SlideShare ist ein Scribd-Unternehmen logo
1 von 223
SP Security Primer 101 Peers working together to battle Attacks to the Net Version 2.1
Free Use ,[object Object],[object Object]
Goal ,[object Object],[object Object],[object Object]
What Do You Tell the Boss? ISP CPE Target Hacker
DDoS Vulnerabilities Multiple Threats and Targets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Attack  zombies : Z ,[object Object],[object Object],Access Line Z Z Z Z Z Z Z Z Z
The SP’s Watershed – Feb 2000
Overview
The Vetted – Battling the Bad Guys
When BOTs Attack – Inter AS http://www.wired.com/politics/security/magazine/15-09/ff_estonia_bots
Aggressive Collaboration NSP-SEC-KR Next Next iNOC-DBA Note: We are not trying to illustrate actual inter-relational or interactive connections between the different communities. National Cyber Teams NSP-SEC NSP-SEC-BR NSP-SEC-JP FIRST/CERT Teams NSP-SEC-D Drone-Armies NSP-SEC-CN FUN-SEC Telecoms  ISAC Other ISACs MWP Hijacked DSHIELD MyNetWatchman Internet  Storm Center SANS
What is NSP-SEC  ,[object Object],[object Object],[object Object],[object Object]
Economic Cycles Peak Trough Recession Expansion Parts of the Cyber Criminal Business Cycle Incidents time Lots of Problems & Attacks Community Mitigation Miscreant & Criminal R&D New Criminal Revenue Opportunities
Where is This Coming From? Work the  Problem Tactical Mitigation Post Mortem Craft Strategic  Response Empowerment Hardware Software BCPs Mitigation  & Operations  Communities Ops Meetings One-on-One Beer Meetings What we’re doing today.
Working the 40/40/20 Rule ,[object Object],[object Object],[object Object],[object Object]
Top Ten List of things that Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” Sun Tzu Art of War
The Executive Summary
SP Security in the NOC - Prepare PREPARATION Prep the network Create tools Test tools Prep procedures Train team Practice IDENTIFICATION How do you know about the attack? What tools can you use? What’s your process for communication? CLASSIFICATION What kind of attack is it? TRACEBACK Where is the attack coming from? Where and how is it affecting the network? REACTION What options do you have to remedy? Which option is the best under the circumstances? POST MORTEM What was done? Can anything be done to prevent it? How can it be less painful in the future?
Aggressive Collaboration NSP-SEC-KR Next Next iNOC-DBA Note: We are not trying to illustrate actual inter-relational or interactive connections between the different communities. National Cyber Teams NSP-SEC NSP-SEC-BR NSP-SEC-JP FIRST/CERT Teams NSP-SEC-D Drone-Armies NSP-SEC-CN FUN-SEC Telecoms  ISAC Other ISACs MWP Hijacked DSHIELD MyNetWatchman Internet  Storm Center SANS
iNOC DBA Hotline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Point Protection NOC ISP’s Backbone Remote Staff Office Staff Penetration Interception Penetration Penetration Interception Interception DOS AAA
Edge Protection ,[object Object],[object Object],[object Object],“ outside” “ outside” Core telnet snmp
Destination Based RTBH NOC A B C D E F G iBGP Advertises List of Black Holed Prefixes Target Peer B Peer A IXP-W IXP-E Upstream A Upstream B Upstream B POP Upstream A
Sink Holes Peer B Peer A IXP-W IXP-E Upstream A Upstream A Upstream B Upstream B POP Customer Primary DNS Servers 171.68.19.0/24 171.68.19.1 Services Network Remote Triggered Sink Hole Garbage packets flow to the closest Sink Hole Remote Triggered Sink Hole Remote Triggered Sink Hole Remote Triggered Sink Hole Remote Triggered Sink Hole Remote Triggered Sink Hole Remote Triggered Sink Hole Remote Triggered Sink Hole
BCP 38 Ingress Packet Filtering Internet ISP’s Customer Allocation Block: 96.0.0.0/19 BCP 38 Filter = Allow only source addresses from the customer’s 96.0.X.X/24 96.0.20.0/24 96.0.21.0/24 96.0.19.0/24 96.0.18.0/24 BCP 38 Filter Applied on Downstream Aggregation and NAS Routers ISP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Where to Prefix Filter?  AS 200 AS 400 C E AS 100 AS 300 Customer AS 500 Egress Filter Prefixes to Internet; Ingress Filters Coming from Internet Customer Filters In and Out Ingress Filter Customer’s Prefixes D M N X A W B
Total Visibility Source:  http://people.ee.ethz.ch/~oetiker/webtools/rrdtool/ Anomaly for DNS Queries Thru’put Spike RTT Spike Investigate the spike An identified cause of the outage
What Really needs to be Done ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prepare your NOC
SP’s/ISP’s NOC Team ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SP’s/ISP’s NOC Team ,[object Object],[object Object],[object Object],[object Object],[object Object]
What Do ISPs Need to Do? 2)  Secure Resources Firewall, Encryption, Authentication, Audit 1) ISP’s Security  Policy 3)  Monitor and Respond   Intrusion Detection, work the incidence,  4)  Test, Practice, Drill Vulnerability Scanning 5)  Manage and Improve Post Mortem, Analyze the Incident, modify the plan/procedures Security incidence are a normal part of an ISP’s operations!
The Preparation Problem ,[object Object],[object Object],[object Object],[object Object],[object Object],?
Six Phases of Incident Response PREPARATION Prep the network Create tools Test tools Prep procedures Train team Practice IDENTIFICATION How do you know about the attack? What tools can you use? What’s your process for communication? CLASSIFICATION What kind of attack is it? TRACEBACK Where is the attack coming from? Where and how is it affecting the network? REACTION What options do you have to remedy? Which option is the best under the circumstances? POST MORTEM What was done? Can anything be done to prevent it? How can it be less painful in the future?
Mitigation Communities
Check List ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Aggressive Collaboration NSP-SEC-KR Next Next iNOC-DBA Note: We are not trying to illustrate actual inter-relational or interactive connections between the different communities. National Cyber Teams NSP-SEC NSP-SEC-BR NSP-SEC-JP FIRST/CERT Teams NSP-SEC-D Drone-Armies NSP-SEC-CN FUN-SEC Telecoms  ISAC Other ISACs MWP Hijacked DSHIELD MyNetWatchman Internet  Storm Center SANS
DSHIELD Data Collection DShield Users Analysis Dissemination DShield.org
NSP-SEC – The Details ,[object Object],[object Object],[object Object],[object Object]
NSP-SEC: Daily DDOS Mitigation Work I've been working an attack against XXX.YY.236.66/32 and XXX.YY.236.69/32. We're seeing traffic come from <ISP-A>, <ISP-B>, <IXP-East/West> and others.  Attack is hitting both IP's on tcp 53 and sourced with x.y.0.0.  I've got it filtered so it's not a big problem, but if anyone is around I'd appreciate it if you could filter/trace on your network.  I'll be up for a while :/
NSP-SEC: Daily DDOS Mitigation Work F Target POP SP - A SP - B SP - C SP - D SP - H SP - G SP - E SP - F SP - I
It is all about  Operational Trust Trust is a bet that an entity, which you cannot control, will meet expectations that are favorable to your cause. Operational trust is the trust that is required from every person and earned by every entity to accomplish an endeavor. - Lt Col Nicole Blatt
NSP-SEC’s  Operational Trust ,[object Object],[object Object],[object Object],[object Object]
NSP-SEC is not …. ,[object Object],[object Object],[object Object],[object Object],[object Object]
NSP SEC Meetings ,[object Object],[object Object],[object Object]
CERT & FIRST ,[object Object],[object Object],[object Object],[object Object],http://www.first.org/about/organization/teams/
iNOC DBA
Check List ,[object Object],[object Object],[object Object],[object Object]
What is the problem? ,[object Object],[object Object],[object Object]
iNOC DBA Hotline ,[object Object],[object Object],[object Object],[object Object],[object Object]
Is set up difficult?
How is iNOC being used today? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Point Protection
Check List ,[object Object],[object Object],[object Object]
RISK Assessment NOC ISP’s Backbone Remote Staff Office Staff Penetration Interception Penetration Penetration Interception Interception DOS AAA
