SIEM Based Intrusion Detection Jim Beechey March 2010

advertisement
SIEM Based Intrusion Detection
Jim Beechey
March 2010
GSEC Gold, GCIA Gold, GCIH, GCFA, GCWN
SANS Technology Institute - Candidate for Master of Science Degree
1
1
Objective
• Attackers are more sophisticated and
targeted in their attacks.
• Defenders need systems which help
provide visibility and altering across
numerous security systems.
• SIEM adoption driven by compliance
• Gartner says “more than 80%”
• Put “Security” back into SIEM using
real world examples.
SANS Technology Institute - Candidate for Master of Science Degree
2
SIEM System Setup
SANS Technology Institute - Candidate for Master of Science Degree
3
Basics – Outbound Traffic
• Outbound SMTP, DNS and IRC
• Unexpected outbound connections
SANS Technology Institute - Candidate for Master of Science Degree
4
New Hosts and Services
• Scanner integration for new host
and service discovery
SANS Technology Institute - Candidate for Master of Science Degree
5
Darknets
• Network segments without any live
systems, but are monitored
• Any traffic considered suspicious
• Qradar defines Darknets at setup
• Qradar Rule: Suspicious Activity:
Communication with Known
Watched Networks
SANS Technology Institute - Candidate for Master of Science Degree
6
Brute-force Attacks
• Create reports to generate statistical
data on failed logins by device, source
IP and locked accounts per day.
• Qradar provides several alerts for brute
force attacks. Login Failures Followed
by Success and Repeated Login Failures
Single Host being the most helpful
• Customize alerts for maximum impact
SANS Technology Institute - Candidate for Master of Science Degree
7
Brute-force Attacks
SANS Technology Institute - Candidate for Master of Science Degree
8
Windows Accounts
• Report of accounts created by whom
• Alerts for:
– accounts not using std naming convention
– outside of creation script timeframe
– workstation account created
– group membership adds to key groups
• Understand the account management
process and alert accordingly
SANS Technology Institute - Candidate for Master of Science Degree
9
IDS Context/Correlation
• Reduce noise by reporting based upon
high value systems or asset weights
• Add context of target operating system
• Add knowledge of vulnerabilities
• Rules
• Target Vulnerable to Detected Exploit
• Vulnerable to Detected Exploit on Different Port
• Vulnerable to Different Exploit than Detected on
Attacked Port
SANS Technology Institute - Candidate for Master of Science Degree
10
Web Application Attacks
• Analyze WAF logs if possible as header
data (POST) not available in server logs
• Create regular expressions to look for
signs of attack, for example
• /(\%27)|(\')|(\-\-)|(\%23)|(#)/ix – Detects ‘ or --
• Create and alert on web honeytokens
• Fake admin page in robots.txt
• Fake credentials in html code
SANS Technology Institute - Candidate for Master of Science Degree
11
Data Exfiltration
• Collection of flows or session data is
extremely helpful
• Reports/Alerts based upon
– Size/destination of outbound flows “Large
Outbound Data Transfer”
– Application data inside specific protocols
– Frequency of requests/application usage
– Session Duration “Long Duration Flow”
SANS Technology Institute - Candidate for Master of Science Degree
12
Client Side Attacks
• Information in Windows event logs:
– Process Information
• Start (592/4688) Ends (593/4689)
– New Service Installed (601/4697)
– Scheduled Tasks Created (602/4689)
– Audit Policy Changed and Cleared
• (612/4719) and (517/1102)
• Integration with third-party tools
SANS Technology Institute - Candidate for Master of Science Degree
13
Sample Attack
SANS Technology Institute - Candidate for Master of Science Degree
14
Summary
• Defenders need to look for indicators of
compromise across many sources
• SIEM solution centralize data
• Start small with basic methods, test,
and move to more advanced techniques
• Goal is to detect compromise and
provide as much information as possible
before starting incident response
SANS Technology Institute - Candidate for Master of Science Degree
15
Download