Archsight Material
Archsight Material
Network types:
Local area network is a group of computers connected with each other in a small
geographical area’s, such as school, hospital, apartment etc.
LAN is secure because there is no outside connection with the local area network
thus the data which is shared is safe on the local area network and can’t be
accessed outside.
It’s used to sharing the data and resources. EX-Printers &Scanners
LAN frequency range is 0 to 2 kms
Metropolitan area network various Local area networks are connected with each
other through telephone lines (or) Combination of different LANS
It’s used to sharing the data and resources.
MAN frequency range is 0 to 50 kms
MANs covers the larger area of a city or town.
Example- INTRANET
3)WAN(Wide Area Network):
Wide area network provides long distance transmission of data. A WAN can cover
country, continent or even a whole world.
It’s used to sharing the data and resources.
MAN frequency range is entire world
Internet connection is an example of WAN. Other examples of WAN are mobile
broadband connections such as 3G, 4G etc.
Example- INTERNET
Network Addresses:
1) MAC Address(Media Access Control)
2) IP Address(Internet protocol)
MAC address means Media Access control Address and it is Physical address.
It’s given to a computer in the network for identification and communication. These IP
Address provided by the ISP (Internet service provider)
It is a logical address.
IP Address is 2 types
IP’S types:
1) Private IP
2) Public IP
Private IP Public IP
1.Used with LANS or Within the organization 1. Used on Public Network (Internet).
2.Not recognized on Internet 2. Recognized on Internet.
3.Given by Administrator 3.Given by ISP
4.This is to free setup 4. Pay to service provider.
5.Unregisterd IP’S 5.Registerd IP’S
Network Devices:
Network devices, or networking hardware, are physical devices that are required for
communication and interaction between hardware on a computer network.
1. HUB
2. Switches
3. Router
1) HUB:
3)Router:
Security Devices:
Security devices are used to protect the data
Firewalls:
IDS/IPS:
These are security devices. It’s specially designed to monitor all inbound and outbound
network activity
Both IDS and IPS solutions detect threat activity in the form of malware, spyware, viruses,
worms and other attack types, as well as threats posed by policy violations
Protocol defines common set of rules for formatting and processing data.
OR
Protocol defines common set of rules& signals that computers on the network use
to communicate.
Network protocols are like a common language for computers
Important Protocols:
TCP Flags:
SYN: Synchronization
ACK: Acknowledgement
PUSH: Push
URG: Urgent
RST: Reset
FIN: Finish
Packet:
Packet is sharing data with Source IP to Destination IP.
TCP UDP
1. TCP defines Transmission control protocol 1. UDP defines user datagram protocol
2. Its connection oriented protocol 2. Connection less protocol.
3. TCP more reliable than UDP 3.UDP is more faster than TCP for data sharing
4. TCP has Acknowledgement segments. 4. No Acknowledgment.
5. TCP gives guarantee that the order of data 5. UDP has no such guarantee.
at receiving end source as on sending end.
Transport
Port Service name protocol
20 File Transfer Protocol (FTP) - Data TCP
21 File Transfer Protocol (FTP) -Control TCP
22 Secure Shell (SSH) TCP and UDP
23 Telnet TCP
25 Simple Mail Transfer Protocol (SMTP) TCP
50, 51 IPSec
53 Domain Name System (DNS) TCP and UDP
Dynamic Host Configuration Protocol
67, 68 (DHCP) UDP
69 Trivial File Transfer Protocol (TFTP) UDP
80 HyperText Transfer Protocol (HTTP) TCP
110 Post Office Protocol (POP3) TCP
119 Network News Transport Protocol (NNTP) TCP
123 Network Time Protocol (NTP) UDP
135-
139 NetBIOS TCP and UDP
143 Internet Message Access Protocol (IMAP) TCP and UDP
161, Simple Network Management Protocol
162 (SNMP) TCP and UDP
Lightweight Directory Access Protocol
389 (LDAP) TCP and UDP
443 HTTP with Secure Sockets Layer (SSL) TCP and UDP
3389 Remote Desktop Protocol (RDP) TCP and UDP
OSI Model
It is Open System Interconnection is a reference model for how Devices communicate over a
network.
There 7 layers in OSI which are:
- Application layer->Data -> network process and apps -> SMTP, telnet, HTTP, FTP, etc.
