SlideShare una empresa de Scribd logo
1 de 45
Mitigating Worm Attacks
EVENING SEMINAR
Deniz Kaya
New Horizons Bulgaria
Agenda
• Introduction
• Experience
• Incident Response
• Worm Mitigation Reaction Methodology
• Tools and Techniques
• Applying the tools to Enterprise Environment
• Appendix
Introduction
• Internet worms have had a severe impact on many enterprise
customers. Recently developed tools and architectural techniques can
be employed to assist with the mitigation of worm activity in an
enterprise environment.
• Here we will speak about:
– A conceptual overview of worm mitigation techniques
– Details for deployment of these techniques into an overall solution
for enterprise customers
• This seminar was prepared from a solution standpoint. It is primarily
designed to provide a tool kit for dealing with the issue of Internet
worms within an enterprise environment. Although this is the primary
motivation, the overall solution has application well beyond this
primary purpose and additionally provides capability for detecting and
responding to other security incidents.
Experience
• The techniques described here were originally developed for large
Internet service providers (ISPs) and have been adapted for use in
enterprise environments. They are well-understood and mature
technologies, now applied in a new way to solve a new problem.
• Cisco uses the same techniques on its own network to defend against a
range of malicious activity, including worms and other security incidents.
Incident Response
• An organization’s internal operational processes are a critical aspect of dealing
with any security incident.
The overall goal of an incident response process is to maintain business operations.
Incident Response
Preparation
• Although preparation is not part of the formal incident response process, here
are some techniques that must be in place prior to the occurrence of a security
incident. Having response procedures in place facilitates efficient response
during an actual incident.
– The Cisco Network Consulting Engineers suggest the following preparatory
steps:
• Develop a clear understanding of the organization’s primary business and IT
resources.
• Arrange for 24x7 access to someone who can authorize business decisions
during a security incident.
• Establish open lines of communication. Operations groups need to know the
key contacts within the organization.
• Collect links to Internet sites that provide up-to-date and reliable details of
security threats and Internet worm activity, such
as www.dshield.org, www.securityfocus.com, and bugtraq.
• Maintain updated contact details for your ISP or ISPs.
Incident Response:
Triage: Initial Analysis and Response
• The first phase of incident response is to verify that the event is an actual
security incident, such as an attack or worm event. In some cases, an incident
could be the result of scheduled maintenance activities.
• After the event is confirmed, take quick action to limit the damage. Doing so
might entail steps such as turning off a device or removing a device from the
network. However, any actions taken need to be in line with maintaining
business continuity.
• During the process, communicate with other relevant parties within the
organization. For example, stay in touch with relevant management and legal
contacts.
Incident Response:
Analysis
• The second phase is the analysis phase.
• Next, determine the scope of the incident-the number of devices, data, and
other resources affected.
• In some cases, it might be necessary to perform a traceback to the origin of the
attack; this activity might involve working through your ISP.
• Measure the impact.
• The results of this analysis will help determine the most appropriate reaction
techniques for the specific incident.
Incident Response:
Reaction
• The reaction phase involves some action to counter the attack. Each situation
will dictate the action to be taken, such as widely deploying access control lists
(ACLs) in a worm event; restoring a device to normal operation by reloading
the OS from the original media and restoring data from backups in a server
compromise; or changing any static passwords because they might have been
compromised-and an entirely reasonable response in some situations might be
to do nothing.
• Generally, the highest priority is to regain full business operations. In many
cases it is often less important to spend time finding the perpetrator of the
attack.
Incident Response:
Post-Mortem
• A post-mortem involves a full, in-depth analysis of the event and the response
to the event. The goal is to determine what can be done to build resistance and
prevent this type of attack from happening again-essentially, learning from the
experience.
• The post-mortem is a step that is often ignored. It is critical that it is not
forgotten.
Worm Mitigation Reaction Methodology
• Following procedures should be followed when responding to a worm incident
– Containment
– Inoculation
– Quarantine
– Treatment
– Planning
Worm Mitigation Reaction Methodology:
Containment
• The first stage of the reaction process is to contain the spread of the worm
inside the network. Compartmentalization, a core principle of the SAFE
Blueprint from Cisco, is key because it allows isolation of parts of the network
that are not yet infected.
Worm Mitigation Reaction Methodology:
Inoculation
• The inoculation phase involves patching all systems. If the appropriate
signature files or plug-ins are available for tools such as OpenVAS, it is
worthwhile to start scanning the network for vulnerable systems. This activity
might allow operations staff to find vulnerable systems before they become
infected.
• During a worm crisis, there are three types of systems in your network:
– Patched systems
– Unpatched systems
– Infected systems
• Inoculating uninfected systems is imperative and usually happens in parallel
with the quarantine and treatment phases.
Worm Mitigation Reaction Methodology:
Quarantine
• The quarantine phase involves finding each infected machine and
disconnecting, removing, or blocking them from the network to prevent them
from infecting other unpatched machines on the network. To achieve this goal,
the infected systems need to be isolated and quarantined.
• Later in this seminar we will outline tools such as remote-triggered black hole
routing. This technique allows the rapid isolation of infected machines, limiting
their capability to spread the infection.
Worm Mitigation Reaction Methodology:
Treatment
• The treatment phase involves the cleaning and the patching of each infected
system. Some worms might require complete reinstallations of the core system
to ensure that the machine is clean.
Worm Mitigation Reaction Methodology:
Planning
• All of this activity requires planning prior to a worm event. When these events
occur, reaction time is critical, and these processes need to be in place. It is
strongly recommended that every organization plan the reaction methodology
ahead of the next crisis.
Tools and Techniques
• It is important to view the following techniques as a tool kit. There is currently no simple
guaranteed solution for dealing with these types of security incidents.
• The main tools we will discuss here are:
• Features
– ACLs
– NetFlow and NetFlow export
– Unicast Reverse Path Forwarding (uRPF)
– Routing protocols such as remote-triggered black hole filtering, also known as
remote-triggered black hole routing
• Products
– Cisco routers and switches
– NetFlow collectors
– Arbor Networks Peakflow X and Peakflow DoS
• There are many other products and features that can be used as security tools. Here we
are only speak a subset of these tools to help you orientate.
Tools and Techniques:
ACLs (Cont.)
• ACLs as Security Tools
ACLs serve a dual purpose as security tools. They provide:
– A mechanism to permit or deny traffic
– A mechanism to detect certain traffic types
The use of ACLs to permit or deny traffic is a well-understood and well-
documented security feature. In terms of worm mitigation, ACLs are likely to
play a key role in preventing the spread of a worm by blocking its attack vector,
usually a TCP or UDP port.
Tools and Techniques:
ACLs (Cont.)
• Using ACLs as a Detection Tool
– The most common technique when using ACLs as a detection tool is to configure the
router as a pseudo packet sniffer. To do so, use an ACL with a series of permit
statements to provide a view of the traffic flow. The counters in the ACL entries can
then be used to find which protocol types are potential culprits.
Tools and Techniques:
ACLs
• VLAN ACLs
– VLAN access control lists (VACLs) operate somewhat like router-based
ACLs. They are a means to apply access control to packets bridged within a
VLAN or routed between VLANs. In terms of worm mitigation, VACLs allow
access control to be applied directly to the access port.
– VACLs use the same Access Control Entry (ACE) format used by router-
based ACLs. The permit and deny statements based on Layer 2-4 header
information are used to determine what traffic to permit and to deny.
VACLs have no sense of direction, unlike router-based ACLs, which are
applied on either an inbound or outbound basis. VACLs apply to traffic at
both ingress and egress.
Tools and Techniques:
NetFlow
• NetFlow is used as the foundational technology for obtaining traffic flow
information across a network. A flow is defined by seven unique keys: source IP
address, destination IP address, source port, destination port, Layer 3 protocol
type, ToS byte, and input logical interface (ifIndex).
• By observing traffic flows across the network, it is possible to see events that
might be malicious. Some events might cause high traffic volumes, such as a
denial of service (DoS) attack; others might be more subtle. In any case,
observation of the flow information can detect these events
Tools and Techniques:
NetFlow (Cont.)
• NetFlow has the capability of performing a flow export function. In this case, all
expired flow information is sent to a collector. Collectors could be a number of
devices, including a Cisco NetFlow Collector, CFLOWD tools, OSU flow-tools
(CFLOWD Successor), or the Arbor Networks collector.
Tools and Techniques:
NetFlow
• The current NetFlow information is also available via the command-line
interface (CLI) of the router. The sample output shows two clients infected
with the Blaster worm that are scanning for other systems to infect. Note: 0x87
equals port 135 (illustrated in pink below).
Tools and Techniques:
NetFlow Deployment (Cont.)
• NetFlow monitors an interface’s ingress traffic only. Therefore, to obtain a full
picture of bidirectional flow information, NetFlow must be deployed such that
all ingress and egress flows are capturedv
Tools and Techniques:
NetFlow Deployment (Cont.)
• Performance Impact
– NetFlow will have some performance impact. The largest dependency
from a performance perspective is the number of flows. The performance
impact needs to be assessed on a case-by-case basis. In worst-case
scenarios, router upgrades might be required.
• Collection Tools
– There are many options for collecting exported NetFlow information. A
commercial option is the Cisco CNS NetFlow Collection Engine. This can be
deployed on a number of platforms, including Solaris, HP UX, and Linux.
– Freeware tools are also available. The OSU flow-tools from Oregon State
University are essentially the successor of CFLOWD and are available at:
http://www.splintered.net/sw/flow-tools/
• Exporting and Analyzing Flow Information for Anomalies
– Arbor Networks Peakflow provides further details of how the Arbor
Peakflow products integrate into the overall solution. Additional NetFlow
Information
Tools and Techniques:
Arbor Networks Peakflow (Cont.)
• Peakflow Overview
• The detection and recognition of an attack or a security event is a critical
component of any security solution.
• Although IDSs provide detection capability, most of them are still signature-
based, and therefore of limited benefit in these situations. Cisco itself has used
the Arbor Peakflow DoS anomaly detection system to successfully detect and
mitigate several worms.
Tools and Techniques:
Arbor Networks Peakflow (Cont.)
• Arbor offers two solutions to this problem.
– Peakflow DoS
• The primary application of Peakflow DoS is the detection of external
threats and events, making this product widely deployed by ISPs. For
enterprises, using Peakflow DoS to detect the presence of an external
security event (an event outside the firewall) is key to being in a
position to quickly secure the network "internally" from the threat.
• In the context of this solution, Peakflow DoS would be used as a tool
used to monitor traffic outside an organization’s firewall.
– Peakflow X
• The primary application of Peakflow X is the detection of internal
threats and events. Peakflow X provides an internal anomaly detection
solution through relational modeling of the enterprise’s internal
network.
• In the context of this solution, Peakflow X provides a detailed
visualization of the application-level conversations inside an enterprise
network.
Tools and Techniques:
Arbor Networks Peakflow (Cont.)
• Placement of the Arbor Collectors
– Both Arbor Peakflow X and Peakflow DoS use a collector and controller architecture.
The Arbor collector receives the flow records exported from the routers. Multiple
routers can export flow information to a single collector. A controller provides a
Web interface, sits in the hierarchy above the collectors, and generally consolidates
the information from the controllers.
Tools and Techniques:
Sinkholes (Cont.)
• A sinkhole is a multifaceted security tool-essentially, a portion of the network
that is designed to accept and analyze attack traffic.
• In the first sinkhole application, a publicly accessible Web server is the target of
either a DoS or DDoS attack. Below we see how server WWW1 is unavailable
due to the attack. Additionally, the extremely high traffic volume has saturated
