Collection, analysis and response stages
Consisting 6 core module
www.ecsc.go.kr
Collection, analysis and response stages Consisting 6 core module - - PowerPoint PPT Presentation
Collection, analysis and response stages Consisting 6 core module www.ecsc.go.kr Contents 1 Overview 2 Collection 3 Analysis 4 Response Overview Technical Introduction to Koreas ECSC security monitoring method How to collect
www.ecsc.go.kr
[Security Information]
Classify the patterns of attacks and apply different correlation analysis to them Collect logs in real time from pattern-based detection systems of individual institutions Share intrusion information in real time through and information sharing system and respond quickly
Integration module Information Sharing Module Threat Management Module Collection Module Collection Module
Monitoring Support module Correlation analysis module
[ECSC detection pattern]
[An example of ECSC detection pattern]
alert tcp any any <> any $HTTP_PORT (content:"POST";depth:4;pcre:"/\x0d\x0a.* (netstat(%20|\+)+\x2Da|\x2Eexe(%20|\+)+\x2Fc|cmd(%20|\+)+\x2Fc|dir(%20|\+)+ c\x3A\x5C|ls(%20|\+)+152\x2E99\x2E)/i";)
< Analy> < Policy src= "original" type= "1 " separator= "," / > < Field regular_ pos= "NO" / > < Field regular_ pos= "NO" / > < Field regular_ pos= "NO" / > < Field regular_ pos= "NO" / > < Field regular_ pos= "NO" / > < Field regular_ pos= "7 " / > < Field regular_ pos= "8 " / > < Field regular_ pos= "1 2 " / > < Field regular_ pos= "NO" / > < Field regular_ pos= "NO"/ > < Field regular_ pos= "NO"/ > < Field regular_ pos= "NO"/ > < Field regular_ pos= "NO"/ > < Field regular_ pos= "NO" / > < Field regular_ pos= "NO" / > < Field regular_ pos= "NO" / > < / Analy>
0 ;2 0 1 1 -0 3 -2 9 1 7 :2 2 :0 9 ;;E0 0 2 ;2 0 1 1
1 7 :2 2 :0 9 ;2 1 0 .1 2 5 .2 0 0 .8 0 ;0 ;2 0 3 .2 2 8 .5 3 .2 2 2 ;;1 5 9 3 ;2 0 3 .2 2 6 .2 5 3 . 9 1 ;;5 0 0 4 ;6 ;;I M: NateOn Traffic Detected;9 9 9 ;;2 ;;;;;;; ;;1
0 ;2 0 1 1 -0 3 -2 9 1 7 :2 2 :0 9 ;;E0 0 2 ;2 0 1 1
1 7 :2 2 :0 9 ;2 1 0 .1 2 5 .2 0 0 .8 0 ;0 ;2 0 3 .2 2 8 .5 3 .2 2 2 ;;1 5 9 3 ;2 0 3 .2 2 6 .2 5 3 . 9 1 ;;5 0 0 4 ;6 ;;I M: NateOn Traffic Detected;9 9 9 ;;2 ;;;;;;; ;;1 0 ;2 0 1 1 -0 3 -2 9 1 7 :2 2 :0 9 ;;E0 0 2 ;2 0 1 1
1 7 :2 2 :0 9 ;2 1 0 .1 2 5 .2 0 0 .8 0 ;0 ;2 0 3 .2 2 8 .5 3 .2 2 2 ;;1 5 9 3 ;2 0 3 .2 2 6 .2 5 3 . 9 1 ;;5 0 0 4 ;6 ;;I M: NateOn Traffic Detected;9 9 9 ;;2 ;;;;;;; ;;1 0 ;2 0 1 1 -0 3 -2 9 1 7 :2 2 :0 9 ;;E0 0 2 ;2 0 1 1
1 7 :2 2 :0 9 ;2 1 0 .1 2 5 .2 0 0 .8 0 ;0 ;2 0 3 .2 2 8 .5 3 .2 2 2 ;;1 5 9 3 ;2 0 3 .2 2 6 .2 5 3 . 9 1 ;;5 0 0 4 ;6 ;;I M: NateOn Traffic Detected;9 9 9 ;;2 ;;;;;;; ;;1
Security Information Regularization Filtering Reduction Encryption FIFO queue Transmission
Real-time pattern-based analysis
[Classification of attack patterns and correlation analysis methods]
[Risk level ]
[Standard of profiling]
Profiling pattern by different institutions : Analyze weekly averages or the average of the previous day
Collecting information Real-time pattern- based analysis Profiling pattern- based analysis Analysis on IPS/IDS pattern Register & respond to intrusion Register as a real-time pattern
Data mining
detect security information in hourly units Primitive security information
Collection Response
Integration Module
Information on intrusion Threat Management Module Monitoring Support Module
Collection Module
Analysis
Correlation analysis module
Information Sharing Module
(Memory DB)
(RDBMS)
Threat management module Information sharing module Monitoring support module
www.ecsc.go.kr