Lock Down the VTY and Console Ports NOC ISP’s Backbone Remote Staff Office Staff Penetration AAA VTY, Console, rACLs, and VTY ACL
Encrypt the Traffic from Staff to Device NOC ISP’s Backbone Remote Staff Office Staff Interception Interception Interception AAA SSH from Staff to Device SSH from Staff to Device
Staff AAA to get into the Device NOC ISP’s Backbone Remote Staff Office Staff Penetration AAA AAA on the Device
Radius is not an SP AAA Option!  NOC ISP’s Backbone Remote Staff Office Staff Interception Interception Interception AAA SSH from Staff to Device encrypts the password via secure TCP Sessions Radius sends unencrypted traffic to the AAA server via UDP! Why make a big deal about SSH to the router when you choose to put your network at risk using Radius as a AAA solution?
One Time Password – Checking the ID NOC ISP’s Backbone Remote Staff Office Staff Penetration Penetration AAA One-Time  Password ,[object Object],[object Object],[object Object],How do you insure that the engineer is authenticated vs a penetrated computer authenticated? OTP
DOSing the AAA Infrastructure NOC ISP’s Backbone Remote Staff Office Staff DOS the AAA Servers AAA OTP DOS the AAA Ports
Use a Firewall to Isolate the AAA Servers NOC ISP’s Backbone Remote Staff Office Staff DOS the AAA Servers AAA OTP DOS the AAA Ports Statefull inspection is another reason to select TCP base AAA over UDP. NOC Firewall Separate AAA Firewall to protect from internal and external threats.
Distribute AAA Servers and Config Backup Peer B Peer A IXP-W IXP-E Upstream A Upstream A Upstream B POP NOC G Sink Hole Network Upstream B AAA Node AAA OTP AAA Node AAA OTP
TACACS+ URLs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Old World: Router Perspective ,[object Object],[object Object],“ untrusted” telnet, snmp Attacks, junk Router CPU
The New World: Router Perspective ,[object Object],[object Object],[object Object],“ untrusted” telnet, snmp Attacks, junk Router CPU Protection
Watch the Config! ,[object Object],[object Object]
Config Monitoring  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Edge Protection
The Old World: Network Edge ,[object Object],[object Object],“ outside” “ outside” Core telnet snmp
The New World: Network Edge ,[object Object],[object Object],[object Object],“ outside” “ outside” Core telnet snmp
Infrastructure ACLs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Infrastructure ACLs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digression: IP Fragments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Infrastructure ACLs ,[object Object],[object Object],[object Object],[object Object]
Infrastructure ACL in Action SRC: 127.0.0.1 DST: Any SRC: Valid DST: Rx (Any R) SRC: eBGP Peer DST: CR1 eBGP SRC: Valid DST: External to AS (e.g.  Customer) X X ACL “in” ACL “in” ACL “in” ACL “in” PR1 PR2 R1 CR1 R4 R2 R3 R5 CR2
Iterative Deployment ,[object Object],[object Object],[object Object],[object Object]
Step 1: Classification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Step 2: Begin to Filter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Steps 3 & 4: Restrict Source Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Infrastructure ACLs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ outside” “ outside” telnet snmp Core
Remote Trigger  Black Hole
Remotely Triggered Black Hole Filtering ,[object Object],[object Object],[object Object]
Customer is DOSed – After – Packet Drops Pushed to the Edge NOC A B C D E F G iBGP Advertises List of Black Holed Prefixes Target Peer B Peer A IXP-W IXP-E Upstream A Upstream B Upstream B POP Upstream A
Inter-Provider Mitigation F Target POP ISP - A ISP - B ISP - C ISP - D ISP - H ISP - G ISP - E ISP - F ISP - I
What can you do to help? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sink Holes
Sink Hole Routers/Networks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why  Sinkhole ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sinkhole Routers/Networks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sinkhole Routers/Networks Target of  Attack 192.168.20.1 host is target 192.168.20.0/24 – target’s network Sinkhole Network Customers Customers Customers
Sinkhole Routers/Networks Target of  Attack 192.168.20.1 host is target 192.168.20.0/24 – target’s network Router advertises 192.168.20.1/32 Customers Customers Customers Sinkhole Network
[object Object],[object Object],[object Object],Sinkhole Routers/Networks Target of  Attack 192.168.20.1 host is target 192.168.20.0/24 – target’s network Sinkhole Network Router advertises 192.168.20.1/32 Customers Customers
Infected End Points Customer 172.168.20.1 is infected Computer starts scanning the Internet Sink Hole Network Sink Hole advertising Bogon and Dark IP Space SQL
Sinkhole Routers/Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Customers Sinkhole Network Router advertises “default” Customers Customers Customers
Scaling Sinkhole Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Customers 192.168.20.1 is attacked 192.168.20.0/24 – target’s network Sinkhole Network
Why Sinkholes? ,[object Object],[object Object],[object Object]
The Basic Sinkhole ,[object Object],[object Object],[object Object],To ISP Backbone Sinkhole Server Advertise small slices of Bogon and Dark IP space
Expanding the Sinkhole ,[object Object],[object Object],[object Object],To ISP Backbone To ISP Backbone To ISP Backbone Sinkhole Gateway Target Router Sniffers and Analyzers Static ARP to Target Router
What to monitor in a Sinkhole? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Monitoring Scan Rates ,[object Object],[object Object],To ISP Backbone To ISP Backbone To ISP Backbone Sinkhole Gateway Target Router Sniffers and Analyzers Place various /32 Infrastructure addresses here
Worm Detection & Reporting UI Operator instantly notified of Worm infection. System automatically generates a list of infected hosts for quarantine and  clean-up.
Automate Quarantine of Infected Hosts
Monitoring Backscatter ,[object Object],[object Object],[object Object],To ISP Backbone To ISP Backbone To ISP Backbone Sinkhole Gateway Target Router Sniffers and Analyzers Capture Backscatter Traffic Advertise Bogons with no-export community
Monitoring Backscatter ,[object Object],[object Object]
Monitoring Spoof Ranges ,[object Object],[object Object],[object Object],To ISP Backbone To ISP Backbone To ISP Backbone Sinkhole Gateway Target Router Sniffers and Analyzers Export ACL Logs to a syslog server Classification ACL with Source Address
Monitoring Spoof Ranges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Example: Jeff Null’s [jnull@truerouting.com] Test
Monitoring Spoof Ranges ,[object Object],[object Object],[object Object],To ISP Backbone To ISP Backbone To ISP Backbone Sinkhole Gateway Target Router Sniffers and Analyzers Place various /32 Infrastructure addresses here
Safety Precautions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Simple Sinkholes – Internet Facing ,[object Object],[object Object],[object Object],Peer Border Aggregation CPE Internet Backscatter Scanners Worms Pulls in garbage packets. Large CIDR Block Out Customer’s Allocated Block CPE Router /w Default
ASIC Drops at Line Rate? ,[object Object],[object Object],Peer Border Aggregation CPE Internet Backscatter Scanners Worms Garbage Saturates Link! Large CIDR Block Out Customer’s Allocated Block CPE Router /w Default
Backbone Router Injecting Aggregates ,[object Object],[object Object],[object Object],Large CIDR Block Out Customer’s Allocated Block CPE Router /w Default Peer border Aggregation CPE Internet Backscatter Scanners Worms Garbage packets are forwarded to backbone router Backbone
Simple Sinkholes – Customer Facing ,[object Object],[object Object],[object Object],Peer border Aggregation CPE Internet Backscatter Scanners Worms Pulls in garbage packets. Large CIDR Block Out Customer’s Allocated Block CPE Router /w Default
Simple Sinkholes – Impact Today ,[object Object],[object Object],[object Object],Peer Border Aggregation CPE Internet Backscatter Scanners Worms Pulls in garbage packets. Large CIDR Block Out Customer’s Allocated Block CPE Router /w Default
