Open NDR For Dummies Guide PDF
Open NDR For Dummies Guide PDF
Open NDR For Dummies Guide PDF
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Open NDR
by Alan Saldich
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Open NDR For Dummies®, Corelight Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2021 by John Wiley & Sons, Inc., Hoboken, New Jersey
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without
the prior written permission of the Publisher. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,
Making Everything Easier, and related trade dress are trademarks or registered trademarks of John
Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be
used without written permission. All other trademarks are the property of their respective owners.
John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.
10 9 8 7 6 5 4 3 2 1
For general information on our other products and services, or how to create a custom For Dummies
book for your business or organization, please contact our Business Development Department in
the U.S. at 877-409-4177, contact [email protected], or visit www.wiley.com/go/custompub.
For information about licensing the For Dummies brand for products or services, contact
BrandedRights&[email protected].
Publisher’s Acknowledgments
Some of the people who helped bring this book to market include the following:
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
INTRODUCTION................................................................................................ 1
About This Book.................................................................................... 2
Foolish Assumptions............................................................................. 2
Icons Used in This Book........................................................................ 3
Where to Go from Here........................................................................ 3
Table of Contents v
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
CHAPTER 4: Rethinking Your Security Posture................................ 37
Perimeter-Based Security: Necessary but Insufficient................... 37
Why Open NDR Is More Powerful Than Proprietary NDR.............. 39
Trust the vendor (versus trust but verify)................................... 39
A widely used “design pattern”.................................................... 39
The flavor of the data.................................................................... 40
Analytics included (or not)............................................................ 40
Access to underlying data............................................................. 41
Cloud only or hybrid...................................................................... 41
Onboard storage or flexible options........................................... 42
Fancy maps and charts................................................................. 42
Revisiting the Core Components of Open NDR............................... 42
Open source versus proprietary.................................................. 43
Open data versus alerts only........................................................ 43
Open architecture versus closed................................................. 43
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
N
etworks are the veins of modern organizations, and data is
the lifeblood that flows through them. Networks carry all
the applications and data required to operate in today’s
digital world, but it wasn’t long ago that interconnecting
computers was a new concept (sneaker-net anyone?).
Introduction 1
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Network data is ground truth. Unlike applications or servers
whose data can be overwritten, network traffic contains innu-
merable clues about people, devices, applications, and data that
are critical to successful incident response and threat hunting.
Attackers use a wide variety of techniques to try to hide in the
network, but ultimately they can’t avoid pushing packets across
the wire, leaving behind an immutable record of their activ-
ity. If you’re there, ready to capture that record and turn it into
evidence, you and your team will have the high ground.
Foolish Assumptions
I assume you’re a security professional in business, government,
or academia. This isn’t an implementation guide — it’s a book
for security managers, architects, and others who may be deeply
familiar with many aspects of modern enterprise security. At the
same time, you may not be as well versed in network security
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
monitoring (also referred to as network traffic analysis, network
detection and response, network analysis and visibility, and a
host of other overlapping terms). You also may not be familiar
with the open-source project called Zeek (which was known as
Bro from 1995 to late 2018). If that’s you, you’re in the right place.
These alerts point out the stuff your mother warned you about.
Well, probably not, but they do offer practical advice to help you
avoid potentially costly or frustrating mistakes.
Introduction 3
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Learning the history of network
monitoring and Zeek (formerly Bro)
Chapter 1
Building Resilient
Security with Open NDR
A
s soon as organizations started using networks for opera-
tional purposes and sharing data that had operational,
technical, or personal value, bad actors started to try to
exploit them. Very early on, monitoring networks to see what was
going on seemed like a pretty good idea. What does “monitoring”
mean, exactly?
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Why Can’t We Just Keep the
Bad Guys Out?
Enterprise security is a never-ending battle, one that gets more
difficult every year as attackers get more sophisticated, invent
new techniques, and build new tools and malware. Of course,
the easiest approach is to just keep them out in the first place!
