What's New in StealthWatch v6.5

37
Looking for the Weird: Detecting "Bad" Traffic and Abnormal Network Behavior CHARLES HERRING @CHARLESHERRING HTTP://F15HB0WN.COM [email protected]

description

Lancope’s latest release includes an intuitive Web interface and sophisticated alarming capabilities for enhanced usability, security analytics and early threat detection. The new version further improves incident response and network forensics for fending off today’s advanced attacks. Specific new features include: • The Operational Network & Security Intelligence (ONSI) dashboard, which keeps track of the attacker’s “kill chain,” providing administrators with awareness of how far attacks are progressing within their networks. • New “data hoarding” alarms that detect attackers who are moving stolen data around within internal networks or preparing it for exfiltration. • StealthWatch Labs Security Updates that provide constantly updated, automated security capabilities in the StealthWatch System to detect the latest threats. • User-defined Threat Criteria, which enable administrators to monitor their networks for targeted attack activity based on specific threat intelligence.

Transcript of What's New in StealthWatch v6.5

Page 1: What's New in StealthWatch v6.5

Looking for the Weird: Detecting "Bad" Traffic and Abnormal Network Behavior 

CHARLES HERRING

@CHARLESHERRING

HTTP: / / F15HB0WN.COM

CHERRING@L ANCOPE .COM

Page 2: What's New in StealthWatch v6.5

AgendaDefinitions

NBAD Specific Detection Approaches

Example Breaches

Page 3: What's New in StealthWatch v6.5

Overview - DefinitionsWhat is NBAD?

What is NetFlow?

Detection Schools

Page 4: What's New in StealthWatch v6.5

What is NBAD?Network Behavioral Anomaly Detection

Data source = Network MetaData (NetFlow)

Probe locations = Core or deeper

Quantity/Metric Centric (not Pattern/Signature Centric)

Sometimes used to refer to NetFlow Security Tools

Page 5: What's New in StealthWatch v6.5

5

OSS NBAD - SilK/PySiLK

Page 6: What's New in StealthWatch v6.5

6

Commercial SolutionsArbor PeakFlow

IBM Qradar

Invea-Tech FlowMon

Lancope StealthWatch

ManageEngine

McAfee NTBA

Plixer Scrutinizer

ProQSys FlowTraq

Riverbed Cascade (formerly Mazu)

* For comparison see Gartner Network Behavior Analysis Market December 2012 (G00245584)

Page 7: What's New in StealthWatch v6.5

8

Network Logging Standards

NetFlow v9 (RFC-3950)

IPFIX (RFC-5101)

Rebranded NetFlow◦ Jflow – Juniper◦ Cflowd – Juniper/Alcatel-Lucent◦ NetStream – 3Com/Huawei◦ Rflow – Ericsson◦ AppFlow - Citrix

Basic/Common Fields

Page 8: What's New in StealthWatch v6.5

Detection MethodsSignature = Inspect Object against blacklist

◦ IPS◦ Antivirus◦ Content Filter

Behavioral = Inspect Victim behavior against blacklist◦ Malware Sandbox◦ NBAD/UBAD◦ HIPS◦ SEIM

Anomaly = Inspect Victim behavior against whitelist◦ NBAD/UBAD

Page 9: What's New in StealthWatch v6.5

Comparison of Detection Methods

Signature Behavior AnomalyKnown Exploits Best Good Limited

0-Day Exploits Limited Best Good

Credential Abuse Limited Limited Best

Page 10: What's New in StealthWatch v6.5

Overview – NBAD Detection ApproachesSignature

Behavioral

Anomaly

Page 11: What's New in StealthWatch v6.5

NBAD Detection - SignatureSegmentation Enforcement

Policy Violations

C&C Connections

Pro’s: Certainty can be established; Easy to set up; Deep visibility (without probes)

Con’s: Only detects “Known Threats”

Page 12: What's New in StealthWatch v6.5

Boolean DetectionIDS Signature?

VA mark

ed vulnerable?

NetFlow

shows return

ed data?

