OSSIM Presentation CIO2013 v5
OSSIM Presentation CIO2013 v5
OSSIM Presentation CIO2013 v5
Dean Faculty of Engineering & Applied Sciences Director Information Technology Professor of Electrical Engineering DHA Suffa University Karachi, Pakistan
Agenda
Introduction to Security Information and Event Management Understand the business case for a SIEM solution Understand the technical architecture of a SIEM solution Get familiar with an economical and open source SIEM solution OSSIM
2
Wireless Network
Infrastructure Access Points and smaller access points provide wireless networking coverage to entire DSU campus.
IT Applications
Laptop
PDA
LMS Email Timetable Student Feedback Online Admission Test Instant Messaging Network Mgmt Service Directory Services Terminals Services Desktop Applications Engineering Design Apps Online Admission Application Storage Services Video Conference Service ERP Accounting Student Records Library Management
DSU Data
DSU Firewall
VPN access to DSU Network for Faculty and Students. Through VPN all IT services can be accessed securely from any remote location Email Web
Servers
PERN Video Conferencing
Internet 10 + 10 MBPS
Asset
Compromise Individual Host or Application
End Value
Fame Theft Espionage (Corporate/ Government)
Compromise Environment
Middle Men
Compromised Host and Application
End Value
Fame Theft Espionage (Corporate/ Government) Extorted Pay-Offs
Malware Writers Worms Viruses Trojans Spyware Information Harvesting Machine Harvesting Bot-Net Creation Extortionist/ DDoS-for-Hire
Pharmer/DNS Poisoning
From: Security Information Management (SIM) Technology Brief, Ken Kaminski, Cisco Systems, Security Architect Northeast US, CISSP, GCIA
From: http://www.scmagazineus.com/hacker-arrested-in-greece-for-stealing-selling-weapons-data/article/104718/
From: http://www.wired.com/threatlevel/2008/10/fed-blotter-new/
APT - Example
June, 2010 StuxNet Worm Target: Natanz Nuclear Facility Motivation: Cyber Sabotage?
10
11
12
13
Old Windows
14
New Linux
15
Regulatory Compliance
HIPAA, SOX, FISMA, GLBA, FDA, PCI, Basel II, OSHA and ISO 27002 Need to respond timely to security events
HIPAA: Health Insurance Portability and Accountability Act SOX: Public Company Accounting Reform and Investor Protection Act of 2002 and commonly called SOX FISMA: The Federal Information Security Management Act of 2002 FDA: The Food and Drug Administration PCI Data Security Standard (PCI DSS): The Payment Card Industry (PCI) and Validation Regulations Basel II: The New Accord: International Convergence of Capital Measurement and Capital Standards GLBA: Gramm-Leach-Bliley Act, also known as the Gramm-Leach-Bliley Financial Services Modernization Act ISO/IEC 27002 (formerly 17799) is an information security standard published and most recently revised in June 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) OSHA: The United States Occupational Safety and Health Administration
compliance - a state or acts of accordance with established standards, specifications, regulations, or laws. Compliance more often connotes a very specific following of the provided model and is usually the term used for the adherence to government regulations and laws
http://searchcio.techtarget.com/sDefinition/0,,sid182_gci947386,00.html
16
17
18
SIEM
A SIEM or SIM is a computerized tool used on enterprise data networks to centralize the storage and interpretation of logs, or events, generated by other software [or hardware] running on the network A new concept (About 10 Years old) A natural evolution of log management A SIEM enables organizations to achieve roundthe-clock pro-active security and compliance.
