Download Visualization

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Post-quantum cryptography wikipedia , lookup

Deep packet inspection wikipedia , lookup

Airport security wikipedia , lookup

Information privacy law wikipedia , lookup

Cyberwarfare wikipedia , lookup

Unix security wikipedia , lookup

Wireless security wikipedia , lookup

Security printing wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Cyberattack wikipedia , lookup

Information security wikipedia , lookup

Mobile device forensics wikipedia , lookup

Mobile security wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Security-focused operating system wikipedia , lookup

Distributed firewall wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Computer security wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Computer Forensics in Practice
Armed Forces of the Slovak Republic
mjr. Ing. Albert VAJÁNYI
1Lt. Ing. Boris ZEMEK
(c) May 2005
Communication and Information System
Control and Operation Centre
Information Security Centre
InfoSec Centre Chief
mjr. Ing. Albert VAJÁNYI
Division Chief
1Lt. Ing. Boris ZEMEK
(c) May 2005
What is computer forensics anyway?
The application of computer investigations and analysis
techniques in the interests of determining potential legal
evidence.
Computer specialists can draw on an array of methods for
discovering deleted, encrypted or damaged file
information.
(Rorrins, 1997)
You don’t know what happened on your network.
A network forensic analysis tool can effectively answer the difficult
question “What happened?” in the aftermath of a security incident.
That tool provides a passive network monitoring solution that visualizes
the network activity.
A network forensics analysis tool can visualize and analyze data from
firewalls, IDS, IPS, syslogs, audit systems and more.
Key Features of Forensic Tools
• Data collection and visualization
– Monitor and analyze data from all seven layers of the Open
Systems Interconnection (OSI) stack
– Relational, Tree ontology for knowledge base
– TCP dump recording: records traffic being monitored in an
unprocessed, binary state
• Pattern and content analysis
– Powerful visualizations expose anomalous activities, providing
visibility into network communications before, during and after a
suspicious event
– Functions irrespective of language using n-gram analysis
Key Features of Forensic Tools
• Forensic analysis and investigation
- Graphical arrangements include source, destination, time, type and
duration of communication and content
- Rebuild crime pattern
- Playback events
- Generate reports and visual representations of the suspicious
activity
- Report on key security and network parameters
Forensics Technology Services – FTS
• Digital Evidence Recovery
It is a technique of finding and extraction evidence. A lot of times the
legislative designates how to confidence a digital evidence.
• Cyber Forensics
Some specialists score incidents to the network. Cyber Forensics
shows who made an attack.
Forensics Technology Services – FTS
• Forensic Data Analysis
It is an interpretation of vast multiple data by using visualization
techniques.
• Document Management Services
Making documents accessible helps sharing essential knowledge. In
your investigations you can draw upon modern document management
tools that allow you to archive, search, find, organising and reproduce
documents.
Requirements for Forensics Tools
COLLECTING
ANALYZING
Real-Time
Traffic Analysis
Knowledge
Base
2D or 3D VISUALIZATION
Post Event
Database
Meta Data and
Content Analysis
Context
Analyzer
Data
Visualization
Types of Collecting Data
All logs are collecting to the Central logs base!!!
Types:
- IDS/IPS logs
- Firewall logs
- Sys logs
- SQUID logs
- Audit system logs
- and more
Security operation centre
Network operation centre
Service Alarms
Security Alarms
Network monitoring
Central logs base
Security Information
Management System
Any Public
Network
Server Farm
Server Farm
Server Farm
Intranet
Server Farm
Security Information Management
What is Security Information Management (SIM)?
SIM provides a simple mechanism that allows security teams
to collect and analyze vast amounts of security alert data.
More specifically, SIM solutions collect, analyze and correlate – in
real-time – all security device information across an entire
enterprise.
Correlated results are then displayed on a centralized real-time
console that is part of an intuitive graphical user interface.
Security Information Management
SIM can be divided into four different phases:
1)
2)
3)
4)
Normalization
Aggregation
Correlation
Visualization
SIM utilizes normalization, aggregation, and correlation to sift through mountains of
security activity data on a real-time basis – correlating events, flagging and rating the
potential seriousness of all attacks, compromises, and vulnerabilities. The power of SIM
technology allows a relatively small security staff to dramatically reduce the time between
attack and response.
.
Security Information Management
Normalization is the process of gathering individual security device
data and putting it into a context that is easier to understand, mapping
different messages about the same security events to a common alarm
ID. Keeping in mind that there are no standards in the security device
industry, normalization alone is a tremendous asset to security teams.
Aggregation eliminates redundant or duplicate event data from the
security event data stream, refining and optimizing the amount of
information that is presented to security analysts.
Security Information Management
Correlation uses software technology to analyze aggregated data, in real-time,
to determine if specific patterns exist. These patterns of similar security events
often correspond to specific securityattacks – whether denial of service,anti
virus, or some other form of attack.
Visualization, the final step in SIM, is the graphical representation of
correlated information in a single, real-time console.
Effective visualization lets security operators quickly identify and respond to
security threats as they occur, before they create problems within the
enterprise.
Systems alarms remapping
Original logs from systems around 20 000 types
Sep 27 16:22:43
dmzserver
su(pam_unix)[10983]:
session opened for user
nf by root(uid=0)
Changed to 100 NF
types
Forbidden Database
Access
Access / Authentication /
Authorization
Application Exploit
Privilege Escalation
Sep 27 16:36:12
[192.168.177.1] Sep 27
2004 16:36:12: %PIX-6605005: Login permitted
from
192.168.177.2/44743 to
inside:192.168.177.1/ssh
for user "pix_ADMIN“
9 categories of
NF alarms
Configuration /
System Status
Evasion
Security Policy
Change
Policy Violations
Authentication
succeed
Attempts
Reconnaissance
Unknown / Suspicious
Virus / Trojan
Security operation centre
Network operation centre
Service Alarms
Security Alarms
Place Forensics Tool in Network
Security Information
Management System
Central logs base
Any Public
Forensics Tool
Network
Server Farm
Server Farm
Server Farm
Intranet
Server Farm
Network Forensics Analyzer
Examples of Visualization
Visualization of Firewall Data
• Quickly visualize and understand relationships in firewall data
across time
• Source_IP ——— # of occurrences ——— Dest_IP
Source_IP versus Firewall Action
• Source_IP ——— # of occurrences ——— Firewall Action
• Green = Accept
Red = Reject
Blue = Drop
Event Correlation
Blocked Firewall
Traffic
VPN Traffic
Events
Overlay Intrusion
Detection
System Alerts
Exercises of anomaly
Exercises of anomaly
E – mail: [email protected]