Next Generation Security Operation Center for NCHC

advertisement
Security Operation Center for
NCHC
Professor Ce-Kuen Shieh
General Director, National Center for High-performance
Computing
National Cheng Kung University
Outline
•
•
•
•
•
•
Brief Introduction to NCHC
Purpose of Security Operation Center
Architecture of SOC
Features of NCHC SOC
Main Achievements
Summary
2
NARLabs Organization
Board of Directors
President
Consultation Committee
Vice President
Taiwan Typhoon & Flood Research Institute
National Center for High-performance
Computing
National Center for Research on Earthquake
Engineering
National Chip Implementation Center
Taiwan Ocean Research Institute
National Laboratory Animal Center
National Nano Device Laboratories
企 業 行 財 稽
Instrument Technology
政 務Center
核
劃 務 Research
考 推 管 會 室
廣 理 計
核Organization
National Space
室 室 室 室
Science & Technology Policy Research and
Information Center
資
訊
管
理
室
NCHC Milestones
2008
Taichung Office
Opened
2005
2003
Tainan Office
Opened
Became
Incorporated
1993
Hsinchu Headquarters
Opened
1991
Officially Founded
4
Categories of NCHC’s Tasks
• Service
– Computing
– Storage
– Networking
• Research & Development
–
–
–
–
Modeling & Simulation
Big Data Applications
Open Source Software Development
Software Defined Network
5
HPC, Storage and Network Services
• Open to academic, research, and Industrial users
• Supporting 700+ research projects per year
ALPS, 2011: Rmax 177 TFLOPS, 442.00 MFLOPS/W
Formosa series built by ourselves
NCHC Total Computing Capacity
Storage Capacity
TaiWan Advanced Research and
Education Network (TWAREN)
• 20Gbps backbone (Toward 100 G)
• 5Gbps international connection
Rmax(TF)
• Three-site, 3-tier backup
• Total capacity 5.4 PB
400
289.4 308.9 308.9
300
200
100
0
31.7
31.7
46.9
2008 2009 2010 2011 2012 2013
Year
6
Self-built Cluster Computers
2012
Formosa 5
2011
2005
2003
Formosa 1
• The first PC
Cluster for
online
service
Formosa 2
• The first 64-bit •
PC Cluster for •
online service
• 64-bit Dual- •
Core CPU and
InfiniBand
2010
Formosa 3
Cloud Cluster
Virtualization and
Green Computing
Cloud IaaS Service
Formosa 4
• Cloud Cluster
• GPU accelerator
• Cloud Cluster
• Big memory
• Hybrid-Computing
Platform
2011 TOP500 #232
2011 TOP500 #234
2011 Green500 #62
2011 Green500 #37
2003 TOP500 #135
7
Backbone Network Service
TWAREN
TaiWan Advanced &
REsearch Network
• TWAREN
– Domestic backbone : 20Gbps
• 12 regional networks
• 95 universities & research institutes
• 500K users
– International connection : 5Gbps
• w/35 int’l research networks
– Network usability : 99.99%
– Shared with TANET (managed by MOE)
• 4000 schools, 4M users
TWAREN Domestic Backbone
TWAREN跨國連網圖
TWAREN International
Connection
•100Gbps backbone is coming by the end of this year
8
Cyber Threats to Taiwan
• Taiwan is at the frontline in an emerging global
battle for cyberspace
– No.4 of Most Botnet Activity in 2013
– No.5 of Top Attack Traffic Originating Countries in
Top Attack Traffic Originating Countries
2013
Country
Q4'13 Traffic %
Q3'13 %
4
Source from: Symantec 2014 Internet Security Threat Report, Volume 19
5
China
43%
35%
US
19%
11%
Canada
10%
0.40%
Indonesia
5.70%
20%
Taiwan
3.40%
5.20%
Netherlands
2.70%
0.50%
Russia
1.50%
2.60%
Brazil
1.10%
2.10%
Romania
0.90%
1.70%
Germany
0.80%
0.90%
Other
12%
17%
Source from: AKAMEAI’s state of the Internet, Q4 2013 report
9
Purpose of SOC
• Security Operation Center (SOC) is to ensure
information security of internet users by
–
–
–
–
–
Security device management
Vulnerability management
Network threat detection
Security event management
Incident response
10
Architecture of SOC
Procedure
Device
Management
Level 2
Security
Analysts
Threat and
Vulnerability
Management
Software
Engineers
Incident
Response
Incident
Handlers
People
Level 1
Security Operators
Software
Security Information and Event Management
(SIEM)
Hardware
Security and Network Devices
11
Features of NCHC SOC
• Hybrid Intrusion Detection System
• Security Intelligence Dashboard and
Visualization of Information Security
• Sharing intelligences with Information Sharing
and Analysis Center (A-ISAC)
• Joint Defense among TANet partners
12
Hybrid Intrusion Detection System
Detecting Known network attacks
by signatures and patterns.
