SIEM Overview with OSSIM Case Study. Mohammad Husain, PhD Cal Poly Pomona

Similar documents
ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Network Security: Firewall, VPN, IDS/IPS, SIEM

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7

SIEM (Security Information Event Management)

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

Compare Security Analytics Solutions

IC32E - Pre-Instructional Survey

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

One Hospital s Cybersecurity Journey

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Unlocking the Power of the Cloud

Total Security Management PCI DSS Compliance Guide

An Aflac Case Study: Moving a Security Program from Defense to Offense

RSA Security Analytics

ForeScout Extended Module for Splunk

ISO27001 Preparing your business with Snare

Not your Father s SIEM

USE CASE IN ACTION Splunk + Komand

An Aflac Case Study: Moving a Security Program from Defense to Offense

RULES VERSUS MODELS IN YOUR SIEM

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Look Who s Hiring! AWS Solution Architect AWS Cloud TAM

Pass4suresVCE. Pass4sures exam vce dumps for guaranteed success with high scores

A Measurement Companion to the CIS Critical Security Controls (Version 6) October

Cybersecurity Roadmap: Global Healthcare Security Architecture

K12 Cybersecurity Roadmap

THE ACCENTURE CYBER DEFENSE SOLUTION

CyberArk Privileged Threat Analytics

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

securing your network perimeter with SIEM

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Integrated, Intelligence driven Cyber Threat Hunting

Securing CS-MARS C H A P T E R

Splunk. Plataforma de Datos. Denise Roca / Gerente de Software

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Designing and Building a Cybersecurity Program

Driving more value from your Security Operations Center (SOC) Platform. James Hanlon Director, Splunk Security Markets Specialization, EMEA

Sobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.

Essentials to creating your own Security Posture using Splunk Enterprise

CompTIA CSA+ Cybersecurity Analyst

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Administration of Symantec Cyber Security Services (July 2015) Sample Exam

Simplify, Streamline and Empower Security with ISecOps

Overview Intrusion Detection Systems and Practices

Security Diagnostics for IAM

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

2. Firewall Management Tools used to monitor and control the Firewall Environment.

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Building Resilience in a Digital Enterprise

10x Increase Your Team s Effectiveness by Automating the Boring Stuff

White Paper IMPLEMENTING PCI DSS CONTROLS WITH EXABEAM

Synchronized Security

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture

Assessing Your Incident Response Capabilities Do You Have What it Takes?

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

An All-Source Approach to Threat Intelligence Using Recorded Future

CYBER RISK MANAGEMENT: ADDRESSING THE CHALLENGE SIMON CRUMPLIN, FOUNDER & CEO

Dynamic Datacenter Security Solidex, November 2009

ANATOMY OF AN ATTACK!

A Risk Management Platform

CIS Top 20 #12 Boundary Defense. Lisa Niles: CISSP, Director of Solutions Integration

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

NEXT GENERATION SECURITY OPERATIONS CENTER

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

CompTIA SY CompTIA Security+

Security, Internet Access, and Communication Ports

Digital forensics Technical Fundamentals. Saurabh Singh

Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Security, Internet Access, and Communication Ports

Cisco Cyber Range. Paul Qiu Senior Solutions Architect

68 Insider Threat Red Flags

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE

Imperva CounterBreach

QuickSpecs. Aruba IntroSpect User and Entity Behavior Analytics. Overview. Aruba IntroSpect User and Entity Behavior Analytics Product overview

Cisco Firepower NGFW. Anticipate, block, and respond to threats

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

Intro to Niara. no compromise behavioral analytics. Tomas Muliuolis HPE Aruba Baltics Lead

Security Operations & Analytics Services

SECURITY OPERATIONS CENTER BUY BUILD BUY. vs. Which Solution is Right for You?