After all, thousands of companies deliver firewalls (and advanced
firewalls!), intrusion detection, intrusion prevention, application
monitoring, end-point detection products, threat intelligence,
end-user detection, and many more.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The Birth of Zeek (Formerly Bro)
Put yourself in 1995 (if you’re old enough). In the technology
world, that wasn’t long after the introduction of NCSA Mosaic
(the world’s first web browser) in 1993. Believe it or not, many
companies were just adopting email widely and were still trying
to figure out what do with a “web server.”
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Source: https://my.es.net/traffic-volume?scale=linear
FIGURE 1-1: 1990s traffic was low but growing fast.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
They would, of course, be using their own computers and applica-
tions, so controlling those in the way a business might was incon-
ceivable. The scientists and students at the lab would be doing
all manner of experiments, from high-energy physics to energy
conservation to biology, and much of that was unpredictable. The
data sets could be massive, with things like the Advanced Light
Source (a particle accelerator) generating terabytes or petabytes
of data regularly. There was no way to enforce the use of specific
devices, applications, or data sets.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Zeek logs are compact, curated, structured, and inter-
connected. Those attributes relate to the data collected in
Zeek logs:
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The challenge for defenders is collecting the right evidence
needed to investigate a suspected attack or breach, whether it
happened just now, or a year ago. Regardless of the recency, inci-
dent responders need the right data to assess the damage, and to
decide what to do about it. They need to know the “ground truth,”
and the best place to get that is from network data.
Often people describe what Zeek does as being a bit like a flight
data recorder (FDR) on an airplane. When something goes awry,
the first thing investigators do is recover that device. Why?
Because during the flight, it was recording the relevant data that
would be needed in an investigation — things like: Airspeed,
throttle position, engine speed, aileron and flap angles, rudder
angles, fuel level, altitude, attitude and other critical data.
The FDR isn’t recording what everyone on the plane was wear-
ing, what movies were shown, or what each passenger ate for the
in-flight meal; it’s recording only the relevant data required to
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
piece together what happened in the event of an accident or other
mishap. Unfortunately, using that metaphor leads people to think
about plane crashes, so I use it judiciously.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Zeek sensors can be deployed to monitor north–south traffic
(typically traffic entering or exiting your organization at an egress
point or primary Internet connection) or east–west traffic (usually
defined as internal traffic to/from or within data centers or other
“on-premises” locations), or high-value locations (like specific
research labs, high-performance computing, specific applications
or databases, and so on).
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Just search your SIEM platform or data lake for those IOCs in the
Zeek logs. Whether you use Backstory, Databricks, Devo, Elastic,
Hadoop, Splunk, Sumo, or something else, if you have the logs
then searching for specific strings is quick.
Then you may notice that in addition to the specific piece of mal-
ware you’re searching for, other files that arrived at the same time
are visible. What are those files? Who downloaded them? Where
did they come from? Why doesn’t the file extension match the file
type? Why was that SMB traffic on an unexpected port?
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Learning key capabilities of Open NDR
built on Zeek and Suricata
Chapter 2
Using Open NDR in
Your Enterprise
T
his chapter covers the advantages of Open NDR — because of
its inherent characteristics — versus other types of network
monitoring approaches. It also dives into some of the finer
points of Zeek logs, integrating data with Suricata Alerts and packet
capture (PCAP), and the 2020 SolarWinds/SUNBURST breach.
The attackers were sophisticated. Not only did they execute a success-
ful supply-chain attack, but after their malware was deployed at the
(continued)
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
(continued)
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Exploring Zeek’s Key Capabilities
Open NDR deployments built on open-source tools like Zeek and
Suricata can be easily integrated into the security infrastructure
of almost any modern enterprise. But, before you get started,
consider these characteristics of organizations that have the most
successful deployments:
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Some of the key capabilities of Corelight Sensors include the
following:
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
for example video traffic, DNA data sets, and so on) and to
retain only some of the connection metadata, increasing the
effective monitoring capacity of the sensor.
»» Community ID: Corelight supports this feature that allows
easy pivots on network connections between tools like Zeek
and Suricata. The Community ID is a hash of the five-tuple
(composed of five values: the source and destination IP
addresses, source and destination ports, and the transport
protocol). Because several other key security solutions also
support Community ID, it’s a powerful way to see correla-
tions and behavioral or temporal relationships between the
two systems for a given TCP session. For more information
about community ID, Christian Kreibich of Corelight pub-
lished a paper about it in 2018, which you can read here at
http://icir.org/christian/talks/2018-11-suricon-
communityid.pdf.
