intelligent logging server
play

Intelligent logging server SIEM for the poor Jan Vykopal , Martin Ju - PowerPoint PPT Presentation

Introduction Use case: cyber attack detection Intelligent logging server SIEM for the poor Jan Vykopal , Martin Ju ren, Daniel Kou ril Tom Kubina, Michal Prochzka, Martin Draar Masaryk University, Brno, Czech Republic CYTER


  1. Introduction Use case: cyber attack detection Intelligent logging server “SIEM for the poor” Jan Vykopal , Martin Juˇ ren, Daniel Kouˇ ril Tomáš Kubina, Michal Procházka, Martin Drašar Masaryk University, Brno, Czech Republic CYTER 2010 Prague, June 23–24, 2010

  2. Introduction Use case: cyber attack detection Introduction Use case: cyber attack detection

  3. Introduction Use case: cyber attack detection Intelligent logging server (ILS) useful tool for intrusion detection and forensic analysis that:

  4. Introduction Use case: cyber attack detection Intelligent logging server (ILS) • Enables earlier and more accurately detection of cyber attacks. • Integrates outputs from separate ICT monitoring systems. • Based on free (and open-source) components. • Reduces total count of relevant messages and eventual false positives. • Supports network hierarchy – suitable for large networks. • Detects also system misconfiguration.

  5. Introduction Use case: cyber attack detection ILS as a central monitoring point I • Supervises network infrastructure: servers, IDS, honeypots . . . • Centrally stores log files destroyed by attackers at compromised hosts (allows forensic analysis). • Can reveal malicious activities invisible at host level (e. g., distributed attacks). • Uses additional data sources such as public blacklists. • Logs are sent via secure channel to ensure message integrity and authentication.

  6. Introduction Use case: cyber attack detection ILS as a central monitoring point II

  7. Introduction Use case: cyber attack detection ILS development as a project I • Small project funded by Development Fund of CESNET and Masaryk University. • Our prototype is aimed at the Linux operating system family. • Should be easy to deploy in real-life network infrastructure . • Project period: 09/2009–11/2010. • Output available under BSD license: software package and deployment guide incl. probes configuration.

  8. Introduction Use case: cyber attack detection ILS development as a project II • Done: • project specification: ”core” protocol: Syslog, correlation: Simple Event Correlator • central log storage deployment (Linux server with RAID) • honeypot deployment (honeyd, VMware + Sebek + database of attempted passwords) • deployment of public blacklist correlation engine • integration of flow-based IDS • attack detection modules • In progress: • presentation layer • deployment of the whole system in the Masaryk University network

  9. Introduction Use case: cyber attack detection Use case: Unauthorized access to computer system • network reconnaissance by attacker • online distributed dictionary attack • successful breach • destruction of evidence • . . .

  10. Introduction Use case: cyber attack detection Incident handling without ILS Somebody or some devices reports several alerts = cyber attacks .

  11. Introduction Use case: cyber attack detection Incident handling without ILS Somebody or some devices reports several alerts = cyber attacks . • (distributed) port scanning captured by firewall/IDS

  12. Introduction Use case: cyber attack detection Incident handling without ILS Somebody or some devices reports several alerts = cyber attacks . • (distributed) port scanning captured by firewall/IDS • (distributed) dictionary attack (not) detected at host

  13. Introduction Use case: cyber attack detection Incident handling without ILS Somebody or some devices reports several alerts = cyber attacks . • (distributed) port scanning captured by firewall/IDS • (distributed) dictionary attack (not) detected at host • breach is locally logged as well as many other events

  14. Introduction Use case: cyber attack detection Incident handling without ILS Somebody or some devices reports several alerts = cyber attacks . • (distributed) port scanning captured by firewall/IDS • (distributed) dictionary attack (not) detected at host • breach is locally logged as well as many other events • attacker stealthily destroys local log files

  15. Introduction Use case: cyber attack detection Incident handling without ILS Somebody or some devices reports several alerts = cyber attacks . • (distributed) port scanning captured by firewall/IDS • (distributed) dictionary attack (not) detected at host • breach is locally logged as well as many other events • attacker stealthily destroys local log files We do not know any connection between these events.

  16. Introduction Use case: cyber attack detection Incident handling with ILS ILS reports only one alert = cyber attack .

  17. Introduction Use case: cyber attack detection Incident handling with ILS ILS reports only one alert = cyber attack . • port scanning is reported to ILS

  18. Introduction Use case: cyber attack detection Incident handling with ILS ILS reports only one alert = cyber attack . • port scanning is reported to ILS • ILS creates context

  19. Introduction Use case: cyber attack detection Incident handling with ILS ILS reports only one alert = cyber attack . • port scanning is reported to ILS • ILS creates context • assigns other reported events to this context

  20. Introduction Use case: cyber attack detection Incident handling with ILS ILS reports only one alert = cyber attack . • port scanning is reported to ILS • ILS creates context • assigns other reported events to this context • destroyed logs can be accessed later in ILS data storage

  21. Introduction Use case: cyber attack detection Incident handling with ILS ILS reports only one alert = cyber attack . • port scanning is reported to ILS • ILS creates context • assigns other reported events to this context • destroyed logs can be accessed later in ILS data storage Events are correlated, one incident is reported and all evidence is kept.

  22. Introduction Use case: cyber attack detection Summary: incident handling without ILS • Events are correlated • Several alerts relevant to • Only one dashboard one attack • Utilization of public • Several different systems blacklists • Local logs prone to • Retaining all logs for destruction forensic analysis

  23. Introduction Use case: cyber attack detection Questions&Answers Intelligent logging server Jan Vykopal et al. vykopal@ics.muni.cz

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend