sinog behaviourand anomaly detectionrouters switches 10.1.8.3 internet 172.168.134.2 network as data...

17
Vedran Franjić, System Engineer Sales [email protected] SINOG Behaviour and anomaly detection

Upload: others

Post on 14-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Vedran Franjić, System Engineer Sales

[email protected]

SINOG

Behaviour and anomaly detection

Page 2: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Agenda

• Common Network Problem• Stealthwatch Overview• Use Cases

Page 3: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

NO VISIBILITY + NO SECURITY

“internal network traffic”

WHOdid this?

HOWlong?

WHAT was accessed?

WHEN will we know?

WHENdid it

happen?

Page 4: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Network

Users

HQ

Data Center

Admin

SEEevery conversation

Understand what is NORMAL

Be alerted toCHANGE

KNOWevery host

Respond to THREATS quickly

Effective security depends on total visibility

Page 5: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Stealthwatch Overview

Page 6: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Routers

Switches

10.1.8.3

172.168.134.2Internet

Network as Data Source

Collecting data:

• Collect data across almost every device in your network

• Protocol : NetFlow, sFlow, IPFIX, NSEL, SPAN

• Ability to view north-south as well as east-west communication

Flow Information Packets

SOURCE ADDRESS 10.1.8.3

DESTINATION ADDRESS 172.168.134.2

SOURCE PORT 47321

DESTINATION PORT 443

INTERFACE Gi0/0/0

IP TOS 0x00

IP PROTOCOL 6

NEXT HOP 172.168.25.1

TCP FLAGS 0x1A

SOURCE SGT 100

: :

APPLICATION NAME NBAR SECURE-HTTP

Page 7: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Telemetry

NetFlow / IPFIX

Span

Web logs

Threat Intelligence

User/Device Identity

Transactional Contextual

Page 8: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Conversational Flow Record

Who WhoWhat

When

How

Where

More context

Page 9: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Arhitecture

Page 10: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Stealthwatch Enterprise System Components

Stealthwatch Flow Sensor • Generate NetFlow from SPAN• SRT/RTT• DPI/NBAR/PAYLOAD

Stealthwatch Flow Collector• Collect and analyze (2 LE)• Store Flow info• Send statistic to SMC

Stealthwatch Management Console• Management and reporting• Statistical view• Top Alarms, Top hosts, Top

Applications

Treat Intelligence

License

Threat Intelligence• Malicious IP• Malicious URL• Malicious processes

Page 11: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Learning engines

Page 12: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Stealthwatch Learning EnginesCognitive Analytics• Cloud Hosted • Multi-layer Machine Learning• Anomaly detection through

statistical learning• Encrypted Traffic Analytics• Malware classification

Stealthwatch• Behavioural Analysis• Anomaly detection through

statistical learning

Stealthwatch Enterprise

Page 13: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Logical alarms based on suspicious events

Sending or receiving SYN flood and other types of

data floods

DDoS Activity

Scanning, excessive network activity such as file copying or transfer, policy violation, etc.

Source or target of malicious

behavior

Port scanning for vulnerabilities or running services

Reconnaissance

Data hoarding and data exfiltration

Insider threats

Communication back to an external remote controlling

server through malware

Command and Control

Page 14: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Encrypted Traffic Analytics

Ensure cryptographic compliance

Detect malware in encrypted traffic

Cisco Stealthwatch Enterprise is the only solution providing visibility and malware detection without decryption

Page 15: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

USE CASES

Page 16: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Network Security

• Interface Status Report

• Investigating Slow Network Performance

• Detecting Policy Violations

• Detecting Malware Propagation

• Detect Rogue DNS Traffic

• Detecting Internal Brute Force Attacks

• Alarm Category: Data Hoarding

• Detecting Application Tunneling

Page 17: SINOG Behaviourand anomaly detectionRouters Switches 10.1.8.3 Internet 172.168.134.2 Network as Data Source Collecting data: •Collect data across almost every device in your network

Summary

• Using your network as THE 2nd line of defense for enforcement• You already have the investment• Agent/endpoint/network agnostic• No device (example IoT) can hide from the network itself• Encrypted traffic a non-issue