+ All Categories
Home > Documents > Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and...

Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and...

Date post: 22-Mar-2018
Category:
Upload: duongthuan
View: 229 times
Download: 5 times
Share this document with a friend
42
Transcript
Page 1: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one
Page 2: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

Next Generation IPS and Advance Malware Protection

Mahmoud Rabi

Consulting Systems Engineer - Security

Page 3: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

Threat Landscape and Attack Continuum

Page 4: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

4 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

All were smart. All had security.

All were seriously compromised.

Today’s Real World: Threats are evolving and evading traditional defense

Page 5: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

5 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Today’s Real World: Threats are evolving and evading traditional defense

So what’s changed?

Hacking has!

Page 6: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

6 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Industrialization of Hacking

Attackers and defenders drive each other to innovate…

…resulting in distinct threat cycles

VIRUSES

MACRO VIRUSES

APTs MALWARE

WORMS HACKERS

1985 1995 2000 2005 2015

SPYWARE / ROOTKITS

Goal: Glory, mode: Noise Goal Profit, mode: Stealth

Page 7: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

7 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

BEFORE Discover Enforce Harden

DURING Detect Block Defend

AFTER Scope

Contain Remediate

Network Endpoint Mobile Virtual Email & Web

Continuous Point-in-time

Attack Continuum

Cloud

To defend against these advanced threats requires greater visibility and control across the full attack continuum

Page 8: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

8 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

You should know the Estate of Your Network

Network Servers

Operating Systems

Routers and Switches

Mobile Devices

Printers

VoIP Phones

Virtual Machines

Client Applications

Files

Users

Web Applications

Application Protocols

Services

Malware

Command and Control

Servers

Potential Vulnerabilities

NetFlow

Network Behavior

You can not protect what you can not see

Processors

Page 9: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

Next Generation IPS

Page 10: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

10 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Gartner Defines Next-Generation IPS NGIPS Definition

• Standard First-Gen IPS

• Context Awareness

• Application Awareness and full-stack visibility

• Content Awareness

• Adaptive Engine

Download at Sourcefire.com

*Source: “Defining Next-Generation Network Intrusion Prevention” Gartner, October 7, 2011

Page 11: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

11 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

What do we mean by Context Awareness

Event: Attempted Privilege Gain

Target: 96.16.242.135

Event: Attempted Privilege Gain

Target: 96.16.242.135 (vulnerable)

Host OS: Blackberry

Apps: Mail, Browser, Twitter

Location: Whitehouse, US

Event: Attempted Privilege Gain

Target: 96.16.242.135 (vulnerable)

Host OS: Blackberry

Apps: Mail, Browswer, Twitter

Location: Whitehouse, US

User ID: bobama

Full Name: Barack Obama

Department: Executive Office

Page 12: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

12 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

FireSIGHT™ Full Stack Visibility

CATEGORIES

EXAMPLES

Cisco Sourcefire

FireSIGHT

TYPICAL

IPS

TYPICAL

NGFW

Threats Attacks, Anomalies ✔ ✔ ✔

Users AD, LDAP, POP3 ✔ ✗ ✔

Web Applications Facebook Chat, Ebay ✔ ✗ ✔

Application Protocols HTTP, SMTP, SSH ✔ ✗ ✔

File Transfers PDF, Office, EXE, JAR ✔ ✗ ✔

Malware Conficker, Flame ✔ ✗ ✗

Command & Control Servers C&C Security Intelligence ✔ ✗ ✗

Client Applications Firefox, IE6, BitTorrent ✔ ✗ ✗

Network Servers Apache 2.3.1, IIS4 ✔ ✗ ✗

Operating Systems Windows, Linux ✔ ✗ ✗

Routers & Switches Cisco, Nortel, Wireless ✔ ✗ ✗

Mobile Devices iPhone, Android, Jail ✔ ✗ ✗

Printers HP, Xerox, Canon ✔ ✗ ✗

VoIP Phones Avaya, Polycom ✔ ✗ ✗

Virtual Machines VMware, Xen, RHEV ✔ ✗ ✗

Contextual

Awareness Information Superiority

Page 13: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

13 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

OS & version Identified

Server applications and version

Client Applications

Who is at the host

Client Version

Application

What other systems / IPs did user have,

when?