links and routers, making server WWW2 unavailable as well.
Tools and Techniques:
Sinkholes (Cont.)
• Here we can see how a sinkhole can be used to pull attack traffic destined for
WWW1 away from the target.
• A sinkhole is also a useful tool for analyzing an attack. The sinkhole router can
be used to forward the attack traffic to a back-end switch where a network
analyzer, such as a sniffer or Ethereal, can be used to look at the details of the
attack.
Tools and Techniques:
Sinkholes – Monitoring the Worm Propagation
– Here we can see how a sinkhole can be deployed to monitor for worm
propagation internally within an enterprise.
Although this example specifically illustrates the application of a sinkhole for
detecting worm propagation, monitoring the bogon and dark IP address space can
also detect other usually malicious activity.
Tools and Techniques:
Sinkholes – Backscatter Traffic
• Packets with unreachable destinations, including the router null0 interface, will
have an Internet Control Message Protocol (ICMP) unreachable message sent
back to the source address. This "unreachable noise" is known as backscatter.
A sinkhole is likely to draw in a substantial amount of backscatter traffic. This is
particularly true for Internet-based sinkholes.
Backscatter traffic on the Internet is often the result of large-scale DoS or DDoS
attacks in which spoofed source addresses have been used.
Tools and Techniques:
Sinkholes – Deployment Option 1
• In this scenario, the target router on the right might be a low-cost device,
possibly a Cisco 2600 or 3600 series router. Its primary purpose is to gather and
export NetFlow information.
• Routing announcements for the bogon and dark IP address space can be made
from either the target router or the sinkhole gateway.
Tools and Techniques:
Sinkholes – Deployment Option 2
• The second design option uses some form of dedicated high-speed router.
• A second Ethernet interface should be available on this router for both
NetFlow export and dedicated Simple Network Management Protocol (SNMP)
polling.
As in the first option, bogon and dark IP address space is announced from the sinkhole
router, preferably via the redistribution of static routes. The static routes will use a bogus
next hop and a static ARP entry to push traffic onto the switched network.
ip route 96.0.0.0 63.255.255.255 192.0.2.200
ip arp 192.0.2.200 00.00.0c.12.34.56 arpa
Tools and Techniques:
Black Hole Routing
• A black hole routing scheme is based on the concept of forwarding traffic to
null0. The technique achieves a similar result to an ACL based on destination
address. However, because the technique occurs directly in the forwarding (or
Cisco Express Forwarding) path, it achieves a dropping function with no
performance impact.
Tools and Techniques:
Remote-Triggered Black Hole Routing
• Although black hole routing is an effective technique for dropping traffic at line
rates, we need to add remote trigger capability. This is achieved with two
steps.
• The first step is to configure an unused route to null0. This needs to be
configured on all routers that will act as remote-trigger black hole routers.
For example: ip route 192.0.2.0 255.255.255.0 Null0
192.0.2.0 /24 is an unused address block called the Test-Net. As such, it is not
publicly allocated and is often used for this application.
• In the second step, Border Gateway Protocol (BGP) is used to propagate
information about a prefix we want to black hole.
Tools and Techniques:
Remote-Triggered Black Hole Routing
• After the trigger router is in place, a configuration like the one below is
typically used to announce the prefixes that should be black holed.
• router bgp 999
• ...
• redistribute static route-map STATIC-TO-BGP
• ...
• !
• route-map STATIC-TO-BGP permit 10
• match tag 66
• set ip next-hop 192.0.2.1
• set local-preference 50
• set origin igp
• !
• Route-map STATIC-TO-BGP permit 20
• !
• ...
• ip route 171.xxx.xxx.1 255.255.255.255 Null0 Tag 66
• !
Tools and Techniques:
Dropping on Source Address
• One of the criteria for remote-triggered black hole routing to be effective as a
security tool is the ability to drop traffic based on both destination address and
source addresses.
• A second scenario requiring a mitigation technique is one in which spoofed
source addresses are used. With recent worms, such as SQL Slammer and
Blaster, the host’s real IP address is used to propagate the worm. This is not to
say that other worms might not use spoofed addresses. As such, the scenario
needs to be accommodated. There is no reason that any host should ever send
out a packet with an address other than what was assigned to it. Any packets
being sent out with illegitimate source addresses should be dropped at the first
router hop.
Tools and Techniques:
Dropping on Source Address
• Unicast RPF in Strict Mode :
If a packet is received on an interface, a route to that packet’s source address
must be available back through the same interface on which the packet was
received. If this route does not exist, the packet fails the RPF check and is
dropped.
interface FastEthernet2/0
ip address 192.xxx.xxx.50 255.255.255.0
ip verify unicast reverse-path
Tools and Techniques:
Dropping on Source Address
• Unicast RPF in Loose Check Mode
In the case of loose check, the only requirement is that the source address
must appear in the router’s Cisco Express Forwarding table. If the route does
not exist or it has a destination of null0, the packet is dropped.
interface FastEthernet2/0
ip address 192.xxx.xxx.50 255.255.255.0
ip verify unicast source reachable-via any
Tools and Techniques:
Dropping on Source Address
• Selective Remote Traffic Dropping
The previous sections on NetFlow and sinkholes provided a set of techniques
for identifying infected machines and listed a variety of abnormal behaviors
that might represent a security incident. When an infected machine or security
event is identified, the operations staff has the option of black holing the
device.
ip route xxx.xx.xxx.242 255.255.255.255 Null0 Tag 66
ip route xxx.xx.xxx.204 255.255.255.255 Null0 Tag 66
Tools and Techniques:
Private VLANs
• Private VLANs are a technique for providing Layer 2 isolation of hosts within a
VLAN. This technique can improve the security posture of a network by
isolating servers that do not need to communicate with each other. From a
security standpoint, if one server were to become infected with a worm, its
inability to communicate with other servers would prevent the spread. In this
case, each server would be attached to an isolated port.
Tools and Techniques:
Other Quarantine Techniques
• Port control using scripting
• Policy-based routing
• Web Cache Communication Protocol
• MAC addresses
• 802.1x
• Remote access
Appendix
• Aggregated Bogon List
http://www.cymru.com/Bogons/index.html
• Freeware Tools
– http://www.net-snmp.org/
– http://www.cpan.org/
– http://oss.oetiker.ch/mrtg/
– http://oss.oetiker.ch/rrdtool/
– http://www.splintered.net/sw/flow-tools/
– http://net.doit.wisc.edu/~plonka/FlowScan/
Q and A

