220 likes | 459 Views
The National Plateforme for Tracking Cyber Attacks : « SAHER » By Hafidh EL Faleh Hafidh.faleh@gmail.com. Perimeter of the project. The NACS is member of :. SAHER Objectifs. Make a dashbord ( Alert Level ) of National Cyberspace.
E N D
The National Plateforme for Tracking Cyber Attacks : « SAHER » By Hafidh EL Faleh Hafidh.faleh@gmail.com NACS - 2012
Perimeter of the project The NACS is member of :
SAHER Objectifs • Make a dashbord ( AlertLevel) of National Cyberspace. • Take a platforme support for incident handling, investigation and legalforensics. • Devellopement of solutions for traking cyber attackswith DIDS, Honeypots and deployingmanysensors. • Monotoringcriticalsinfrastrcture and detect anomalies intohersystems.
SAHER Objectifs • Supervise Web sites to detectsdefacementsattacks. • Maintain a system for malware detection(virus, botnets, torjans) , and use cordination to cleanup the National Cyberspace. • Build an information database for types of attack, leaks of vulnerability and blackliste.
SAHER est une plateforme à trois couches Couche WORKFLOW Couche analyse et corrélation Couchede collecte et de détection
Détection • SAHER-WEB: ce sont des routines qui ont pour bute de vérifier l’intégrité des sites Web. • SAHER-SRV: ce sont des routines qui ont pour bute de vérifier la disponibilité des serveurs Web, MAIL et DNS • Les IDS: des Snorts qui sont généralement installés dans les espaces d’hébergement WEB. • Les honeynets: plusieurs solutions de déférentes types sont disponibles dans le monde du logiciels libres. 7
Collecte We need to exchange security events and collaboration to handle incidents: • Incidents: • Phishing • Web defacement • Scan • Intrusion • Spam / Scam • DoS / DDoS • Malware: • Worm spread • Botnet / C&C • HoneyNet detection • Vulnerabilities • Exploit • Zero days • Product vulnerability
Workflow interne A CSIRT is a team thatresponds to computer security incidents by providing all necessary services to solve the problem(s) or to support the resolution of them
Workflow: Plateforme de coordination USER USER USER Sensors TEL SMTP Server S1 Central DB Autres CERT tunCERT S2 TEL mail mail S3 IDS DB
Saher-Honeynet: Architecture et Outils 2500 Public IP
Saher-Honeynet Annuallyevolution of attacks
Saher-Honeynet Website: Online statistics www.honeynet.tn
Saher-Honeynet Website: « Dashboard » www.honeynet.tn/dashboard
Ideas For Projects IP ReputationDadabase • Designing and specifying a tool to interface with a lot of honeypottools (dionaea, glastopf, kippo ..) and provide an update database to cheeck a reputation of any IP addressrelatedwithherhistoric logs. • Provide an web access (web services) to thistool , automaticgettingIp source and providing information relatedherreputationhistoric and sendingnecessary instructions for cleanningprocess.
Ideas For GSoc 2012 Black-List Generator • Create an updatedlist for maliciousdomains and hosts from malwares offred. • Select Profile of equipments to generate ACL (Firewall, IDS/IPS, Proxy ..) . • Designing and specifying techniques for black-list tool. • Online sharing of black-list.
ISP 2 ISP 1 ISP 3 IDS IDS IDS 2 Update D-IDS Rules 3 Save passive DNS Detection 1 Extract List of MaliciousDomains Watch for logs
THANKS http://www.honeynet.tn honeynet@ansi.tn Hafidh.faleh@gmail.com http://twitter.com/SaherHoneyNet http://www.linkedin.com/groups/The-Honeynet-Project-Tunisia-chapter