collection analysis and response stages
play

Collection, analysis and response stages Consisting 6 core module - PowerPoint PPT Presentation

Collection, analysis and response stages Consisting 6 core module www.ecsc.go.kr Contents 1 Overview 2 Collection 3 Analysis 4 Response Overview Technical Introduction to Koreas ECSC security monitoring method How to collect


  1. Collection, analysis and response stages Consisting 6 core module www.ecsc.go.kr

  2. Contents 1 Overview 2 Collection 3 Analysis 4 Response

  3. Overview  Technical Introduction to Korea’s ECSC security monitoring method  How to collect security information from different institutional heterogeneous security systems  How to implement correlation analysis on the mass data collected  How to effectively respond to intrusion incidents [Security Information ] ● Information detected by pattern-based security system such as IPS or IDS

  4. Stages of security monitoring Collection Analysis Response Share intrusion Collect logs in Classify the information in real time from patterns of real time pattern-based attacks and apply through and detection different information systems of correlation sharing system individual analysis to them and respond institutions quickly

  5. 6 Core Modules ….. Information Sharing Module Collection Module Correlation Integration Threat analysis module Management module Module Collection Module Monitoring Support ….. ECSC’s 6 Core modules module

  6. Collection Stage  Issues related to the collection stage  What information to collect  How to collect the logs detected from individual systems?  How to regularize different logs of heterogeneous security systems?  How to collect massive amounts of data?

  7. Analysis Stage  Issues of the analysis stage  Is all the collected information related to hacking incidents?  How to implement correlation analysis on collected information?  How to classify hacking attack patterns ?  What analysis strategy should be applied to the mass data?

  8. Response Stage  Issues of the response stage  What are efficient response strategies and methods for different attack patterns?  What is the most efficient response system to intrusion incidents?

  9. Contents 1 Overview 2 Collection Analysis 3 4 Response

  10. Process of collecting security information Pattern-based Regularization real-time syslog detection logs Filtering Transmission Reduction Network traffic snmp information Encryption  Collection module

  11. Collecting Security Information  Pattern-based security information  Real-time logs from pattern-based detection system such as IPS or IDS  The key to precise detection is patterns: to combine patterns of individual security systems and ECSC’s own pattern  Operate a consultative organization to apply a precise detection pattern [ECSC detection pattern] ● Develop its own patterns by investigating and analyzing actual cases and use open source of IDS snort ● Share patterns in cooperation with related institutions  Network Traffic Information  Real-time traffic information form the backbone switch in related institutions and information on CPU usage

  12. ECSC Detection Pattern  Develop own pattern  Develop highly accurate patterns by investigating actual cases  Apply them to individual institutions through consultative organization for detection pattern sharing [ An example of ECSC detection pattern ] ● POST method run through command "netstat ", ".exe", "dir", "ls", alert tcp any any <> any $HTTP_PORT (content:"POST";depth:4;pcre:"/\x0d\x0a.* (netstat(%20|\+)+\x2Da|\x2Eexe(%20|\+)+\x2Fc|cmd(%20|\+)+\x2Fc|dir(%20|\+)+ c\x3A\x5C|ls(%20|\+)+152\x2E99\x2E)/i";)