Más contenido relacionado

La actualidad más candente

Bit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesBit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesLumension
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxAlamgir Hossain
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Sam Bowne
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
Password Cracking
Password Cracking Password Cracking
Password Cracking Sina Manavi
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMfaraz hussain
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYRohitK71
 

La actualidad más candente (20)

malware analysis
malware  analysismalware  analysis
malware analysis
 
Malware
MalwareMalware
Malware
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
Basic malware analysis
Basic malware analysis Basic malware analysis
Basic malware analysis
 
Bit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesBit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it Compares
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
 
Password Attack
Password Attack Password Attack
Password Attack
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
Hacking
Hacking Hacking
Hacking
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
Malicious
MaliciousMalicious
Malicious
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Spyware
SpywareSpyware
Spyware
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 

Destacado

Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation processAjay Ohri
 
Microsoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 SecurityMicrosoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 Securitydkaya
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windowsdkaya
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasuresdkaya
 
Sniffing SSL Traffic
Sniffing SSL TrafficSniffing SSL Traffic
Sniffing SSL Trafficdkaya
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacksdkaya
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAAdkaya
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
Cisco Switch Security
Cisco Switch SecurityCisco Switch Security
Cisco Switch Securitydkaya
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certificationdkaya
 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 

Destacado (14)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation process
 
Microsoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 SecurityMicrosoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 Security
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windows
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasures
 
Sniffing SSL Traffic
Sniffing SSL TrafficSniffing SSL Traffic
Sniffing SSL Traffic
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacks
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAA
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
Cisco Switch Security
Cisco Switch SecurityCisco Switch Security
Cisco Switch Security
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
 
Ccna security
Ccna securityCcna security
Ccna security
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 

Similar a Mitigating Worm Attacks

ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx
ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docxScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx
ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docxronnasleightholm
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxdanhaley45372
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourKasper de Waard
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptxdotco
 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012AVEVA
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Secure design best practices and design patterns
Secure design best practices and design patternsSecure design best practices and design patterns
Secure design best practices and design patternsIntopalo Digital Oy
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017Atef Yassin
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSaqib Raza
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopPriyanka Aash
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
Monitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System ControlMonitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System ControlMarc-Andre Heroux
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptxPiyush Jain
 
