conquering*the*ids*alertchallenge** with*splunk* · 2017-10-08 · disclaimer* 3...

24
Copyright © 2016 Splunk Inc. Brennan Lodge Cyber Security Analyst, Bloomberg LP Conquering The IDS Alert Challenge With Splunk

Upload: others

Post on 05-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Copyright  ©  2016  Splunk  Inc.  

Brennan  Lodge    Cyber  Security  Analyst,  Bloomberg  LP  

Conquering  The  IDS  Alert  Challenge    With  Splunk  

Page 2: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Whois  Lookup  

2  

Page 3: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Disclaimer  

3  

During  the  course  of  this  presentaIon,  we  may  make  forward  looking  statements  regarding  future  events  or  the  expected  performance  of  the  company.  We  cauIon  you  that  such  statements  reflect  our  current  expectaIons  and  esImates  based  on  factors  currently  known  to  us  and  that  actual  events  or  results  could  differ  materially.  For  important  factors  that  may  cause  actual  results  to  differ  from  those  contained  in  our  forward-­‐looking  statements,  please  review  our  filings  with  the  SEC.  The  forward-­‐looking  statements  made  in  the  this  presentaIon  are  being  made  as  of  the  Ime  and  date  of  its  live  presentaIon.  If  reviewed  aSer  its  live  presentaIon,  this  presentaIon  may  not  contain  current  or  

accurate  informaIon.  We  do  not  assume  any  obligaIon  to  update  any  forward  looking  statements  we  may  make.  In  addiIon,  any  informaIon  about  our  roadmap  outlines  our  general  product  direcIon  and  is  

subject  to  change  at  any  Ime  without  noIce.  It  is  for  informaIonal  purposes  only  and  shall  not,  be  incorporated  into  any  contract  or  other  commitment.  Splunk  undertakes  no  obligaIon  either  to  develop  the  features  or  funcIonality  described  or  to  include  any  such  feature  or  funcIonality  in  a  future  release.  

Page 4: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

The  Challenge    •  Intrusion  DetecIon  Systems  Alerts  •  Few  analysts  to  triage  IDS  alerts  +  every  other  security  log  to  review  

•  IDS  alerts  are  influx    •  Many,  many,  many  false  posiIve  alerts  =  noise    

•  However  IDS  is  a  huge  value  add  to  the  success  of  a  informaIon  security  program  

•  MUST  be  managed  accordingly    

4  

IDS  

0  1  0  1  

0  1  0  1  

0  1  0  1  

0  1  0  1  

0  1  0  1  

Page 5: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

IDS  By  The  Numbers  •  A  basic  install  of  snort  with  community  and  open  source  Emerging  Threat  signatures  comes  with  20,000  +  IDS  rules  

•  There  are  50+  categories  of  rules    •  There  are  25+  class  types  of  rules    •  With  snort  sensor  si\ng  on  the  perimeter  of  an  Amazon  EC2  instance  the  average  count  per  day  for  a  months  Ime,  alerts  fired  on  average  585  8mes  per  day  

5  

Page 6: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Why  Throw  IDS  At  Splunk  

  IDS  –  noIfies  analysts  of  cyber  security  a`acks  in  progress    Goal  of  IDS  –  100%  accuracy  and  0%  false  posiIves  –  You  don’t  want  your  IDS  to  cry  wolf  –  You  don’t  want  to  let  a`acks  pass  undetected  –  Correlate  a`acks  –  Provide  context  to  analysts  on  an  a`ack  –  Find  evil  –  Let  Splunk  do  all  of  this  for  you!  

6  

Page 7: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

#Winning  With  IDS  &  Splunk  

  IDS  +  Splunk  allows  for  the  following  wins:    IDS  complements  the  security  controls  in  an  organizaIon  Splunk  complements  all  the  logs  collected  from  the  security  controls  in  an  organizaIon  Splunk  allows  the  flexibility  to  correlate  the  IDS  logs  +  the  IDS  signatures  =  analyst  context  for  triaging  an  event  which  may  lead  to  an  incident  and  escalaIon    

  Dashboards  Dashboards  Dashboards    

7  

Page 8: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Agenda  

  The  Research  Environment  Diagram    Understand  Your  Rules  And  Alerts    Breaking  Down  And  Understanding  Your  Signatures    The  IDS  Dashboard    Anomaly  DetecIon    ConInue  To  Tune    QuesIons    

8  

Page 9: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Research  Environment  

9  

Amazon  EC2  cloud  

/var/log/snort/alert  

Snort    

Forwarder  search  head  

dashboard  

Splunk  server  IDS  Rules  

Page 10: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Understand  Your  Rules  And  Alerts  

  Help  be`er  understand  your  environment    Know  which  IDS  alerts  to  tune  out    Know  who  is  a`acking  you    Know  which  IDS  sensors  are  generaIng  the  greatest  /  least  amount  of  traffic  

  Correlate  IDS  with  other  log  sources  (proxy,  dns,  windows  logs,  etc)  

10  

Page 11: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Make  Sense  Of  Your  Signatures  

  Regex  your  signatures  into  a  lookup  table    Break  IDS  signatures  into  the  following  categories:    –  SEIM  Category,  CVE,  classtype,  desInaIon  ip,  desInaIon  port,  msg,  

msg_type,  protocol,  rule_who,  sid#,  signature_all,  source  ip,  source  port  

11  

Page 12: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Example  IDS  Signature  

