20
© Cyberspace Analytics Creating Near Real - Time and End - to - End Cyber Situational Awareness of University Networks Dr. Deepinder Sidhu - Professor of Computer Science - UMBC Aaron Boteler - Cyberspace Analytics Gunnar Engelbach – Cyberspace Analytics Randal Taylor – Cyberspace Analytics POC - Email: [email protected]; Tel: 443-742-2210 1 The Gold Standard for Security Internet2 2017 Technology Exchange, San Francisco, CA, October 15-18, 2017

Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics

Creating Near Real-Time and End-to-End Cyber Situational Awareness of University Networks

Dr. Deepinder Sidhu - Professor of Computer Science - UMBCAaron Boteler - Cyberspace Analytics

Gunnar Engelbach – Cyberspace AnalyticsRandal Taylor – Cyberspace Analytics

POC - Email: [email protected]; Tel: 443-742-2210

1

The Gold Standard for Security

Internet2 2017 Technology Exchange, San Francisco, CA, October 15-18, 2017

Page 2: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics

1. Real-Time Network Mapping Analytics: vNOC

2. Cybersecurity & Compliance Analytics: CNOC

3. Real-Time Cyberspace Analytics: Intel NUC

2

Discuss significant advances for addressing cyberspace challenges of university networks innovatively, effectively and inexpensively

Page 3: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics

• Culture‒ Information sharing, collaboration, free flow of information

and ideas‒ Restrictions often viewed as impediments

• Plethora of valuable information‒ Credit cards, research data, intellectual property‒ Student and faculty personal information

• Major targets of attack‒ Extensive attack surface – mobile, wireless, etc.‒ Valuable resources mean attacks from everywhere

3

Page 4: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics

Real-Time Network Mapping AnalyticsReverse Engineering Raw Data

–Mapping Network

–Visualizing Network

– Identifying Features

–Reporting Problems

–Enabling

Cybersecurity & Compliance AnalyticsLarge Device Support

–Processing Compliance/Vulnerability

–Visualizing Health

– Identifying Features

–Reporting Problems

–Enabling

Big Data Analytic Fusion Engine Recreate Network Map

PCAP (OSPF/BGP), Router Configs, NMAP, Compliance Scores (DISA/PCI),

Flow Records, Firewall Logs, Nessus Scanner, Splunk Exports, etc…

Cisco Firewall/Router, Palo Alto Firewall, Checkpoint Firewall,

Windows-based OS/Servers, Linux-based OS/Servers, MAC-based

OS/Servers

Intel NUC Platform✓ Cost-effective Commodity Hardware✓ Minimal Power & Space Requirements✓ Low-cost, easy to deploy

4

3D Interactive EnvironmentMassive Scalability – 100K+

Animations, Interactive, Real-time

Firewalls, NATs, Tunnels, Port Forwards, IDS/IPS,

Phantom Devices, Mobile Devices, IoTIngress/Egress Connections,

Application/Service Properties,Flow Behaviors, Temporal Behaviors,

Compliance/Vulnerability Results

Configuration Collisions,Duplicate Physical Interfaces,

Phantom Devices,Unmanaged Network Nodes

Device Inventory ManagementIP Address Inventory Management

Subnet ManagementIP Threat Flow Overlays (Reputation)

DISA STIGS, USGCB, HIPPA Compliance, PCI Compliance, Vulnerability Scans,

Compliance/Vulnerability Score,Device Currency (Scan Age), Device Misconfigurations,

Compliance/Policy Violations

Compliance/Vulnerability Score,Device Currency (Scan Age),

Device Group/Cluster Summaries

Ticket System Integration (Remedy9),Health Reports,

Device Configuration Drift Reports

Full Cyber Situational Awareness

Export for Emulation

Page 5: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics

• Reverse engineer, map and visualize network

• Discover network blind spots

• Display real-time changes to network topology

• Identify network segmentations and boundary

• Identify misconfigurations, including duplicate IPs

• Optimize network to reduce attack surface

• Improve network hygiene

• Fingerprint network assets

• Baseline network configurations

• Create Virtual Network Operation Center (vNOC)

5

Page 6: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics6

Large Enterprise Network–Router Configs, NMAP Scans, Palo Alto Firewall Logs–Enriched by extracted Properties Very Large Enterprise

Network–Router Configs, NMAP Scans, Juniper Firewall Logs

R&D✓ Big Data Network Data Fusion Analytics✓ Big Data Network Mapping Analytics✓ Analytics Identify Anomalies across Network✓ Large-scale Correlation Logic✓ Generic Enrichment Engine

Real Discoveries✓ Duplicate Addresses✓ Phantom Devices✓ Phantom OSPF Interfaces✓ Unmanaged Devices (Security)✓ Back Channels (Tunnels)

Page 7: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics7

Simple & Advanced Network Node Search–IP/Name and/or any combination of generic properties–Any combination of Compliance/Vulnerability Results

–Aggregate score–Individual rule pass/fail

–Highlight/Mark results–Drill-down into the Nodes

Highlight All Hosts in the Network that passed a particular rule in the .NET 1.4 Framework STIG.

