RealTime CyberThreat Detection
RealTime CyberThreat Detection
AND
ANALYSIS
Jayaram P
CDAC
August 2, 2024 1
Plan
Basic Network Security
Firewalls
System Auditing
AI & ML
August 2, 2024 2
What is Threat Detection?
August 2, 2024 3
Several methods available in the defender's arsenal:
what kind of data they access, what times they log on, and where they are
physically located
August 2, 2024 4
3. Setting Intruder Traps
Some targets are just too tempting for an attacker to pass up.
August 2, 2024 5
Basic Network Security
STO is based on the idea that any information system is secure as long as
security vulnerabilities remain hidden.
August 2, 2024 6
TCP/IP Evolution and Security
August 2, 2024 7
August 2, 2024 8
August 2, 2024 9
IP Spoofing
IP address spoofing – Disguises an attacker’s origin IP. It’s typically used in DoS
assaults.
August 2, 2024 10
August 2, 2024 11
IP address spoofing is used for two reasons in DDoS attacks:
To mask botnet device locations
To stage a reflected assault.
August 2, 2024 13
TCP Sequence Number Attack
TCP uses the sequence number field to take responsibility for ensuring that
data packets are delivered to higher layers in the protocol stack in their
correct order.
The attacker would then cut off the other system (which is trusted by the
target) from the communication, perhaps via a Denial of Service (DoS)
attack.
In this type of attack, the host looks for applications associated with these
datagrams.
When none are found, the host issues a “Destination Unreachable” packet
back to the sender.
August 2, 2024 16
How to Mitigate and Prevent a UDP Flood Attack?
Using deep packet inspection, can be used to balance the attack load
across a network of scrubbing servers.
August 2, 2024 17
Packet Sniffing
Packet sniffing is the practice of gathering, collecting, and logging some or all
packets that pass through a computer network, regardless of how the packet is
addressed.
When you install packet sniffing software, the network interface card (NIC)—the
interface between your computer and the network—must be set to promiscuous
mode.
August 2, 2024 18
Packet Filtering
Packet filtering is a network security mechanism that works by controlling what data
can flow to and from a network.
A router may be a dedicated piece of hardware that has no other purpose, or it may
be a piece of software that runs on a general-purpose PC.
Packet filtering lets you control (allow or disallow) data transfer based on:
Ex: Don't let anybody use Telnet (an application protocol) to log in from the outside.
or:
Let everybody send us email via SMTP (another application protocol).
August 2, 2024 19
Advantages of Packet Filtering
August 2, 2024 20
Firewalls
Types of Firewall Architectures
All messages entering or leaving the intranet pass through the firewall.
It examines each message and blocks those that do not meet the specified
security criteria.
Firewall types
o Hardware
o Software
August 2, 2024 21
There are several types of firewall techniques that will prevent potentially
harmful information from getting through:
Proxy Server: Intercepts all messages entering and leaving the network. The
proxy server effectively hides the true network addresses.
August 2, 2024 22
Firewalls utilize following technologies for firewall architectures:
August 2, 2024 23
1. Static Packet Filter
Packet filtering policies may be based upon any of the following:
Allowing or disallowing packets on the basis of the source IP address
(sender)
Allowing or disallowing packets on the basis of their destination port
(service port)
Allowing or disallowing packets according to protocol.
Advantages
Low impact on network performance
Low cost.
Disadvantages
Operates only at network layer therefore it only examines IP and TCP
headers
Unaware of packet payload-offers low level of security.
Lacks state awareness-may require numerous ports be left open to facilitate
services that use dynamically allocated ports.
Susceptible to IP spoofing
Difficult to create rules (order of precedence).
August 2, 2024 24
2. Dynamic (State Aware) Packet filter
A dynamic packet filter can monitor the state of active
connections and use the information obtained to determine
which network packets to allow through the firewall.
Advantages
Low cost
State awareness provides measurable .performance benefit,
scalability and extensibility.
Disadvantages
Operates only at network layer therefore, it only examines IP and
TCP headers.
Unaware of packet payload-offers low level of security
Susceptible to IP spoofing
Difficult to create rules (order of precedence)
Can introduce additional risk if connections
Can be established without following the RFC-recommended 3
way-handshake.
August 2, 2024 25
3. Circuit level Gateway
The circuit level gateway operates at the session layer-OSI layer 5.
Advantages
Low to moderate impact on network performance
Breaks direct connection to server behind firewall
Higher level of security than a static or dynamic (state aware)
packet filter
Provides services for a wide range of protocols.
Disadvantages
Shares many of the same negative issues associated with packet filters
Allows any data to simply pass through the connection
Only provides for a low to moderate level of security.
August 2, 2024 26
4. Application level Gateway
A firewall that filters information at the application level blocks all IP traffic
between the private network and the Internet.
The proxies are application specific
The proxies examine the entire packet and can filter packets at the
application layer of the OSI model.
Advantages
Better logging handling of traffic
State aware of services (FTP etc.)
