13. Network Security Monitoring Flashcards
NSM
Network Security Monitoring
- Detection
- Prevention
- Investigation
The Security process
Ongoing cycle;
- Assesment
- Protection
- Detection
- Response
Traffic profiles
Understanding anomalies, normal profiles;
- expected source ports, destination ports
- Differrent OS’ may pick source ports differently
- what shold normal traffic to/from a DNS/web server look like?
When is the traffic not normal;
- When is DNS traffic part of a DDoS
- what if your web server is connecting out on port 80?
Network Security Tools
Traffic Analysis Penetration Testing First hop security Perimeter or subnet border defence Infrastructure monitoring
Traffic Analysis
IP Flow Records (NetFlow, sFlow, IPFIX)
Packet capture (Wireshark, tcpdump)
Intrusion detection systems (snort)
Penetration testing
Network Scanning (nmap, Metasploit)
First hop security
defending against local/internet attachks eg rogue DHCP servers
Perimeter or subnet border defence
traffic filtering log analysis ( eg firewalls ACLs)
Infrastructure monitoring
SNMP device management (NAV)
Simple Network Management Protocol
Network Flow
Set of packets with common properties
eg. IP src/dst address, TCP/UDP src/dst port, protocol
Flow export methods
Configure the export of flows on a router
Use a flow collector to gather flows to database for analysis
eg Cisco Netflow
- can spot ‘out of profile’ traffic
- after an incident can see which other systems in the network might have been involved
- doesn’t explicitly prevent any attack
Packet Capture - Wireshark
Software that understands the structure - encapsulation - of different networking protocols.
Parses & displays fields along with their meanings.
- can capture data from a live network connection or from a file of already-captured packets
Eg
- A DNS response
- An http request
- Ethernet/IP/TCP header address
Network Flow Info Use
Network flow useful for traffic analysis mainly after the fact
- usually an investigative tool, using only flow data
- current possible DDoS or past incident correlation
IDS
Intrusion Detection System
Intrusion Detection System
Generally used for live incident detection
- must see, capture and analyse full packets from the live traffic feed
- typically port mirror traffic into the detector
Prefer to do at network edge to minimise volume
- capture and analysis at 10Gbit/s gets challenging