Page 8: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics8

Network Mapping Video–Real-time Mapping

–Incremental Add Data Sets–Dynamically Build Network Map–Interact with Network Map

Page 9: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics9

Router Degree Report

Node Attribute Report

Report Types• External Addresses• Internal Addresses• External Clients/Servers• Internal Client/Servers• Mapping Logs• End-Node Attributes• Router Degree• Sensor Logs• Configuration Drift• Compliance Scores

Advance Analytics – On-Demand Reports

External Servers(Overlays Threat Information)

• Review Mapping Log for Configuration Collisions

• Identify duplicate interfaces Identify Phantom Interfaces

Page 10: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics

• Display enhanced network map with data from –‒ Sensors (taps)‒ Scanning tools (Nessus, NMAP, …)‒ Threat intelligence feeds (Lashback, Geospatial, …)

• Display real-time network configuration changes• Identify vulnerabilities and security patches• Conduct attack vector analysis to harden network• Conduct regulatory/policy compliances for reports

‒ STIGs, FISMA, PCI, HIPAA, NERC, ---

• Test resiliency under‒ Cyber-attacks ‒ Catastrophic failures

• Create Cyber Network Operation Center (CNOC)10

Real Discoveries✓ Misconfigured tunnels✓ Firewall rules inconsistencies✓ Unauthorized web servers✓ Weak passwords✓ Unprotected wireless access points✓ Text files containing passwords to

sensitive systems✓ Unpatched software & firmware

Page 11: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics11

Network Map for Cyber Situational Awareness• Built from Lab Environment• Used PCAP and Compliance Results

• Aggregate of All Benchmarks• Average Score Bar Graph

• Palo Alto Firewall Device• Used for Drift Example

Page 12: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics12

Large Device Support–All types of Hosts–All types of Network Equipment–Integrates with Splunk, Remedy9

Compliance Standards–Continuous compliance analysis–Security Content Automation Protocol (SCAP)–Engine tested and validated by NIST–Verify and report on compliance status

–Organization configuration checking–PCI DSS, HIPPA, NERC, SOX, FISMA(USGCB), STIGs, CIS, etc.–Drill-Down

Page 13: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics13

Visualizing Health–Examine Composite/Vulnerability Score

–Group-basis–Daily Trending Scores

Device Analysis–Identify role and functionality –Baseline configuration and track drift –Quantify Security Posture–View Device Logs–Interact with the Device

Page 14: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics14

Network Drift Analytics–Compliance/Vulnerability/Config Samplesevery N number of days–Perform deep-diff on samples

Page 15: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics15

Regulatory Compliance – Configuration Drifts

Page 16: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics16

Regulatory Compliance – Security Dashboard Drill-Down

Page 17: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics17

Data Extraction and Reporting

Page 18: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics18

CONOP– Active & Passive Collection– Real-Time Taps– Real-Time Update– Visualize Deltas– Create Virtual Reality of the Network’s Data Space

• “The Matrix”

Intel NUC- vNOC/CNOC– Commodity Hardware– Light weight– Low Power– Portable

✓ Passive Collections✓ Automated Active Collections✓ Automated Alerting✓ Integration with Help Desk✓ Interact Virtually with the Network✓ Track Network Health/Map Changes

CNOC

Page 19: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics19

• Attacks are a given – knowledge is power‒ Must go beyond simple analytics, tables, raw storage

and expensive rack-mounted solutions‒ Turn massive amounts of data into actionable and

manageable information

• Merge network and cyber situational awareness

• This will only work if solutions are‒ Scalable‒ Affordable‒ Supportable‒ Effective

The Gold Standard for Security

CNOC

Deployed in enterprise networks to

implement robust security

Page 20: Creating Near Real-Time and End-to-End Cyber …...2017/10/15  · • Identify vulnerabilities and security patches • Conduct attack vector analysis to harden network • Conduct

© Cyberspace Analytics20

Discussion