Sinkholes – Advertising Dark IP ,[object Object],[object Object],[object Object],[object Object],To ISP Backbone To ISP Backbone To ISP Backbone Sinkhole Gateway Target Router Sniffers and Analyzers Target router receives the garbage Advertise CIDR Blocks with Static Lock-ups pointing to the target router
Anycast Sinkholes to Scale Anycast allows garbage packet load management and distribution . Core Backbone Regional Node Regional Node Regional Node Regional Node Regional Node Regional Node POPs POPs POPs POPs POPs POPs ISPs ISPs ISPs
Anycast Sinkholes Peer B Peer A IXP-W IXP-E Upstream A Upstream A Upstream B Upstream B POP Customer Primary DNS Servers 192.168.19.0/24 192.168.19.1 Services Network Sinkhole employs same Anycast mechanism. Sinkhole Sinkhole Sinkhole Sinkhole Sinkhole Sinkhole Sinkhole
Sink Hole Routers/Networks Target of  Attack 172.168.20.1 is attacked 172.168.20.0/24 – target’s network Sink Hole Network
Source Address Validation
BCP 38 Ingress Packet Filtering ,[object Object]
BCP 38 Ingress Packet Filtering ,[object Object],[object Object],[object Object]
BCP 38 Ingress Packet Filtering Internet ISP’s Customer Allocation Block: 96.0.0.0/19 BCP 38 Filter = Allow only source addresses from the customer’s 96.0.X.X/24 96.0.20.0/24 96.0.21.0/24 96.0.19.0/24 96.0.18.0/24 BCP 38 Filter Applied on Downstream Aggregation and NAS Routers ISP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BCP 38 Packet Filtering: Principles ,[object Object],[object Object],[object Object]
Many  Working  Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Source Address Validation Works ,[object Object],[object Object],[object Object]
One Major ISP’s Example - uRPF ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
One Major ISP’s Example - uRPF ,[object Object],[object Object],[object Object],[object Object],[object Object]
What can you do to help? ,[object Object],[object Object],[object Object],[object Object]
Control Plane Protection
BGP Attack Vectors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Whacking the BGP Session ,[object Object],[object Object],[object Object],[object Object],[object Object]
Attacking Routing Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],password cracking DDOS etc. social engineering
Saturate the Receive Path Queues ,[object Object],[object Object],[object Object],ToFab to Other  Line Cards Forwarding/Feature ASIC/NP/FPGA Cluster ASICs Supporting CPU Receive Path Packets Route Processor CPU Ingress Packets Forwarded Packets Punted Packets Saturate the Supporting ASIC CPU Data Plane Control Plane Saturate the Raw “Punt” Queue Packets Bound for the LC CPU or RP Saturate the Input Buffers on the RP Fabric Interconnect Saturate the CPU Management Plane
Saturate the Link ,[object Object],[object Object],[object Object]
Drop the TCP Session ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Generalized TTL Security Mechanism ,[object Object],[object Object],[object Object],eBGP Transmits all packets with a TTL of 255 Doesn’t accept packets with a TTL  lower than 254 A Packets generated here cannot reach A with a TTL higher  than 253.
Secure Routing - Route Authentication Configure Routing Authentication Signs Route Updates Verifies Signature Campus Signature Route Updates Certifies  Authenticity  of Neighbor  and  Integrity  of Route Updates
Peer Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Drop the IGP ,[object Object],[object Object],[object Object]
Attacking Routing Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A D B C 10.1.1.0/24 protected path 10.1.1.0/24 10.1.1.0/24 10.1.1.0/25 10.1.1.0/24 doesn’t exist
Pakistan and YouTube http://www.ripe.net/news/study-youtube-hijacking.html
Malicious Route Injection Perceive Threat ,[object Object],[object Object],[object Object],[object Object]
Malicious Route Injection   Reality – an Example ,[object Object],[object Object],[object Object]
Garbage in – Garbage Out:  What is it?   AS 200 AS 400 C AS 100 AS 300 AS XYZ AS 500 Lets advertise the entire Internet with /24 more specifics I accept the entire Internet with /24 more specifics and sent them on. I accept the entire Internet with /24 more specifics and sent them on. D E B N X A
Garbage in – Garbage Out:  Results Unstable Unstable DURESS DURESS DURESS The rest of the Internet The rest of the Internet D C E B AS 100 AS 300 AS XYZ AS 500 N X A Lets advertise the entire Internet with /24 more specifics
Garbage in – Garbage Out:  Impact ,[object Object],[object Object],[object Object],[object Object],Unstable Unstable DURESS DURESS DURESS The rest of the Internet The rest of the Internet D C E B AS 100 AS 300 AS XYZ AS 500 N X A Lets advertise the entire Internet with /24 more specifics
Garbage in – Garbage   Out:  What to do? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Unstable Unstable DURESS DURESS DURESS The rest of the Internet The rest of the Internet D C E B AS 100 AS 300 AS XYZ AS 500 N X A Lets advertise the entire Internet with /24 more specifics
Malicious Route Injection Attack Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malicious Route Injection Impact ,[object Object],[object Object],[object Object],[object Object]
What is a prefix hijack?  AS 200 AS 400 C AS 100 AS 300 Customer AS 500 Broken into router advertises Web Server prefix as a /32 X.Y.Z.0/24 X.Y.Z.1/32 All Web traffic forwards to the /32 more specific. D E M N X A W B Q
What could be worse? ,[object Object],[object Object],Internet NGN
Why? ,[object Object],[object Object],NGN More prefixes, more communities, more as-paths, more activities (flapping, changes, etc.) More memory, more FIB capacity, more RP processing
Malicious Route Injection What can ISPs Do? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BGP Peering Fundamentals ,[object Object],[object Object],[object Object]
Guarded Trust ,[object Object],[object Object],[object Object],[object Object],ISP A ISP B Ingress Filter Egress Filter Prefixes Prefixes
Malicious Route Injection What can SPs Do? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prefix Filters: In ,[object Object],[object Object],Customer SP Peer Apply Prefix Filters to All eBGP Neighbors Prefix Filter BGP Prefixes Prefix Filter BGP Prefixes Our Problem
Malicious Route Injection What can ISPs Do? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Prefix Filters: Out ,[object Object],[object Object],Customer SP Peer Apply Prefix Filters to All eBGP Neighbors Prefix Filter BGP Prefixes Prefix Filter BGP Prefixes
What can ISPs Do? Containment Egress Prefix Filters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Containment Filters   AS 200 AS 400 C AS 100 AS 300 AS XYZ AS 500 Lets advertise the entire Internet with /24 more specifics I will NOT accept entire Internet with /24 more specifics and sent them on. I will NOT accept the entire Internet with /24 more specifics and sent them on. D E B N X A
Malicious Route Injection What can ISPs Do? ,[object Object],[object Object],[object Object],[object Object]
Bogons and Special Use Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Total Visibility
What Is Meant by ‘Telemetry’? Te·lem·e·try—  a  technology  that allows the  remote measurement and reporting of  informatio n  of intere st  to the system designer or operator. The word is derived from  Greek  roots  tele  = re mote,  and  metron  = measure
Check List ,[object Object],[object Object],[object Object],[object Object]
Holistic Approach to  System-Wide Telemetry Cardiologist Ophthalmologist Neurologist Nephrologist Hematologist   Podiatrist Holistic Approach to Patient Care Uses a system-wide approach, coordinating with various specialists, resulting in the patient’s better overall health and wellbeing.
Holistic Approach to  System-Wide Telemetry ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],P P P P PE P P PE(s) L2 Agg. Broadband, Wireless (3G, 802.11), Ethernet, FTTH,  Leased Line, ATM, Frame-Relay CPE(s) P P Data/Service Center CPE/ACCESS/AGGREGATION CORE PEERING DATA/SVC Center ISP /  Alt. Carrier Listen Listen Listen Listen
