Understanding Security Onion: Network Security Monitoring Tools

Slide Note
Embed
Share

Security Onion is a Linux distribution designed for network security monitoring using various tools like Full Packet Capture, Network IDS, Host IDS, and Analysis Tools. It offers capabilities for detecting and responding to security incidents effectively, making it a valuable asset for defensive network security.


Uploaded on Jul 29, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. IDS/IPS Incident Response

  2. What is Security Onion? A Linux distribution with various network security monitoring (NSM) tools Runs on Ubuntu Security Onion is to NSM as Kali is to pentesting Security Onion has three major components: Full packet capture Intrusion detection systems Network-based (NIDS) Host-based (HIDS) Analysis tools CSC-438 Defensive Network Security 2

  3. Full Packet Capture Capture all the things! Uses netsniff-ng Captures all the traffic, and stores as much as it can Security Onion will purge old data before the disks fill up CSC-438 Defensive Network Security Having a full capture is like having a recorder on your network Not for daily monitoring or hunting There to run down issues or incidents after the fact Attackers can t bypass a full capture 3

  4. Network IDS Rule Driven Snort and Suricata Uses fingerprints to match known malicious traffic Uses anomalous signatures to match suspicious traffic Kind of like antivirus but more flexible CSC-438 Defensive Network Security You can write custom rules and signatures Can use signatures from threat feeds 4

  5. Network IDS Analysis Driven Bro IDS Bro doesn t look for specific malicious or anomalous traffic Bro gathers data about the traffic Metadata Logs Connections DNS requests HTTP traffic SSL Certificates Files and more CSC-438 Defensive Network Security 5

  6. Host IDS OSSEC Free, open source HIDS for Windows, Linux, and Mac OS Agent to deploy on endpoints Log analysis CSC-438 Defensive Network Security File integrity checking Rootkit detection Real-time alerting Correlating host-based events with network-based events can be key 6

  7. Analysis Tools - Sguil The analyst console for network security monitoring Facilitates event driven analysis Provides visibility into the event data being collected CSC-438 Defensive Network Security A single GUI to view alerts Snort or Suricata alerts OSSEC alerts Bro HTTP events Can pivot from an alert into a packet capture 7

  8. Analysis Tools - Squert Web application interface to Squil Not a real-time interface for Sguil Not a replacement for Sguil Provides some visualizations of Sguil data CSC-438 Defensive Network Security Provides geo-IP mapping 8

  9. Analysis Tools - ELSA Enterprise Log Search and Archive ELSA Centralized syslog framework Web-based query interface for searching billions of logs Sift through logs that Security Onion collects And any syslog you send to ELSA CSC-438 Defensive Network Security Charting and graphing 9

  10. Analysis Tools Elastic Stack Elasticsearch, Logstash, Kibana ELK, Elastic Stack Store, search, and visualize data Logstash stores log data Elasticsearch searches log data CSC-438 Defensive Network Security Kibana dashboards and visualizations This is new to Security Onion, and not officially production ready Release candidate 1 released in late January 2018 10

  11. Deployment Scenarios Security Onion is setup in two parts: a sensor and a server Client-Server model The sensor is the client sends information back to the server Sensors can be placed throughout the network for additional visibility Server stores information, and includes analysis tools for processing CSC-438 Defensive Network Security The analyst logs in to the server Three deployment scenarios Standalone Server-sensor Hybrid 11

  12. Deployment Scenarios - Standalone A single machine running the sensor and server components Can be a physical machine or a VM Can have multiple network interfaces for monitoring different networks CSC-438 Defensive Network Security Easiest deployment for monitoring at a single location 12

  13. Deployment Scenarios Server-sensor A single machine runs the server component One or more separate machines run the sensor component Sensors report back to the central server Sensors run the sniffing, and store packet captures, alerts, and databases Analyst connects to the server Queries are distributed to the appropriate sensors CSC-438 Defensive Network Security Reduces network traffic, keeping the bulk of the data on the sensors 13

  14. Deployment Scenarios - Hybrid Standalone installation Server and sensor combination with one or more additional sensors reporting back to the server CSC-438 Defensive Network Security 14

  15. Hardware Requirements - Server If you re running just the server, requirements are down Intensive processing is left to the sensors 1-4 CPU cores 8-16gB RAM CSC-438 Defensive Network Security 100GB to 1TB of disk space 15

  16. Hardware Requirements - Sensor Snort, Suricata, and Bro are very CPU intensive The more traffic, the more CPU cores you ll need CPU - One core per worker 200Mbps per Snort, Suricata, or Bro worker Fully saturated 1Gbps link with Snort and Bro? 10 cores (5 Snort workers, 5 Bro workers) CSC-438 Defensive Network Security RAM It depends on traffic Minimum 3GB 50Mbps link 8GB+ 50-500Mbps link 16GB 128GB Storage Full packet capture takes a lot of space 50Mbps link, 540GB for one day of pcap Store for as long as you can useful for investigations after the fact ELSA will need space too 16

  17. Getting the traffic Make sure you ve got a good NIC Intel works well Will need 2 NICs one for sniffing, one for management Sniffing NIC is connected to a tap or span port Dumps a copy of all traffic Super cheap Netgear GS105E Config it to be an inline tap CSC-438 Defensive Network Security Many switches have port mirroring capabilities Various enterprise grade network taps available 17

Related


More Related Content