- Presentation Layer->Data -> Data formatting and encryption -> JPG, HTTPS, SSL
- Session layer->Data -> establishes/ends connections between two hosts -> NetBIOS, PPTP
- Transport layer->Segments -> end-to-end connections and reliability -> TCP, UDP
- Network layer-> Packets -> Path determination and IP (logical addressing) -> routers and layer3
switches
- Data link layer-> Frames -> Physical addressing - > switches
- Physical layer -> Bits -> Send data on to the physical wire -> Hubs, NICS, cables
Malware:
Malware Types:
1) Virus
2) Worm
3) Trojan Horse
4) Adware
5) Spyware
6) Ransom ware
1) Virus:
2) Worm’s:
Worms are another category of malicious software.
Its self-replicating and self-propagating
Worms creates the duplicate files and its effected with memory usage and system or
network performance degrade.
Both Virus and Worm’s executes without the knowledge of the end user.
3) Trojan horse:
Trojan horse is a program
It is showing legitimatize software, but it installs once damaging the software behind
the system
Trojan once installs total system control accessed by hacker
Trojan unlike Virus and Worm’s, it cannot self-replicate and cannot reproduce.
4) Adware:
Adware is a software application that displays or downloads advertisements to a
computer
If you don’t carefully read the terms and conditions of original programs you can
easily connect adware on your computer
When typing the search engine your web results may be redirected t the other
advertisement websites
Its effects performance of computer.
5) Spyware:
Spyware is a software
That aims to gathering the information about a user activity without their
knowledge
Transmitted or Routing that information in the background to some one else
Spyware can also gather the information about Emails, address and even passwords
and credit card numbers
6) Ransom ware:
It is a Malware that install’s secretly on a Victims computer and Encrypts the data and
demands payment for the decryption Key.
Encryption:
Decryption:
Attacks:
Attack is nothing but trying to gain unauthorized access.
(or)
In a computer network an attack is any attempt to destroy, expose, Steal, disable and
gain unauthorized access.
Asset:
An asset is what we are trying to protect (example- System, Servers and Devices etc..)
Hacker/Cracker/Attacker:
Backdoors:
Victims:
Zombie:
Attacks Types:
Zero day attack:
A zero day attack is occurs on the same day a weakness discovers in a software.
At that point its exploits by hackers before the vendor becomes aware and hurry to
fix it.
Phishing types:
SQL Injection:
CIA triangle:
SIEM Uses:
Arcsight Architecture:
1. Linear Architecture
2. Dual Destination(Bi directional destination)
ArcsightComponents :
It acts as a Interface between the Arcsight ESM and data sources that generates the
ESM relevant data on your network
Smart connector, perform the Data collection, Normalization, Aggregation etc.
Smart connector collect event raw data from the data sources such as (Network
devices, security devices, Servers)
Its normalize the data in CEF form(Common Event Format)
And smart connector can perform first level of filtering and aggregate the events.
To reduce the volume of events sent to the ESM manager which increase the ESM
efficiency and reduce the Event processing time.
Smart connector is agent that pull’s and receives logs from the end devices
Flex connector is a Custom agent, where you can integrate devices which are not support by
Arcsight.
In this case you have to collect logs and create a custom connector using it types, so that
you can integrate required devices
Arcsight Logger:
User Interface:
ESM provides two interfaces Arcsight WEB, ESM console to navigate the features and
functions of ESM.
Arcsight WEB interfacing having very limited resources like active channels & reports
Basically this interface for Clients and business team for checking and download the
data
It provides a Secure WEB based interface to the manager
Arcsight Console:
Navigator Panel:
Active Channels
Assets
Cases
Customer
Connectors
Dashboards
Fields Sets
Files
Filters
Integration commands
Knowledge base
List
Notification
Query viewer
Reports
Rules
Saved search
Search filters
Stages
Users
Viewer Panel:
The viewer panel is the middle section of the console window and its display the
results of ESM monitoring and investigating tool.
Inspect/Edit panel:
Inspect/edit panel enable’s you to view details of an individual events or edit the values of
new or existing ESM resources.
Data Sources:
Arcsight ESM collects outputs from the data sources such as IDS, IPS, Switches,
Routers, Servers, Vulnerbility assistance, Penetration testing and antivirus etc.
Normalization:
It’s a process of convert the raw events into common event format(CEF)
Smart connector collects the raw data generated by different types of devices such
as network devices, security devices and Servers
All formats are different its difficult to understand because networks are
heterogeneous environment
Each device have a different logging format & reporting mechanism
its difficult to understand so that Smart connector convert the raw events into CEF
format
Aggregation:
Aggregation consolidates events with matching values into single aggregate event.
Which reduce the number of events the manager must evaluate
Which increases the ESM efficiency and reduce event processing
Connector aggregation merges events with matching vales into single aggregate
event
Correlation:
Example: ESM correlation engine uses the rules you construct to correlate the Base events
and Aggregated events fed in from the smart connector to determine something of interest
has occurred.