Security Operation Center
Concepts and Implementation
renaud.bidou@intexxia.com
Security Operation Center Concepts and Implementation - - PDF document
Security Operation Center Concepts and Implementation renaud.bidou@intexxia.com > SOC Modules > Global Architecture > Collection & Storage > Correlation > SOC Modules R Box R Box reaction and reporting + A Box K Box A Box
renaud.bidou@intexxia.com
E Box C Box D Box A Box E Box E Box E Box E Box C Box
E Boxes C Boxes D Box A Box
R Box
R Box
event generators : sensors & pollers collection boxes formated messages database incident analysis reaction and reporting K Box
K Box
knowledge base
+
Messages Correlation Stats
Permanent Risk Evaluation
Client System Modelisation
OS Host based IDS Applications Firewall alerts Network IDS Integrity Checking Network equipment Alerts
Monitored System
Incident Handling Client Configuration Record Security Policy Customer Status Vulnerability Database Analysis
.........
A Box (Correlation Engine) E Box (Event Generators)
Status Integrity
C Box (Collection & Formating Modules) K Box (Knowledge Base) SNMP syslog Proprietary SMTP HTTP / XML
.........
Linux Windows 2k / XP Cisco Pix Firewall-1 Oracle Apache IIS
.........
D I S P A T C H E R Tripwire ISS Snort
Events
D Box (Local events database) Real-time Monitoring Statistical Analysis
System Status Security Activity
R'' Box (Customer Portal) R' Box (SOC Console)
Distributed Architecure Distributed Architecure Polling
protocol agent protocol agent protocol agent dispatcher dispatcher Encryption Decryption
Events
HA & LB application agent application agent application agent E Box E Box E Box Unsecure Network socket socket socket sockets sockets HA & LB HA & LB protocol agent protocol agent protocol agent mqueue mqueue mqueue mqueue mqueue mqueue dispatcher application agent application agent application agent
Events E Box E Box E Box
Host Token @Host_IP_Table @Host_FQDN_Table ID IP Address ID FQDN
Host Table Host IP Table Host IP Table
Field Attributes Description id Unique Unique message ID sensor_id Not Null Unique Sensor ID msg_type Not Null Type of message (ipchains, snort-1.8.x-alert etc.) epoch_time Not Null Date in epoch format of event generation source Intrusion Source Host Token target Intrusion Target Host Token proto Protocol number src_port Intrusion source port number tgt_port Intrusion target port number info Additional info int_type_id Not Null Intrusion type ID (Filter, Access etc.) int_id Intrusion ID message Not Null Original message
Alert Stats
www.cust1.com hack1.com hack2.com mail.cust1.com hack1.com hack3.com www.cust2.com hack3.com hack2.com Dispatch Message Analysis Vulnerability Database System Exposure System Status Structural Analysis Security Policy Date / Time / Source Match Behavior Analysis hack2.com www.cust1.com www.cust2.com hack3.com mail.cust1.com www.cust2.com hack1.com www.cust1.com mail.cust1.com Contexts Intrusion Path Functional Analysis Formated messages
Target proto.port Target proto.port Target proto.port Target Host Token Target Host Token Target Host Token Target Host Token Target Host Token
ID
ID
ID
ID
ID
ID
ID
ID
ID
ID
ID
ID
ID
ID Target Host Token Target proto.port Target proto.port Target Host Token Target proto.port Target proto.port Source Host Token Target Host Token Target proto.port Target proto.port Array of source contexts
ID
ID
ID
ID Intrusion ID Intrusion ID Intrusion ID Intrusion ID Intrusion ID
ID
ID
ID
ID Target Host Token Target Host Token Target Host Token Target Host Token
%AttackSources source attack hashtable address $AttackSources{$source} target detail hashtable address start_time First reception time stop_time Last reception time ${$AttackSources{$source}}{$target} proto.tgt_port (protocol, target port) id start_time First reception time stop_time Last reception time Unknown array address 100 Filtered array address 530 Integrity array address Intrusion Type Table ${{$AttackSources{$source}}{$target}}[$int_type] attack_info_id attack info hashtable address start_time First reception time stop_time Last reception time ${{{$AttackSources{$source}}{$target}}[$int_type]}[attack_info_id] intrusion_id Intrusion id start_time First reception time stop_time Last reception time duplicate Duplicate info Intrusion Type Table Hosts Table
at each level
New Messages Timeout Closure Code New Message Active Inactive Closed
Analysis Module Message Correlation Message Correlation
||
Field Condition Field Condition Field Condition
&& && field operator <field | value> [!]