1 / 37

Best Known Methods in Security Events Correlation

Best Known Methods in Security Events Correlation. Mohammed Fadzil Haron GSEC GCIA April 12, 2005. Agenda. Correlation overview Knowledge requirements Methodology Data representation Reaction. Correlation defined.

lane
Download Presentation

Best Known Methods in Security Events Correlation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Best Known Methods in Security Events Correlation Mohammed Fadzil Haron GSEC GCIA April 12, 2005

  2. Agenda • Correlation overview • Knowledge requirements • Methodology • Data representation • Reaction IT@Intel

  3. Correlation defined • A relation existing between phenomena or things or between mathematical or statistical variables which tend to vary, be associated, or occur together in a way not expected on the basis of chance alone…[1] [1] http://www.webster.com IT@Intel

  4. Overview • Correlation is the next security big thing in importance • An important tool in the security analyst’s toolbox for monitoring security events • To be most effective, most – if not all – events should be examined • Defense in depth means more data from different technologies, vendors, and products • Huge amount of data to analyze; terabytes in size and growing • Reduce false-positive and false-negative findings compared to use of a single product/technology • Expensive manned 24x7 monitoring capabilities IT@Intel

  5. Ultimate goal Et = Dt + Rt • Exposure time (Et): The time the resource, information, or organization is susceptible to attack or compromise. • Detection time (Dt): The time it takes for the vulnerability or the threat to be detected. • Reaction time (Rt): The time it takes for the individual, group, or organization to respond and eliminate or mediate the vulnerability or risk. “Time Based Security” by Winn Schwartau IT@Intel

  6. Security events flow IT@Intel

  7. Axiom on correlation • You only see the tip of the iceberg • Know the environment and perimeter of defense well • Don’t trust the tool; trust your judgment • “Automate whenever possible” [1] • Use the simplest data representation possible • Balance between over-correlated and under-correlated • Get the big picture • “The truth is in the packet” [1] [1] Toby Kohlenberg, Intel Corp. IT@Intel

  8. Knowledge requirements • Know your environment • Know your perimeter of defense • Automate tasks • Simplify data representation IT@Intel

  9. Know your environment Knowing the ins and outs of your network is a necessity • External network, DMZ and internal network architecture • Other networks, such as VPN and dial-up • Logistical and geographical locations of servers and users • Different operation systems, applications and functionality of servers and client machines • Network switches and routers in use • Logistical and geographical locations of critical servers (DNS, WINS, DHCP) as well as high-valued servers (web servers, servers containing intellectual properties) • You cannot know everything yourself, so know the individual experts on each piece of the network puzzle IT@Intel

  10. Example of environment knowledge usage • Can isolate IP addresses of Internet, DMZ and internal network for different categorization • Potential detection of external attack versus inside job • VPN and dial-up services introduce other threats and need to be given separate consideration • Allows assignment of customized severity levels for different services, such as DNS and servers housing intellectual property, for upgraded security needs IT@Intel

  11. Source of events • Host level – Syslog, HIDS/HIPS, eventlog, log files, apps logs, anti-virus signature level • Network level – NIDS/NIPS, NBAD, firewall, network routers and switch logs, active directory logs, VPN logs, third-party authentication logs • Audit – Vulnerability scanning, OS and patch level • Knowledgebase – Software vulnerabilities and exploits IT@Intel

  12. Know your perimeter of defense • Firewall • IDS • IPS • Audit capabilities • Host level defenses • PENS • Vulnerability scanning data • And so on. IT@Intel

  13. Know your firewalls • Location – Outer-facing, inner-facing, DMZ, internal, internal isolated network • Type – Packet filter, stateful, application firewall/proxy • What’s allowed versus denied • Capabilities versus shortcomings IT@Intel

  14. Know your IDS/IPS • Which product deployed? NIDS, HIDS/HIPS, NIPS • Where were they deployed? What kind of traffic is being monitored? • What product/vendor deployed? • Capabilities versus shortcomings IT@Intel

  15. Know your audit capabilities • Where are logs being kept? Syslog server or logs on host? • How long have logs being kept? Rotated? • Know your syslog servers IT@Intel

  16. Host level defenses • Anti-virus logs • Minimum security specification compliance enforcement software logs • OS, service packs, patches-level information IT@Intel

  17. Automate tasks as much as possible • Daunting tasks to detect intrusion due to: • Amount of data involved reaching terabyte range • Complexity of network environment architecture with Internet presence, DMZ, WAN, MAN, PAN, LAN, VOIP, VPN, Dial-up • Complexity of perimeter of defense • Large IP address ranges used internally, that is, using Class A 10.x.x.x • Multiple internally isolated networks with different type of policies, and access controls IT@Intel