19
Log management Automation in collection of logs in a central place e.g. syslog-ng Tools for log searching and analysis Still a dependence on expert human for analysis
Typical human expert cannot process more than a 1000 events a day
20
Logs
What Logs? Audit Logs Transaction Logs Intrusion Logs Connection Logs System Performance Records User Activity Logs Misc. alerts and other messages From Where? Firewalls/Intrusion Prevention Routers/switches Intrusion Detection Servers, Desktops, Mainframes Business Applications Databases Anti-virus VPNs 21
UNIX Syslogs
787,000 Events
Firewall
12,000 Events
Antivirus
3 MILLION 15,000 24 8
TOTAL EVENTS CORRELATED EVENTS DISTINCTIVE SECURITY ISSUES INCIDENTS REQUIRING ACTION
22
Firewalls, IDS, IPS, Anti-Virus, Databases, Operating Systems, Content filters Information overload
Making sense of event sequences that appear unrelated False positives and validation issues Heterogeneous IT environment
23
Too much data, but not enough information High Signal To Noise Ratio No situational awareness Too many tools to isolate root cause
Improve Efficiency
Risk/Cost
Time to remediate
25
Increase overall security posture of an organization Turn chaos into order Aggregate log file data from disparate sources Create holistic security views for compliance reporting Identify and track causal relationships in the network in near real-time Build a historical forensic foundation
26
R Box
A Box
K Box
A Box
Incident Analysis
K Box
Knowledge base
Aggregate
D Box
D Box
Normalize
Translate disparate syntax into a standardized one
C Box
C Box
C Boxes
Correlate
If A and B then C
Collection boxes
Report
State of health Policy conformance
E Box
E Box
E Box
E Box
E Box
E Boxes
Archive
27
NOC vs SOC
Separates auditing role from operations role
28
State-of-the-art Cyber Security Operations Center, a comprehensive cyber threat detection and response center that focuses on protecting Northrop Grumman and its customers networks and data worldwide. (Northrop Grumman)
29
http://www.armybase.us/2009/07/northrop-grumman-opens-cyber-security-operations-center/
Reactive
Incident Response, Notification, Tracking, Analysis, Containment, Eradication, and Remediation
Proactive
Network Vulnerability Scanning: Network, Systems
Predictive
Strategic Analysis
S O C
Vulnerability Handling
Third-Party Pen. Testing (3rd Party) Email Filtering & Blocking DNS Sinkhole Threat Tracking, Monitoring, & Mitigation Patch/Asset Management
Situational Awareness: Log Monitoring, Event Aggregation and Correlation (SIM) Flow/Network Behavior Monitoring Host Based Monitoring System (HBSS): Antivirus, Firewall, Anti-Malware, Application White listing Active Protection: Intrusion Prevention System (IPS)
30
31
Open source is free software ! Software is free, people are not ! Free as in freedom not necessarily as in free beer Open source is a viable business model Open source is a better software engineering methodology
Given enough eye-balls, all bugs are shallow Linus' Law
32
Commercial products have a high cost of entry barrier User can become confused with the:
Open source SIEM has matured can compete head-on with commercial offerings Open Source SIEM can even be used as a learning tool requirements analysis tool for a commercial SIEM specifications
33
Made of best of breed open source security tools: snort, ntop, nmap, nagios Full installer plug & play Integrated Graphical Management Console Includes Reporting Engine (JasperReports) with pre-designed reports Commercially supported - AlienVault Implemented in local companies
34
35
36
OSSIM Pros
Extendable Stable Low cost Works with native tools and mechanisms
38
39
SIEM Concepts
40
The different tools integrated in OSSIM can be classified into two categories:
Active: They generate traffic within the network which is being monitored. Passive: They analyze network traffic without generating any traffic within the network being monitored.
The passive tools require a port mirroring /port span configured in the network equipment. 41
Collectors
Detectors
42
Sensor: Collection
The Sensor can aggregate events using multiple collection methods
43
Sensor: Detection
Detection is done by setting the Sensors NIC into promiscuous mode to collect all the traffic on the monitored network
HUB Port Mirroring/Spanning Network Tap
44
Event
Any log entry generated by any Data Source at application, system or network level will be called an event. For SIEM it is important to know:
When has the event been generated? What is involved? (Systems, users, ) Which application generated the event? Whats the event type?
45
The SIEM
The SIEM component provides the system with Security Intelligence and Data Mining capacities, featuring:
Real-time Event processing Risk metrics Risk assessment Correlation Policies Management Active Response Incident Management Reporting 46
Database
The AlienVault database runs on a MySQL server SIEM Events, configurations, and inventory information are stored in the Database Database is a required component in any AlienVault deployment, even if no Logger is being used
48
Detection
The process of identifying behavior that leads to the generation of an event Multiple elements that can be used by SIEM to provide detection capabilities:
Snort, Ntop, Arpwatch (Example Data Sources included in AlienVault) Existing corporate applications/tools Tools that have been deployed prior to SIEM installation (Firewalls, Antivirus)
49
Collection
The task that determines which events shall be collected into the Server Collection is done by the Sensors Server can collect events using multiple methods:
Some require configuring the Data Source to send events to the Sensor (E.g.: Syslog, FTP...) Other require the Sensor gathers the events from the application or device (WMI, SQL, SCP...)