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Cyber Defense Operations Center

About NitroSecurity. Application Data Monitor. Log Mgmt Database Monitor SIEM IDS / IPS. NitroEDB

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Part 2: How to Detect Insider Threats

Best Practices for Scoping Infections and Disrupting Breaches

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Transcription:

SIEM Overview with OSSIM Case Study Mohammad Husain, PhD Cal Poly Pomona 1

SIEM SIEM = Security Information and Event Management Collects security information from multiple sources; internal and external to an organization Detects anomalies in the collected security information and tries to correlate multiple anomalies to interpret whether a particular incident is related to a potential attack An organization can use the information within the SIEM to effectively respond and detect security incidents 2

But skeptics say Image Courtesy: [3] 3

Once upon a time Intrusion Detection System (IDS): report intrusions by out of band detection Intrusion Prevention System (IPS): block intrusions by in band filtering Optional input filtered by firewall and IPS; VPN is allowed Internal network Firewall public Internet DMZ Image Courtesy: [2] Web, DNS servers 4

IDS vs. IPS IDS: out of band IDS External network IPS: in line IPS Wire tap internal network External network internal network Image Courtesy: [2] 5

The Bigger Picture Industrial Control Email Mobile Authentication Web DHCP/ DNS Data Loss Prevention Vulnerability Scans Firewall Real-time Machine Data Monitoring, Correlations, Alerts Ad Hoc Search & Investigate Custom Dashboards And Reports Analytics And Visualization Provides Insight to Security Personnel Security Management/ Intelligence Platform Developer Platform Network Flows Servers Intrusion Detection Storage Custom Apps Anti-Malware Asset Info External Lookups / Enrichment Employee Info Threat Feeds Applications Data Stores Badges Cloud Apps Image Courtesy: Splunk 6

Host-Based IDS/IPS (HIDS/HIPS) Protects against: local attacks from a user, and codes/scripts from removable devices attacks from the same subnet/vlan Con: if an attacker takes over a host, then one can tamper with IDS/agent binaries and modify audit logs only local view of the attack Analyzing, and comparing with the database for system calls, sequence of system calls logs/ file-system modification integrity of system binaries password files access control and privilege escalation 7

Network-based IDS/IPS (NIDS/NIPS) Deploying sensors at strategic locations with a central monitor in the network E.G., Packet sniffing via tcpdump at routers watch for violations of protocols and unusual connection patterns Protects against network-oriented attacks such as DDoS monitoring user activities by looking into the data portions of the packets for malicious command sequences Con: may not detect encrypted traffic, as data portions and some header information can be encrypted cannot detect some attacks in the host 8

The genesis of SIEM VLAN2 SIEM Box : IDS/IPS sensor HIDS in each host Internal network firewall public Internet VLAN3 VLAN1 HIDS in each host VLAN4 DMZ Web, DNS servers Image Courtesy: [2] 9

SIEM Process Image Courtesy: [1] Most alerts require manual analysis by a SOC analyst Experience gained from handling incidents or falsepositives can serve as an input for a new use case or for finetuning 10

SIEM Comparison (Gartner, Aug 2016) 11

But skeptics say Image Courtesy: [3] 12

Hands-on: Alien Vault OSSIM Open Source https://www.alienvault.com/products/ossim Download and installation https://youtu.be/xfa-ziyhx3c Configuration of OSSIM https://youtu.be/y2f3vqoxzus Attack event scenarios https://youtu.be/wgnmir8lqgo 13

Research Question What if the SIEM box is compromised? Thoughts? How about using SIEM in a Software-as-a-Service scenario Thoughts? 14

But skeptics say Image Courtesy: [3] 15

References [1] van de Moosdijk, Jarno, and Daan Wagenaar. "Addressing SIEM." (2015) http://www.vurore.nl/images/vurore/downloads/scripties/2030-defscriptie-jarno-van-de-moosdijk---daan-wagenaar.pdf [2] Introduction to Computer Networks and Cybersecurity. Chwan-Hwa (John) Wu and J. David Irwin. CRC Press [3] http:///www.curphey.com 16