Security Onion: Network Security Monitoring Tools

undefined
 
IDS/IPS
 
Incident Response
 
What is Security Onion?
 
A Linux distribution with various network security monitoring (NSM) tools
Runs on Ubuntu
Security Onion is to NSM as Kali is to pentesting
 
Security Onion has three major components:
Full packet capture
Intrusion detection systems
Network-based (NIDS)
Host-based (HIDS)
Analysis tools
 
CSC-438 Defensive Network Security
 
2
 
Full Packet Capture
 
Capture all the things!
Uses netsniff-ng
Captures all the traffic, and stores as much as it can
Security Onion will purge old data before the disks fill up
 
Having a full capture is like having a recorder on your network
Not for daily monitoring or hunting
There to run down issues or incidents after the fact
Attackers can’t bypass a full capture
 
CSC-438 Defensive Network Security
 
3
 
Network IDS – Rule Driven
 
Snort and Suricata
Uses fingerprints to match known malicious traffic
Uses anomalous signatures to match suspicious traffic
Kind of like antivirus – but more flexible
 
You can write custom rules and signatures
Can use signatures from threat feeds
 
CSC-438 Defensive Network Security
 
4
 
Network IDS – Analysis Driven
 
Bro IDS
Bro doesn’t look for specific malicious or anomalous traffic
Bro gathers data about the traffic
Metadata
Logs…
Connections
DNS requests
HTTP traffic
SSL Certificates
Files
…and more
 
CSC-438 Defensive Network Security
 
5
 
Host IDS
 
OSSEC
Free, open source HIDS for Windows, Linux, and Mac OS
Agent to deploy on endpoints
Log analysis
File integrity checking
Rootkit detection
Real-time alerting
 
Correlating host-based events with network-based events can be key
 
CSC-438 Defensive Network Security
 
6
 
Analysis Tools - Sguil
 
The analyst console for network security monitoring
Facilitates event driven analysis
 
Provides visibility into the event data being collected
A single GUI to view alerts
Snort or Suricata alerts
OSSEC alerts
Bro HTTP events
Can pivot from an alert into a packet capture
 
CSC-438 Defensive Network Security
 
7
 
Analysis Tools - Squert
 
Web application interface to Squil
Not a real-time interface for Sguil
Not a replacement for Sguil
Provides some visualizations of Sguil data
Provides geo-IP mapping
 
CSC-438 Defensive Network Security
 
8
 
Analysis Tools - ELSA
 
Enterprise Log Search and Archive – ELSA
Centralized syslog framework
Web-based query interface for searching billions of logs
Sift through logs that Security Onion collects
And any syslog you send to ELSA
Charting and graphing
 
CSC-438 Defensive Network Security
 
9
 
Analysis Tools – Elastic Stack
 
Elasticsearch, Logstash, Kibana – ELK, Elastic Stack
Store, search, and visualize data
Logstash – stores log data
Elasticsearch – searches log data
Kibana – dashboards and visualizations
 
This is new to Security Onion, and not officially production ready
Release candidate 1 released in late January 2018
 
CSC-438 Defensive Network Security
 
10
 
Deployment Scenarios
 
S
e
c
u
r
i
t
y
 
O
n
i
o
n
 
i
s
 
s
e
t
u
p
 
i
n
 
t
w
o
 
p
a
r
t
s
:
 
a
 
s
e
n
s
o
r
 
a
n
d
 
a
 
s
e
r
v
e
r
Client-Server model
The sensor is the client – sends information back to the server
Sensors can be placed throughout the network for additional visibility
Server stores information, and includes analysis tools for processing
The analyst logs in to the server
Three deployment scenarios
Standalone
Server-sensor
Hybrid
 
CSC-438 Defensive Network Security
 
11
 
Deployment Scenarios - Standalone
 
A single machine running the sensor and server components
Can be a physical machine or a VM
Can have multiple network interfaces for monitoring different networks
 
Easiest deployment for monitoring at a single location
 
CSC-438 Defensive Network Security
 
12
 
Deployment Scenarios – Server-sensor
 
A single machine runs the server component
One or more separate machines run the sensor component
Sensors report back to the central server
Sensors run the sniffing, and store packet captures, alerts, and databases
Analyst connects to the server
Queries are distributed to the appropriate sensors
Reduces network traffic, keeping the bulk of the data on the sensors
 
CSC-438 Defensive Network Security
 
13
 
Deployment Scenarios - Hybrid
 
 
 
Standalone installation
Server and sensor combination
…with one or more additional sensors reporting back to the server
 
CSC-438 Defensive Network Security
 
14
 
Hardware Requirements - Server
 
If you’re running just the server, requirements are down
Intensive processing is left to the sensors
1-4 CPU cores
8-16gB RAM
100GB to 1TB of disk space
 
CSC-438 Defensive Network Security
 
15
 
Hardware Requirements - Sensor
 
Snort, Suricata, and Bro are very CPU intensive
The more traffic, the more CPU cores you’ll need
CPU - One core per worker
200Mbps per Snort, Suricata, or Bro worker
Fully saturated 1Gbps link with Snort and Bro?
10 cores (5 Snort workers, 5 Bro workers)
RAM – It depends on traffic
Minimum – 3GB
50Mbps link – 8GB+
50-500Mbps link – 16GB – 128GB
Storage – Full packet capture takes a lot of space
50Mbps link, 540GB for one day of pcap
Store for as long as you can – useful for investigations after the fact
ELSA will need space too
 
CSC-438 Defensive Network Security
 
16
 
Getting the traffic
 
Make sure you’ve got a good NIC – Intel works well
Will need 2 NICs – one for sniffing, one for management
Sniffing NIC is connected to a tap or span port
Dumps a copy of all traffic
Super cheap – 
Netgear GS105E
Config it to be an inline tap
Many switches have port mirroring capabilities
Various enterprise grade network taps available
 
CSC-438 Defensive Network Security
 
17
Slide Note
Embed
Share

Security Onion is a Linux distribution designed for network security monitoring using various tools like Full Packet Capture, Network IDS, Host IDS, and Analysis Tools. It offers capabilities for detecting and responding to security incidents effectively, making it a valuable asset for defensive network security.

