Secure Analytics - IP NETWORK SOLUSINDO

Download Report

Transcript Secure Analytics - IP NETWORK SOLUSINDO

JUNIPER SECURE ANALYTICS (JSA) OVERVIEW

Stefan Lager Product Line Manager [email protected]

2

AGENDA

1. Challenges with Event Management 2.

Data Collection 3.

Event Management and Analytics 4.

Flow Management and Analytics 5.

Secure Analytics - Use Cases 6.

Deployment Options 7.

Platforms and Licensing Copyright © 2009 Juniper Networks, Inc. www.juniper.net

3

CHALLENGES WITH EVENT COLLECTION

IT “information” overload  The amount of events   The amount of different types of events The amount of different type of event sources Data mining and Analytics  Events Categorization   Event Search and Drill-down Anomaly Detection Copyright © 2009 Juniper Networks, Inc. www.juniper.net

THE SOLUTION: JUNIPER SECURE ANALYTICS

Log Server Secure Analytics (JSA) 4 “Here are all your events.

Please take a look at them and let me know if you find anything strange.

“Of all the million incoming events I think you need to take a look at this one.” Copyright © 2009 Juniper Networks, Inc. www.juniper.net

LOG SERVER VS. JUNIPER SECURE ANALYTICS

Log Server Secure Analytics (JSA) • “APACHE-STRUTS-URI-CMDEXE” • “APACHE-STRUTS-URI-CMDEXE” • • • • • • • Webserver is vulnerable!

Webserver sent a crash event!

Strange traffic seen FROM Webserver!

Attack came from an IP with bad reputation!

Attack came from a suspicious country!

Events has been received from other “Security Devices”! … 5 “Security Device” “Security Device” Copyright © 2009 Juniper Networks, Inc. www.juniper.net

Webserver

6

AGENDA

1. Challenges with Event Management 2.

Data Collection 3.

Event Management and Analytics 4.

Flow Management and Analytics 5.

Secure Analytics - Use Cases 6.

Deployment Options 7.

Platforms and Licensing Copyright © 2009 Juniper Networks, Inc. www.juniper.net

7

MULTI-VENDOR EVENT AND FLOW COLLECTION Networking events

 Switches & routers, including flow data

Security logs

 Firewalls, IDS, IPS, VPNs, Vulnerability Scanners, Gateway AV, Desktop AV, & UTM devices

Operating Systems/Host logs

 Microsoft, Unix and Linux

Applications

 Database, mail & web

User and asset

 Authentication data

Security map utilities

 GeoIP  Reputation Feeds Compliance Templates Forensics Search Policy Reporting Copyright © 2009 Juniper Networks, Inc. www.juniper.net

8

WHAT DOES JSA COLLECT?

Syslog SNMP Events UDP/TCP Multiline UDP Binary (SRX) +PCAP (SRX) Syslog-TLS Version 1, 2 & 3 Application/Protocols (*) JDBC OPSEC/LEA SDEE SourceFire Estreamer Log File Microsoft EMC VMWare Oracle SMB Tail Cisco NSEL … NetFlow IPFIX JFlow SFlow QFlow Flows Version 1,5,7,9 Supported Supported Version 2, 4, 5 On QFC and Monitor Interfaces Agents ALE Snare WinCollect Packeteer FDR

Copyright © 2009 Juniper Networks, Inc. www.juniper.net

(*) For more info refer to datasheet

SECURE ANALYTICS (JSA) - KEY BENEFITS

Reduced OPEX

 Collects all event and flow data in one place  Supports a large set of vendors out-of-the-box

Compliance

 Ships with predefined reports for COBIT, FISMA, GLBA, GSX-Memo22, HIPAA, NERC, PCI and SOX.

