25 th , 2011

Upload: others

Post on 18-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Scalable and Real-time

Network Forensics

Dr. Rajesh Talpade

Executive Director – Product Management

[email protected]

March 25th, 2011

Page 2: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Agenda

• Need for network forensics

• Requirements for a good forensics solution

• Network forensics case-study

Page 3: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Technology Landscape Is Evolving

Instant Gratification!

Not Just Email

Social / Collaborative

Rich Multimedia

Powerful, Portable & Capable

Dynamic

Interactive

Anywhere

Anytime

Real-Time

Page 4: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Malware Is Growing Rapidly

- 67 new malware variants created every minute

(Sophos Security Threat Report 2011)

Source: AV-Test GmbH

Page 5: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

…..Even Impacting Mobile Devices

March 3rd 2011

Page 6: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Who Is NOT Vulnerable?

More than 75,000 computer systems at nearly 2,500 companies in the United States and around the world have been hacked in what appears to be one of the largest and most sophisticated attacks by cyber criminals discovered to date,

News of the attack follows reports last month that the computer networks at Google and more than 30 other large financial, energy, defense, technology and media firms had been compromised.

Page 7: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Who Is NOT Vulnerable?

Much of the concern has to do with the fact that the motives behind the attacks, and the scope of the intrusions, still remain largely unknown. The stock exchange’s systems are considered vital to U.S. national interests and a large scale compromise of the network could cause considerable financial havoc.

Page 8: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011NIKSUN © Copyright 2010

Who Is NOT Vulnerable?

… Hackers Took Control Of

FAA Critical Network

Servers & could have shut

them down ...

Page 9: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Costly Breaches, Not Just News

Computer Spies Have Broken

Into The Pentagon’s $300 Billion

Joint Strike Fighter Project

The Intruders Were Able To

Copy And Siphon Off Several

Terabytes Of Data Related To

Design And Electronics Systems

NIKSUN, Inc., CONFIDENTIAL. See Confidentiality restrictions on the title page

Page 10: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Plenty of Unknowns

• Verizon/US Secret Service 2010 Data-Breach Incident Report (DBIR)

Page 11: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Hence … Network Analysis & Visibility

Forrester Research Report

aka Network Forensics

Page 12: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

A New Approach

+ +

Step 1: In Addition To Available Data, We

Need More Relevant Data

Page 13: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

A Collection Approach?

Page 14: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Or An Organized Warehouse?

(video)

Page 15: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

A Data Warehouse For

Network Traffic, Events, Meta

Data, ...

Step 2: Need To Extract Meta-data and

Organize Both Raw Data and Meta-data

Page 16: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Role Based Access Control

Step 3: Need To Provide Data (Fast)

Based On Job & Need

Page 17: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Example

Page 18: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Intrusion (dashboard monitored by Tier 1 Staff)

Tier 1: Escalate To

Tier 2

Page 19: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Intrusion (Tier 2: Needs Deeper Dive Into Content)

Tier 2 Wants To Do Deep

Dive Analytics

Page 20: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Tier 2 Escalates Investigation

Order & Receives Approval /

Collaboration Authorization

Page 21: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Tier 2: Attack Vector Verified

Recreate Session

From Recorded

Data

Confirm Attack

Vector

Page 22: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Tier 2: Intrusion Analytics Confirms Backdoor

Tier 2: Recreate

Hacker Session

After Attack

Tier 2: Evidence Obtained Of

Backdoor Installation on TCP Port

60000

Page 23: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Tier 2 Passes To Malware

Investigation Team (Tier 3) -

Authorization Order Tracks Activity

Page 24: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Tier 3: Malware Distribution Method Verified

Intruder Has

Uploaded Malware

Using FTP

Reconstruct FTP to

See Malware & How

It Is ExecutedExact Reconstruction of

Malware & Method of

Infection!

Page 25: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Two Key Takeaways

Make The

UNKNOWN KNOWN

Data Warehouse & RBAC

Are Key for Scalable

Network ForensicsVerizon/USSS 2010 DBIR

Page 26: Scalable and Real-time Network Forensicsitm.iit.edu/netsecure11/RajeshTalpade_NetworkForensics.pdf- 67 new malware variants created every minute (Sophos Security Threat Report 2011)

NIKSUN © Copyright 2011

Thank You!