NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t...

32
Advanced Security Analytics: NetFlow for Incident Response

Transcript of NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t...

Page 1: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

Advanced Security Analytics: NetFlow for Incident Response

Page 2: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

2015: The Year of the Breach

> 200 Million PII exposed

• Ashley Madison• Office of Personnel Management• Anthem• VTech• Hilton• LATEST – Wendy’s

2016 – The Year of Ransomware

Page 3: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

What Motivates Cyber Criminals•Financial Gain

• Personally identifiable information (PII)

• Intellectual Property

• Ransom

• Access to your bank accounts

•Your servers to host malware

• Increase botnet nodes for attacks

Page 4: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

Why Can’t You Detect Them?

•Zero Day• No signature match

•They make outbound connections•They embrace encryption for secure connections•They know DNS in your blind spot•They use the authentication system you setup!

Page 5: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

2014 2015 Today

Encryption Growth Rate

70%29%

Page 6: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

What is NetFlow/IPFIX

Page 7: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

NetFlow – What it is…

OutboundPhone Calls

Outbound Flow Data

Page 8: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

A

B

A - sending to B is one flow entry on every NetFlow capable router / switch in the path

B - acknowledging A is a 2nd

flow

NetFlow – How it works…

Page 9: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

IPFIX

• Internet Protocol Flow Information Export (IPFIX)• Designed as a common standard for defining how IP Flow

information can be exported from routers, measurement probes, or other devices for billing and network management systems.

• The RFC draft of 5101 was approved as standard – July ’13• What does this mean?• Who supports IPFIX?

Page 10: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

NetFlow/IPFIX Supported Vendors

• 3Com• Adtran• Barracuda• Blue Coat• Cisco• Citrix• Dell• Enterasys

• Plixer• Riverbed• SonicWALL• VMware• Vyatta• Xirrus• Others …

• Expand• Extreme• FatPipe• Juniper• Mikrotik• Nortel• YAF• Palo Alto

Page 11: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

How to Combat: Reduce Complexity

1.Analyze Behavior2.Profile3.Threshold4.Correlate DNS5.Alarm

Page 12: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

Identifying Malware Requires

• Network Traffic Monitoring• Host-based information monitoring

Page 13: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

Profile Your Oracles – Critical Resources

• Before setting thresholds, use flow data to determine certain behaviors that are normal. For example:

• Volume of flows from a host• Max number of end systems it communicates within 5 minutes• Average bytes transmitted• The ports it communicates on

• Loaded with a historical profile, you can set thresholds which build upon your threat index!

Page 14: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

Host Indexing

• Index every IP seen on your network• Search across TRILLIONS of records in

SECONDS.• Clean search & result GUI• Can be queried by a new API runmode

for security vetting automation

Page 15: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

Network as a Sensor: Collect AVC Flows

Page 16: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

AVC: Incident Response

Page 17: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

AVC: Performance

Page 18: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

Elasticsearch

FlowProDefender

Cloud Services

DNS

DNS

ApplicationServers

Scrutinizer

FlowReplicator

BYOD

Desk Tops

Security as a Platform

• FireSIGHT• Splunk• Elasticsearch• FlowPro Defender

Splunk

FireSIGHT

Page 19: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

FlowProDefender

Cloud Services

DNS

DNS

ApplicationServers

Scrutinizer

FlowReplicator

BYOD

Desk Tops

FireSIGHT Integration

• Username• Application• FS App• URL• HTTP Host• Web event &

Rule Details FireSIGHT

Elasticsearch Splunk

Page 20: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

FireSIGHT Server

Cisco ASAs with FirePOWER

Scrutinizer

FireSIGHT Integration

Page 21: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections
Page 22: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

DNS

• Cloud, Virtualization, & Encryption make it difficult to collect flow data directly from all source devices.

• Visibility suffers as a result!

DNS

Visibility Challenge

Page 23: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections
Page 24: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

DNS

Page 25: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections
Page 26: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

FlowProDefender

Cloud Services

DNS

DNS

ApplicationServers

Scrutinizer

FlowReplicator

BYOD

Desk Tops

FlowPro Defender

• DNS Data Leak• Botnet Detection• DNS C2 detection• Data exfiltration• DNS to flow

correlation FireSIGHT

Elasticsearch Splunk

Page 27: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections
Page 28: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

DNS Data Leak and Exfiltration

Trusted Vendors are sneaking past your firewall. c-0.b3000081.50083.15e0.1e2a.36d4.210.0.mfunhzl9whredkfbfe2qvdhiti.avts.mcafee.com

1009050090202.000001000.001010101010101010.110100123.dc1a8ae28a4a4ea8938842445c903a91.6b4c217548c84de99d42b0262debd80d.11000.h.00.mac.sophosxl.net

Page 29: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections
Page 30: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections
Page 31: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

Who

When

Where

WhatHow much

Page 32: NetFlow for Incident Response - Cybersecurity · •Increase botnet nodes for attacks. Why Can’t You Detect Them? •Zero Day •No signature match •They make outbound connections

Thank You for Attending! Thomas Pore

Director of IT & [email protected]

www.plixer.com/unc