Increased Visibility

 Supports Graph/Dashboard/Reporting on any event data  Flow collection enables proactive actions

Increased Detection

 Analytics engine detects violations and anomalies  Built in support for GeoIP and Reputation feeds

Scalable

 Supports up to 7M EPS per console  Supports distributed collection of events and flows Copyright © 2009 Juniper Networks, Inc. www.juniper.net 9

AGENDA

1. Challenges with Event Management 2.

Data Collection 3.

Event Management and Analytics 4.

Flow Management and Analytics 5.

Secure Analytics - Use Cases 6.

Deployment Options 7.

Platforms and Licensing Copyright © 2009 Juniper Networks, Inc. www.juniper.net 10

EXAMPLE:

WHAT CAN SECURE ANALYTICS DO WITH A FIREWALL EVENT?

<182>Sep 26 20:14:49 127.0.0.1 <14>1 2012-03-24T05:21:13.677 utm-n0 RT_FLOW RT_FLOW_SESSION_CREATE [[email protected] source-address="192.168.34.10" source-port="58541" destination-address="204.245.34.169" destination-port="80" service-name="junos-http" nat-source address="192.168.32.2" nat-source-port="3195" nat-destination-address="204.245.34.169" nat-destination-port="80" src-nat-rule-name="r1" dst-nat-rule-name="None" protocol-id="6" policy-name="utm-out" source-zone-name="trust" destination-zone-name="untrust" session-id-32="143804" username="VIRTUALPOC\slager" roles="VPoC-UTM-Demo" packet-incoming-interface="ge-0/0/2.3602"]

Event Analytics

• Taxonomy : • GeoIP : • IP Reputation: • Analytics: RT_FLOW_SESSION_CREATE => Category “FIREWALL PERMIT” 204.245.34.169 => Country “BRAZIL” 204.245.34.169 => Remote Network “BOTNET” Alert if more then events from the same src, IF the src is coming from one of our client networks

Event Management

• RBAC: Allow access to subset of event data • Indexing: • Retention: • Forwarding: Allow to index on any field. 10-100x search time improvement Flexible setting for how long this event should be stored Should this specific event be forwarded ?

11 Copyright © 2009 Juniper Networks, Inc. www.juniper.net

EVENT ANALYTICS: GEOIP-MAPPING

Provide mapping of IP to Countries both for visibility and for correlation.

12 Copyright © 2009 Juniper Networks, Inc. www.juniper.net

EVENT ANALYTICS: IP REPUTATION

13 Copyright © 2009 Juniper Networks, Inc. www.juniper.net

EVENT ANALYTICS: RULES ENGINE MATCHING

• Secure Analytics is delivered with a large set of built-in rules • Many of them are disabled per default but will help you get tips on what to correlate on • All rules are easy to tune to fit your specific deployment 14

Creating a correlation rule is as simple as sorting mail in Outlook!

Copyright © 2009 Juniper Networks, Inc. www.juniper.net

EVENT ANALYTICS: RULES ENGINE ACTION

15 Copyright © 2009 Juniper Networks, Inc. www.juniper.net

THE KEY TO DATA MANAGEMENT: REDUCTION AND PRIORITIZATION STRM

Copyright © 2009 Juniper Networks, Inc. www.juniper.net Previous 24hr period of network and security activity (

2.7M logs

) Correlation of data sources creates offenses (

129

) Offenses are a complete history of a threat or violation with full context about accompanying network, asset and user identity information Offenses are further prioritized by business impact 16

USE CASE: COMPLEX THREAT DETECTION

Sounds Nasty… But how do we know this?

The evidence is a single click away.

Network Scan Detected by QFlow Buffer Overflow Exploit attempt seen by Snort Targeted Host Vulnerable Detected by Nessus 17 Total Security Intelligence Convergence of Network, Event and Vulnerability data Copyright © 2009 Juniper Networks, Inc. www.juniper.net

USE CASE: USER ACTIVITY MONITORING

Authentication Failures Perhaps a user who forgot his/her password? Brute Force Password Attack Numerous failed login attempts against different user accounts Copyright © 2009 Juniper Networks, Inc. www.juniper.net

Host Compromised

All this followed by a successful login.

