Security Onion - Brief

13
Security Onion NETWORK SECURITY MONITORING

description

 

Transcript of Security Onion - Brief

Page 1: Security Onion - Brief

Security OnionNETWORK SECURITY MONITORING

Page 2: Security Onion - Brief

What is Security Onion?• Security Onion is a network security monitoring (NSM) system that provides full context and forensic

visibility into the traffic it monitors

• Designed to make deploying complex open source tools simple via a single package (Snort, Suricata,

Sguil, Snorby etc.)

• Having the ability to pivot from one tool to the next to seamlessly, provides the most effective collection

of network security tools available in a single package

• Allows the choice of IDS engines, analysts consoles, web interfaces

• Free (Open Source)!!

Page 3: Security Onion - Brief

What is NSM?

“the collection, analysis, and escalation of indications and warnings (I&W) to detect and respond to intrusions.”

Page 4: Security Onion - Brief

Why do we need NSM? We can take an IDS alert

alert ip $EXTERNAL_NET $SHELLCODE_PORTS -> $HOME_NET any (msg:"GPL SHELLCODE x86 inc ebx NOOP"; content:"CCCCCCCCCCCCCCCCCCCCCCCC"; fast_pattern:only; classtype:shellcode-detect; sid:2101390; rev:7;)

And turn it into something useful!

• Full traffic packet captures

• Ascii transcripts of traffic

• Ability to carve files (or malware) for later analysis

Page 5: Security Onion - Brief

Installation – It’s Quick and Easy Run as a LiveCD

• Great way to test out • Able to do the following installations

Quick Setup• Automatically configures most of the applications• Uses Snort and Bro to monitor all network interfaces by default• Also configures and enables Sguil, Squert and Snorby

Advanced Setup• More control over the setup of Security Onion• Install either a Sguil server, Sguil sensor, or both • Select either Snort or Suricata IDS engine • Selecting an IDS ruleset, Emerging Threats, Snort VRT, or both • Configure network interfaces monitored by the IDS Engine and Bro

Page 6: Security Onion - Brief

Automated IDS Rule Updates

Pulled Pork keeps all the IDS rules up to date

Updates rules from multiple sources (Sourcefire/Snort VRT, Emerging Threats etc.)

Ability to disable rules with Pulled Pork (prevent certain events from triggering an alert)

Fully automated!

Page 7: Security Onion - Brief

Can I Write My Own Rules? OF COURSE!

•Rules are written using the Snort format

•Rules can be added to a local rules configuration file to ensure they are never deleted or overwritten by the automated IDS rules updates

•Rules can be set to either alert or drop the traffic

Page 8: Security Onion - Brief

Security Onion & NSM in Action

Page 9: Security Onion - Brief

Security Onion & NSM in Action

Page 10: Security Onion - Brief

But What About Management?

Page 11: Security Onion - Brief

Tools Over 60 custom tools Snort – Signature based IDS

Sguil – Security analyst console

Squert - View HIDS/NIDS alerts and HTTP logs

Snorby - View and annotate IDS alerts

ELSA - Search logs (IDS, Bro and syslog)

Bro - Powerful network analysis framework with highly detailed logs

OSSEC - Monitors local logs, file integrity & rootkits

Page 12: Security Onion - Brief

Conclusion

•Easy to install, configure and use (even for Windows admins)

•Signature-based detection with Snort or Suricata

•Context provided by Bro IDS

•Full packet captures mean you know exactly what a host has done

•Loaded with tools

•It’s free!! (except for the hardware)

Page 13: Security Onion - Brief

Additional Reading

Project Home - http://code.google.com/p/security-onion/

Blog – http://securityonion.blogspot.com

Mailing Lists - http://code.google.com/p/security-onion/wiki/MailingLists

Google Group - https://groups.google.com/forum/?fromgroups#!forum/security-onion

Wiki - http://code.google.com/p/security-onion/w/list