50
Normalization
The process of translating the events generated by different tools into a unique and normalized format
Normalization is done in the Sensor Log information is normalized using regular expressions by AlienVault Sensors
End Device/App
Sensor
event type="detector" date="2008-03-22 20:40:15" sensor="192.168.1.109" interface="eth0 plugin_id="4005" plugin_sid="2" src_ip="192.168.1.109" dst_ip="192.168.1.109" username="root" log="Mar 22 20:40:15 ossim-A su[27992]: Successful su for root by root"
SIEM Server
51
Data Source
A Data Source is any application or device that generates logs, events and information AlienVault can collect events from any Data Source by using a Data Source Connector (Plugin)
52
Data Source ID
The Data Source ID (Formerly known as Plugin_id) is a unique number used by AlienVault to identify each of the Data Source types that send events to AlienVault
This number is used in correlation rules and when defining Policy Rules
53
Event Type
The Event Type (Formerly known as Plugin_sid) is a unique number (Within each Data Source) that identifies the different events a Data Source is able to generate.
The Event Type always has to be associated to a Data Source ID, since multiple Data Source ID can share common Event Types.
(E.g.: 404 Event Type in Apache and IIS)
54
Assets
An Asset is any device available on a network that is being monitored by SIEM
Assets in AlienVault have a value (0-5). Each Asset will have a different value depending on their task within the network Assets in AlienVault:
55
Asset Value
Every Asset in AlienVault has an Asset Value (0-5)
Assets not defined within the AlienVault Inventory have a default
Asset Value of 2
Assets will have different values depending on their role within the
monitored network
E.g.: A printing company
Printers will be a very high asset value
56
57
Event Priority
Priority is the importance of the event itself It is a measure which tries to determine the relative impact an event could have in our network.
Priority is a value between 0 and 5
0 1 2 3 4 5 No importance Very Low Low Average Important Very Important
58
Event Reliability
Reliability determines the probability of an attack being real or not.
E.g.: A single authentication failure.
Would you be able to determine if it is a real attack (Brute Force attack) using a single event?
59
Event Risk
The SIEM calculates a risk for each event processed in the SIEM
The Event Risk is a numeric value (0-10)
60
Alarm
Any event with a risk value greater than or equal to 1 will become an alarm.
An alarm is a special type of event since it can have more than one event originating it. Correlation doesnt generate alarms (done by server during R.A), it will generate new events that may or may not become alarms.
61
Correlation
Correlation is the process of transforming various input data into a new output data element Using correlation we can transform two or more input events into a more reliable output event Through correlation of various events from disparate data sources a SIEM delivers greater Security Intelligence
62
Aggregated Risk
Apart from calculating a risk value for each event, the AlienVault SIEM also maintains an Aggregated risk indicator for each asset of the network
This aggregated risk is stored in two properties of each asset within AlienVault
Compromise: Compromise means a network element is generating lots of events as source, this is, its behaving like if its been compromised Attack: Attack is a value that measures the level of attack an element has received in our network, that is, how much it has been attacked
63
Compromise Value
Compromise value is increased by taking into account the risk of the event calculated using the Asset Value of the source (The Asset value of the destination is ignored even if it is higher)
This value increases the compromise value of the host, the compromise value of the host groups, networks and network groups the host belongs to, as well as the global compromise
64
Attack Value
Attack value is increased by taking into account the risk of the event calculated using the Asset Value of the destination (The Asset value of the source is ignored even if it is higher)
This value increases the attack value of the host, the attack value of the host groups, networks and network groups the host belongs to, as well as the global attack value
65
66
67
Conclusions
OSSIM provides SIEM capabilities to small and medium sized organizations OSSIM leverages best of breed open source tools and combines them into integrated SIEM to manage security events OSSIM can be setup quickly time is money
68
Thank You !
69