stackarmor microsummit - niksun network monitoring - dpi

33
KNOW THE UNKNOWN ® NIKSUN Inc., CONFIDENTIAL - INTERNAL USE ONLY This document contains confiden0al informa0on that shall be distributed, routed or made available only within NIKSUN. Comprehensive Network Monitoring / DPI NIKSUN Inc.

Upload: gaurav-gp-pal

Post on 22-Jan-2018

46 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: stackArmor MicroSummit - Niksun Network Monitoring - DPI

KNOW THE UNKNOWN®

NIKSUNInc.,CONFIDENTIAL-INTERNALUSEONLYThisdocumentcontainsconfiden0alinforma0onthatshallbedistributed,routedormadeavailableonlywithinNIKSUN.

ComprehensiveNetworkMonitoring/DPI

NIKSUNInc.

Page 2: stackArmor MicroSummit - Niksun Network Monitoring - DPI

  Whydoescybercrimes0llpersist,despitesignificantinvestment?

  Whatdoesitmeantohavetrulycomprehensivemonitoring?  Surveillance,Detec0on,andForensics

  Howcanthishelpyouintherealworld?  ContextualAwareness(IncidentResponse)  FirewallMonitoring&DDoS  Malware/Ransomware  Compliance  Informa0onHiding  DNSServerHacked(Forensics)

Agenda

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide2

Page 3: stackArmor MicroSummit - Niksun Network Monitoring - DPI

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage.

WhyDoesCyberCrimePersist?

Slide3Copyright NIKSUN 2014

Known

Unknown

Cyber Security Products Cover this Area

Sophisticated Hackers work here!

Known

Known

Unknown Unknown

Imagine if the CDC only looked to prevent virus’ that have already wiped out millions… they would have no recourse in mitigating incidents like Ebola! •  Now imagine if they had

full visibility into every single person in the United States… they could monitor every person’s body and watch for the development of both old and new virus’

Page 4: stackArmor MicroSummit - Niksun Network Monitoring - DPI

Preven0on

  Howcanonepreventthatwhichonecan’tsee?  Whatnewservicesandapplica0onshaveenteredyournetworkthatyouareunawareof?

  Whoisbehindthem?Isitalegi0matebusinessapplica0onoratrojanormalware?

  Howdoweknowthatourdefensesareeffec0ve?

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide4

Page 5: stackArmor MicroSummit - Niksun Network Monitoring - DPI

WhatKnowledgeIsNecessary?

  Weneedmoreadvancedsignals(“data”)thanthosewhichwehaveprogrammedapriori

  Goodcybera^ackersevadeaprioriindicatorsandexploitdifferenta^ackvectors

  Anovelapproachisnecessarytogatherinforma0onfrombothknownandunknowna^ackvectors

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide5

Page 6: stackArmor MicroSummit - Niksun Network Monitoring - DPI

ComprehensiveMonitoring

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide6

Page 7: stackArmor MicroSummit - Niksun Network Monitoring - DPI

Whatisneeded?•  Videocamera(surveillance)•  Sensordetec0on(laserbeams)•  Imagerecogni0on(easysearchforforensics,incidentresponse)

Whyareflowslimited?•  Generallyonlyprovideinforma0onatlayer3•  Lackgoodsupportforcorrelatedflows(FTP,Mobility,evenwebpages,etc.)•  LackofbroaderThreatIntelligencesupport(files,domains,cer0ficates,

etc.)

Whyarelogslimited?•  Developerschoosewhatlogstorecord.Can’tknowabouta^acksthat

havenotevenoccurredyet

WhatisNetworkMonitoring?

NIKSUN,Inc.CONFIDENTIAL.--Seeconfiden0alityrestric0onson0tlepage. Slide7

Page 8: stackArmor MicroSummit - Niksun Network Monitoring - DPI

SampleFlowlogs

NIKSUN,Inc.CONFIDENTIAL.--Seeconfiden0alityrestric0onson0tlepage. Slide8

Page 9: stackArmor MicroSummit - Niksun Network Monitoring - DPI

  Surveillance&ThreatHun0ng  Top-downHolis0cviewofAllNetworkAc0vity  Cri0calNetworkInfrastructureIndicators  Real-0meContentAnaly0cs  Applica0onRecogni0on/Applica0onMetadata  Geo-IP

  Detec0on  Anomaly/Signatures/Content(DataLeakage)  IntelligenceFeeds

  IncidentResponse&Forensics  Applica0onReconstruc0on&Ar0factExtrac0on  SandboxIntegra0on  Flows&Connec0ons  RawPackets

  Other  Performance  Compliance

ComprehensiveMonitoring

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide9

Page 10: stackArmor MicroSummit - Niksun Network Monitoring - DPI

EmailServerCRM

Server WebServer

Enterprise-wideMonitoring

NIKSUN,Inc.CONFIDENTIAL.--Seeconfiden0alityrestric0onson0tlepage. Slide10

Monitor across all deployed physical and virtual devices, centrally, from any smart device

Page 11: stackArmor MicroSummit - Niksun Network Monitoring - DPI

FastMacro-to-MicroAnalysis

Slide11NIKSUN Inc., CONFIDENTIAL. See confidentiality restrictions on title page

Global Visibility

Regional View

Specific Session

Single Packet

NIKSUN, Inc. CONFIDENTIAL -- See confidentiality restrictions on title page. Slide 11