Open Source Tools for NetFlow Analysis Visualization—FlowScan Source: University of Wisconsin Investigate the spike An identified cause of the outage
NetFlow - Stager Source:  UNINETT
Other Visualization Techniques Using SNMP Data with RRDTool Source:  http://people.ee.ethz.ch/~oetiker/webtools/rrdtool/ Anomaly for DNS Queries Thru’put Spike RTT Spike
Displaying RMON — ntop Examples Source:  http://www.ntop.org Detailed Analysis i.e. TTL
BGP Example — SQL Slammer
Correlating NetFlow and Routing Data Matching data collected from  different tools
Syslog ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of Deploying NTP ,[object Object],[object Object],[object Object],[object Object],[object Object]
Packet Capture Examples Source:  http://www.ethereal.com Wealth of information, L1-L7 raw data for analysis
Putting the Tools to Work – DDOS Attack
DDOS = SLA Violation! ISP CPE Target Hacker What do you tell the Boss?  SP’s Operations Teams have found that they can express DDOS issues as SLA violations, which allow for their management to understand why they need to act.
BOTNETS – Making DDoS Attacks Easy Customer premise: Server/FW/Switch/router Zombies Extortionist Last Mile Connection ISP Edge router ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2 for 1 Special CE
[object Object],[object Object],[object Object],[object Object],[object Object],It is all about the packet ……… POP Border POP Border OC48 OC12 OC12 Nine ChOC12 Big  Aggregation  Box Big  Aggregation  Box Internet IP Packet
Six Phases of Incident Response PREPARATION Prep the network Create tools Test tools Prep procedures Train team Practice IDENTIFICATION How do you know about the attack? What tools can you use? What’s your process for communication? CLASSIFICATION What kind of attack is it? TRACEBACK Where is the attack coming from? Where and how is it affecting the network? REACTION What options do you have to remedy? Which option is the best under the circumstances? POST MORTEM What was done? Can anything be done to prevent it? How can it be less painful in the future?
SITREP ,[object Object],[object Object]
Customer Is DOSed — Before NOC A B C D E F G Target Peer B Peer A IXP-W IXP-E Upstream A Upstream B Upstream B POP Upstream A Target is   taken  out
Customer Is DOSed — Before — Collateral Damage NOC A B C D E F G Target Peer B Peer A IXP-W IXP-E Upstream A Upstream B Upstream B POP Upstream A Customers Attack causes Collateral Damage
SITREP – Attack in Progress ,[object Object],[object Object],[object Object]
Customer Is DOSed — After — Packet Drops Pushed to the Edge NOC A B C D E F G iBGP Advertises List of Black Holed Prefixes Target Peer B Peer A IXP-W IXP-E Upstream A Upstream B Upstream B POP Upstream A
SITREP – Attack in Progress ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Remote Triggered Drops and Communities Corp Network Core Data Center POP/Customer Upstream A Peer X Peer Y Communities 1, 100, 200 Community abc Communities 1, 100, 300 Communities 1, 100, 300 Community hij Community efg
SITREP – Attack in Progress ,[object Object],[object Object],[object Object],[object Object]
BGP Community Trigger to Sinkhole Peer B Peer A IXP-W IXP-E Upstream A Upstream A Upstream B Upstream B POP Customer Primary DNS Servers 171.68.19.0/24 171.68.19.1 Services Network Send DOS to Sink Hole. Sinkhole Sinkhole Sinkhole Sinkhole Sinkhole Sinkhole Sinkhole
Analyze the Attack ,[object Object],[object Object],To ISP Backbone To ISP Backbone To ISP Backbone Sinkhole Gateway Target Router Sniffers and Analyzers
SITREP – Attack in Progress ,[object Object],[object Object],[object Object],[object Object]
What is Full Service Recovery ,[object Object],[object Object],[object Object],[object Object]
SUMMARY
These Top 10 are a Basic Foundation ,[object Object],[object Object]
Communications Addendum
“ Never underestimate the power of human communications as a tool to solve security problems.  Our history demonstrates that since the Morris Worm, peer communication has been  the  most effect security tool.” Barry Raveendran Greene
Preparation as Empowerment ,[object Object],[object Object],[object Object],[object Object]
Important Points ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Step #1 – Take Care of Your Responsibilities ,[object Object],[object Object],[object Object]
OPSEC Communications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OPSEC Communications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SOC’s Public Mailboxes  ,[object Object],[object Object],MAILBOX  AREA  USAGE -----------  ----------------  --------------------------- ABUSE  Customer Relations  Inappropriate public behavior NOC  Network Operations  Network infrastructure SECURITY  Network Security  Security bulletins or queries
/Security Web Page ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Emergency Customer Contact List ,[object Object],[object Object],[object Object],[object Object],[object Object]
Exercising the Customer Contact List ,[object Object],Dear Customers,   You are receiving this email because you have subscribed to one or more services with Infoserve. We have received a virus alert from security authorities and we believe that you should be informed (please see information below). If you do not wish to be included in future information service, please click “Reply” and type “Remove from subscription” in the subject field.   ------------------------------------------- We have received warning from security authorities on a new virus, W32.Sobig.E@mm. W32.Sobig.E@mm is a new variant of the W32.Sobig worm. It is a mass-mailing worm sends itself to all the email addresses, purporting to have been sent by Yahoo (support@yahoo.com) or obtained email address from the infected machine. The worm finds the addresses in the files with the following extensions: .wab .dbx .htm .html .eml .txt   You should regularly update your antivirus definition files to ensure that you are up-to-date with the latest protection.   For more information, please follow the following links:   Information from Computer Associates:    http://www3.ca.com/solutions/collateral.asp?CT=27081&CID=46275 Information from F-Secure:                      http://www.europe.f-secure.com/v-descs/sobig_e.shtml Information from McAfee:                        http://vil.mcafee.com/dispVirus.asp?virus_k=100429 Information from Norman:                        http://www.norman.com/virus_info/w32_sobig_e_mm.shtml Information from Sophos:                        http://www.norman.com/virus_info/w32_sobig_e_mm.shtml Information from Symantec:                    http://www.symantec.com/avcenter/venc/data/w32.sobig.e@mm.html Information from Trend Micro:                  http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SOBIG.E -------------------------------------------  
Remember to Communicate ,[object Object],[object Object],[object Object]
CERTs  (Computer Emergency Response Teams) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to Work with CERTs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collecting Information from Peers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions ,[object Object],[object Object],[object Object],[object Object]
Over Dependence on Vendors–Danger! ,[object Object],[object Object],[object Object],[object Object]
What you should expect from your vendor? ,[object Object],[object Object],[object Object]
Total Visibility Addendum
NetFlow—More Information ,[object Object],[object Object],[object Object]
More Information about SNMP ,[object Object],[object Object],[object Object],[object Object]
RMON—More Information ,[object Object],[object Object],[object Object]
BGP — More Information ,[object Object],[object Object],[object Object]
Syslog—More Information ,[object Object],[object Object],[object Object]
Packet Capture—More Information ,[object Object],[object Object]
Remote Triggered Black Hole ,[object Object],[object Object],[object Object]
More Netflow Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefShah Sheikh
 