  18. What and where to automate • Data aggregation – at data source and event manager • Manual, repetitive tasks – at event manager and reaction • Data correlation – event manager • Simplify data representation – event manager console • Incident notification – event manager IT@Intel

  19. Group your assets • Break down IP addresses into groups, such as internal, DMZ and others for Internet • Determine and group all critical servers, such as DNS, WINS, and DHCP • Determine and group all high valued servers, such as file shares, web servers, and FTP servers, and encrypted content servers for intellectual properties IT@Intel

  20. Types of correlation • Sets • String a group of events together to generate a trigger • Sequences • String a group of events together in sequence or particular order to generate a trigger • Statistical • Deviation of normal behavior, such as mean or normal curve IT@Intel

  21. Methods of correlation • Rule • Manually constructed, easy to create/update. Usually explicit in nature and can be applied to set, sequence and threshold types. Contains three elements: condition, time interval, and response. • Heuristic • Similar to anti-virus signature. One signature can detect multiple variations. More implicit than explicit in nature, thus potential for higher false positives/negatives. • Fuzzy Logic / Artificial Intelligence • Model approach to correlation that can dynamically adapt to changing environment. Difficult to produce and still immature; very cutting-edge. • Hybrid • No one doing them all yet. Commonly used are heuristic and rule. IT@Intel

  22. Correlation constraint • Time • Time should be considered when creating time box correlation • Correct time is critical in correlation • Time synchronization is crucial • Context • Order of events sequence is important • Context can be necessary in correlation rules IT@Intel

  23. Sample of correlation flow IT@Intel

  24. Graphical representation • Seeing is believing • Pros • Can represent huge data in simple and easy to understand graphs • Cons • Not many tools (commercial/open source) with this capability • If exist, limited capabilities IT@Intel

  25. Effective graphics should… • Show the data • Avoid distorting data • Present a large volume of data in small space • Make large data sets coherent • Show several levels of detail • Provide clear purpose of data presentation • Represent the data and not the underlying technology, methodology, and design IT@Intel

  26. Forms of data representation • Graphs • Link graph • Charts • Data maps • Time series • Narrative graphics (space and time) • Animation • Visualization • Virtual reality IT@Intel

  27. Scanning graph (One source to many target relationship) Mar 14 08:33:20 66.34.244.12:2827 -> xxx.yyy.1.1:18905 SYN ******S* Mar 14 08:33:20 66.34.244.12:2830 -> xxx.yyy.1.2:18905 SYN ******S* Mar 14 08:33:20 66.34.244.12:2833 -> xxx.yyy.1.3:18905 SYN ******S* Mar 14 08:33:22 66.34.244.12:2836 -> xxx.yyy.1.4:18905 SYN ******S* Mar 14 08:33:22 66.34.244.12:2839 -> xxx.yyy.1.5:18905 SYN ******S* Mar 14 08:33:22 66.34.244.12:2842 -> xxx.yyy.1.6:18905 SYN ******S* Mar 14 08:33:22 66.34.244.12:2845 -> xxx.yyy.1.7:18905 SYN ******S* Mar 14 08:33:20 66.34.244.12:2848 -> xxx.yyy.1.8:18905 SYN ******S* Harder to internalize Scan activity easily recognized IT@Intel

  28. Link graph Stage 1 of worm propagation IT@Intel

  29. Link graph Stage 2 of worm propagation IT@Intel

  30. Link graph Stage 3 of worm propagation IT@Intel

  31. Moving average (Simple network anomaly detection) Example: Monitoring port 445 Increase in moving average, showing an increase in activities IT@Intel

  32. Animation movie • Inbound connection attempts to San Diego State University (SDSU) from external source (unauthorized) • Representing 332 GB of raw data, 3.4 billion raw syslog records, and 1 million events • Period of 1996-2002 (6 years) • Available at http://security.sdsc.edu/probes-animations/index.shtml IT@Intel

  33. Animation movie IT@Intel

  34. Reaction to correlated data • Enforcement for malware cleaning • Blocking to minimize malware propagation and attack • Investigation for malicious non-worm activities • Learning mode for improving data (reducing false-positives and false-negatives) IT@Intel

  35. Conclusion • Correlation is a must tool for information security professionals • Time saved in detection will allow faster response time • Faster response time will minimize damages to your assets IT@Intel

  36. Questions? IT@Intel

  37. References • Event correlation; http://www.computerworld.com/networkingtopics/networking/management/story/0,10801,83396,00.html • “Protecting the Enterprise with Scalable Security Event Management, Part II - Intelligent Event Correlation”; Michael Mychalczuk; https://www.sans.org/webcasts/show.php?webcastid=90468 • “Thinking about Security Monitoring and Event Correlation“; http://www.securityfocus.com/infocus/1231 IT@Intel

More Related