SlideShare una empresa de Scribd logo
1 de 28
Malware ResponseCenter 
MrRAOUFLAMARI 
PrivateHigherSchoolof Computer Science and Technologies 
End of StudiesProject 
National Agency for Computer Security 
ABDESSABOUR AROUS 
MrFOUEDZGHIDI
2
Motivation 
Anti malware products can’t handle all infections (specially new ones) 
200,000 newly unique malicious artifacts are collected per day (*) 
Getting infected is a matter of time 
Formatting the system disk is not always possible (production server) 
We need a complete checkup of the system 
* Source: http://www.sophos.com/en-us/support/knowledgebase/119112.aspx 
3
Motivation 4 
Microsoft Security Intelligence Report: Trends for the five locations with the highest malware infection rates in 2H13, by CCM (100,000 MSRT executions minimum) 
Tunisia is the second !!!
CurrentWorkflow (1/2) 
Security Analyst 
Email: assistance@ansi.tn 
Phone: 71 843 200 
On site assistance: 94 Jughurtaavenue, MutuelleVille, Tunis, Tunisia 
“My device performance is slowing down” 
“My AV has detected a malware called WIN32.X but he was unable to remove it !” 
“I have a window telling me that I need to pay some money to unlock my Computer” 
NACS Assistance activity 
Requests 
Citizen/Company 
5
Current Workflow (2/2) 
Email 
On site 
Phone 
Ask user to download and run an external tool 
User send tool report by email 
Usually no precise result 
Ask user to run a bootable AV solution 
Citizen 
Company 
1 
2 
3 
4 
5 
Askfor help via 
6
Goals & Objectives 7 
Build a system that provides all the facilities that the manual service already provides. 
Automate the hole process. 
Build a national capability in malware analysis field. 
Online, Easy to use, efficient, …
Proposedsolution 8 
Login/Register 
Download the scanner 
Upload the report 
Device 
Scan 
Generate a report 
Download a dedicated script 
Create a ticket 
Analyze the report 
Check externals resources 
Run the removal kit
Methodology 9 
SPRINT 0 
SPRINT 1 
SPRINT 2 
SPRINT 3 
SPRINT 4 
Project Start 
Modeling Architecture and Graphical User Interface 
Web App: 
Back Office 
Web App: 
Front Office 
Client: 
Windows Application 
We are AGILE 
SCRUM Based
Overallarchitecture 10 
Collect running applications 
Users management 
Tickets management 
Artifacts management 
Modules management 
Security Analysts management 
www 
Device Specific Code 
Web Application
Solution comparison 11 
Collect running applications 
Blacklist database 
Whitelist database 
Real time scanner 
System Scanner tools 
Antivirus 
Malware Response Center 
Ticketing system 
Malware Removal tools 
Cloud Analysis 
Remove Malicious codes
Why a new Cleaner/Scanner? 12 
Why building our own tank? 
National Information Security is like National territorial security! 
The improvement of non proprietary tool is not in your hand!
Overallarchitecture 13 
User 
Security Analyst 
Web Server 
Front End DB 
Back End DB 
External Resources 
Internals Resources 
Modules 
Remote Storage
External & Internal resources 
Online Malware database 
Sandboxes 
Local Malware database 
14 
MD5 : 5f62962605b4858e20bfaf6edc8eb521
Database 15 
Report{ 
Created At : 
TICKET_ID : 
OS_VERSION : 
MACHINE_UNIQUE_ID : 
PROCESSES : [ 
{ 
PROCESS_ID : 
EXE_FILE : 
PRIORITY_BASE : 
MODULES : [ 
{ 
MODULE_NAME : 
HASH : 
SIZE : 
} 
] 
} 
] 
} 
Ticket_Status 
•Id 
•Label 
Ticket 
•Id 
•Created At 
•Status_Id 
•Agent_Id 
•Citizen_Id 
•Description 
Agent 
•Id 
•Name 
•Firstname 
•Email 
•Password 
•Mobile 
Schema-less data 
Different Workload 
NOSQL+NOSQL OR SQL+NOSQL
Database 16 
Object Document mapper 
Doctrine 
Object Relational mapper 
class Ticket 
{ 
/** 
* @varinteger 
* 
* @ORMId 
*/ 
private $id; 
} 
Report{ 
Created At : 
TICKET_ID : 
OS_VERSION : 
MACHINE_UNIQUE_ID : 
} 
Class Report 
{ 
/** 
* @MongoDBId 
*/ 
protected $id; 
} 
Agent 
•Id 
•Name 
•Firstname 
•Email
Overallarchitecture (Client side) 17 
Processes 
Threads 
Loaded modules 
Device Drivers 
Graphical User Interface 
Dynamic Link Libraries 
Low level programming = C 
But C is not the reference in UI
Technologies used 
Client side: 
C# WPF UI 
C/C++/Assemblymodules (DLL) 
Server side: 
Nginxweb server 
Symfony2 framework 
Python 
MySQL front database 
MongoDB+ GridFsas backenddatabase 
Microsoft Azure Storage 
18
Source code management 
Gitkey features 
Distributed 
Speed 
Data integrity 
Gitlabkey features 
Free and open source 
Ticket management 
Request management 
Repositories, Users management 
19
Testing 
Unit testing(whateverrelevant) 
Client side( .NET ): Visual Studio Unit test framework 
Server side( PHP SYMFONY ): Symfony2 unit test 
BDD for acceptancetest 
Behat(PHP) 
Specflow(C#) 
20
Security 
OWASP TOP 10 Security flaws: 
Input sanitazing 
Anti CSRF token 
Confidentiality: SSL 
Vulnerabilityassesment 
Via automatedscanner 
21
Deploiement 
Currently in beta test version 
Looking to work with pioneer partners: 
To try the scanner and the online portal 
Features improvement 
Estimate system workload 
22
Implementation 23
Implementation 24
At the end 
We succeed to: 
Develop a solution that covers the assistance workflow (from the client to the ticketing system) 
More accurate Data about Tunisian Cyberspace: 
Operating systems distribution 
Infection distribution 
Device use evolution 
25 
Operating Systems 
Windows 7 
Windows XP 
Android 
Linux 
0 
2 
4 
6 
First Quarter 
SecondQuarter 
Third Quarter 
FourthQuarter 
Top malwares 
Windows 
Linux 
Android
Future works 
More scalable: 
Message Queuing 
Databasereplicationand clustering 
More automated: 
Learning mode: ArtificialIntelligence, Expert System 
More defensein depth: 
More granularsecurity 
MandatoryAccess Controleimplementation 
Support more devices: iOS –Mac OS –etc… 
Feedback system and Social media integration. 
26
27
28 
Question