1 (20 files merged).ppt
1 (20 files merged).ppt1 (20 files merged).ppt
1 (20 files merged).pptseshas1
 
Penentration testing
Penentration testingPenentration testing
Penentration testingtahreemsaleem
 
The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.Expeed Software
 

Similar a Mitigating Worm Attacks (20)

Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Iscsp apt
Iscsp aptIscsp apt
Iscsp apt
 
ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx
ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docxScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx
ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviour
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptx
 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Secure design best practices and design patterns
Secure design best practices and design patternsSecure design best practices and design patterns
Secure design best practices and design patterns
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Monitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System ControlMonitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System Control
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
1 (20 files merged).ppt
1 (20 files merged).ppt1 (20 files merged).ppt
1 (20 files merged).ppt
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
Penentration testing
Penentration testingPenentration testing
Penentration testing
 
The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.
 

Mitigating Worm Attacks

  • 1. Mitigating Worm Attacks EVENING SEMINAR Deniz Kaya New Horizons Bulgaria
  • 2. Agenda • Introduction • Experience • Incident Response • Worm Mitigation Reaction Methodology • Tools and Techniques • Applying the tools to Enterprise Environment • Appendix
  • 3. Introduction • Internet worms have had a severe impact on many enterprise customers. Recently developed tools and architectural techniques can be employed to assist with the mitigation of worm activity in an enterprise environment. • Here we will speak about: – A conceptual overview of worm mitigation techniques – Details for deployment of these techniques into an overall solution for enterprise customers • This seminar was prepared from a solution standpoint. It is primarily designed to provide a tool kit for dealing with the issue of Internet worms within an enterprise environment. Although this is the primary motivation, the overall solution has application well beyond this primary purpose and additionally provides capability for detecting and responding to other security incidents.
  • 4. Experience • The techniques described here were originally developed for large Internet service providers (ISPs) and have been adapted for use in enterprise environments. They are well-understood and mature technologies, now applied in a new way to solve a new problem. • Cisco uses the same techniques on its own network to defend against a range of malicious activity, including worms and other security incidents.
  • 5. Incident Response • An organization’s internal operational processes are a critical aspect of dealing with any security incident. The overall goal of an incident response process is to maintain business operations.
  • 6. Incident Response Preparation • Although preparation is not part of the formal incident response process, here are some techniques that must be in place prior to the occurrence of a security incident. Having response procedures in place facilitates efficient response during an actual incident. – The Cisco Network Consulting Engineers suggest the following preparatory steps: • Develop a clear understanding of the organization’s primary business and IT resources. • Arrange for 24x7 access to someone who can authorize business decisions during a security incident. • Establish open lines of communication. Operations groups need to know the key contacts within the organization. • Collect links to Internet sites that provide up-to-date and reliable details of security threats and Internet worm activity, such as www.dshield.org, www.securityfocus.com, and bugtraq. • Maintain updated contact details for your ISP or ISPs.
  • 7. Incident Response: Triage: Initial Analysis and Response • The first phase of incident response is to verify that the event is an actual security incident, such as an attack or worm event. In some cases, an incident could be the result of scheduled maintenance activities. • After the event is confirmed, take quick action to limit the damage. Doing so might entail steps such as turning off a device or removing a device from the network. However, any actions taken need to be in line with maintaining business continuity. • During the process, communicate with other relevant parties within the organization. For example, stay in touch with relevant management and legal contacts.
  • 8. Incident Response: Analysis • The second phase is the analysis phase. • Next, determine the scope of the incident-the number of devices, data, and other resources affected. • In some cases, it might be necessary to perform a traceback to the origin of the attack; this activity might involve working through your ISP. • Measure the impact. • The results of this analysis will help determine the most appropriate reaction techniques for the specific incident.
  • 9. Incident Response: Reaction • The reaction phase involves some action to counter the attack. Each situation will dictate the action to be taken, such as widely deploying access control lists (ACLs) in a worm event; restoring a device to normal operation by reloading the OS from the original media and restoring data from backups in a server compromise; or changing any static passwords because they might have been compromised-and an entirely reasonable response in some situations might be to do nothing. • Generally, the highest priority is to regain full business operations. In many cases it is often less important to spend time finding the perpetrator of the attack.
  • 10. Incident Response: Post-Mortem • A post-mortem involves a full, in-depth analysis of the event and the response to the event. The goal is to determine what can be done to build resistance and prevent this type of attack from happening again-essentially, learning from the experience. • The post-mortem is a step that is often ignored. It is critical that it is not forgotten.
  • 11. Worm Mitigation Reaction Methodology • Following procedures should be followed when responding to a worm incident – Containment – Inoculation – Quarantine – Treatment – Planning
  • 12. Worm Mitigation Reaction Methodology: Containment • The first stage of the reaction process is to contain the spread of the worm inside the network. Compartmentalization, a core principle of the SAFE Blueprint from Cisco, is key because it allows isolation of parts of the network that are not yet infected.
  • 13. Worm Mitigation Reaction Methodology: Inoculation • The inoculation phase involves patching all systems. If the appropriate signature files or plug-ins are available for tools such as OpenVAS, it is worthwhile to start scanning the network for vulnerable systems. This activity might allow operations staff to find vulnerable systems before they become infected. • During a worm crisis, there are three types of systems in your network: – Patched systems – Unpatched systems – Infected systems • Inoculating uninfected systems is imperative and usually happens in parallel with the quarantine and treatment phases.
