Monitoring for network security and management Cyber Solutions Inc.

31
Monitoring for network security and management Cyber Solutions Inc.

Transcript of Monitoring for network security and management Cyber Solutions Inc.

Page 1: Monitoring for network security and management Cyber Solutions Inc.

Monitoring for network security and management

Cyber Solutions Inc.

Page 2: Monitoring for network security and management Cyber Solutions Inc.

Why monitoring?

Health check of networked node Usage and load evaluation for optimizing

the configuration Illegal access detection for both inbound

and outbound traffic

All networked information is on the LINE

Page 3: Monitoring for network security and management Cyber Solutions Inc.

Threats have to be monitored Node alive or dead

• Network or node fault?• Attacked?

Performance degradation• Network fault?• DoS possibility?• Large-scale incident?

Policy enforcement• Detecting policy violation (prohibited communication)• Detecting configuration change

Potential attack originator• Exploited / Compromised by attacker?• Attacking by insider?• Virus polluted?• Malicious terminal connected?

Page 4: Monitoring for network security and management Cyber Solutions Inc.

Monitoring is the first step for security and network management

Monitoring basics• Information collection from every networked node• Packet monitoring

Advanced topics• High-resolution monitoring• Hash-based traceback• Simple and light weight analysis for practical monitori

ng• Information collection from mobile node/network• Monitoring network inside

Page 5: Monitoring for network security and management Cyber Solutions Inc.

High-resolution monitoring

Traffic is so dynamic• Peak rate is important for actual performance• Malicious access is in peaky traffic (pulsing D

oS) Requirement

• Shift minutes, hours, daily measurement to msec, usec, and further precise measurement

Page 6: Monitoring for network security and management Cyber Solutions Inc.

34 Hours

5 Seconds

Monitoring with high-resolution

Page 7: Monitoring for network security and management Cyber Solutions Inc.

time

Manager

AgentQue

ry a

nd r

esp

onse

Current Method

Delay

time

Manager

Que

ry a

nd r

esp

onse

1000 *n MOs/packet

Agent

Scalability by Aggregation

Page 8: Monitoring for network security and management Cyber Solutions Inc.

The drafts

 http://wwwietf.org/internet-drafts/

draft-glenn-mo-aggr-mib-02.txt

Page 9: Monitoring for network security and management Cyber Solutions Inc.

Problems in current counter DoS attack solutions

Page 10: Monitoring for network security and management Cyber Solutions Inc.

Take the battle to the foe

Traceback

Traceback potential

Page 11: Monitoring for network security and management Cyber Solutions Inc.

Internet

Source

Do you know?

Target

Yes !

Around Here!

PPPacket Trace Agent

Yes !

No !

←Packet Trace

Yes !

The traceback concept

Page 12: Monitoring for network security and management Cyber Solutions Inc.

The Architecture

PRA

PR

PRB

PacketTracker(PT)

Packet Query/Response

Page 13: Monitoring for network security and management Cyber Solutions Inc.

The Architecture

PRA

PR

PRB

PacketTracker( PT)

Packet Query/Response

Conf: Query/Response Setting

Page 14: Monitoring for network security and management Cyber Solutions Inc.

Requirements: Packet Record Protocol

Mapping: PacketRecord (encoded) Packet

Additional Data for corroboration

Scope of Packet Record

which IP header fields are masked) how much of the payload

Page 15: Monitoring for network security and management Cyber Solutions Inc.

Requirements: Packet Record Protocol

Packet Data

Key Generation

Packet Record Agent

Key Storage

IP Datagram

Key GenerationKg (IP Datagram)

Packet Recorder

Additional data

Key Storage

Additional Data

Page 16: Monitoring for network security and management Cyber Solutions Inc.

Requirements: Communication Protocol

Authenticated

Non Repudiation

Lightweight

Check for existence of a datagram

Query for Packet Recording parameters

Privacy, Integrity

Page 17: Monitoring for network security and management Cyber Solutions Inc.

The Process:

Packet Data

Transform

PRA

Packet Record Base

IP Datagram

TransformTr (IP Datagram)

PR

Additional data

Packet Record Base

Additional Data

IP Datagram

Transform

PTYes/No

Page 18: Monitoring for network security and management Cyber Solutions Inc.

Demonstration:  Tracking Attacks using             SNMP based packet tracing

The Internet

PRAPacket Record Agent

PRA2

IETF wired networkAttacker2

IETF wireless networkAttacker1

Victim on remote network

1. Attacker1 sends packet to Victim.2. IDS detects it and sends SNMP trap

to manager along with packet’s “record”.

3. Manager queries packet record agents PRA1, PRA2 and PRA3 for packet record

4. Manager receives responses from PRA1, PRA2, PRA3 and traces packet path.

atta

ck

IDS

ManagerSNMP Trap

Query and Response

PRA1

PRA3

Intrusion Detect SensorIDS

Page 19: Monitoring for network security and management Cyber Solutions Inc.

Demonstration: Screen shot

Page 20: Monitoring for network security and management Cyber Solutions Inc.

For practical network monitoring

Simple and right weight monitoring• Focusing on stability of traffic• Simple event generation and deep inspection

Monitoring and Stability analysis

Deep inspectionPacketSample DB

Event notification

Page 21: Monitoring for network security and management Cyber Solutions Inc.

Stability example

Observed source address is stable in large scale network

Page 22: Monitoring for network security and management Cyber Solutions Inc.

Mobility issues

Some times disconnected

changing network

changing place/environment

Access to more information

Page 23: Monitoring for network security and management Cyber Solutions Inc.

Mobility issues (1)

not continuously connected

Usual polling paradigm will not work

Agent initiated polling

Agent intitiated informs

Store locally (Offline)

Store and forward (Semi-online)

Page 24: Monitoring for network security and management Cyber Solutions Inc.

time

Manager

Current Method

Page 25: Monitoring for network security and management Cyber Solutions Inc.

time

Manager

Current Method

Page 26: Monitoring for network security and management Cyber Solutions Inc.

time

Manager

Agent initiated Polling

Page 27: Monitoring for network security and management Cyber Solutions Inc.

time

Manager

Agent initiated informs

Page 28: Monitoring for network security and management Cyber Solutions Inc.

Conventional defense strategy

インターネット

Intranet

WEB seriver Mail server

Firewalling

DMZ

Monitoring by IDS

Monitoring access from outside to inside

Page 29: Monitoring for network security and management Cyber Solutions Inc.

Risks network inside

インターネット

Exploited and/or compromised

Prohibited user accessFrom DHCP/Wireless network

Virus influenced node

Potential insider attacks

Page 30: Monitoring for network security and management Cyber Solutions Inc.

Monitoring inside

Detection non-authorized terminalPrevent illegal outbound access

インターネット

Monitoring• Log collection and audit• DHCP and/or connection activity monitoring• Application traffic from inside to outside

Connectivity and log monitoring

Page 31: Monitoring for network security and management Cyber Solutions Inc.

Summary Monitoring is the real base of network security and the m

anagement Further advanced monitoring is required

• High-resolution New security applications are required

• Packet traceback Further practical analysis is required

• Stability based analysis Future network environment support is required

• Mobile node and network support New monitoring target is required

• Network inside