Automatically detected, no custom tuning required.

18

AGENDA

1. Challenges with Event Management 2.

Data Collection 3.

Event Management and Analytics 4.

Flow Management and Analytics 5.

Secure Analytics - Use Cases 6.

Deployment Options 7.

Platforms and Licensing Copyright © 2009 Juniper Networks, Inc. www.juniper.net 19

SECURE ANALYTICS FLOW

Branch-Office STRM-FP STRM-Console 20 DMZ WEB-1 WEB-2 WEB-3 STRM-FP vGW STRMV-FP Copyright © 2009 Juniper Networks, Inc. www.juniper.net Virtualized Servers STRM-FP

• • • • • •

FLOWS FOR NETWORK INTELLIGENCE

QoS Monitoring Detection of day-zero attacks that have no signature Policy monitoring and rogue server detection Visibility into all attacker communications Passive flow monitoring builds asset profiles & auto-classifies hosts Network visibility and problem solving (not just security related) 21 Copyright © 2009 Juniper Networks, Inc. www.juniper.net

ANOMALY DETECTION

Secure Analytics learns and anticipates the established “normal” condition for: - The Network - The Host - The Protocol - The Application 22 Copyright © 2009 Juniper Networks, Inc. www.juniper.net

AGENDA

1. Challenges with Event Management 2.

Data Collection 3.

Event Management and Analytics 4.

Flow Management and Analytics 5.

Secure Analytics - Use Cases 6.

Deployment Options 7.

Platforms and Licensing Copyright © 2009 Juniper Networks, Inc. www.juniper.net 23

USE-CASE: CAMPUS & BRANCH

VPN MONITORING USING JUNOS RPM

BRANCH-1 24 RPM-Logs RPM-Probes HQ RPM-Probes BRANCH-2 Copyright © 2009 Juniper Networks, Inc. www.juniper.net

USE-CASE: CAMPUS & BRANCH

VPN MONITORING USING JUNOS RPM

25 Copyright © 2009 Juniper Networks, Inc. www.juniper.net

USE-CASE: DATACENTER

VISIBILITY, REPORTING AND CORRELATION OF EVENTS AND TRAFFIC

Clients

SRX AppSecure

Events

EX

Events Exposed Services

WebApp Secure

WEB-1 WEB-2 WEB-3 Flow 26 NOC/SOC

JSA

N

FireFly

Flow and events VM-1 VM-2 VM-3 VM-4 VM-5 VM-6 Copyright © 2009 Juniper Networks, Inc. www.juniper.net Virtualized Servers

FireFly

USE-CASE: BYOD AUTOMATIC REMEDIATION USING OPEN STANDARDS PROTOCOL (IF-MAP)

Juniper IC (IF-Map Server) IF-MAP NSM Secure Analytics UAC Agent UAC Agent-less Mode Juniper EX (Switch) IDP Series Juniper AX (WLAN AP) Juniper SA (SSL-VPN) 27 Firewall SSG Series ISG Series Copyright © 2009 Juniper Networks, Inc. www.juniper.net SRX Series

Application Servers

AGENDA

1. Challenges with Event Management 2.

Data Collection 3.

Event Management and Analytics 4.

Flow Management and Analytics 5.

Secure Analytics - Use Cases 6.

Deployment Options 7.

Platforms and Licensing Copyright © 2009 Juniper Networks, Inc. www.juniper.net 28

SMALL SITE DEPLOYMENT – APPLIANCE OR VM JSA1500

syslog STRM 5000 EP or FP

SRX Branch

Flowdata and syslog  JSA1500 can collect up to 1000 events per second 50kF/min  Allows Real-Time Streaming of events  Visibility of incoming/outgoing traffic (SRX FW/AppTrack)  Visibility of internal traffic (EX flow-data)  Threat and Anomaly Detection  Correlation and Compliance Reporting  Provides Common Dashboard