  • 14. Worm Mitigation Reaction Methodology: Quarantine • The quarantine phase involves finding each infected machine and disconnecting, removing, or blocking them from the network to prevent them from infecting other unpatched machines on the network. To achieve this goal, the infected systems need to be isolated and quarantined. • Later in this seminar we will outline tools such as remote-triggered black hole routing. This technique allows the rapid isolation of infected machines, limiting their capability to spread the infection.
  • 15. Worm Mitigation Reaction Methodology: Treatment • The treatment phase involves the cleaning and the patching of each infected system. Some worms might require complete reinstallations of the core system to ensure that the machine is clean.
  • 16. Worm Mitigation Reaction Methodology: Planning • All of this activity requires planning prior to a worm event. When these events occur, reaction time is critical, and these processes need to be in place. It is strongly recommended that every organization plan the reaction methodology ahead of the next crisis.
  • 17. Tools and Techniques • It is important to view the following techniques as a tool kit. There is currently no simple guaranteed solution for dealing with these types of security incidents. • The main tools we will discuss here are: • Features – ACLs – NetFlow and NetFlow export – Unicast Reverse Path Forwarding (uRPF) – Routing protocols such as remote-triggered black hole filtering, also known as remote-triggered black hole routing • Products – Cisco routers and switches – NetFlow collectors – Arbor Networks Peakflow X and Peakflow DoS • There are many other products and features that can be used as security tools. Here we are only speak a subset of these tools to help you orientate.
  • 18. Tools and Techniques: ACLs (Cont.) • ACLs as Security Tools ACLs serve a dual purpose as security tools. They provide: – A mechanism to permit or deny traffic – A mechanism to detect certain traffic types The use of ACLs to permit or deny traffic is a well-understood and well- documented security feature. In terms of worm mitigation, ACLs are likely to play a key role in preventing the spread of a worm by blocking its attack vector, usually a TCP or UDP port.
  • 19. Tools and Techniques: ACLs (Cont.) • Using ACLs as a Detection Tool – The most common technique when using ACLs as a detection tool is to configure the router as a pseudo packet sniffer. To do so, use an ACL with a series of permit statements to provide a view of the traffic flow. The counters in the ACL entries can then be used to find which protocol types are potential culprits.
  • 20. Tools and Techniques: ACLs • VLAN ACLs – VLAN access control lists (VACLs) operate somewhat like router-based ACLs. They are a means to apply access control to packets bridged within a VLAN or routed between VLANs. In terms of worm mitigation, VACLs allow access control to be applied directly to the access port. – VACLs use the same Access Control Entry (ACE) format used by router- based ACLs. The permit and deny statements based on Layer 2-4 header information are used to determine what traffic to permit and to deny. VACLs have no sense of direction, unlike router-based ACLs, which are applied on either an inbound or outbound basis. VACLs apply to traffic at both ingress and egress.
  • 21. Tools and Techniques: NetFlow • NetFlow is used as the foundational technology for obtaining traffic flow information across a network. A flow is defined by seven unique keys: source IP address, destination IP address, source port, destination port, Layer 3 protocol type, ToS byte, and input logical interface (ifIndex). • By observing traffic flows across the network, it is possible to see events that might be malicious. Some events might cause high traffic volumes, such as a denial of service (DoS) attack; others might be more subtle. In any case, observation of the flow information can detect these events
  • 22. Tools and Techniques: NetFlow (Cont.) • NetFlow has the capability of performing a flow export function. In this case, all expired flow information is sent to a collector. Collectors could be a number of devices, including a Cisco NetFlow Collector, CFLOWD tools, OSU flow-tools (CFLOWD Successor), or the Arbor Networks collector.
  • 23. Tools and Techniques: NetFlow • The current NetFlow information is also available via the command-line interface (CLI) of the router. The sample output shows two clients infected with the Blaster worm that are scanning for other systems to infect. Note: 0x87 equals port 135 (illustrated in pink below).
  • 24. Tools and Techniques: NetFlow Deployment (Cont.) • NetFlow monitors an interface’s ingress traffic only. Therefore, to obtain a full picture of bidirectional flow information, NetFlow must be deployed such that all ingress and egress flows are capturedv
  • 25. Tools and Techniques: NetFlow Deployment (Cont.) • Performance Impact – NetFlow will have some performance impact. The largest dependency from a performance perspective is the number of flows. The performance impact needs to be assessed on a case-by-case basis. In worst-case scenarios, router upgrades might be required. • Collection Tools – There are many options for collecting exported NetFlow information. A commercial option is the Cisco CNS NetFlow Collection Engine. This can be deployed on a number of platforms, including Solaris, HP UX, and Linux. – Freeware tools are also available. The OSU flow-tools from Oregon State University are essentially the successor of CFLOWD and are available at: http://www.splintered.net/sw/flow-tools/ • Exporting and Analyzing Flow Information for Anomalies – Arbor Networks Peakflow provides further details of how the Arbor Peakflow products integrate into the overall solution. Additional NetFlow Information
  • 26. Tools and Techniques: Arbor Networks Peakflow (Cont.) • Peakflow Overview • The detection and recognition of an attack or a security event is a critical component of any security solution. • Although IDSs provide detection capability, most of them are still signature- based, and therefore of limited benefit in these situations. Cisco itself has used the Arbor Peakflow DoS anomaly detection system to successfully detect and mitigate several worms.
  • 27. Tools and Techniques: Arbor Networks Peakflow (Cont.) • Arbor offers two solutions to this problem. – Peakflow DoS • The primary application of Peakflow DoS is the detection of external threats and events, making this product widely deployed by ISPs. For enterprises, using Peakflow DoS to detect the presence of an external security event (an event outside the firewall) is key to being in a position to quickly secure the network "internally" from the threat. • In the context of this solution, Peakflow DoS would be used as a tool used to monitor traffic outside an organization’s firewall. – Peakflow X • The primary application of Peakflow X is the detection of internal threats and events. Peakflow X provides an internal anomaly detection solution through relational modeling of the enterprise’s internal network. • In the context of this solution, Peakflow X provides a detailed visualization of the application-level conversations inside an enterprise network.
  • 28. Tools and Techniques: Arbor Networks Peakflow (Cont.) • Placement of the Arbor Collectors – Both Arbor Peakflow X and Peakflow DoS use a collector and controller architecture. The Arbor collector receives the flow records exported from the routers. Multiple routers can export flow information to a single collector. A controller provides a Web interface, sits in the hierarchy above the collectors, and generally consolidates the information from the controllers.