資安控管實務技術
資安控管實務技術資安控管實務技術
資安控管實務技術bv8af4
 
2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class NineFRSecure
 
Protecting the manufacturing industry
Protecting the manufacturing industryProtecting the manufacturing industry
Protecting the manufacturing industryCybereason
 
2018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 82018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 8FRSecure
 
FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class TenFRSecure
 
2020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 42020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 4FRSecure
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017FRSecure
 
2018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 112018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 11FRSecure
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotShah Sheikh
 
2018 FRSecure CISSP Mentor Program- Session 5
2018 FRSecure CISSP Mentor Program-  Session 52018 FRSecure CISSP Mentor Program-  Session 5
2018 FRSecure CISSP Mentor Program- Session 5FRSecure
 
2018 FRSecure CISSP Mentor Program Session 9
2018 FRSecure CISSP Mentor Program Session 92018 FRSecure CISSP Mentor Program Session 9
2018 FRSecure CISSP Mentor Program Session 9FRSecure
 
Ensure Software Security already during development
Ensure Software Security already during developmentEnsure Software Security already during development
Ensure Software Security already during developmentIT Weekend
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.pptwebhostingguy
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 82020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 8FRSecure
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksMehrdad Jingoism
 
Zankhana Pandya Resume @ 21_Dec_2015
Zankhana Pandya Resume @ 21_Dec_2015Zankhana Pandya Resume @ 21_Dec_2015
Zankhana Pandya Resume @ 21_Dec_2015Zhankhana Pandya
 

Was ist angesagt? (20)

Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
資安控管實務技術
資安控管實務技術資安控管實務技術
資安控管實務技術
 
2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine
 
Protecting the manufacturing industry
Protecting the manufacturing industryProtecting the manufacturing industry
Protecting the manufacturing industry
 
2018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 82018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 8
 
FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
2020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 42020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 4
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 
2018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 112018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 11
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
 
2018 FRSecure CISSP Mentor Program- Session 5
2018 FRSecure CISSP Mentor Program-  Session 52018 FRSecure CISSP Mentor Program-  Session 5
2018 FRSecure CISSP Mentor Program- Session 5
 
2018 FRSecure CISSP Mentor Program Session 9
2018 FRSecure CISSP Mentor Program Session 92018 FRSecure CISSP Mentor Program Session 9
2018 FRSecure CISSP Mentor Program Session 9
 
Ensure Software Security already during development
Ensure Software Security already during developmentEnsure Software Security already during development
Ensure Software Security already during development
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1
 
2020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 82020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 8
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
 
Zankhana Pandya Resume @ 21_Dec_2015
Zankhana Pandya Resume @ 21_Dec_2015Zankhana Pandya Resume @ 21_Dec_2015
Zankhana Pandya Resume @ 21_Dec_2015
 

Ähnlich wie Sp Security 101 Primer 2 1

Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayKaren Oliver
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAPNIC
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Barry Greene
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to knowEric Klein
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxSuhailShaik16
 
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a HackerAutomotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a HackerForAllSecure
 
Infosec cert service
Infosec cert serviceInfosec cert service
Infosec cert serviceMinh Le
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in CybersecurityTeri Radichel
 
Network intrusi detection system
Network intrusi detection systemNetwork intrusi detection system
Network intrusi detection systemMaulana Arif
 
Network intrusi detection system
Network intrusi detection systemNetwork intrusi detection system
Network intrusi detection systemDuwinowo NT
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPSymantec
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022lior mazor
 

Ähnlich wie Sp Security 101 Primer 2 1 (20)

Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security Professional
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a HackerAutomotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
 
Infosec cert service
Infosec cert serviceInfosec cert service
Infosec cert service
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
Network intrusi detection system
Network intrusi detection systemNetwork intrusi detection system
Network intrusi detection system
 
Network intrusi detection system
Network intrusi detection systemNetwork intrusi detection system
Network intrusi detection system
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATP
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
Defining Cyber Crime
Defining Cyber CrimeDefining Cyber Crime
Defining Cyber Crime
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
 