»» Data reduction: Zeek is very efficient at extracting compact,
structured logs from network flows, but it still pumps out a
lot of data. Because some SIEM platforms are priced based
on the amount of data ingested, adding Zeek log data can
increase the bill for your SIEM platform, sometimes signifi-
cantly. Corelight Sensors can reduce the volume of key logs
compared to Zeek by 30 percent to 50 percent, which can
make a material difference in your bill.
»» Fork-and-filter: Sometimes a SOC team wants to send some
Zeek logs into its SIEM platform for live analysis but send
other logs to longer-term “colder” (and cheaper) storage.
Corelight Sensors allow fine-grained control of log destina-
tions to fork different logs to different destinations, and to
filter out some logs altogether if they aren’t needed.
»» Support for the Zeek Input Framework: Often it’s useful
to automatically append or “decorate” Zeek logs with more
human-readable information to speed up investigations.
That can be done using the Input Framework, which allows
the addition of third-party data to be inserted into Zeek logs.
It might be useful, for example, to include department
names, location information, machine names, and so on, so
that incident responders do not have to constantly look up
trivial (yet important) data to understand the context around
an alert.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Note: Corelight is the company behind Zeek, and some of these
features are available only with Corelight Sensors, not with DIY
Zeek sensors. I address some of the challenges with building your
own Zeek sensors in Chapter 5.
Because all Zeek logs are created using the real-time event pro-
cessing engine that we describe in Chapter 1, they share cer-
tain common elements. A trivial but important example is the
timestamp. Any incident responder who doesn’t have access to
Zeek logs can tell you that before they can piece together the cir-
cumstances around an incident, they need to sync up whatever
data they’ve been able to collect from sources that are usually
not tightly synchronized like NetFlow collectors, PCAP files, and
device health logs (for example, email servers, file servers, web
servers, Domain Name Server [DNS] logs, and so on).
Another critical field is the Unique ID (UID) field. Every TCP con-
nection logged by Zeek is assigned a unique identifier known as
the UID. This is a critical pivot point in Zeek logs that allows an
investigator to “pull the threads” as they follow clues in the Zeek
logs.
For example, the UID allows an analyst to start with a clue trig-
gered by an email, with that evidence collected in the SMTP log.
The analyst can copy the UID from that log and then pivot to the
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Files log to see any file downloads that occurred during the same
session and determine whether anyone else was affected. They
may then examine any DNS queries and responses in the DNS log
for more clues, again pivoting off the UID, and examine the cer-
tificates used during the session. Cross-log linking is one of the
most powerful capabilities of Zeek.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Two other tools frequently used alongside Zeek and Suricata are
PCAP and NetFlow data. Normally, if you don’t find what you’re
looking for in the thin data Netflow stream, you have to dive into a
PCAP file where 99 percent of the data probably isn’t relevant to a
security investigation. Security teams that use Zeek and Suricata,
combined with file extraction, typically find that 80 percent to
90 percent of security incidents can be resolved using those tools
alone.
PCAP files of large network flows are so large that they’re typi-
cally only kept for a few days or maybe a week or two, continually
overwritten by newer PCAP files. If you’re investigating a six-
month-old breach, PCAP can’t help you!
First of all, it’s true: Like all open-source software, Zeek and
Suricata are both free and can be downloaded from GitHub and
installed on off-the-shelf hardware. Thousands of individuals
and organizations around the world have done so.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Before you decide to build your own open-source/DIY Zeek sen-
sors, think about these considerations:
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» You may face tuning issues and packet loss. Zeek sensors
built with off-the-shelf components are notorious for high
and often devilishly invisible packet loss. That means your
team may be seeing only 60 percent to 80 percent of the
packets — you’re essentially looking for security evidence
with one eye closed. Corelight has optimized its NIC and
software to deliver zero packet loss, which means less
headaches and better performance.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Helping SOCs operate faster with Open
NDR based on Zeek and Suricata
Chapter 3
Improving Operational
Security with Open NDR
T
his chapter is about implementing Zeek in your enterprise
from a high level. It’s not the Zeek manual or installation
guide (also known as Book of Zeek), which is available
at https://docs.zeek.org/en/current/install.html. Rather,
it’s a big-picture explanation of how building an Open NDR capa-
bility based on Zeek and Suricata can have a big impact on your
security operations center (SOC), how it operates, and how effec-
tive it can be.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
from innovation from the vendor, from other vendors and
even individual contributors to the open-source project.