  • 29. Tools and Techniques: Sinkholes (Cont.) • A sinkhole is a multifaceted security tool-essentially, a portion of the network that is designed to accept and analyze attack traffic. • In the first sinkhole application, a publicly accessible Web server is the target of either a DoS or DDoS attack. Below we see how server WWW1 is unavailable due to the attack. Additionally, the extremely high traffic volume has saturated links and routers, making server WWW2 unavailable as well.
  • 30. Tools and Techniques: Sinkholes (Cont.) • Here we can see how a sinkhole can be used to pull attack traffic destined for WWW1 away from the target. • A sinkhole is also a useful tool for analyzing an attack. The sinkhole router can be used to forward the attack traffic to a back-end switch where a network analyzer, such as a sniffer or Ethereal, can be used to look at the details of the attack.
  • 31. Tools and Techniques: Sinkholes – Monitoring the Worm Propagation – Here we can see how a sinkhole can be deployed to monitor for worm propagation internally within an enterprise. Although this example specifically illustrates the application of a sinkhole for detecting worm propagation, monitoring the bogon and dark IP address space can also detect other usually malicious activity.
  • 32. Tools and Techniques: Sinkholes – Backscatter Traffic • Packets with unreachable destinations, including the router null0 interface, will have an Internet Control Message Protocol (ICMP) unreachable message sent back to the source address. This "unreachable noise" is known as backscatter. A sinkhole is likely to draw in a substantial amount of backscatter traffic. This is particularly true for Internet-based sinkholes. Backscatter traffic on the Internet is often the result of large-scale DoS or DDoS attacks in which spoofed source addresses have been used.
  • 33. Tools and Techniques: Sinkholes – Deployment Option 1 • In this scenario, the target router on the right might be a low-cost device, possibly a Cisco 2600 or 3600 series router. Its primary purpose is to gather and export NetFlow information. • Routing announcements for the bogon and dark IP address space can be made from either the target router or the sinkhole gateway.
  • 34. Tools and Techniques: Sinkholes – Deployment Option 2 • The second design option uses some form of dedicated high-speed router. • A second Ethernet interface should be available on this router for both NetFlow export and dedicated Simple Network Management Protocol (SNMP) polling. As in the first option, bogon and dark IP address space is announced from the sinkhole router, preferably via the redistribution of static routes. The static routes will use a bogus next hop and a static ARP entry to push traffic onto the switched network. ip route 96.0.0.0 63.255.255.255 192.0.2.200 ip arp 192.0.2.200 00.00.0c.12.34.56 arpa
  • 35. Tools and Techniques: Black Hole Routing • A black hole routing scheme is based on the concept of forwarding traffic to null0. The technique achieves a similar result to an ACL based on destination address. However, because the technique occurs directly in the forwarding (or Cisco Express Forwarding) path, it achieves a dropping function with no performance impact.
  • 36. Tools and Techniques: Remote-Triggered Black Hole Routing • Although black hole routing is an effective technique for dropping traffic at line rates, we need to add remote trigger capability. This is achieved with two steps. • The first step is to configure an unused route to null0. This needs to be configured on all routers that will act as remote-trigger black hole routers. For example: ip route 192.0.2.0 255.255.255.0 Null0 192.0.2.0 /24 is an unused address block called the Test-Net. As such, it is not publicly allocated and is often used for this application. • In the second step, Border Gateway Protocol (BGP) is used to propagate information about a prefix we want to black hole.
  • 37. Tools and Techniques: Remote-Triggered Black Hole Routing • After the trigger router is in place, a configuration like the one below is typically used to announce the prefixes that should be black holed. • router bgp 999 • ... • redistribute static route-map STATIC-TO-BGP • ... • ! • route-map STATIC-TO-BGP permit 10 • match tag 66 • set ip next-hop 192.0.2.1 • set local-preference 50 • set origin igp • ! • Route-map STATIC-TO-BGP permit 20 • ! • ... • ip route 171.xxx.xxx.1 255.255.255.255 Null0 Tag 66 • !
  • 38. Tools and Techniques: Dropping on Source Address • One of the criteria for remote-triggered black hole routing to be effective as a security tool is the ability to drop traffic based on both destination address and source addresses. • A second scenario requiring a mitigation technique is one in which spoofed source addresses are used. With recent worms, such as SQL Slammer and Blaster, the host’s real IP address is used to propagate the worm. This is not to say that other worms might not use spoofed addresses. As such, the scenario needs to be accommodated. There is no reason that any host should ever send out a packet with an address other than what was assigned to it. Any packets being sent out with illegitimate source addresses should be dropped at the first router hop.
  • 39. Tools and Techniques: Dropping on Source Address • Unicast RPF in Strict Mode : If a packet is received on an interface, a route to that packet’s source address must be available back through the same interface on which the packet was received. If this route does not exist, the packet fails the RPF check and is dropped. interface FastEthernet2/0 ip address 192.xxx.xxx.50 255.255.255.0 ip verify unicast reverse-path
  • 40. Tools and Techniques: Dropping on Source Address • Unicast RPF in Loose Check Mode In the case of loose check, the only requirement is that the source address must appear in the router’s Cisco Express Forwarding table. If the route does not exist or it has a destination of null0, the packet is dropped. interface FastEthernet2/0 ip address 192.xxx.xxx.50 255.255.255.0 ip verify unicast source reachable-via any
  • 41. Tools and Techniques: Dropping on Source Address • Selective Remote Traffic Dropping The previous sections on NetFlow and sinkholes provided a set of techniques for identifying infected machines and listed a variety of abnormal behaviors that might represent a security incident. When an infected machine or security event is identified, the operations staff has the option of black holing the device. ip route xxx.xx.xxx.242 255.255.255.255 Null0 Tag 66 ip route xxx.xx.xxx.204 255.255.255.255 Null0 Tag 66
  • 42. Tools and Techniques: Private VLANs • Private VLANs are a technique for providing Layer 2 isolation of hosts within a VLAN. This technique can improve the security posture of a network by isolating servers that do not need to communicate with each other. From a security standpoint, if one server were to become infected with a worm, its inability to communicate with other servers would prevent the spread. In this case, each server would be attached to an isolated port.
  • 43. Tools and Techniques: Other Quarantine Techniques • Port control using scripting • Policy-based routing • Web Cache Communication Protocol • MAC addresses • 802.1x • Remote access
  • 44. Appendix • Aggregated Bogon List http://www.cymru.com/Bogons/index.html • Freeware Tools – http://www.net-snmp.org/ – http://www.cpan.org/ – http://oss.oetiker.ch/mrtg/ – http://oss.oetiker.ch/rrdtool/ – http://www.splintered.net/sw/flow-tools/ – http://net.doit.wisc.edu/~plonka/FlowScan/

