+ All Categories
Transcript
Page 1: What's New in StealthWatch v6.5

Looking for the Weird: Detecting "Bad" Traffic and Abnormal Network Behavior 

CHARLES HERRING

@CHARLESHERRING

HTTP: / / F15HB0WN.COM

CHERRING@L ANCOPE .COM

Page 2: What's New in StealthWatch v6.5

AgendaDefinitions

NBAD Specific Detection Approaches

Example Breaches

Page 3: What's New in StealthWatch v6.5

Overview - DefinitionsWhat is NBAD?

What is NetFlow?

Detection Schools

Page 4: What's New in StealthWatch v6.5

What is NBAD?Network Behavioral Anomaly Detection

Data source = Network MetaData (NetFlow)

Probe locations = Core or deeper

Quantity/Metric Centric (not Pattern/Signature Centric)

Sometimes used to refer to NetFlow Security Tools

Page 5: What's New in StealthWatch v6.5

5

OSS NBAD - SilK/PySiLK

Page 6: What's New in StealthWatch v6.5

6

Commercial SolutionsArbor PeakFlow

IBM Qradar

Invea-Tech FlowMon

Lancope StealthWatch

ManageEngine

McAfee NTBA

Plixer Scrutinizer

ProQSys FlowTraq

Riverbed Cascade (formerly Mazu)

* For comparison see Gartner Network Behavior Analysis Market December 2012 (G00245584)

Page 7: What's New in StealthWatch v6.5

8

Network Logging Standards

NetFlow v9 (RFC-3950)

IPFIX (RFC-5101)

Rebranded NetFlow◦ Jflow – Juniper◦ Cflowd – Juniper/Alcatel-Lucent◦ NetStream – 3Com/Huawei◦ Rflow – Ericsson◦ AppFlow - Citrix

Basic/Common Fields

Page 8: What's New in StealthWatch v6.5

Detection MethodsSignature = Inspect Object against blacklist

◦ IPS◦ Antivirus◦ Content Filter

Behavioral = Inspect Victim behavior against blacklist◦ Malware Sandbox◦ NBAD/UBAD◦ HIPS◦ SEIM

Anomaly = Inspect Victim behavior against whitelist◦ NBAD/UBAD

Page 9: What's New in StealthWatch v6.5

Comparison of Detection Methods

Signature Behavior AnomalyKnown Exploits Best Good Limited

0-Day Exploits Limited Best Good

Credential Abuse Limited Limited Best

Page 10: What's New in StealthWatch v6.5

Overview – NBAD Detection ApproachesSignature

Behavioral

Anomaly

Page 11: What's New in StealthWatch v6.5

NBAD Detection - SignatureSegmentation Enforcement

Policy Violations

C&C Connections

Pro’s: Certainty can be established; Easy to set up; Deep visibility (without probes)

Con’s: Only detects “Known Threats”

Page 12: What's New in StealthWatch v6.5

Boolean DetectionIDS Signature?

VA mark

ed vulnerable?

NetFlow

shows return

ed data?

Trigger

Breach

Alarm

13

• Requires understanding of “bad” scenario• Dependent on reliable (non-compromised) data

sources• Data sources rely on signature (known bad) detection• NetFlow usage limited to communication tracking

Page 13: What's New in StealthWatch v6.5

NBAD Detection - BehavioralScanning

SYN Flood

Flag Sequences

Pro’s: Doesn’t need to know exploit

Con’s: Must establish host counters

Page 14: What's New in StealthWatch v6.5

NBAD Detection – Anomaly Pro’s: Can Catch Sophisticated/Targeted/Unknown Threats

Con’s:◦ Requires Host and User Profiles◦ Requires Specific Baselines/Policies◦ Output requires interpretation◦ Requires massive data collection/processing◦ Requires Algorithmic Calculation

Page 15: What's New in StealthWatch v6.5

Algorithmic Detection

16

• Based on knowing normal• Dependent on raw NetFlow MetaData (multiple sources)• Does not require understanding of attack• Output is security indices focused on host activity