It’s a more powerful way to develop software.
»» Open data: Incident response and threat hunting is
detective work, and teams depend on access to the evi-
dence. NDR solutions that just give you the “answers” in the
form of “the right alerts” are probably not what a sophisti-
cated blue team is looking for. If someone at a crime scene
tells you, “The butler did it,” but doesn’t let you see any
fingerprints, cell phone records, or other evidence, you’d
be hard pressed to take their word for it.
»» Open architecture: Your needs change over time, and
perhaps your organization has specialized requirements. In
that case, the flexibility of an Open NDR platform is critical:
You can modify it with third-party packages or with packages
your own security team develops to meet your needs.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Long connections detection: Generate a notice when
long-running connections occur, providing early visibility
into a possible attack in progress.
»» Port scanning detection: Identify port scanning behavior
involving hosts (horizontal) or ports (vertical) across a variety
of protocols.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» SSH authentication bypass detection: Reveal when a client
and server switch to a non-SSH protocol.
»» SSH client keystroke detection: Reveal an interactive
session when a client sends user-driven keystrokes to the
server.
»» SSH client file activity detection: Reveal a file transfer
occurring during the session when the client sends a
sequence of bytes to the server or vice versa.
»» SSH scan detection: Infer scanning activity based on how
often a single service is scanned.
»» Custom encryption detection: Detect connections that are
already encrypted without an observed handshake, which
can indicate custom or prenegotiated encryption.
»» Expected encryption detection: Identify unencrypted
connections running on ports when encryption is expected.
»» SSH agent forwarding detection: See when SSH agent
forwarding occurs between clients and servers, which may
indicate lateral movement when adversaries have compro-
mised SSH credentials.
»» SSH multifactor authentication (MFA) detection: See
when SSH connections use MFA, which can help analysts rule
out other explanations for observed timing discrepancies in
SSH connections. This detection can also help teams monitor
external SSH servers for MFA compliance.
»» Noninteractive SSH detection: Reveal when SSH connec-
tions don’t request an interactive terminal and instead use
SSH as a port forwarding tunnel, which may indicate
malicious SSH tunneling.
»» SSH reverse tunnel detection: Reveal when a client
connects to an SSH server and sends the server an interac-
tive terminal, establishing a reverse SSH tunnel that may
indicate malicious SSH tunnelling.
»» Domain Name System (DNS) over HTTP Secure (HTTPS)
(DoH) detection: Reveal when DNS queries are made to
known DoH providers to provide insight into DNS traffic that
would otherwise be hidden.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
You can see the power in taking advantage of the extensibility of
Open NDR solutions when it comes to encrypted traffic. Of course,
any investigator would like to be examining unencrypted traffic,
but that’s not always possible.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Integrating Open NDR into
your security architecture
With any NDR solution, open or not, you must understand the
scope of the solution. There isn’t strict agreement as to what
capabilities are essential, required, or optional. But generally, the
flow goes something like what’s shown in Figure 3-1.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The choice about what approach you want to take depends on a
couple factors:
»» Your existing SIEM platform: Are you happy with it? Are
you planning to upgrade now (or soon)? What about in a
year or two? Can your SIEM handle the demands of a
modern big data approach to security?
»» The sophistication of your team: Does your team want the
data? Will they analyze it? Do they understand how to take
advantage of the power of the data? If not, then maybe you’d
be better off with an all-in-one solution, more of an off-the-
shelf NDR solution.
Zeek data can be used for incident response or for threat hunting,
and ideally for both. One of the fundamental principles to keep in
mind is that you only get one chance to capture the relevant data
lurking in your network traffic. After the data passes over your
network, if you didn’t capture it, it’s lost forever. The first step is
to begin collecting it using an Open NDR Sensor.
