13. Network Security Monitoring Flashcards

1
Q

NSM

A

Network Security Monitoring

  • Detection
  • Prevention
  • Investigation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Security process

A

Ongoing cycle;

  • Assesment
  • Protection
  • Detection
  • Response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Traffic profiles

A

Understanding anomalies, normal profiles;
- expected source ports, destination ports
- Differrent OS’ may pick source ports differently
- what shold normal traffic to/from a DNS/web server look like?
When is the traffic not normal;
- When is DNS traffic part of a DDoS
- what if your web server is connecting out on port 80?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Security Tools

A
Traffic Analysis
Penetration Testing
First hop security
Perimeter or subnet border defence
Infrastructure monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Traffic Analysis

A

IP Flow Records (NetFlow, sFlow, IPFIX)
Packet capture (Wireshark, tcpdump)
Intrusion detection systems (snort)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Penetration testing

A

Network Scanning (nmap, Metasploit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

First hop security

A

defending against local/internet attachks eg rogue DHCP servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Perimeter or subnet border defence

A
traffic filtering
log analysis ( eg firewalls ACLs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Infrastructure monitoring

A

SNMP device management (NAV)

Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Flow

A

Set of packets with common properties

eg. IP src/dst address, TCP/UDP src/dst port, protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Flow export methods

A

Configure the export of flows on a router
Use a flow collector to gather flows to database for analysis
eg Cisco Netflow
- can spot ‘out of profile’ traffic
- after an incident can see which other systems in the network might have been involved
- doesn’t explicitly prevent any attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet Capture - Wireshark

A

Software that understands the structure - encapsulation - of different networking protocols.
Parses & displays fields along with their meanings.
- can capture data from a live network connection or from a file of already-captured packets
Eg
- A DNS response
- An http request
- Ethernet/IP/TCP header address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Flow Info Use

A

Network flow useful for traffic analysis mainly after the fact

  • usually an investigative tool, using only flow data
  • current possible DDoS or past incident correlation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intrusion Detection System

A

Generally used for live incident detection
- must see, capture and analyse full packets from the live traffic feed
- typically port mirror traffic into the detector
Prefer to do at network edge to minimise volume
- capture and analysis at 10Gbit/s gets challenging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IPS

A

Intrusion Prevention System
An IDS may signal a firewall device to block a source
- it then becomes an intrusion prevention system
- can block a host using BitTorrent for a period of time

17
Q

IDS/IPS is used for

A

IDS will match traffic/packets against:
- signature database (looking for exploits of known web packages)
- set of IP blacklists (known botnet command & control servers
- possible protocol anomalies (bad IP headers)
Prioritising from a large number of reports from tools like Snort is a challenge

18
Q

Botnet

A

Collection of internet conected programs communicating with other similar programs to perform tasks
Clients usually infected by ‘drive by download’
DDoS, Adware, Spyware, E-mail spam, Click fraud, Fast flux, scareware
Wide variety of beaviour eg, changing DNS settings
Client activity can be detected by an IDS
Client downloads config file via HTTP GET
Client sends data to server via HTTP POST

19
Q

Penetration testing

A

Involves someone probing your network, usually from outside the perimeter, to detect potential vulnerabilities

  • if by a contracted security consultancy - expensive
  • could be done by a potential attacker
20
Q

Penetration testing aims

A

Identify open IP/port combinations and the services running on them
- check whether those services are secure
- produce some report for action
Interesting challenge for IPv6 due to subnet size

21
Q

First hop security

A

Detection/prevention of attacks from systems connected internally

  • specifically within the same IP subnet
  • possible rogue DHCP servers, attacks, IPv6 RAs (Router Advertisements)…
  • All rely on trust btwn all connected devices in the subnet
  • how do you know the DHCP response is from the right server?
22
Q

ARP spoofing

A

When an attacker send a fake Address Resolution Protocol message onto a LAN
Can only be used on networks using ARP

23
Q

Mitigation for First Hop

A

Increased smartness in the managed layer 2 devices

  • DHCP snooping or DHCP Guard
  • Only allow DHCP responses from known DHCP server switch ports
  • Simpler to deploy than certificates, eg Authenticated DHCP
24
Q

Perimeter Security

A

Perimeter Defence
Classic perimeter firewall
- default deny mode blocks all traffic except that configure to pass (can end up with very large rule sets which need to be managed)
Firewall/ACL (Access Control List) principles at subnet boundaries
- this is a good reason to create subnets
- partition the risk
Host security/firewalls
- increasingly common but still huge issues
- security of home networking devices in the news recently

25
Q

Other border functions

A

Other types of traffic protection/controls may be applied at a perimeter firewall device
Eg
TCP SYN flood attack detection
- avoid simplest types of DoS attack
- BCP 38 filtering (outbound)
- avoid spoofed IP packets leaving your network

26
Q

Network infrastructure mornitoring

A

Do this to;
- detect anomalies
- implies you understand normal traffic behaviour
Can poll switch/router quipment via SNMP (Simple Network Management Protocol)
- store results in a db using tools like NAV
- can then query info (where was a given MAC address or IP address seen, want some form of accountability)
- can poll traffic counts and spot unusual traffic volumes