Más contenido relacionado

La actualidad más candente

Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacks
UltraUploader
 
metaploit framework
metaploit frameworkmetaploit framework
metaploit framework
Le Quyen
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumeration
Mehrdad Jingoism
 

La actualidad más candente (15)

Living off the land and fileless attack techniques
Living off the land and fileless attack techniquesLiving off the land and fileless attack techniques
Living off the land and fileless attack techniques
 
A walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commandsA walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commands
 
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
 
Top 10 Latest Viruses
Top 10 Latest VirusesTop 10 Latest Viruses
Top 10 Latest Viruses
 
Persistence in windows
Persistence in windowsPersistence in windows
Persistence in windows
 
Assingment 5 - ENSA
Assingment 5 - ENSAAssingment 5 - ENSA
Assingment 5 - ENSA
 
Stuxnet - More then a virus.
Stuxnet - More then a virus.Stuxnet - More then a virus.
Stuxnet - More then a virus.
 
Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacks
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware Analysis
 
Stuxnet flame
Stuxnet flameStuxnet flame
Stuxnet flame
 
metaploit framework
metaploit frameworkmetaploit framework
metaploit framework
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumeration
 
Adw cleaner[c0]
Adw cleaner[c0]Adw cleaner[c0]
Adw cleaner[c0]
 
SANS Windows Artifact Analysis 2012
SANS Windows Artifact Analysis 2012SANS Windows Artifact Analysis 2012
SANS Windows Artifact Analysis 2012
 
O p
O pO p
O p
 

Destacado

Luis emilio velutini tipos de-perros
Luis emilio velutini tipos de-perrosLuis emilio velutini tipos de-perros
Luis emilio velutini tipos de-perros
Luis Emilio Velutini
 
Fraude En La Red Jonathan
Fraude En La Red JonathanFraude En La Red Jonathan
Fraude En La Red Jonathan
informatica4
 
Defendiendo nuestras-tradiciones-tomo-ii1-
Defendiendo nuestras-tradiciones-tomo-ii1-Defendiendo nuestras-tradiciones-tomo-ii1-
Defendiendo nuestras-tradiciones-tomo-ii1-
Julio Andres
 
Macedònia "Superfashion"
Macedònia "Superfashion"Macedònia "Superfashion"
Macedònia "Superfashion"
raguilafosch
 

Destacado (20)

Mica 2012
Mica 2012Mica 2012
Mica 2012
 
Kees Schiphouwer Responsum onderzoek
Kees Schiphouwer Responsum onderzoekKees Schiphouwer Responsum onderzoek
Kees Schiphouwer Responsum onderzoek
 