Strong application proxy that inspects protocol header lengths can
eliminate an entire class of buffer overrun attacks
Highest level of security.
Disadvantages
Complex setup of application firewall needs more and detailed
attentions to the applications that use the gateway.
August 2, 2024 27
August 2, 2024 28
5. Stateful Inspection
Stateful inspection combines the many aspects of dynamic packet filtering,
circuit level and application level gateways.
Stateful firewalls remember information about previously passed packets
and are considered much more secure.
A unique limitation of one popular stateful inspection implementation is
that it does not provide the ability to inspect sequence numbers on
outbound packets from users behind the firewall.
Advantages
Offers the ability to inspect all seven layers of the OSI model and is user
configurable to customize specific filter constructs
Does not break the client server model
Disadvantages
The single-threaded process of the stateful inspection engine has a
dramatic impact on performance.
August 2, 2024 29
5. Air Gap
This is an extreme kind of firewall where there is no direct or automated
connection between two devices.
Air gap technology provides a physical gap between trusted and
untrusted networks
In air gap technology, the external client connection "causes the
connection data to be written to an SCSI e-Disk.
The internal connection then reads this data from the SCSI e-Disk.
Advantages
Inside is insulated from outside
Packets are not "automatically" passed through
Only explicitly launched services work
No unexpected traffic via other sockets.
August 2, 2024 30
System Auditing
August 2, 2024 31
IT security standards in existence today
ISO Compliance
The ISO/IEC 27000 family of standards are some of the most relevant
to system administrators, as these standards focus on keeping
information assets secure.
HIPAA Security Rule:
The HIPAA Security Rule outlines specific guidelines pertaining to
exactly how organizations should protect patients’ electronic
personal health information.
PCI DSS Compliance:
The PCI DSS compliance standard applies directly to companies
dealing with any sort of customer payment.
August 2, 2024 32
Web Application Security
Common Web App Vulnerabilities
3. Sensitive Data Exposure. Sensitive data exposure means data is vulnerable to being
exploited by a bad actor when it should have been protected.
4. XML External Entities (XXE). A type of attack against an application that parses XML
input and occurs when XML input containing a reference to an external entity is
processed by a weakly configured XML parser.
5. Broken Access Control. When components of a web application are accessible instead
of being protected like they should be, leaving them vulnerable to data breaches.
August 2, 2024 33
6. Security Misconfigurations. Incorrectly misconfiguring a web application provides
bad actors with an easy way in to exploit sensitive information.
7. Cross Site Scripting (XSS). An XSS attack means a bad actor injects malicious client-
side scripts into a web application.
8. Insecure Deserialization. Bad actors will exploit anything that interacts with a web
application—from URLs to serialized objects—to gain access.
10. Insufficient Logging and Monitoring. Lack of efficient logging and monitoring
processes increases the chances of a web app being compromised.
August 2, 2024 34
Practical Solutions for Protecting Web Apps:
Passive Protection:
August 2, 2024 35
Intrusion Detection Systems
August 2, 2024 36
Types of Intrusion Detection Systems
Stack IDS: monitor network packets in transit through the network stack
(TCP/IP).
August 2, 2024 37
August 2, 2024 38
Design of SIEM
Tools:
Cloud SIEM
Elasticsearch
Elasticsearch is a real-time, distributed storage, search,
and analytics engine.
Kibana : for Visualization
August 2, 2024 39
AI Systems for real time threat detection
August 2, 2024 40
Machine Learning for Cybersecurity
August 2, 2024 41
Most of tasks are subclasses of the most common ones, which are
described below.
August 2, 2024 42
Machine Learning tasks and Cyber security:
Regression:
It can be applied to fraud detection. The features (e.g., the total amount of
suspicious transaction, location, etc.) determine a probability of fraudulent
actions.
Classification:
a spam filter separating spams from other messages can serve as an
example. Spam filters are probably the first ML approach applied to Cyber
security tasks.
August 2, 2024 43
There are three dimensions (Why, What, and How).
prediction
prevention
detection
response
monitoring
August 2, 2024 44
The second dimension is a technical layer and an answer to the “What”
question:
August 2, 2024 45
Machine learning for Network Protection
regression to predict the network packet parameters and compare them
with the normal ones;
classification to identify different classes of network attacks such as
scanning and spoofing;
clustering for forensic analysis.
August 2, 2024 46
Machine learning for Application Security:
To remind you, Application security can differ. There are web applications,
databases, ERP systems, SaaS applications, micro services, etc.
It’s almost impossible to build a universal ML model to deal with all
threats effectively in near future.
August 2, 2024 47
Machine learning for Process Behavior:
regression to predict the next user action and detect outliers such as
credit card fraud;
August 2, 2024 48
Deep Learning in Cybersecurity:
1. Intrusion Detection and Prevention Systems (IDS/IPS)
Deep learning, convolutional neural networks and Recurrent Neural Networks
(RNNs) can be applied to create smarter ID/IP systems
August 2, 2024 50
THANK YOU
[email protected]