Host Concern Index =

1,150,000

Slow Scanning Activity : Add

325,000

Abnormal connections: Add 425,000

Internal pivot activity: Add

400,000

Page 16: What's New in StealthWatch v6.5

NBAD Detection – Anomaly TypesService Traffic Threshold Anomaly

Service Type Anomaly

Geographic Traffic Anomaly

Time of Day Anomaly

Geographic User Anomaly

Data Hoarding

Data Disclosure

Page 17: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Service Traffic Threshold Anomaly

Page 18: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Service Type Anomaly

Page 19: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Geographic Traffic Anomaly

Page 20: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Time of Day Anomaly

Page 21: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Geographic User Anomaly

Page 22: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Data Hoarding

Page 23: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Data Disclosure

Page 24: What's New in StealthWatch v6.5

Overview – Specific NBAD BreachesHealth Care vs. State Sponsored

State/Local Government vs. Organized Crime

Agriculture vs. State Sponsored

Higher Education vs. State Sponsored

Manufacture vs. Activists

Page 25: What's New in StealthWatch v6.5

Patient Data to East AsiaVictim Vertical: Healthcare

Probable Assailant: State Sponsored

Objective: Theft of patient healthcare records

Motivation: Geopolitical/Martial

Methodology: ◦ Keylogging Malware◦ Configuration change of infrastructure

NBAD Type: Enforcement Monitoring

Page 26: What's New in StealthWatch v6.5

Geographical Anomaly

Page 27: What's New in StealthWatch v6.5

Cardholder Data to East Europe Victim Vertical: State/Local Government

Probable Assailant: Organized Crime

Objective: Theft of cardholder data

Motivation: Profit

Methodology: ◦ Coldfusion exploit of payment webserver◦ Recoded Application◦ Staged data on server; uploaded to East Europe FTP server

NBAD Type: ◦ Geographic Anomaly◦ Traffic Anomaly

Page 28: What's New in StealthWatch v6.5

Geographical Traffic Anomaly

Page 29: What's New in StealthWatch v6.5

Intellectual Property to East Asia Victim Vertical: Agriculture

Probable Assailant: State Sponsored

Objective: Theft of food production IP

Motivation: Profit/National Competition

Methodology: ◦ Spearphish of administrator◦ Pivot via VPN◦ Pivot via monitoring servers◦ Direct exfiltration

NBAD Type: ◦ Geographic Traffic Anomaly◦ Geographic User Anomaly◦ Traffic Anomaly

Page 30: What's New in StealthWatch v6.5

Recon from Monitoring Servers

Page 31: What's New in StealthWatch v6.5

Geographical Anomaly

Page 32: What's New in StealthWatch v6.5

Theft of Research Data Victim Vertical: Higher Education

Probable Assailant: State Sponsored

Objective: Theft sensitive research data

Motivation: Geopolitical/Martial

Methodology: ◦ Direct access to exposed RDP Servers◦ Bruteforce of credentials

NBAD Type: ◦ Service Traffic Anomaly◦ Geographic Traffic Anomaly

Page 33: What's New in StealthWatch v6.5

Traffic Anomaly

Page 34: What's New in StealthWatch v6.5

Theft of Customer Data Victim Vertical: Manufacturing

Probable Assailant: Activist

Objective: Publish stolen customer data

Motivation: Embarrassing Victim

Methodology: ◦ SQL Injection to Customer Portal

NBAD Type: ◦ Recon detection◦ Traffic Anomaly to Internet◦ Traffic Anomaly to Webserver from DB

Page 35: What's New in StealthWatch v6.5

Recon before SQLi

Page 36: What's New in StealthWatch v6.5

Anomalous Data Exfiltration

Page 37: What's New in StealthWatch v6.5

Catching Breaches with NBAD

CHARLES HERRING

@CHARLESHERRING

HTTP: / / F15HB0WN.COM

CHERRING@L ANCOPE .COM

Questions?


Top Related