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Sp Security 101 Primer 2 1

  • 1. SP Security Primer 101 Peers working together to battle Attacks to the Net Version 2.1
  • 2.
  • 3.
  • 4. What Do You Tell the Boss? ISP CPE Target Hacker
  • 5.
  • 6. The SP’s Watershed – Feb 2000
  • 8. The Vetted – Battling the Bad Guys
  • 9. When BOTs Attack – Inter AS http://www.wired.com/politics/security/magazine/15-09/ff_estonia_bots
  • 10. Aggressive Collaboration NSP-SEC-KR Next Next iNOC-DBA Note: We are not trying to illustrate actual inter-relational or interactive connections between the different communities. National Cyber Teams NSP-SEC NSP-SEC-BR NSP-SEC-JP FIRST/CERT Teams NSP-SEC-D Drone-Armies NSP-SEC-CN FUN-SEC Telecoms ISAC Other ISACs MWP Hijacked DSHIELD MyNetWatchman Internet Storm Center SANS
  • 11.
  • 12. Economic Cycles Peak Trough Recession Expansion Parts of the Cyber Criminal Business Cycle Incidents time Lots of Problems & Attacks Community Mitigation Miscreant & Criminal R&D New Criminal Revenue Opportunities
  • 13. Where is This Coming From? Work the Problem Tactical Mitigation Post Mortem Craft Strategic Response Empowerment Hardware Software BCPs Mitigation & Operations Communities Ops Meetings One-on-One Beer Meetings What we’re doing today.
  • 14.
  • 15.
  • 16. “ If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” Sun Tzu Art of War
  • 18. SP Security in the NOC - Prepare PREPARATION Prep the network Create tools Test tools Prep procedures Train team Practice IDENTIFICATION How do you know about the attack? What tools can you use? What’s your process for communication? CLASSIFICATION What kind of attack is it? TRACEBACK Where is the attack coming from? Where and how is it affecting the network? REACTION What options do you have to remedy? Which option is the best under the circumstances? POST MORTEM What was done? Can anything be done to prevent it? How can it be less painful in the future?
  • 19. Aggressive Collaboration NSP-SEC-KR Next Next iNOC-DBA Note: We are not trying to illustrate actual inter-relational or interactive connections between the different communities. National Cyber Teams NSP-SEC NSP-SEC-BR NSP-SEC-JP FIRST/CERT Teams NSP-SEC-D Drone-Armies NSP-SEC-CN FUN-SEC Telecoms ISAC Other ISACs MWP Hijacked DSHIELD MyNetWatchman Internet Storm Center SANS
  • 20.
  • 21. Point Protection NOC ISP’s Backbone Remote Staff Office Staff Penetration Interception Penetration Penetration Interception Interception DOS AAA
  • 22.
  • 23. Destination Based RTBH NOC A B C D E F G iBGP Advertises List of Black Holed Prefixes Target Peer B Peer A IXP-W IXP-E Upstream A Upstream B Upstream B POP Upstream A
  • 24. Sink Holes Peer B Peer A IXP-W IXP-E Upstream A Upstream A Upstream B Upstream B POP Customer Primary DNS Servers 171.68.19.0/24 171.68.19.1 Services Network Remote Triggered Sink Hole Garbage packets flow to the closest Sink Hole Remote Triggered Sink Hole Remote Triggered Sink Hole Remote Triggered Sink Hole Remote Triggered Sink Hole Remote Triggered Sink Hole Remote Triggered Sink Hole Remote Triggered Sink Hole
  • 25.
  • 26. Where to Prefix Filter? AS 200 AS 400 C E AS 100 AS 300 Customer AS 500 Egress Filter Prefixes to Internet; Ingress Filters Coming from Internet Customer Filters In and Out Ingress Filter Customer’s Prefixes D M N X A W B
  • 27. Total Visibility Source: http://people.ee.ethz.ch/~oetiker/webtools/rrdtool/ Anomaly for DNS Queries Thru’put Spike RTT Spike Investigate the spike An identified cause of the outage
  • 28.
  • 30.
  • 31.
  • 32. What Do ISPs Need to Do? 2) Secure Resources Firewall, Encryption, Authentication, Audit 1) ISP’s Security Policy 3) Monitor and Respond Intrusion Detection, work the incidence, 4) Test, Practice, Drill Vulnerability Scanning 5) Manage and Improve Post Mortem, Analyze the Incident, modify the plan/procedures Security incidence are a normal part of an ISP’s operations!
  • 33.
  • 34. Six Phases of Incident Response PREPARATION Prep the network Create tools Test tools Prep procedures Train team Practice IDENTIFICATION How do you know about the attack? What tools can you use? What’s your process for communication? CLASSIFICATION What kind of attack is it? TRACEBACK Where is the attack coming from? Where and how is it affecting the network? REACTION What options do you have to remedy? Which option is the best under the circumstances? POST MORTEM What was done? Can anything be done to prevent it? How can it be less painful in the future?
  • 36.
  • 37. Aggressive Collaboration NSP-SEC-KR Next Next iNOC-DBA Note: We are not trying to illustrate actual inter-relational or interactive connections between the different communities. National Cyber Teams NSP-SEC NSP-SEC-BR NSP-SEC-JP FIRST/CERT Teams NSP-SEC-D Drone-Armies NSP-SEC-CN FUN-SEC Telecoms ISAC Other ISACs MWP Hijacked DSHIELD MyNetWatchman Internet Storm Center SANS
  • 38. DSHIELD Data Collection DShield Users Analysis Dissemination DShield.org
  • 39.
  • 40. NSP-SEC: Daily DDOS Mitigation Work I've been working an attack against XXX.YY.236.66/32 and XXX.YY.236.69/32. We're seeing traffic come from <ISP-A>, <ISP-B>, <IXP-East/West> and others. Attack is hitting both IP's on tcp 53 and sourced with x.y.0.0. I've got it filtered so it's not a big problem, but if anyone is around I'd appreciate it if you could filter/trace on your network. I'll be up for a while :/
  • 41. NSP-SEC: Daily DDOS Mitigation Work F Target POP SP - A SP - B SP - C SP - D SP - H SP - G SP - E SP - F SP - I
  • 42. It is all about Operational Trust Trust is a bet that an entity, which you cannot control, will meet expectations that are favorable to your cause. Operational trust is the trust that is required from every person and earned by every entity to accomplish an endeavor. - Lt Col Nicole Blatt
  • 43.
  • 44.
  • 45.
  • 46.
  • 48.
  • 49.
  • 50.
  • 51. Is set up difficult?
  • 52.
  • 54.
  • 55. RISK Assessment NOC ISP’s Backbone Remote Staff Office Staff Penetration Interception Penetration Penetration Interception Interception DOS AAA
  • 56. Lock Down the VTY and Console Ports NOC ISP’s Backbone Remote Staff Office Staff Penetration AAA VTY, Console, rACLs, and VTY ACL
  • 57. Encrypt the Traffic from Staff to Device NOC ISP’s Backbone Remote Staff Office Staff Interception Interception Interception AAA SSH from Staff to Device SSH from Staff to Device
  • 58. Staff AAA to get into the Device NOC ISP’s Backbone Remote Staff Office Staff Penetration AAA AAA on the Device
  • 59. Radius is not an SP AAA Option! NOC ISP’s Backbone Remote Staff Office Staff Interception Interception Interception AAA SSH from Staff to Device encrypts the password via secure TCP Sessions Radius sends unencrypted traffic to the AAA server via UDP! Why make a big deal about SSH to the router when you choose to put your network at risk using Radius as a AAA solution?
  • 60.
  • 61. DOSing the AAA Infrastructure NOC ISP’s Backbone Remote Staff Office Staff DOS the AAA Servers AAA OTP DOS the AAA Ports
  • 62. Use a Firewall to Isolate the AAA Servers NOC ISP’s Backbone Remote Staff Office Staff DOS the AAA Servers AAA OTP DOS the AAA Ports Statefull inspection is another reason to select TCP base AAA over UDP. NOC Firewall Separate AAA Firewall to protect from internal and external threats.
  • 63. Distribute AAA Servers and Config Backup Peer B Peer A IXP-W IXP-E Upstream A Upstream A Upstream B POP NOC G Sink Hole Network Upstream B AAA Node AAA OTP AAA Node AAA OTP
