JMU GenCyber Boot Camp Summer, 2015. Defense Logging Auditing Response.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Access Control Chapter 3 Part 5 Pages 248 to 252.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
System and Network Security Practices COEN 351 E-Commerce Security.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Lecture 11 Reliability and Security in IT infrastructure.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
seminar on Intrusion detection system
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Network security policy: best practices
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Security Guidelines and Management
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
APA of Isfahan University of Technology In the name of God.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Using Windows Firewall and Windows Defender
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
What is FORENSICS? Why do we need Network Forensics?
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
SATAN Presented By Rick Rossano 4/10/00. OUTLINE What is SATAN? Why build it? How it works Capabilities Why use it? Dangers of SATAN Legalities Future.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Computer Forensics in Practice Armed Forces of the Slovak Republic mjr. Ing. Albert VAJÁNYI 1Lt. Ing. Boris ZEMEK (c) May 2005.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
1 Figure 10-4: Intrusion Detection Systems (IDSs) Actions  Alarms  Interactive analysis Manual event inspection of raw log file Pattern retrieval 
Cryptography and Network Security Sixth Edition by William Stallings.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IS3220 Information Technology Infrastructure Security
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Security Methods and Practice CET4884
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Securing Network Servers
NETWORKS Fall 2010.
Lesson 16-Windows NT Security Issues
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Bethesda Cybersecurity Club
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

JMU GenCyber Boot Camp Summer, 2015

Defense Logging Auditing Response

Logging and Auditing We have discussed many a priori techniques to prevent security violations A posteriori techniques are also important: –Logging is the recording of events or statistics to provide information about system use and performance –Auditing is the analysis of log records to present information about the system in a clear and understandable manner

Logging Logs provide a mechanism for analyzing the system security state –Determine if a requested action will put the system in an insecure state –Determine the sequence of events leading to the system being in an insecure state Problem: –What information/events to log?

Logging (cont) Logs typically contain entries for successful and/or failed: –User logins and logouts –Creation of accounts –Execution of certain commands –Access to files –Starting and stopping of services or the system

Windows Logging What to log set in Administrative Tools->Local Security Settings Logs stored in binary format System logs can be viewed using the Event Viewer Demo

IIS Logging Configured in IIS Manager Log file format can be selected, but mostly plain text Logs can be viewed using Notepad (or other text viewers) Demo

Firewall Logging Configured in Firewall GUI Log saved in c:\WINDOWS\pfirewall.log (by default) Can be viewed with Notepad (or other text viewers) Demo

Auditing Analysis of log records to present information about the system in a clear and understandable manner –Manually –Automated

Automated Auditing Tools Many tools available that process log files or produce real-time audit displays –Application logs Web logs Database logs –System logs –Security logs (but these tend to be intrusion detection systems)

Automated Auditing Tools (cont) Splunk – URL: – Log collection and analysis: Organizes and correlates information from various logs, machines, applications, etc.

Automated Auditing Tools (cont) System iNtrusion Analysis and Reporting Environment (SNARE) – URL: – Log collection and analysis: Collects audit data Transfers it to a central server for analysis

Attacking Logs and Audit Mechanisms Attackers typically alter logs to avoid detection –May delete logs entirely –May remove particular suspicious events: Failed logins Error conditions Stopped services File access/modification

Defending Log and Audit Data Bare minimum: –Enable sensible logging –Set proper permissions on log files A little better: –Make log files append only (can be circumvented) –Encrypt log files Attacker cannot alter logs without the proper encryption key

Defending Log and Audit Data (cont) Best –Use a separate log server Hosts can be configured to redirect their logs to a dedicated log server Logs are centralized for easier processing/ analysis Compromise of a host does not allow the attacker to alter its stored logs –Transfer logs to write-once media (slow)

Response Passive responses Record and report the problem Active responses Block the attack Repair the damage done by the attack Affect the progress of the attack Be careful!

Passive Responses Provide information to the user Rely on the user to take subsequent action Alarms On screen alert, window, or IDS console Remote notification Send Dial pagers or cell phones

Passive Responses (cont) SNMP Traps and Plug-ins IDS designed to function in concert with network management tools Utilize the network management infrastructure to send and display alarms Provided by several commercial IDSs

Active Responses Take action based on the detection of an intrusion: Take action against the intruder Amend the environment Collect more information Take action: Automatically (be careful!) User driven

Take Action Against the Intruder Ideally: Trace intrusion back to its source Disable the intruder’s machine/network connection Prosecute the person responsible Problems: Network hopping - the “source” of the attack is probably another victim of the attacker Address spoofing – the “sources” of the attack may just be random IP addresses

Take Action Against the Intruder (cont) Problems (cont): Striking back could provoke escalation Striking back could result in: Criminal charges Attacks (even in in response to an attack) are usually viewed as a violation of computer crime statutes Civil legal action Damages caused to innocent (or even guilty) parties could result in lawsuits Disciplinary action Many government, military, and commercial, and educational institutions have policies prohibiting attacks

Taking (Responsible) Action Against an Intruder Terminate a network session by resetting the TCP connection Configure a firewall or router to block packets coming from the IP address that appears to be the source of the intrusion Send to the admin of the attacking system For persistent attacks, notify law enforcement so they can investigate

Amend the Environment System environment Identify and fix what enabled the intrusion Disable vulnerable services Configure a firewall or router to block the attack Detection environment Increase sensitivity level of IDS Increase information collected by IDS Insert rules to better distinguish certain types of attacks

Collect Additional Information Especially important if you plan to pursue legal remedies Honeypots or decoy servers (legal grey area) Collect information/evidence Determine intruder’s intent Understand threat trends and construct detection signatures Gather vulnerability information without putting sensitive/critical systems at risk

Fail-Safe Considerations Assume that an adversary will target the IDS/response component as part of the attack Monitoring response channels Searching for signs of detection Intercepting/disrupting alarms Determining response policies (and try to use them against a site)

Fail-Safe Measures Utilize encryption, integrity checking, and authentication to protect IDS communications from tampering Use redundant alarms (and multiple communications channels) Logs, audit records, and other evidence should be protected from alteration or destruction

Mapping Response to Policy Response activities should be documented in an organization’s security policy Response activities can be categorized as: Immediate Timely Long term (local) Long term (global)

Immediate Response Activities Critical actions required immediately following an attack or intrusion: Initiating incident-handling procedures Performing damage control and containment Notifying law enforcement or other organizations Restoring victim systems to service

Timely Response Activities Actions required within hours or days of an incident: Investigate unusual patterns of system use Investigate and isolate the root causes of the detected problems Correct the problems when possible Apply vendor patches Reconfigure systems Report details of the incident to the proper authorities Pursue legal action against the perpetrator(s) Alter or amend detection signatures in the IDS

Long-Term (Local) Response Activities Less critical, but should be performed regularly: Compiling statistics Performing trend analysis Tracking patterns of intrusion over time Identify areas in need of improvement

Long-Term (Global) Response Activities Notifying vendors of the problems the organization has suffered due to security problems in their products Lobbying lawmakers for additional legal remedies to system security threats Reporting statistics regarding security incidents to law enforcement or other organizations

Defense Logging – Information about what is happening on a system – Evidence Auditing – View and search log files to find important information Response – Passive – Active