EX- VirtualChassis

Copyright © 2009 Juniper Networks, Inc. www.juniper.net 29

LARGE SITE DEPLOYMENT – APPLIANCE JSA 1/3/5/7500 EventProcessors

STRM 5000 EP or FP

JSA5500 Console

 You can connect up to 250 Event Processors to one Console  JSA Console provides One Dashboard with aggregated data from all EPs  Searches and Reports are done on aggregated data from all EPs  Configurable Retention Policies allows storing of important/compliance logs for a longer time than other logs

SLB

syslog 30

SRX-5800 SRX-5800

Copyright © 2009 Juniper Networks, Inc. www.juniper.net

DISTRIBUTED LOG/FLOW COLLECTION

 Distributed log and flow collection offloads WAN links

JSA1500 Local EP/FP JSA Console JSA VM Local EP

EMEA

JSA VM Local FP

 Will continue to receive and store events/flows even if WAN link goes down  Available both as physical appliance and virtual appliances  CombiCollector (both EP/FP) only supported on physical appliance  JSA VM is available as: - Remote TM EP - Remote LM EP - Remote FP  Visibility of incoming/outgoing traffic  Threat and Anomaly Detection  Correlation and Compliance  Provides Common Dashboard Australia Beijing Canada Copyright © 2009 Juniper Networks, Inc. www.juniper.net 31

AGENDA

1. Challenges with Event Management 2.

Data collection 3.

Event Management and Analytics 4.

Flow Management and Analytics 5.

Secure Analytics - Use Cases 6.

Deployment Options 7.

Platforms and Licensing Copyright © 2009 Juniper Networks, Inc. www.juniper.net 32

SECURE ANALYTICS:

ALL-IN-ONE DEPLOYMENT JSA3500

33

JSA1500

1,000EPS 15KF/M 5,000EPS 50KF/M

Copyright © 2009 Juniper Networks, Inc. www.juniper.net

JSA5500

10,000 EPS 200 KF/M

SECURE ANALYTICS:

DISTRIBUTED DEPLOYMENT

 Supports very high amount of EPS  Solves branch-office collection  Can be fully redundant

EP/FP combo Console WebUI Flow Processor Event Processor Qflow Collector

34

Security Devices Exporting Event Data Network Devices Exporting Flow Data

Copyright © 2009 Juniper Networks, Inc. www.juniper.net

JSA1500 QFlow Collectors Deployed in Tap/Mirror or SPAN Mode

JSA PLATFORM SUPPORT MATRIX

QFlow Collector Event Processor Flow Processor EP/FP Combo JSA VM Console Support All-in-one Support JSA1500 JSA3500 JSA5500 JSA7500

35 Copyright © 2009 Juniper Networks, Inc. www.juniper.net

SECURE ANALYTICS – LICENSING

LOG ANALYTICS VS THREAT ANALYTICS

Threat Analytics License Network Behavior Anomaly Detection (NBAD) Security Information and Event Management (SIEM) Network Traffic Visibility QoS Visibility Traffic Anomaly Detection Event and Flow Correlation Asset Profiling Vulnerability Scanner integration Log Analytics License Log Collection and Categorization Customizable Dashboards Predefined and customizable reports Copyright © 2009 Juniper Networks, Inc. www.juniper.net 36

SECURE ANALYTICS - KEY BENEFITS

Reduced OPEX

 Collects all event and flow data in one place  Supports a large set of vendors out-of-the-box

Compliance

 Ships with predefined reports for COBIT, FISMA, GLBA, GSX-Memo22, HIPAA, NERC, PCI and SOX.

Increased Visibility

 Supports Graph/Dashboard/Reporting on any event data  Flow collection enables proactive actions

Increased Detection

 Analytics engine detects violations and anomalies  Built in support for GeoIP and Reputation feeds

Scalable

 Supports up to 7M EPS per console  Supports distributed collection of events and flows Copyright © 2009 Juniper Networks, Inc. www.juniper.net 37

Thanks!