12  

alert  tcp  $HOME_NET  any  -­‐>  $EXTERNAL_NET  $HTTP_PORTS  (msg:"ET  MALWARE  Suspicious  Mozilla  User-­‐Agent  -­‐  Likely  Fake  (Mozilla/4.0)";  flow:to_server,established;  content:"User-­‐

Agent|3a|  Mozilla/4.0|0d  0a|";  fast_pa`ern;  nocase;  h`p_header;  content:!"/CallParrotWebClient/";  h`p_uri;  content:!"Host|3a|  www|2e|google|2e|com|0d  0a|";  nocase;  h`p_header;  content:!"Cookie|3a|  PREF|3d|ID|3d|";  nocase;  h`p_header;  content:!"Host|3a  20|secure|2e|logmein|2e|com|0d  0a|";  nocase;  h`p_header;  content:!"Host|3a  20|weixin.qq.com";  h`p_header;  nocase;  content:!"Host|3a|  

slickdeals.net";  nocase;  h`p_header;  content:!"Host|3a|  cloudera.com";  nocase;  h`p_header;  content:!"Host|3a  20|secure.digitalalchemy.net.au";  h`p_header;  content:!".ksmobile.com|0d  0a|";  h`p_header;  reference:url,doc.emergingthreats.net/2003492;  classtype:trojan-­‐acIvity;  

sid:2003492;  rev:20;)  

Page 13: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Example  IDS  Signature  

13  

alert  tcp  $HOME_NET  any  -­‐>  $EXTERNAL_NET  $HTTP_PORTS  (msg:"ET  MALWARE  Suspicious  Mozilla  User-­‐Agent  -­‐  Likely  Fake  (Mozilla/4.0)";  flow:to_server,established;  content:"User-­‐

Agent|3a|  Mozilla/4.0|0d  0a|";  fast_pa`ern;  nocase;  h`p_header;  content:!"/CallParrotWebClient/";  h`p_uri;  content:!"Host|3a|  www|2e|google|2e|com|0d  0a|";  nocase;  h`p_header;  content:!"Cookie|3a|  PREF|3d|ID|3d|";  nocase;  h`p_header;  content:!"Host|3a  20|secure|2e|logmein|2e|com|0d  0a|";  nocase;  h`p_header;  content:!"Host|3a  20|weixin.qq.com";  h`p_header;  nocase;  content:!"Host|3a|  

slickdeals.net";  nocase;  h`p_header;  content:!"Host|3a|  cloudera.com";  nocase;  h`p_header;  content:!"Host|3a  20|secure.digitalalchemy.net.au";  h`p_header;  content:!".ksmobile.com|0d  0a|";  h`p_header;  reference:url,doc.emergingthreats.net/2003492;  classtype:trojan-­‐acIvity;  

sid:2003492;  rev:20;)  

Page 14: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Rule  Break  Down  

14  

Page 15: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Rule  Message  Word  Cloud    

15  

Page 16: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Pulling  It  All  Together  In  A  Splunk  Dashboard    -­‐  DisInct  rule  count    -­‐  Alerts  by  Host    -­‐  Total  Signatures  alerted    -­‐  Signature  lookup      -­‐  The  signature  rollup  and  acIvity      -­‐  Top  signatures  firing      -­‐  Signatures  broken  out  by  port  hits      -­‐  Rule  class  distribuIon      -­‐  Anomaly  detecIon  

16  

Page 17: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Dashboard  Break  Down  

17  

Page 18: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Alerts  In  The  Dashboard  

18  

Page 19: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

CVE’S    

19  

Page 20: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

SEIM  Category  

20  

  Malware  -­‐  worm|exploit|acIvex|ciarmy|trojan|botcc|dshield|owned  

  AcIvity  Reviews  –  catch  all    

  Browsing  Exploits  -­‐  browser|plugin|flash|silverlight|java|php|internet  explorer  

  Corp  Policy  ViolaIons  –  “policy”  

  Infrastructure  /  Service  A`acks  –  server  |denial|successful-­‐recon|network-­‐scan|scan|sql  

  DLP  -­‐  Sp  

  Spyware  /  Adware  /  PUPs  -­‐  spware|adware|PUP  

  PHISHING  –  “phish”  

Page 21: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

Anomaly  DetecIon  

  Anomaly  DetecIon      StaIsIcal  breakdown  of  signatures  firing:    Sparklines  

  Counts    Number  of  Days  a`ackers  a`acking    CorrelaIon  among  other  security  log  sources    Top  A`ackers        Baseline  by  Custom  Category  Type  

21  

Page 22: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

The  IDS  Dashboard  

22  

DEMO  

Page 23: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

ConInuous  Tuning    Given  the  results  from  the  Dashboard  anomalies  you  can  put  signatures  on  silent  (don’t  appear  to  analysts)  

  SIll  record  in  case  you  need  to  correlate  an  a`ack  that  was  not  originally  idenIfied  through  IDS  

  ConInue  to  measure  the  effecIveness  of  signatures      Organize  a  meeIng  with  analysts  and  engineers  to  decide  on  false  posiIve  alerts  that  should  be  tuned  accordingly    

  Correlate  IDS  alerts  with  other  splunk  alerts  for  more  accurate    “evil”  events  

23  

Page 24: Conquering*The*IDS*AlertChallenge** With*Splunk* · 2017-10-08 · Disclaimer* 3 During*the*course*of*this*presentaon,*we*may*make*forward*looking*statements*regarding*future* events*or*the*expected*performance*of*the*company.*We

THANK  YOU