As the saying goes, the best time to plant a tree was 20 years
ago; the next best time is now. The same holds true for deploying
network sensors!
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
After your sensors are deployed, you can start thinking about
making use of the data, a topic too big for this book. I cover a few
considerations in the following sections, and at www.corelight.
com where you can request Corelight’s Threat Hunting Guide.
The simplest pivot point is time — all Zeek logs share a common
timestamp that allows the investigation of web traffic, email, file
downloads or shares, DNS queries and responses, and everything
else across a common time boundary. That may sound trivial, but
when you’re gathering data from many unrelated sources like
system health logs, network performance logs, NetFlow, and so
on, and then trying to sync them up, that’s just drudgery that
Zeek avoids.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
simply search Virus Total to see if that file hash is a malicious file
that required further investigation.
In the world of network security, Zeek can help you pinpoint a lot
of clues around a point in time and a specific TCP connection or
file transfer, and usually that’s enough to figure out what hap-
pened and what to do about it. (“Footprints show they jumped
the back fence, guessed the security code on the loading dock, and
stole our truck!”)
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
By being selective (or “smart”) about which packets you capture,
you can make more efficient use of the given storage available,
which means your team can go back farther in time using PCAP
to resolve investigations. That increases the odds of success for
those thorniest cases.
Data reduction
Zeek is a very compact data structure, which means you can keep
Zeek logs around for years.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Fork and filter
Sometimes, possibly also for cost considerations (like per-
gigabyte SIEM licensing models), you may not want to export
all your Zeek data into your SIEM platform. Maybe you want the
most commonly accessed logs to go there, but you want to send
everything else to long term, low-cost cloud storage. Or perhaps
your company is moving to a new SIEM platform, so migrating
some logs to the new system while retaining your old system dur-
ing a transition makes sense.
Speeding up investigations
Using Zeek for the first time can be overwhelming even for expe-
rienced security analysts. With a ton of data that may be unfa-
miliar, analysts new to Zeek may not know where to start. It’s
not unusual for new users to only scratch the surface of what’s
possible because they’re not sure where to go next:
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Learning how the most sophisticated
security teams think about monitoring
Chapter 4
Rethinking Your Security
Posture
T
his chapter steps back and takes a look at the philosophy
behind Zeek and discusses the power of Open NDR. These
topics may be unfamiliar ground to you, depending on your
past experience and the tools you’re accustomed to using.
Regardless, I hope it helps you consider thinking differently about
your security architecture and approach.
Perimeter-Based Security:
Necessary but Insufficient
Seatbelts. Water. Good barbecue. Many things in our lives are nec-
essary but not sufficient (alone) to sustain life. Perimeter-based
security is one of them. For decades, the need to keep attackers out
of our facilities, systems, databases, networks, and other infra-
structure has been obvious. It’s also required. It’s a no-brainer.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Just like locking your front door and setting the house alarm when
you leave, ensuring that you have correctly configured firewalls,
advanced firewalls, intrusion detection and prevention systems,
multifactor authentication, physical security, and all the rest is
fundamental. Unfortunately, in today’s environment, it’s not
enough.
I cover the basic idea in Chapter 1. Revisiting why this is the case
in enterprise security today is worthwhile. Recall that Zeek was
developed and evolved in the late 1990s at Lawrence Berkeley Lab
and then spread throughout the federal government before mak-
ing its way into the world of enterprise security.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
seem overwhelming as a member of a blue team — because thou-
sands of combinations of tactics, techniques, and procedures can
be launched by an unknown number of adversaries over any time
period. The reality is that anticipating and preventing all possible
attacks at all times is not possible. Monitoring your key networks
24 hours a day, 365 days a year is possible. If your organization
isn’t doing that simple first step, you’re missing critical pieces of
information that your security teams will need to do their jobs at
some point in the future!