  • Security Onion
  • Network Security
  • Incident Response
  • IDS
  • IPS

Uploaded on Jul 29, 2024 | 2 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. IDS/IPS Incident Response

  2. What is Security Onion? A Linux distribution with various network security monitoring (NSM) tools Runs on Ubuntu Security Onion is to NSM as Kali is to pentesting Security Onion has three major components: Full packet capture Intrusion detection systems Network-based (NIDS) Host-based (HIDS) Analysis tools CSC-438 Defensive Network Security 2

  3. Full Packet Capture Capture all the things! Uses netsniff-ng Captures all the traffic, and stores as much as it can Security Onion will purge old data before the disks fill up CSC-438 Defensive Network Security Having a full capture is like having a recorder on your network Not for daily monitoring or hunting There to run down issues or incidents after the fact Attackers can t bypass a full capture 3

  4. Network IDS Rule Driven Snort and Suricata Uses fingerprints to match known malicious traffic Uses anomalous signatures to match suspicious traffic Kind of like antivirus but more flexible CSC-438 Defensive Network Security You can write custom rules and signatures Can use signatures from threat feeds 4

  5. Network IDS Analysis Driven Bro IDS Bro doesn t look for specific malicious or anomalous traffic Bro gathers data about the traffic Metadata Logs Connections DNS requests HTTP traffic SSL Certificates Files and more CSC-438 Defensive Network Security 5

  6. Host IDS OSSEC Free, open source HIDS for Windows, Linux, and Mac OS Agent to deploy on endpoints Log analysis CSC-438 Defensive Network Security File integrity checking Rootkit detection Real-time alerting Correlating host-based events with network-based events can be key 6

  7. Analysis Tools - Sguil The analyst console for network security monitoring Facilitates event driven analysis Provides visibility into the event data being collected CSC-438 Defensive Network Security A single GUI to view alerts Snort or Suricata alerts OSSEC alerts Bro HTTP events Can pivot from an alert into a packet capture 7

  8. Analysis Tools - Squert Web application interface to Squil Not a real-time interface for Sguil Not a replacement for Sguil Provides some visualizations of Sguil data CSC-438 Defensive Network Security Provides geo-IP mapping 8

  9. Analysis Tools - ELSA Enterprise Log Search and Archive ELSA Centralized syslog framework Web-based query interface for searching billions of logs Sift through logs that Security Onion collects And any syslog you send to ELSA CSC-438 Defensive Network Security Charting and graphing 9

  10. Analysis Tools Elastic Stack Elasticsearch, Logstash, Kibana ELK, Elastic Stack Store, search, and visualize data Logstash stores log data Elasticsearch searches log data CSC-438 Defensive Network Security Kibana dashboards and visualizations This is new to Security Onion, and not officially production ready Release candidate 1 released in late January 2018 10

  11. Deployment Scenarios Security Onion is setup in two parts: a sensor and a server Client-Server model The sensor is the client sends information back to the server Sensors can be placed throughout the network for additional visibility Server stores information, and includes analysis tools for processing CSC-438 Defensive Network Security The analyst logs in to the server Three deployment scenarios Standalone Server-sensor Hybrid 11

  12. Deployment Scenarios - Standalone A single machine running the sensor and server components Can be a physical machine or a VM Can have multiple network interfaces for monitoring different networks CSC-438 Defensive Network Security Easiest deployment for monitoring at a single location 12

  13. Deployment Scenarios Server-sensor A single machine runs the server component One or more separate machines run the sensor component Sensors report back to the central server Sensors run the sniffing, and store packet captures, alerts, and databases Analyst connects to the server Queries are distributed to the appropriate sensors CSC-438 Defensive Network Security Reduces network traffic, keeping the bulk of the data on the sensors 13

  14. Deployment Scenarios - Hybrid Standalone installation Server and sensor combination with one or more additional sensors reporting back to the server CSC-438 Defensive Network Security 14

  15. Hardware Requirements - Server If you re running just the server, requirements are down Intensive processing is left to the sensors 1-4 CPU cores 8-16gB RAM CSC-438 Defensive Network Security 100GB to 1TB of disk space 15

  16. Hardware Requirements - Sensor Snort, Suricata, and Bro are very CPU intensive The more traffic, the more CPU cores you ll need CPU - One core per worker 200Mbps per Snort, Suricata, or Bro worker Fully saturated 1Gbps link with Snort and Bro? 10 cores (5 Snort workers, 5 Bro workers) CSC-438 Defensive Network Security RAM It depends on traffic Minimum 3GB 50Mbps link 8GB+ 50-500Mbps link 16GB 128GB Storage Full packet capture takes a lot of space 50Mbps link, 540GB for one day of pcap Store for as long as you can useful for investigations after the fact ELSA will need space too 16

  17. Getting the traffic Make sure you ve got a good NIC Intel works well Will need 2 NICs one for sniffing, one for management Sniffing NIC is connected to a tap or span port Dumps a copy of all traffic Super cheap Netgear GS105E Config it to be an inline tap CSC-438 Defensive Network Security Many switches have port mirroring capabilities Various enterprise grade network taps available 17

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#