WETEC Compellent Enterprise Manager 3.1
WETEC Compellent Enterprise Manager 3.1WETEC Compellent Enterprise Manager 3.1
WETEC Compellent Enterprise Manager 3.1
 
Digital Tattoo Workshop for BCLA/PNLA
Digital Tattoo Workshop for BCLA/PNLADigital Tattoo Workshop for BCLA/PNLA
Digital Tattoo Workshop for BCLA/PNLA
 
Vender por internet con eventos virtuales
Vender por internet con eventos virtualesVender por internet con eventos virtuales
Vender por internet con eventos virtuales
 
Mugshot Catalog Review
Mugshot Catalog ReviewMugshot Catalog Review
Mugshot Catalog Review
 
Luis emilio velutini tipos de-perros
Luis emilio velutini tipos de-perrosLuis emilio velutini tipos de-perros
Luis emilio velutini tipos de-perros
 
Fraude En La Red Jonathan
Fraude En La Red JonathanFraude En La Red Jonathan
Fraude En La Red Jonathan
 
One direction
One directionOne direction
One direction
 
Pinizsi_portfolio_2
Pinizsi_portfolio_2Pinizsi_portfolio_2
Pinizsi_portfolio_2
 
Bo corporate brochure
Bo corporate brochureBo corporate brochure
Bo corporate brochure
 
Defendiendo nuestras-tradiciones-tomo-ii1-
Defendiendo nuestras-tradiciones-tomo-ii1-Defendiendo nuestras-tradiciones-tomo-ii1-
Defendiendo nuestras-tradiciones-tomo-ii1-
 
Relato de una CoP (2)
Relato de una CoP (2)Relato de una CoP (2)
Relato de una CoP (2)
 
01. gutuna ikasleak 1415rako
01. gutuna ikasleak 1415rako01. gutuna ikasleak 1415rako
01. gutuna ikasleak 1415rako
 
AERIS Xango
AERIS XangoAERIS Xango
AERIS Xango
 
Envolvedora stretch-hood-boreas
Envolvedora stretch-hood-boreasEnvolvedora stretch-hood-boreas
Envolvedora stretch-hood-boreas
 
There Once Was A Blue Moon P
There  Once  Was A  Blue  Moon  PThere  Once  Was A  Blue  Moon  P
There Once Was A Blue Moon P
 
Macedònia "Superfashion"
Macedònia "Superfashion"Macedònia "Superfashion"
Macedònia "Superfashion"
 
Presentazione Frosmo in italiano Nov2015
Presentazione Frosmo in italiano Nov2015 Presentazione Frosmo in italiano Nov2015
Presentazione Frosmo in italiano Nov2015
 
Histoire revue par petit Grincheux série 4
Histoire revue par petit Grincheux série 4Histoire revue par petit Grincheux série 4
Histoire revue par petit Grincheux série 4
 

Similar a End of Studies project: Malware Repsonse Center

Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
 

Similar a End of Studies project: Malware Repsonse Center (20)

Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
technical overview - endpoint protection 10.3.3
technical overview - endpoint protection 10.3.3technical overview - endpoint protection 10.3.3
technical overview - endpoint protection 10.3.3
 
Paper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesPaper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devices
 
Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced Threats
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
spamzombieppt
spamzombiepptspamzombieppt
spamzombieppt
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners
 