Building Host Profiles Converting Data into Information

Page 14: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

14 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

SecOPS NetOPS

Indicators of Compromise Within Host Profile

May have connected an Exploit Kit

+ Has connected to a host that SI tells us

could be a CnC server

+ Has triggered an IPS event for traffic that looks

like CnC

= 3

Page 15: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

15 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

FireSIGHT™ Context Explorer

Page 16: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

16 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

FireSIGHT™ Fuels NGIPS

IT Insight Spot rogue hosts, anomalies, policy

violations, and more

Impact Assessment Threat correlation reduces

actionable events by up to 99%

Automated Tuning Adjust IPS policies automatically

based on network change

User Identification Associate users with security

and compliance events

Page 17: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

17 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Impact Assessment and Generate Rules Recommendations (Adaption)

FireSIGHT™ Streamlines Operations

• Impact Assessment for all intrusion events (Linux based attack to Windows machine)

• Enable the IPS rules that should be enabled based on profiled network

• Easy access to all assessed intrusion events

Page 18: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

18 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Associate Users with Intrusion and Compliance Events

FireSIGHT™ Reduces Response Time

Page 19: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

19 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Real Time Correlation

• Leverage Real Time Visibility

• Find the needle in the Haystack

• Correlation based on a Real Time traffic

• Receive alerts for specific scenarios

• Alert me for something specific

• Drop from 100K events to 3 specific events

Page 20: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

20 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

SecOPS NetOPS

Deployment Scenarios

Page 21: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

21 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Gartner Leadership The Path “Up and Right”

Sourcefire has been

a leader in the

Gartner Magic

Quadrant for IPS

since 2006.

As of December 2013 Source: Gartner (December 2013)

Radware

StoneSoft (McAfee)

IBM

Cisco HP

McAfee

Sourcefire

(Cisco)

Huawei Enterasys Networks

(Extreme Networks)

NSFOCUS

Information Technology

challengers

ab

ility

to

exe

cu

te

leaders

visionaries niche players vision

Page 22: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

22 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

2012 NSS Labs SVM for IPS

Page 23: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

23 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

2013 NSS Labs SVM for IPS

Page 24: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

Advanced Malware Protection

Page 25: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

25 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Malware Ecosystem: Droppers

• Don’t think of isolated instances; instead, think ecosystem

• Address ecosystem, otherwise re-infections occur

Page 26: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

26 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Cisco Sourcefire Advanced Malware Protection Complete solution suite to protect the extended network

Dedicated Advanced Malware

Protection (AMP) Appliances (FirePOWER & WSA/ESA

Advanced Malware Protection for FirePOWER (NGIPS)

FireAMP for hosts (MS Windows & Mac), virtual and

mobile devices

Page 27: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

27 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Actual Disposition = Bad = Blocked

Antivirus

Sandboxing

Initial Disposition = Clean

Point-in-time Detection

Retrospective Detection, Analysis Continues

Initial Disposition = Clean

Continuous

Blind to scope of compromise

Sleep Techniques

Unknown Protocols

Encryption

Polymorphism

Actual Disposition = Bad = Too Late!!

Turns back time Visibility and Control are Key

Not 100%

Analysis Stops

Beyond the Event Horizon Addresses limitations of point-in-time detection

Page 28: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

28 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

And the tools in place to rapidly isolate and remediate

Context Enforcement Continuous Analysis

Who What

Where When

How

Event History

Collective Security

Intelligence

Page 29: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

29 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

File Trajectory

1001 1101 1110011 0110011 101000 0110 00

• Lets you determine scope by tracking malware in motion and activity

• Visibility across organization, centering on a given file

Looks ACROSS the organization

and answers:

• What systems were infected?

• Who was infected first (“patient

0”) and when did it happen?

• What was the entry point?

• When did it happen?

• What transfer protocols were

used?

Page 30: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

30 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Network File Trajectory – Tracking

Tracking Senders / Receivers

over Attack Continuum

File Disposition Change to MALWARE History of the File as it spreads

Host

Details

Page 31: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

31 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Device Trajectory - FireAMP

1001 1101 1110011 0110011 101000 0110 00

• Gives you deep visibility into file activity on a single device/endpoint

Looks DEEP into a device and

helps answer:

• How did the threat get onto

the system?

• How bad is my infection on

a given device?

• What communications

were made?

• What don’t I know?

• What is the chain of

events?

