Secure Implementation of Logging and Network Monitoring: Indian Computer Emergency Response Team
Secure Implementation of Logging and Network Monitoring: Indian Computer Emergency Response Team
Ruchi Gola,Scientist-C,
[email protected]
Agenda
• Logs & Monitoring
• Monitoring Logs for Security
• Monitoring logs for understanding the systems
• Challenges in Log Management
• Solution to this challenge
• System Information and event management (SIEM) technology
• Benefits of SIEM tools solves these issues
• A comparative situation with example of the attack taxonomy
• A comparative situation with example of the attack
taxonomy……with SIEM implemented
• Secure Implementation of Logging and Network Monitoring-Best
Practices compliance
• References
Logs & Monitoring
• What are logs?
o Provide an audit trail of who done
what, where,when and why(5 Ws)
o Security
Proactive
Reactive
o Understand your systems
Good system administration
Identify configuration errors 3
Monitoring Logs for Security
• Proactive - identify a pattern before it
becomes serious
4
Example of proactive monitoring ofLogs for
Security
/var/log/auth.log
Sep 2 07:43:21 sshd[24760]: refused connect from
220-128-206-131.HINET-IP.hinet.net
(::ffff:213.149.206.131)
Sep 2 07:44:23 sshd[24765]: refused connect from
220-128-206-131.HINET-IP.hinet.net
(::ffff:213.149.206.131)
Sep 2 07:46:41 sshd[24770]: refused connect from
220-128-206-131.HINET-IP.hinet.net
(::ffff:213.149.206.131)
Sep 2 07:50:14 sshd[24779]: refused connect from
220-128-206-131.HINET-IP.hinet.net
(::ffff:213.149.206.131)
5
Example of reactive monitoring of Logs for Security
Incident Handling:
• Review Logs as they are invaluable in detecting and tracking
attempted intrusions and other suspicious activity.
• In the above log entry, the c-ip 202.x.y.4 has successfully inserted the
hexadecimal code string in CommitteeName column of the table
committees.The ASCII equivalent of the hexadecimal code string
‘0x4f3C68313E776E65642062792046617354206F6620533474346E69635
F5330756C7320566572696E20656820756D61206269626F6E6120616865
696F6169686F613C2F68313E’ is ‘?O<h1>wned by FasT of
S4t4nic_S0uls Verin eh uma bibona aheioaihoa</h1>
6
Monitoring logs for understanding the systems
8
Challenges in Log Management
• Logs contain enormous amount of information.
• Identifying anomalies can be difficult
• Managing Logs can be Expensive;
Log analysis is a unique skill.
Looking at all events takes time. Logs can consume a lot of
disk space.
• Volume of information is huge No one size fits all as each
network is unique
9
Solution to this challenge
Reference: http://www.sans.org/reading_room/whitepapers/auditing/effective-case-
modeling-security-information-event-management_33319
10
System Information and event management
(SIEM) technology
• Centralized Syslog Server :
11
Benefits of SIEM tools solves these issues
12
A comparative situation with example of the
attack taxonomy
1. Attacker Scans the Firewall
(using NMAP,Firewalker, HPING,
etc…) to determine the responding
IP addresses, open ports on
it.Conducts this phase in Low and
Slow manner to avoid triggering
automatic Protections
2. Finger Printing
Continued, targeted scan (using
NMAP, HPING, etc…)again to
determine the operating system and
applications running on discovered
hosts.
In each phase ,the attacker has crafted the attack phase such as to bypass a single individual
protection device, having learned how to penetrate the preceding device.
14
A comparative situation with example of the
attack taxonomy……with SIEM implemented
1.
15
A comparative situation with example of the attack
taxonomy……with SIEM implemented….contd.
1. Attacker Scans the Firewall The
Router or Firewall sends events to
SIEM indicating port scans and an
alert is built at minor/warning level.
2. Finger Printing
The IDS/IPS reports system scans,
and other possible signature
matches, and the alert is raised to
an elevated level.Security staff is
notified (email, pager,etc...).
• Log Rotation
Determine time schedule
Based on volume of data
Develop meaningful naming convention.
Move data to rotated file
• Log Retention
Based on disk space.
May be regulatory requirements.
Archive onto WORM type devices and store in secure area.
18
Secure Implementation of Logging and Network
Monitoring-Best Practices compliance……contd.
• Normalise the data
All events such as Windows, Syslog, SNMP etc. should be normalised
into same format.
19
References
• Log Analysis website(http://loganalysis.org/ )
• The SANS reading room (http://www.sans.org/rr/whitepapers/logging/ )
• Event ID website given explanations to MS events http://www.eventid.net/
• Convert Windows Events to Syslog
WinSyslog http://winsyslog.com/en/
• EventReporter http://www.eventreporter.com/en/
• Commercial Monitoring tools
GFI LANguard (Windows Only) - http://www.gfi.com/lanselm/
Symantec - http://www.symantec.com
HP Openview - http://www.managementsoftware.hp.com/products/a-z.html
IBM Tivoli - http://www-306.ibm.com/software/tivoli/
CA Unicentre - http://www3.ca.com/solutions/product.asp?id=2869
Intellitactics Security Manager - http://www.intellitactics.com/blue.asp?PageID=26
Netforensics - http://www.netforensics.com/
ArchSight - http://www.arcsight.com/
• Open Source
Nagios (Open Source) - http://www.nagios.org/
• Guidelines for Auditing and Logging at CERT-In website
• A Practical Application of SIM/SEM/SIEM Automating Threat
identification(www.sans.org) 20
Thank you