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

End of Studies project: Malware Repsonse Center

  • 1. Malware ResponseCenter MrRAOUFLAMARI PrivateHigherSchoolof Computer Science and Technologies End of StudiesProject National Agency for Computer Security ABDESSABOUR AROUS MrFOUEDZGHIDI
  • 2. 2
  • 3. Motivation Anti malware products can’t handle all infections (specially new ones) 200,000 newly unique malicious artifacts are collected per day (*) Getting infected is a matter of time Formatting the system disk is not always possible (production server) We need a complete checkup of the system * Source: http://www.sophos.com/en-us/support/knowledgebase/119112.aspx 3
  • 4. Motivation 4 Microsoft Security Intelligence Report: Trends for the five locations with the highest malware infection rates in 2H13, by CCM (100,000 MSRT executions minimum) Tunisia is the second !!!
  • 5. CurrentWorkflow (1/2) Security Analyst Email: assistance@ansi.tn Phone: 71 843 200 On site assistance: 94 Jughurtaavenue, MutuelleVille, Tunis, Tunisia “My device performance is slowing down” “My AV has detected a malware called WIN32.X but he was unable to remove it !” “I have a window telling me that I need to pay some money to unlock my Computer” NACS Assistance activity Requests Citizen/Company 5
  • 6. Current Workflow (2/2) Email On site Phone Ask user to download and run an external tool User send tool report by email Usually no precise result Ask user to run a bootable AV solution Citizen Company 1 2 3 4 5 Askfor help via 6
  • 7. Goals & Objectives 7 Build a system that provides all the facilities that the manual service already provides. Automate the hole process. Build a national capability in malware analysis field. Online, Easy to use, efficient, …
  • 8. Proposedsolution 8 Login/Register Download the scanner Upload the report Device Scan Generate a report Download a dedicated script Create a ticket Analyze the report Check externals resources Run the removal kit
  • 9. Methodology 9 SPRINT 0 SPRINT 1 SPRINT 2 SPRINT 3 SPRINT 4 Project Start Modeling Architecture and Graphical User Interface Web App: Back Office Web App: Front Office Client: Windows Application We are AGILE SCRUM Based
  • 10. Overallarchitecture 10 Collect running applications Users management Tickets management Artifacts management Modules management Security Analysts management www Device Specific Code Web Application
  • 11. Solution comparison 11 Collect running applications Blacklist database Whitelist database Real time scanner System Scanner tools Antivirus Malware Response Center Ticketing system Malware Removal tools Cloud Analysis Remove Malicious codes
  • 12. Why a new Cleaner/Scanner? 12 Why building our own tank? National Information Security is like National territorial security! The improvement of non proprietary tool is not in your hand!
  • 13. Overallarchitecture 13 User Security Analyst Web Server Front End DB Back End DB External Resources Internals Resources Modules Remote Storage
  • 14. External & Internal resources Online Malware database Sandboxes Local Malware database 14 MD5 : 5f62962605b4858e20bfaf6edc8eb521
  • 15. Database 15 Report{ Created At : TICKET_ID : OS_VERSION : MACHINE_UNIQUE_ID : PROCESSES : [ { PROCESS_ID : EXE_FILE : PRIORITY_BASE : MODULES : [ { MODULE_NAME : HASH : SIZE : } ] } ] } Ticket_Status •Id •Label Ticket •Id •Created At •Status_Id •Agent_Id •Citizen_Id •Description Agent •Id •Name •Firstname •Email •Password •Mobile Schema-less data Different Workload NOSQL+NOSQL OR SQL+NOSQL
  • 16. Database 16 Object Document mapper Doctrine Object Relational mapper class Ticket { /** * @varinteger * * @ORMId */ private $id; } Report{ Created At : TICKET_ID : OS_VERSION : MACHINE_UNIQUE_ID : } Class Report { /** * @MongoDBId */ protected $id; } Agent •Id •Name •Firstname •Email
  • 17. Overallarchitecture (Client side) 17 Processes Threads Loaded modules Device Drivers Graphical User Interface Dynamic Link Libraries Low level programming = C But C is not the reference in UI
  • 18. Technologies used Client side: C# WPF UI C/C++/Assemblymodules (DLL) Server side: Nginxweb server Symfony2 framework Python MySQL front database MongoDB+ GridFsas backenddatabase Microsoft Azure Storage 18
  • 19. Source code management Gitkey features Distributed Speed Data integrity Gitlabkey features Free and open source Ticket management Request management Repositories, Users management 19
  • 20. Testing Unit testing(whateverrelevant) Client side( .NET ): Visual Studio Unit test framework Server side( PHP SYMFONY ): Symfony2 unit test BDD for acceptancetest Behat(PHP) Specflow(C#) 20
  • 21. Security OWASP TOP 10 Security flaws: Input sanitazing Anti CSRF token Confidentiality: SSL Vulnerabilityassesment Via automatedscanner 21
  • 22. Deploiement Currently in beta test version Looking to work with pioneer partners: To try the scanner and the online portal Features improvement Estimate system workload 22
  • 25. At the end We succeed to: Develop a solution that covers the assistance workflow (from the client to the ticketing system) More accurate Data about Tunisian Cyberspace: Operating systems distribution Infection distribution Device use evolution 25 Operating Systems Windows 7 Windows XP Android Linux 0 2 4 6 First Quarter SecondQuarter Third Quarter FourthQuarter Top malwares Windows Linux Android
  • 26. Future works More scalable: Message Queuing Databasereplicationand clustering More automated: Learning mode: ArtificialIntelligence, Expert System More defensein depth: More granularsecurity MandatoryAccess Controleimplementation Support more devices: iOS –Mac OS –etc… Feedback system and Social media integration. 26
  • 27. 27