Page 32: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

32 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

FireAMP Private Cloud: Maintains Customers’ Privacy

SHA256

Disposition

•Management

•Policies & Custom Detections

•File Trajectory, Root Cause

•Reporting

•Disposition Cache

FireAMP Private Cloud

Virtual Appliance

FireAMP

Connector

AMP for FirePower

Cisco Collective

Security Intelligence

Page 33: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

33 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Outbreak Control – Stop Malware Spread No more waiting - stop threats and eliminate root causes

• Simple and specific controls

• Context rich signatures for broader control

Simple

Custom

Detections

Application

Blocking

Custom

White

Lists

Fast

&

Specific

Group

Policy

Control

Trusted

Apps &

Images

Comms /

IP Blacklists

Stop Connections

to Bad Sites

Advanced

Custom

Signatures

Families

Of

Malware

Network and Endpoint

Page 34: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

34 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Se

cu

rity

Eff

ec

tive

ne

ss

TCO per Protected-Mbps

Cisco Advanced

Malware Protection

Best Protection Value

99.0% Breach

Detection Rating

Lowest TCO per

Protected-Mbps

NSS Labs Security Value Map (SVM) for Breach Detection Systems

Cisco-Sourcefire AMP Results – For Detection Capability Only

2014 NSS Labs SVM for Breach Detection Systems

Page 35: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

FirePOWER Platforms

Page 36: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

36 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

IPS

P

erf

orm

an

ce

an

d S

ca

lab

ility

Data Center Campus Branch Office SOHO Internet Edge

From 50Mbps to 60Gbps

Modularity in 8000 Series

Fixed Connectivity in 7000 Series

Mixed SFPs in 7100 Series

Configuration Fail-Open & Fail-Close across all

Scalable 8000 Series

Runs NGIPS, AMP and App Control in the same chassis

FirePOWER 7100 Series

500 Mbps – 1 Gbps

FirePOWER 7120/7125/8120

1 Gbps - 2 Gbps

FirePOWER 8100/8200

2 Gbps - 10 Gbps

FirePOWER 8200 Series

10 Gbps – 40 Gbps

Platforms and Places in the Network

FirePOWER 7000 Series

50 Mbps – 250 Mbps

Page 37: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

37 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

1G Copper 1G Fiber 10G Fiber 40G Fiber

1 slot 1 slot 1 slot 2 slots

4 Port 1Gbps Copper

4 Port 1Gbps SX Fiber

2 Port SR or LR Fiber

2 Port 40GBASE-SR4

Cluster Module

Used to connect an 3D8140, 3D8250, 8260, 8270, and 8290 to one or more stacking kits. Included in stacking kits.

40G Switch Module

Switch module for 8250/8260 that supports the 40G Fiber network module. Comes standard on 8270/8290.

All interfaces are programmable bypass/fail-open and field replaceable.

8000 Series Network Modules: Configurable-Bypass

Page 38: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

38 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

DC750 DC1500 DC3500

Max. Devices

Managed* 10 35 150

Max. IPS Events 20M 30M 150M

Event Storage 100 GB 125 GB 400 GB

Max. Network Map

(hosts | users) 2k | 2k 50k | 50k 300k | 300k

Max. Flow Rate

(flows/second) 2000 fps 6000 fps 10000 fps

High Availability

Features

Lights-out

Management (LOM)

RAID 1, LOM,

High Availability

pairing (HA)

RAID 5, LOM,

HA, Redundant

AC Power

* Max number of devices is dependent upon sensor type and event rate

Defense Center Models

Centralized Command & Control

Page 39: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

39 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

• Inline or passive deployment

• Full NGIPS Capabilities

• Deployed as virtual appliance

• Use Cases

SNORT Conversion

Small / Remote Sites

Virtual Environment Protection

• Manages up to 25 sensors

physical and virtual

single pane-of-glass

• Use Cases

Rapid Evaluation

Pre-production Testing

Service Providers

NOTE: Supports ESX(i) 4.x and 5.x on Sourcefire 5.x platforms

• Virtual Defense Center • Virtual 3D Device

DC

Network Virtual Appliances

Page 40: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

40 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

• “Known-server key” for SSL

o Requires access to the server key

o Decrypts inbound SSL communication

• “Certificate resign” for SSL

o Requires Intermediate certificate in browsers

o Decrypts outbound SSL communication

• Only Physical Appliance

• Cut-through non-SSL traffic

Passive Deployment

Inline Deployment

SSL Appliance for SSL Inspection

Page 41: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

41 Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Attack Continuum

BEFORE Discover

Enforce

Harden

AFTER Scope

Contain

Remediate

Detect

Block

Defend

DURING

Visibility and Context

Firewall

NGFW

Identity Services Engine

VPN

UTM

NGIPS

Email Security

Advanced Malware Protection

ISE/NAC

Cyber Threat Defense

Web Security

Cisco Sourcefire System in the Attack Continuum

Page 42: Next Generation IPS and Advance Malware Protection - · PDF fileNext Generation IPS and Advance Malware Protection ... Enterasys Networks Huawei (Extreme ... 8270, and 8290 to one

Recommended