DDoS
Network Intrusion
Detection System
Hackers
SIEM
Network Worms
Phishing
emails
Distributed
Honeynet
System
Event Correlation and
incident identification
Collecting Unknown network threats and
malware samples for further analysis.
13
Hybrid Intrusion Detection System
• Network Intrusion Detection System
– Enterprise and Open-source solutions
– APT Mail Detector
– Secure Web Gateway
• Distributed Honeynet System
– Low-interaction honeypots
– Simulating vulnerable systems for network threats
– Collecting malware samples and suspicious exploit
traffic for further research
– Analyzing Malware behavior for potential threats
14
Distributed Honeynet System
• Using 6000+ IP address
for sensor deployment
and data collection
• Cooperating with 11
National Universities
• Collecting 1,500,000+
malware samples
• Providing network
threat list for TANet
partners weekly
• Establishing Malware
Database
15
Cyber Intelligence Dashboard
• A web-based system for monitoring, managing,
reporting and notifying of events for IP enabled devices
• A Self-developed system based on open source
software to
provides cost-efficient network management services
16
Features of NCHC SOC
-Security Visualization
17
Information Sharing and Analysis
NCHC SOC shares
intelligence with other
partners through Information
Sharing and Analysis
Centers .
Taiwan
Academic
Network
G-ISAC
GSN Incidents
A-ISAC
Hinet Incidents
GSN Incidents
HiNet Incidents
NCHC SOC
Government
Service
Network
NCC-ISAC
ISPs
18
Incident Reported by NCHC SOC
Incidents from TANet users
Over 6,000 Incidents reported
by NCHC SOC in one month.
Incidents from Taiwan ISPs
NCHC SOC detected more
than 10,000 Incidents of
network attacks in one
month
19
Joint Defense of TANet partners
• 24/7 operation for ensuring
the efficiency of incident
handling.
• NCHC cooperates with 7
regional network centers
of Taiwan Academic
Network for network
monitoring and threat
detection.
• Providing digital forensics,
malware analysis and other
technical supports
20
Main Achievements
• Ensuring Information Security
– Protecting 4,000+ schools and
5 Million users
Telecom
ISAC
MSSP/SOC
EC-Cert
• Reporting real-time Incidents(Avg.)
G-ISAC
Academic
ISAC
GOV Agencies
– Taiwan: 12,000+ tickets/month
– International: 2,500+ tickets/month
TWNIC
TWCERT/CC
NTU
ASOC
NCHC
ASOC
• Malware Collection
– Malware Samples: 1.5 Million(since
CERT
ISAC
CSIRT
Forensics
SPAM Mails
Analysis
Incident
Management
TWAREN
Netflow
Malware
Analysis
Search Engine
2009)
• Big Data(Avg.)
– Honeypot: 60GB/day
– Malware: 1200+ sample/day
Netflow
Analysis
Malicious list
TWMAN
Analysis
Honeynet
Analysis
Campus
Netflow
21
Summary
• To adapt with the changing network threats,
Hybrid Intrusion Detection Systems is essential
for bettering security protection and provide
efficient security services.
• Distributed Honeynet System not only collects
network threat samples, but also brings values to
information security researches.
• Strengthening International technological
exchange and academic-industry cooperation to
extend the scope of our Joint Defense Alliance
are the our future job.
22
Q&A
23
Download