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76. Infrastructure ACL in Action SRC: 127.0.0.1 DST: Any SRC: Valid DST: Rx (Any R) SRC: eBGP Peer DST: CR1 eBGP SRC: Valid DST: External to AS (e.g. Customer) X X ACL “in” ACL “in” ACL “in” ACL “in” PR1 PR2 R1 CR1 R4 R2 R3 R5 CR2
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82. Remote Trigger Black Hole
  • 83.
  • 84. Customer is DOSed – After – Packet Drops Pushed to the Edge NOC A B C D E F G iBGP Advertises List of Black Holed Prefixes Target Peer B Peer A IXP-W IXP-E Upstream A Upstream B Upstream B POP Upstream A
  • 85. Inter-Provider Mitigation F Target POP ISP - A ISP - B ISP - C ISP - D ISP - H ISP - G ISP - E ISP - F ISP - I
  • 86.
  • 88.
  • 89.
  • 90.
  • 91. Sinkhole Routers/Networks Target of Attack 192.168.20.1 host is target 192.168.20.0/24 – target’s network Sinkhole Network Customers Customers Customers
  • 92. Sinkhole Routers/Networks Target of Attack 192.168.20.1 host is target 192.168.20.0/24 – target’s network Router advertises 192.168.20.1/32 Customers Customers Customers Sinkhole Network
  • 93.
  • 94. Infected End Points Customer 172.168.20.1 is infected Computer starts scanning the Internet Sink Hole Network Sink Hole advertising Bogon and Dark IP Space SQL
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102. Worm Detection & Reporting UI Operator instantly notified of Worm infection. System automatically generates a list of infected hosts for quarantine and clean-up.
  • 103. Automate Quarantine of Infected Hosts
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116. Anycast Sinkholes to Scale Anycast allows garbage packet load management and distribution . Core Backbone Regional Node Regional Node Regional Node Regional Node Regional Node Regional Node POPs POPs POPs POPs POPs POPs ISPs ISPs ISPs
  • 117. Anycast Sinkholes Peer B Peer A IXP-W IXP-E Upstream A Upstream A Upstream B Upstream B POP Customer Primary DNS Servers 192.168.19.0/24 192.168.19.1 Services Network Sinkhole employs same Anycast mechanism. Sinkhole Sinkhole Sinkhole Sinkhole Sinkhole Sinkhole Sinkhole
  • 118. Sink Hole Routers/Networks Target of Attack 172.168.20.1 is attacked 172.168.20.0/24 – target’s network Sink Hole Network
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137. Secure Routing - Route Authentication Configure Routing Authentication Signs Route Updates Verifies Signature Campus Signature Route Updates Certifies Authenticity of Neighbor and Integrity of Route Updates
  • 138.
  • 139.
  • 140.
  • 141. Pakistan and YouTube http://www.ripe.net/news/study-youtube-hijacking.html
  • 142.
  • 143.
  • 144. Garbage in – Garbage Out: What is it? AS 200 AS 400 C AS 100 AS 300 AS XYZ AS 500 Lets advertise the entire Internet with /24 more specifics I accept the entire Internet with /24 more specifics and sent them on. I accept the entire Internet with /24 more specifics and sent them on. D E B N X A
  • 145. Garbage in – Garbage Out: Results Unstable Unstable DURESS DURESS DURESS The rest of the Internet The rest of the Internet D C E B AS 100 AS 300 AS XYZ AS 500 N X A Lets advertise the entire Internet with /24 more specifics
  • 146.
  • 147.
  • 148.
  • 149.
  • 150. What is a prefix hijack? AS 200 AS 400 C AS 100 AS 300 Customer AS 500 Broken into router advertises Web Server prefix as a /32 X.Y.Z.0/24 X.Y.Z.1/32 All Web traffic forwards to the /32 more specific. D E M N X A W B Q
  • 151.
  • 152.
  • 153.
  • 154.
  • 155.
  • 156.
  • 157.
  • 158.
  • 159.
  • 160.
  • 161. Containment Filters AS 200 AS 400 C AS 100 AS 300 AS XYZ AS 500 Lets advertise the entire Internet with /24 more specifics I will NOT accept entire Internet with /24 more specifics and sent them on. I will NOT accept the entire Internet with /24 more specifics and sent them on. D E B N X A
  • 162.
  • 163.
  • 165. What Is Meant by ‘Telemetry’? Te·lem·e·try— a technology that allows the remote measurement and reporting of informatio n of intere st to the system designer or operator. The word is derived from Greek roots tele = re mote, and metron = measure
  • 166.
  • 167. Holistic Approach to System-Wide Telemetry Cardiologist Ophthalmologist Neurologist Nephrologist Hematologist Podiatrist Holistic Approach to Patient Care Uses a system-wide approach, coordinating with various specialists, resulting in the patient’s better overall health and wellbeing.
  • 168.
  • 169. Open Source Tools for NetFlow Analysis Visualization—FlowScan Source: University of Wisconsin Investigate the spike An identified cause of the outage
  • 170. NetFlow - Stager Source: UNINETT
  • 171. Other Visualization Techniques Using SNMP Data with RRDTool Source: http://people.ee.ethz.ch/~oetiker/webtools/rrdtool/ Anomaly for DNS Queries Thru’put Spike RTT Spike
  • 172. Displaying RMON — ntop Examples Source: http://www.ntop.org Detailed Analysis i.e. TTL
  • 173. BGP Example — SQL Slammer
  • 174. Correlating NetFlow and Routing Data Matching data collected from different tools
  • 175.
  • 176.
  • 177. Packet Capture Examples Source: http://www.ethereal.com Wealth of information, L1-L7 raw data for analysis
  • 178. Putting the Tools to Work – DDOS Attack
  • 179. DDOS = SLA Violation! ISP CPE Target Hacker What do you tell the Boss? SP’s Operations Teams have found that they can express DDOS issues as SLA violations, which allow for their management to understand why they need to act.
  • 180.
  • 181.
  • 182. Six Phases of Incident Response PREPARATION Prep the network Create tools Test tools Prep procedures Train team Practice IDENTIFICATION How do you know about the attack? What tools can you use? What’s your process for communication? CLASSIFICATION What kind of attack is it? TRACEBACK Where is the attack coming from? Where and how is it affecting the network? REACTION What options do you have to remedy? Which option is the best under the circumstances? POST MORTEM What was done? Can anything be done to prevent it? How can it be less painful in the future?
  • 183.
  • 184. Customer Is DOSed — Before NOC A B C D E F G Target Peer B Peer A IXP-W IXP-E Upstream A Upstream B Upstream B POP Upstream A Target is taken out
  • 185. Customer Is DOSed — Before — Collateral Damage NOC A B C D E F G Target Peer B Peer A IXP-W IXP-E Upstream A Upstream B Upstream B POP Upstream A Customers Attack causes Collateral Damage
  • 186.
  • 187. Customer Is DOSed — After — Packet Drops Pushed to the Edge NOC A B C D E F G iBGP Advertises List of Black Holed Prefixes Target Peer B Peer A IXP-W IXP-E Upstream A Upstream B Upstream B POP Upstream A
  • 188.
  • 189. Remote Triggered Drops and Communities Corp Network Core Data Center POP/Customer Upstream A Peer X Peer Y Communities 1, 100, 200 Community abc Communities 1, 100, 300 Communities 1, 100, 300 Community hij Community efg
  • 190.
  • 191. BGP Community Trigger to Sinkhole Peer B Peer A IXP-W IXP-E Upstream A Upstream A Upstream B Upstream B POP Customer Primary DNS Servers 171.68.19.0/24 171.68.19.1 Services Network Send DOS to Sink Hole. Sinkhole Sinkhole Sinkhole Sinkhole Sinkhole Sinkhole Sinkhole
  • 192.
  • 193.
  • 194.
  • 196.
  • 198. “ Never underestimate the power of human communications as a tool to solve security problems. Our history demonstrates that since the Morris Worm, peer communication has been the most effect security tool.” Barry Raveendran Greene
  • 199.
  • 200.
  • 201.
  • 202.
  • 203.
  • 204.
  • 205.
  • 206.
  • 207.
  • 208.
  • 209.
  • 210.
  • 211.
  • 212.
  • 213.
  • 214.
  • 216.
  • 217.
  • 218.
  • 219.
  • 220.
  • 221.
  • 222.
  • 223.