Trigger

Breach

Alarm

13

• Requires understanding of “bad” scenario• Dependent on reliable (non-compromised) data

sources• Data sources rely on signature (known bad) detection• NetFlow usage limited to communication tracking

Page 13: What's New in StealthWatch v6.5

NBAD Detection - BehavioralScanning

SYN Flood

Flag Sequences

Pro’s: Doesn’t need to know exploit

Con’s: Must establish host counters

Page 14: What's New in StealthWatch v6.5

NBAD Detection – Anomaly Pro’s: Can Catch Sophisticated/Targeted/Unknown Threats

Con’s:◦ Requires Host and User Profiles◦ Requires Specific Baselines/Policies◦ Output requires interpretation◦ Requires massive data collection/processing◦ Requires Algorithmic Calculation

Page 15: What's New in StealthWatch v6.5

Algorithmic Detection

16

• Based on knowing normal• Dependent on raw NetFlow MetaData (multiple sources)• Does not require understanding of attack• Output is security indices focused on host activity

Host Concern Index =

1,150,000

Slow Scanning Activity : Add

325,000

Abnormal connections: Add 425,000

Internal pivot activity: Add

400,000

Page 16: What's New in StealthWatch v6.5

NBAD Detection – Anomaly TypesService Traffic Threshold Anomaly

Service Type Anomaly

Geographic Traffic Anomaly

Time of Day Anomaly

Geographic User Anomaly

Data Hoarding

Data Disclosure

Page 17: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Service Traffic Threshold Anomaly

Page 18: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Service Type Anomaly

Page 19: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Geographic Traffic Anomaly

Page 20: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Time of Day Anomaly

Page 21: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Geographic User Anomaly

Page 22: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Data Hoarding

Page 23: What's New in StealthWatch v6.5

NBAD Detection - Anomaly Data Disclosure

Page 24: What's New in StealthWatch v6.5

Overview – Specific NBAD BreachesHealth Care vs. State Sponsored

State/Local Government vs. Organized Crime

Agriculture vs. State Sponsored

Higher Education vs. State Sponsored

Manufacture vs. Activists

Page 25: What's New in StealthWatch v6.5

Patient Data to East AsiaVictim Vertical: Healthcare

Probable Assailant: State Sponsored

Objective: Theft of patient healthcare records

Motivation: Geopolitical/Martial

Methodology: ◦ Keylogging Malware◦ Configuration change of infrastructure

NBAD Type: Enforcement Monitoring

Page 26: What's New in StealthWatch v6.5

Geographical Anomaly

Page 27: What's New in StealthWatch v6.5

Cardholder Data to East Europe Victim Vertical: State/Local Government

Probable Assailant: Organized Crime

Objective: Theft of cardholder data

Motivation: Profit

Methodology: ◦ Coldfusion exploit of payment webserver◦ Recoded Application◦ Staged data on server; uploaded to East Europe FTP server

NBAD Type: ◦ Geographic Anomaly◦ Traffic Anomaly

Page 28: What's New in StealthWatch v6.5

Geographical Traffic Anomaly

Page 29: What's New in StealthWatch v6.5

Intellectual Property to East Asia Victim Vertical: Agriculture

Probable Assailant: State Sponsored

Objective: Theft of food production IP

Motivation: Profit/National Competition

Methodology: ◦ Spearphish of administrator◦ Pivot via VPN◦ Pivot via monitoring servers◦ Direct exfiltration

NBAD Type: ◦ Geographic Traffic Anomaly◦ Geographic User Anomaly◦ Traffic Anomaly

Page 30: What's New in StealthWatch v6.5

Recon from Monitoring Servers

Page 31: What's New in StealthWatch v6.5

Geographical Anomaly

Page 32: What's New in StealthWatch v6.5

Theft of Research Data Victim Vertical: Higher Education

Probable Assailant: State Sponsored

Objective: Theft sensitive research data

Motivation: Geopolitical/Martial

Methodology: ◦ Direct access to exposed RDP Servers◦ Bruteforce of credentials

NBAD Type: ◦ Service Traffic Anomaly◦ Geographic Traffic Anomaly

Page 33: What's New in StealthWatch v6.5

Traffic Anomaly

Page 34: What's New in StealthWatch v6.5

Theft of Customer Data Victim Vertical: Manufacturing

Probable Assailant: Activist

Objective: Publish stolen customer data

Motivation: Embarrassing Victim

Methodology: ◦ SQL Injection to Customer Portal

NBAD Type: ◦ Recon detection◦ Traffic Anomaly to Internet◦ Traffic Anomaly to Webserver from DB

Page 35: What's New in StealthWatch v6.5

Recon before SQLi

Page 36: What's New in StealthWatch v6.5

Anomalous Data Exfiltration

Page 37: What's New in StealthWatch v6.5

Catching Breaches with NBAD

CHARLES HERRING

@CHARLESHERRING

HTTP: / / F15HB0WN.COM

CHERRING@L ANCOPE .COM

Questions?