A strategy for Inexpensive Automated Containment of Infected or - - PowerPoint PPT Presentation

a strategy for inexpensive automated containment of
SMART_READER_LITE
LIVE PREVIEW

A strategy for Inexpensive Automated Containment of Infected or - - PowerPoint PPT Presentation

A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager Infocomm Security Group, NUSCERT Computer Centre National University of Singapore steven@nus.edu.sg NOTE: Updated


slide-1
SLIDE 1

A strategy for Inexpensive Automated Containment

  • f Infected or Vulnerable Systems

Steven Sim Kok Leong Assistant Manager Infocomm Security Group, NUSCERT Computer Centre National University of Singapore steven@nus.edu.sg NOTE: Updated slides available online at https://selftest1.nus.edu.sg:9876/ppt/steven_sim_FIRST_2006.pdf

slide-2
SLIDE 2

Agenda

  • NUS IT infrastructure
  • The awakening
  • A first step
  • Exploring alternatives
  • The evolution
  • Track record
  • What’s next?
  • Closing
slide-3
SLIDE 3

The NUS IT infrastructure

  • Not-for-profit
  • Multi-gigabit, high speed network
  • 35,000 students and 6,000 staff
  • 30,000 concurrent online nodes
  • Plug-and-play networks
  • Wireless networks
  • Heterogeneous and diverse IT
slide-4
SLIDE 4

The awakening

  • That blasted worm
  • Expensive and labor-intensive containment
  • Bottleneck in incident management
  • Need to process re-engineer

– detection – containment – alert (response) – eradication (remediation)

slide-5
SLIDE 5

A first step

  • Acceptable Use Policy

– Legal counsel – IT steering committee – Student union

  • Detection: Statistical-based anomaly IDS

– simple – low overheads – minimal false positives

  • Containment

– switch-port disconnection

  • Alert (Response)

– win-popup alerts

  • Eradication (Remediation)

– users not easily reached

slide-6
SLIDE 6

The evolution

Statistical-anomaly IDS Blackhole Mechanism Host switch-port manually disconnected by network team User discovers network disconnection User approaches helpdesk Helpdesk identifies and fixes security issues Release Mechanism User gets alerted where possible through Windows messenging service

  • The process

Host switch port manually reactivated by network team Helpdesk informs user his network connectivity is fixed

slide-7
SLIDE 7

A first step

  • Limitations

– a DoS attack on innocent users – require OOB to alert users – difficulty with remediation – tendency for user to change ports – manual and fairly labor-intensive

slide-8
SLIDE 8

Exploring alternatives

  • Commercial containment products

– route blackholing – admission control

  • Benefits

– robust – efficient

slide-9
SLIDE 9

Exploring alternatives

  • Limitations

– costly

  • expensive ($$)
  • tremendous effort

– overhaul of all unsupported switches

  • agent dependent

– integration with detection feeds not available

  • lack of consideration for false negatives

– in-house developed detection mechanisms

slide-10
SLIDE 10

The evolution

  • Detection

– statistical anomaly-based IDS – honeynets – vulnerability scanners

  • Containment

– DHCP blackholing – internal intruders quarantined

  • botnet irc servers blocked
  • Alert (Response)

– win-popup to infected machines – abuse contact of external origin auto-alerted

  • Eradication (Remediation)

– self-help

slide-11
SLIDE 11

The evolution

Statistical-anomaly IDS Honeynets Blackhole Mechanism Host quarantined User accesses Internet websites User gets redirected to self-help page User performs remedy including self assessment Release Mechanism Host gets released in next batch release User gets alerted via email User gets alerted where possible through email or Windows messenging service Vulnerability Scanners

  • The process
slide-12
SLIDE 12

Self

  • help
slide-13
SLIDE 13
  • Email on release
slide-14
SLIDE 14

The evolution

  • Email alert to external abuse
slide-15
SLIDE 15

The evolution

  • Beneficial features

– cost and effort

  • cost of implementation
  • ease of implementation

– user management

  • managing user expectations
  • empowering users

– minimal false negatives

  • efficacy of current antivirus detection pattern

can be determined

  • new antivirus-undetected malicious trojans,

backdoors and worms can be discovered

slide-16
SLIDE 16

The evolution

  • Limitations

– does not handle non-DHCP based hosts

  • rely on switch-port disconnection

– longer time window of infection/vulnerability

  • need to be improved upon

– loopholes to circumvent DHCP blackhole and remediation steps

  • mitigated through monitoring of re-

infections – self-help is Windows specific

  • eradication for other OS infections handled
  • nsite.
slide-17
SLIDE 17

Track record

VIDS Detections

5000 10000 15000 20000 25000 30000 35000 Jan '05 Feb '05 Mar '05 Apr '05 May '05 Jun '05 Jul '05 Aug '05 Sep '05 Oct '05 Nov '05 Dec '05 Month

  • No. of Intrusions
slide-18
SLIDE 18

Track record

Honeynet Detections

200 400 600 800 1000 1200 1400 1600 Aug '05 Sep '05 Oct '05 Nov '05 Dec '05 Month

  • No. of internal intrusions

Internal intrusions Internal intruders

slide-19
SLIDE 19

Track record

Blackholed/Quarantined systems

100 200 300 400 500 600 Jan '05 Feb '05 Mar '05 Apr '05 May '05 Jun '05 Jul '05 Aug '05 Sep '05 Oct '05 Nov '05 Dec '05 Month

  • No. of quarantined MAC addresses
slide-20
SLIDE 20

Track record

  • Some signatures created that is based on

discovered binaries in containment – TSPY_AGENT.AX

  • BKDR_NORUNORG.A

– TSPY_AGENT.AK

  • BKDR_SERVU.AS

– TROJ_DROPPER.GG

  • BKDR_SERVU.AZ

– TROJ_SMALL.AHE

  • BKDR_HACDEF.AQ

– TROJ_AGENT.XT

  • BKDR_SHELL.B

– TROJ_AGENT.XU

  • WORM_NETSKY.DAM

– TROJ_AGENT.XV

  • WORM_SOBER.DAM

– WORM_RBOT.BWC

  • WORM_MYTOB.DAM

– WORM_RBOT.BZC

  • WORM_LOVGATE.DAM

– HKTL_PROCKILL.I

  • WORM_MYDOOM.DAM
slide-21
SLIDE 21

What’s next?

  • Enhance containment for non-DHCP based

systems

– new server allowed on network after risk accessed and managed (this includes administrative, network and host vulnerability assessments) – existing server switch-port disconnected from network should any periodic network vulnerability assessment fail

slide-22
SLIDE 22

Acknowledgements

The development of the automated incident containment strategy would not be possible without the support and assistance from the following people:

  • Ms Yong Fong Lian (IT Security Manager)
  • Dr Ma Huijuan (IT Security Engineer)
  • Mr Gong Wei (IT Network Engineer)
slide-23
SLIDE 23

Closing

Containment strategy

  • Inexpensive
  • Simple
  • Easy to develop
  • Easy to implement
  • Easy to maintain
  • Effective
slide-24
SLIDE 24

“The virus may be spreading despite the control measures already taken. Far more human and animal exposure to the virus will

  • ccur if strict containment does not isolate all

known and unknown locations where the bird flu virus is currently present.” Dr Juan Lubroth