Hinweis der Redaktion

  1. 12
  2. 45 left, 11:20AM - 12:20PM 02:20:00 - 03:20:00, RI
  3. 13 left, 9:30AM - 10:30AM 00:30:00 - 01:30:00, RD
  4. By polling various devices like routers, interfaces and servers, DNS query serge can be related to the bleep on the Interface utilization anomaly.
  5. 46 left, 11:20AM - 12:20PM 02:20:00 - 03:20:00, RI
  6. 46 left, 11:20AM - 12:20PM 02:20:00 - 03:20:00, RI
  7. 45 left, 11:20AM - 12:20PM 02:20:00 - 03:20:00, RI
  8. 43 left, 11:20AM - 12:20PM 02:20:00 - 03:20:00, RI
  9. 42 left, 11:20AM - 12:20PM 02:20:00 - 03:20:00, RI
  10. REWORK
  11. REWORK
  12. 112 5 left, 9:30AM - 10:30AM 00:30:00 - 01:30:00, RD
  13. 6 left, 9:30AM - 10:30AM 00:30:00 - 01:30:00, RD
  14. 6 left, 9:30AM - 10:30AM 00:30:00 - 01:30:00, RD
  15. 12 left, 9:30AM - 10:30AM 00:30:00 - 01:30:00, RD
  16. Good health is sought so overall well-being is required. Need to watch for all body parts – not just the heart and brain. They may be operating just fine ‘outside the happy hour’ but…. You may suffer from arthritis or liver or cholesterol. So, kidney and liver need to function well and they need to be checked as well. You also need to understand what the inter-relationship is. So it’s a holistic view that is needed for network telemetry.
  17. Identifying where to collect data from is very important too. However, in each network areas, it become self evident that a certain funtion has precedence. For example, in Access or CPE arena, it is important to have shared resources like DNS and SMTP are important. Whereas the core’s function is to pass the packets as fast as possible. So performance is important. In the Data Center, watching out for the Trust Relationship between servers is important. Also, servers are powerful end devices so making sure that they are not compromised and launching an attack or attacks somewhere should also be watched. At the edge, multiple SP connectivity and ability to trace the attacks through asymmetric routing is important.
  18. Investigate the spike and find the root cause for it – easy to identify an anomaly. Don’t spend too much time here because we plan to spend more time later to investigate some more.
  19. By polling various devices like routers, interfaces and servers, DNS query serge can be related to the bleep on the Interface utilization anomaly.
  20. Remote Monitoring (RMON) is a standard monitoring specification that enables various network monitors and console systems to exchange network-monitoring data. RMON provides network administrators with more freedom in selecting network-monitoring probes and consoles with features that meet their particular networking needs. This chapter provides a brief overview of the RMON specification, focusing on RMON groups. The RMON specification defines a set of statistics and functions that can be exchanged between RMON-compliant console managers and network probes. As such, RMON provides network administrators with comprehensive network-fault diagnosis, planning, and performance-tuning information. RMON was defined by the user community with the help of the Internet Engineering Task Force (IETF). It became a proposed standard in 1992 as RFC 1271 (for Ethernet). RMON then became a draft standard in 1995 as RFC 1757, effectively obsoleting RFC 1271. Q— What is the function of the RMON group Matrix? A— This group stores statistics for conversations between sets of two addresses. As the device detects a new conversation, it creates a new entry in its table. Q— What is RMON? A— Remote Monitoring (RMON) is a standard monitoring specification that enables various network monitors and console systems to exchange network-monitoring data. Q— Multicast packets, CRC errors, runts, giants, fragments, and jabbers are elements of what RMON group? A— Statistics. http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/rmon.htm
  21. Basically, SQL slammer traffic caused a DDoS on routers to force them to drop the BGP peer relationship. So 127k prefix carrying router dropped to the 0 prefix count.
  22. It is always valuable to tally up the totals using two different tools. Here, you can log on to the Internet router and find out how many routes exist today  Go to ‘www.nanog.org/lookingglass’ – you can do ‘show ip route sum’. If you are tracking BGP prefixes, announcements and updates, you can compare them.
  23. Some free tools available - Kiwi, Syslog-ng
  24. Important to synchronise the time. Very important for forensic work. If you have a global organization, use GMT timestamp. What do the miscreants do when they first see compromise a device? – They try to hide their tracks. So selective log deletion is common. But with timestamp and central deposits of logs, this becomes difficult.
  25. Reactionary tool Telemetry during the event Tie in story: Telemetry see it an event or anomaly- prompt for data capture – see what u r hit with
  26. Try ‘cco/go/mib’ – get a list of mibs there.