Notas del editor

  1. The first phase of incident response is to verify that the event is an actual security incident, such as an attack or worm event. In some cases, an incident could be the result of scheduled maintenance activities. After the event is confirmed, take quick action to limit the damage. Doing so might entail steps such as turning off a device or removing a device from the network. However, any actions taken need to be in line with maintaining business continuity. During the process, communicate with other relevant parties within the organization. For example, stay in touch with relevant management and legal contacts.
  2. The second phase is the analysis phase. A key part of this process is incident classification, which involves understanding the type of attack and the damage it is causing. It is important to perform the analysis with as little impact as possible on business functions. Next, determine the scope of the incident-the number of devices, data, and other resources affected. It is important to look beyond the initially identified target, because the event might be more widespread than initially thought. In some cases, it might be necessary to perform a traceback to the origin of the attack; this activity might involve working through your ISP. In other cases, restoration of business operations might require priority over any traceback activities. Measure the impact-what are the resulting effects of the incident on the organization? Has the event caused a minor problem or has it caused a major impact to the business? The results of this analysis will help determine the most appropriate reaction techniques for the specific incident.
  3. As a simple example, if a network penetration occurred, it would be prudent to identify what vulnerability was used to obtain access, and then fix all occurrences of that vulnerability. Additionally, it should be determined if the incident was detected in an acceptable time; if not, measures should be deployed to speed detection in the event of further incidents.