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 4-1: The Open NDR design pattern.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
based in signatures, and more — solutions like Security Onion
(an all-in-one tool including Zeek, Suricata, and other security
tools combined with a nice GUI built on the ELK stack [Elastic,
Logstash, and Kibana] from Elastic) would probably be worth
investigating.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Onboard storage or flexible options
Even with systems like Zeek, which are super-efficient at pulling
out the relevant metadata from network traffic, it’s still a ton of
data. Some NDR solutions store the extracted metadata onboard,
whether that includes packet capture, Zeek data, Suricata alerts,
or some combination. Even in a large heterogeneous environment
there simply won’t be enough onboard storage to take advantage
of one of the most powerful capabilities of Zeek: to go back in
time, by years if necessary. To do that, you need to have kept the
log data, and if you’re constrained to keeping the data local in the
sensor, you’ll run out of space very quickly!
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Open source versus proprietary
Open-source software isn’t the only way to develop technology
and build products, but it’s a pretty powerful approach. From the
buyers’ perspective, there are a couple of key advantages:
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Open NDR solutions’ open architecture means you can extend its
functionality with new packages. You can create new packages
yourself to extract data or other evidence that’s specific to your
company or industry. And you benefit from the work of people in
other organizations (see https://github.com/zeek/packages)
who may benefit from yours.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Considering questions security teams
often have trouble answering
Chapter 5
Ten Questions to Ask
Yourself about Your
Network
T
his book explains how Open NDR can help your cybersecu-
rity teams operate more efficiently and effectively, closing
investigations using the evidence collected by Zeek and
Suricata. With a grounding in Open NDR, you might wonder, “So
what? What can this really do for me?”
When faced with any incident, the problem for most members of a
security operations center (SOC) is the seemingly infinite amount
of data available to explore in an effort to understand what hap-
pened (or didn’t happen). At the same time, the universe of avail-
able data is somewhat unknown. Analysts may wonder
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
And many, many others. Here are ten things your security team
should know — and can know — with an Open NDR platform.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
the traffic periodically, or capture only some portions of an
interaction but not others. Or they may log once every minute.
Or they may collect data on a query but not the associated
response (for example, collecting DNS queries but not
responses).
You may not have the visibility you think you have. In the middle
of the next breach is not the right time to realize you have massive
visibility holes!
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
How Far Back in Time Can You Go?
Hours? Days? Months? Years? Most enterprise security teams rely
on a combination of data sources to investigate breaches. Com-
mon sources are device health logs, NetFlow logs, packet capture
(PCAP), and endpoint detection and response (EDR). That means
analysts spend a lot of time pulling together information from
many sources and building a coherent picture of what happened.
The problem is often that the data they have to work with is spotty
and incomplete (as highlighted by the previous questions in this
chapter).
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» The security team doesn’t have control over that portion
of the network infrastructure.
»» It could be illegal in some jurisdictions for privacy
reasons.
»» Your organization may have policies that don’t allow
traffic to be unencrypted for security purposes. This may
vary from country to country.
»» Networks contain a tremendous amount of very
detailed, very specific, and often extremely sensitive
information. (Think about salaries, proprietary information,
email traffic that isn’t intended for public consumption, web
page visits, and so on.) So, naturally some companies are
extremely reluctant to make that available by decrypting it.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Can You Find Malicious Files
Hiding in Plain Sight?
A simple technique attackers use is simply to change the file
extension to make an executable look like a GIF or some other
innocuous file type. If that happens, would you have a way to look
for it in the ocean of benign traffic? How would you go about it?
What if you miss one?
And even after all that, they’re probably not sure they have all the
evidence they need. It would be like trying to solve a jigsaw puzzle
when you don’t know what the picture is, and you’re not sure if
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
all the pieces are in the box, or even if the pieces in the box are
for the right puzzle! Are there other puzzles? Other boxes? Other
pieces? For most security teams, there’s room for improvement
and increased efficiency.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Closing more tickets per hour, per day, per week, and
per month is better. It means analysts are more likely to
get to the serious one (faster) among the thousands of
benign alerts, reducing the existential or strategic risk to
your organization.
»» Every large organization lives with the fear of a major
breach. A major breach leads to loss of revenue, confidential
information, market value, reputation, and brand equity, or
worse, legal and regulatory jeopardy and penalties.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.