Title: Critical National Infrastructure
1Critical National Infrastructure
- What is attacking your network, and how do you
know? - By
- Frode Rein
- ICT Manager, The Norwegian Parliament
Stortinget - (Nigel Beighton, Symantec, Advance Threat
Research)
ECPRD Nicosia 6.th November 2003
2What is CNI
- CNI is an initiative to prepare and protect a
countrys critical organisations and
infrastructure - The CNI project is a community based early
warning and reporting capability currently in
development as a pilot by Symantec and selected
organisations - We need early warning to be prepared alerts for
all our community.
3(No Transcript)
4Events over last 7 days
5Where did it come from?
Trends
Governments need to protect
Increase speed and severity of hit
Sector targeting
CNI
Organisations
need time to be prepared
Services
Newresearch
interested in benchmarking
Experience
6Change in Exploitability of Vulnerabilities
..its easy
..in theory
..it can be done
7Patch, patch, patch
- Averaging 90 serious/critical vulnrabilities a
month ! - Organisations can not constantly patch
- emergency patches are only tested against the
vulnrability - Not all vulnerabilities lead to attacks
- Will this vulnerability become the next Blaster?
- Watch them try it, build exploits, test it and
start it - Need to prioritise which patch to do, when and
where - You need time to be prepared
8The Changing Threat Picture
9Blaster Milestones
Blaster hit the headlines with reported spread
affecting 188,000 systems worldwide.
Symantec sees increase in TCP port 135 scanning
Automated tools observed start of exploiting
vulnerability on a large scale
Microsoft Patch Released
Broadcast media to comment on Blaster
CNI CORe team begin specific monitoring
July 16
22
23
25
August 7
11
13
Aug 16
31
Buffer Overflow vulnerability discovered
CNI Members contacted directly about Blaster
CNI Members advised
Microsoft delisted windows update.com website and
averted denial of service attack.
Sample Exploit code circulating in the hacking
community
Symantec discover the W32.Blaster worm. virus
updates released.
Exploit code captured made public
10Blaster worm
30,000
Unique Source IPs
15,000
0
July 20
July 27
August 3
August 10
Time
11Less time to react
12Timing
CNI (community defence)
Activity warning
Mgmt Monitor
Spotted Threat on you
Deepsight TMS
Deepsight Alert
Technology vulnerability warning
General Threat Alert
Hit
months/weeks
days
on the doorstep
around the corner
13Where does the data come from?
- Symantecs 20,000 internet and private network
sensors (180 countries) - 200 pop-up honey-pots
- Security Focus Bugtraq
- Virus response team (and their zoo!)
- 100M submitting AV systems
- Internet community (black_hat white_hat)
- External authorities
- Directly monitored averagesper day
- Logs/alerts imported
- 400M
- Triggered events
- 250,000
- Severe events
- 300
- Correlated with
- 5.5B events
- 40M attacking IP addresses
Ex. virus!
14Community Monitor Alert
Early Warning
CNI
Community Knowledge
Analysis Reporting
15What do we get
Community Monitor Alert
Early Warning
- Deep probe activity report (weekly)
- Online technology vulnerability alerting
- Security device monitoring
- Community specific alerting
- Online threat reporting.
CNI
Community Knowledge
Analysis
- Analysis trend tracking events (quarterly)
- Online community forum
- Online threat reporting
- Online regulatory and standard industry
benchmarking - Custom reporting and analysis
16Important notes
- CNI will provide observations, probables,
potentials this needs to be treated
accordingly. - Do not have all data on all companies in all
segments it grows with the community - (Public) Device data is initially processed in
the US (Alexandria central SOC) now moving to
European only processing. - It is a pilot (experimental) development input
is essential
Q. How accurate?
17What is the Pilot?
- 6 months
- Up to 8 sensors Monitored
- Deepsight access
- Early warning
- Shared data(Anonymised)
- .. and involvement
- Sensor data
- Workshops
- Feedback
- Ideas
and an understand of the information basis..
18Our experiences
- A pilot is a pilot
- Pros
- High attention from vendor
- State of the art technology
- Cons
- Deficient routines
- Reports still in development
- State of the art technology
- Time-consuming for the customer
- No community parliament warning (We are alone ? )
19Options data sensitivity
- Multi-dimensional analyses
- Internal External
- Comprehensive
- (Not acceptable)
NIDS
Internet
Firewalls
secure log data
- External only
- Less comprehensive
- Acceptable
- Option2 outside IDS collector only
NIDS
Internet
Firewalls
secure log data
IDS Collector
20Pilot infrastructure
ManHunt IDS
Firewall
LAN Stortinget
Internet
21Our Home page
22Reports
- Weekly Event Digest
- Emerging Threat Notifications
- Community Watch Report
- Deep Sight Alert Service
23People our greatest resource
- This technology/concept is very interesting, but
without dedicated people within your organization
this concept will fail - Heavy use of internal personal resources
- Incident handling,routines, reports, monitoring
- Well-educated personnel
- High requirements for internal IT security and
networking skills
24Responsibility
- In the end you cannot transfer responsibility to
the vendor - Still you have to keep up the high focus on IT
security
25Internal handling of CNI information
- Daily routines and procedures
- Incident management
- Incident Response Team
- Who is doing what in a crisis
- Who is pulling the plug
- Who is handling the press
- Who is responible for handling forensic evidence
26Controversials
- You have to give something before you get
something - Collecting data from the parliament
- IDS and Firewalls
- Inside or outside the Firewall?
- What do the MPs say if we tell them that an
american company are collecting data from IDSs
and FW within their local network
27Why join this concept?
- Parliamentary community
- European Parliamentary IRT
- A large community gives high attention from the
vendor - More reliable data from a large community
- Benchmarking within the community
- Community warning
- A problem shared is a problem halved