Page 12: stackArmor MicroSummit - Niksun Network Monitoring - DPI

DeepContentInspec0on-Example

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide12

With just a few clicks, DPI / DCI can identify all of this information

Page 13: stackArmor MicroSummit - Niksun Network Monitoring - DPI

UseCase–ContextualAwareness

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide13

Page 14: stackArmor MicroSummit - Niksun Network Monitoring - DPI

UseCase:ContextualAwareness

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide14

Alarms

Firewall

Log Analyzer

IDS/IPS

Content Filters

SIEM

Scanners

Alarms

Incident Response -Integrated Analysis

Alarms

Attacks often occur over disparate parts of the network, over extended periods of time à forensic investigation is necessary to put together pieces of the puzzle and reveal how an attack was crafted

Page 15: stackArmor MicroSummit - Niksun Network Monitoring - DPI

UseCase–FirewallMonitoring

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide15

Page 16: stackArmor MicroSummit - Niksun Network Monitoring - DPI

  Trendinginforma0ontotuneFirewalls  TCP-SYNrate(commonfirewallmetric)  Fragmentedpacketrate(IPv4,IPv6)  UDP,ICMP,DNS,NTP,etc.packetrates  Bandwidth

  In-depthanalysisofa^acka^empts  Resolveissueswithfirewalls

  FWvendors/usersokenneedpacketstotuneagainstana^ack  ComprehensiveIntelligenceonDDoSa^acks

  Isolatebadtrafficfromgood

  ThreatIntelligence(didanybadURLsmakeitpasttheFW?)  AnalyzeFirewalleffec0veness(Retrospec0veIDS)  ReplaytraffictotestnewFWrules

UseCase-FirewallMonitoring

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide16

Inline systems may face latency and complexity constraints, requiring a reduction in the deployed ruleset •  Monitoring becomes

invaluable for a constant pulse on critical infrastructure

Page 17: stackArmor MicroSummit - Niksun Network Monitoring - DPI

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage.

FirewallInbound+OutboundMonitoring

Network Internet

Who is trying to get in?

What methods are they using?

Who got in?

What did they get

out?

Backdoor?

Slide17

Page 18: stackArmor MicroSummit - Niksun Network Monitoring - DPI

DDoSMonitoring(Volumetric/Applica0on)

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide18

Page 19: stackArmor MicroSummit - Niksun Network Monitoring - DPI

RedZone/GreenZone

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide19

Page 20: stackArmor MicroSummit - Niksun Network Monitoring - DPI

TrafficVolume-BeforeandAkerFirewall

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide20

Page 21: stackArmor MicroSummit - Niksun Network Monitoring - DPI

UseCase– Ransomware(Wannacry)

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide21

Page 22: stackArmor MicroSummit - Niksun Network Monitoring - DPI

UseCase:WannacryInves0ga0on

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide22

Page 23: stackArmor MicroSummit - Niksun Network Monitoring - DPI

UseCase:WannacryInves0ga0on(cont.)

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide23

•  Leverage retrospective IDS •  View SMB scans on your infrastructure •  Real-time intelligence feed related information

Page 24: stackArmor MicroSummit - Niksun Network Monitoring - DPI

UseCase:WannacryInves0ga0on(cont.)

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide24

How can we know if the hosts scanned have actually been impacted?

Page 25: stackArmor MicroSummit - Niksun Network Monitoring - DPI

UseCase–Compliance

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide25

Page 26: stackArmor MicroSummit - Niksun Network Monitoring - DPI

  Discovercompliancelevelwithtrafficmonitoring  FasterthanPenTes0ng

  Validatesecuritypreandpostchanges  Firewalls,networks,servers

  Evidence  Rawdatacaptures

  Instantlyiden0fyinsecurecommunica0ons  Whoisusingnoncompliant:SSL2.0,SSL3.0,TLS1.0  Whoisusingwhichciphers–strongorweak?  WhatCer0ficatesareinuse?CertOrganiza0ons?  Cleartextprotocols,SSN

UseCase:Compliance-PCI/Fed/Gov

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide26

Page 27: stackArmor MicroSummit - Niksun Network Monitoring - DPI

Compliance–SSLMetadata

Slide27NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage.

Page 28: stackArmor MicroSummit - Niksun Network Monitoring - DPI

UseCase–InformaMonHiding/

ExfiltraMon

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide28

Page 29: stackArmor MicroSummit - Niksun Network Monitoring - DPI

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage.

Scenic?

Slide29

Page 30: stackArmor MicroSummit - Niksun Network Monitoring - DPI

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage.

AndNow?

Slide30COPYRIGHT 2013 - NIKSUN Inc.

Social Security Numbers hidden in picture… only way to tell is by drilling down to the raw packets!

Page 31: stackArmor MicroSummit - Niksun Network Monitoring - DPI

UseCase–DNSServerHacked

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide31

Page 32: stackArmor MicroSummit - Niksun Network Monitoring - DPI

  Spear-phishinga^ackluredemployeestogototheirbanktoupdatetheirinfo

  TheywereredirectedtoaBADsite  DifficulttotraceastheDNSserverfixeditselfakersomeamountof0mesotheproblemcouldnotbeiden0fiedbytradi0onalmethods

  Forensicanalysis  Discoveredthatthe“windowofopportunity”wastransient  GaveIPaddressofallthosethatwereluredtothewrongsite  Reconstructedthea^ackandtracedthea^acker’smovesstep-by-step

  DamagewasminimizedduetorapididenMficaMonandimmediateremediaMon

UseCase:DNSServerHacked

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide32

Page 33: stackArmor MicroSummit - Niksun Network Monitoring - DPI

NIKSUN:HelpingYouKnowtheUnknown®[email protected]

Foraddi0onalinforma0on:

NIKSUN,Inc.CONFIDENTIAL--Seeconfiden0alityrestric0onson0tlepage. Slide33