  13. Regularization of Security Information  Regularize real-time logs from individual systems  Regularize real-time logs from heterogeneous systems through an xml-based policy - DST_ I P: '2 0 3 .2 2 6 .2 5 3 .9 1 ' - SRC_ I P: '2 0 3 .2 2 8 .5 3 .2 2 2 ' 0 ;2 0 1 1 -0 3 -2 9 < Analy> - COMP_ YN: 'Y' < Policy src= "original" 1 7 :2 2 :0 9 ;;E0 0 2 ;2 0 1 1 0 ;2 0 1 1 -0 3 -2 9 - ATTACK_ NM: 'I M: NateOn Traffic Detected' type= "1 " separator= "," / > -0 3 -2 9 - CNT: '1 ' 1 7 :2 2 :0 9 ;;E0 0 2 ;2 0 1 1 < Field regular_ pos= "NO" / > 0 ;2 0 1 1 -0 3 -2 9 1 7 :2 2 :0 9 ;2 1 0 .1 2 5 .2 0 < Field regular_ pos= "NO" / > -0 3 -2 9 - EQP_ I P: '2 1 0 .1 2 5 .2 0 0 .8 0 ' 1 7 :2 2 :0 9 ;;E0 0 2 ;2 0 1 1 0 ;2 0 1 1 -0 3 -2 9 < Field regular_ pos= "NO" / > 0 .8 0 ;0 ;2 0 3 .2 2 8 .5 3 .2 2 1 7 :2 2 :0 9 ;2 1 0 .1 2 5 .2 0 - EQP_ TYPE: '0 5 ' -0 3 -2 9 < Field regular_ pos= "NO" / > 1 7 :2 2 :0 9 ;;E0 0 2 ;2 0 1 1 2 ;;1 5 9 3 ;2 0 3 .2 2 6 .2 5 3 . 0 .8 0 ;0 ;2 0 3 .2 2 8 .5 3 .2 2 < Field regular_ pos= "NO" / > - DST_ PORT: '5 0 0 4 ' 1 7 :2 2 :0 9 ;2 1 0 .1 2 5 .2 0 -0 3 -2 9 9 1 ;;5 0 0 4 ;6 ;;I M: < Field regular_ pos= "7 " / > 2 ;;1 5 9 3 ;2 0 3 .2 2 6 .2 5 3 . - COMP_ CNT: '1 ' 0 .8 0 ;0 ;2 0 3 .2 2 8 .5 3 .2 2 1 7 :2 2 :0 9 ;2 1 0 .1 2 5 .2 0 < Field regular_ pos= "8 " / > NateOn Traffic - PAYLOAD: '' 9 1 ;;5 0 0 4 ;6 ;;I M: 2 ;;1 5 9 3 ;2 0 3 .2 2 6 .2 5 3 . < Field regular_ pos= "1 2 " / > 0 .8 0 ;0 ;2 0 3 .2 2 8 .5 3 .2 2 Detected;9 9 9 ;;2 ;;;;;;; NateOn Traffic < Field regular_ pos= "NO" / > - BODY_ TYPE: 'LOG_ I A' 9 1 ;;5 0 0 4 ;6 ;;I M: 2 ;;1 5 9 3 ;2 0 3 .2 2 6 .2 5 3 . ;;1 < Field regular_ pos= "NO"/ > Detected;9 9 9 ;;2 ;;;;;;; - I NST_ CD: '7 3 0 3 4 0 0 0 ' NateOn Traffic 9 1 ;;5 0 0 4 ;6 ;;I M: < Field regular_ pos= "NO"/ > ;;1 - SRC_ PORT: '1 5 9 3 ' Detected;9 9 9 ;;2 ;;;;;;; < Field regular_ pos= "NO"/ > NateOn Traffic < Field regular_ pos= "NO"/ > - PROTOCOL: '6 ' ;;1 Detected;9 9 9 ;;2 ;;;;;;; < Field regular_ pos= "NO" / > - OPTI ON2 : '' ;;1 < Field regular_ pos= "NO" / > - OPTI ON1 : '' < Field regular_ pos= "NO" / > < / Analy> - EQP_ TI ME: '2 0 1 1 0 3 2 9 1 7 1 9 2 9 ' - SI MS_ TI ME: '2 0 1 1 0 3 2 9 1 7 1 9 2 9 ' - OPTI ON3 : '' Xml regularization policy

  14. Filtering, Reduction, Encryption  Filtering, reduction, and encryption of security information  Filter detection errors( false positive )  Reduce recurring information : reduce logs with the same starting IP, arriving IP, and attacking name  Transmit encryption to the central center (SSL) Regularization Filtering Security FIFO queue Transmission Information Reduction Encryption

  15. Contents 1 Overview 2 Collection Analysis 3 4 Response

  16. Analysis Method on Security Information Automatic analysis system Integration Correlation module module Real-time pattern-based analysis Collected Detection information and Response Profiling Analysis from to intrusion. institution Data mining Analysis

  17. Analysis Method on Security Information real-time correlation analysis on Pattern information detected by patterns with high accuracy analyze critical values by profiling Profiling information detected by patterns with low accuracy create statistics for 5 minute increments to Mining utilize for security monitoring

  18. Real-time Pattern-Based Analysis  Real-time pattern-based analysis  Grade risk level by real-time correlation analysis on information detected by accurate detection pattern (ECSC pattern)  Correlation analysis: - Correlation analysis on logs with the same attack pattern based on attack IP - Correlation analysis on black list IP based on attack IP - Correlation analysis on vulnerabilities based on target IP [ Classification of attack patterns and correlation analysis methods ] ● Cooperation between ECSC monitoring researchers and related institutions

  19. Real-time Pattern-Based Analysis  Real-time correlation analysis  Calculate risk level through correlation analysis based on attack patterns, attack information, vulnerabilities, and critical values [Risk level ] ● Risk level=initial risk level Ⅹ significance of risk level+(∑risk level through correlation analysis) • Black List IP, Port • Vulnerabilities Correlation analysis • Risk level of attack patterns • Critical values

  20. Profiling-based Analysis  Profiling pattern-based analysis  Analyze information detected through patterns with low accuracy by comparing it with profiled critical values  Profile critical values in advance : profiling critical values by different institutions and patterns [Standard of profiling] Profiling pattern by different institutions : Analyze weekly averages or the average of the previous day

  21. Profiling-based Analysis  Through profiling-based analysis, we register patterns with high accuracy as a real-time monitoring pattern that is analyzed automatically Register as a real-time pattern Real-time pattern- based analysis Register & Collecting respond to information intrusion Profiling pattern- Analysis on based analysis IPS/IDS pattern

  22. Data mining Analysis  Data mining analysis  Create a statistic every 5 minutes from the original data and utilize it for monitoring  Data mining based on the top attack name, top place, top target, and top traffic increase

  23. Data mining Analysis Primitive security detect security information information in hourly units Data mining Apply new monitoring pattern based on mining results

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend