Top Banner
56

Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

Mar 30, 2018

Download

Documents

buikhanh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs
Page 2: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

#clmel

Cisco CSIRT: Security Analytics and Forensics with NetFlow

BRKSEC-2073

Michael Scheck – CSIRT Investigations Manager

Paul Eckstein – CSIRT Engineering Manager

Page 3: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

BRKSEC-2073 Cisco Public© 2015 Cisco and/or its affi liates. All rights reserved.

Agenda

• Heartbleed Use Case

• Netflow Growth

• Deployment

• Problems Solved

• Use Cases

• Conclusion

3

Page 4: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

Heartbleed

Page 5: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

April 8, 2014: Heartbleed Vulnerability

• The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by SSL

5

Page 6: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Cisco CSIRT Response to Heartbleed

• Preparation

• Scanned 1.2M vulnerable servers - 300 needed repair

• Helped develop signatures for Sourcefire and Cisco IDS

• Deployed signatures to IDS

• Monitoring and response

• Discovered 25 attacks: 21 benign, 4 malicious

• Researched attack via NetFlow analysis to discern normal connections from those that were anomalous and malicious

6

Page 7: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Heartbleed Benign Host

7

Page 8: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Heartbleed Benign Host

8

Page 9: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

Netflow Growth

Page 10: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

NetFlow Overview

10

Source IP: Port Destination IP: PortPacket

sDate / Time

192.168.15.7:2068 211.160.17.195:8080 73/12/2015

08:15:02 GMT

192.168.21.5:1042 72.18.45.223:21 2193/12/2015

09:02:51 GMT

192.168.6.22:3161 172.18.15.188:80 13/12/2015

09:12:42 GMT

Page 11: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

NetFlow Collection and Analysis Solutions

11

OSU FlowTools NfdumpLancope

StealthWatch

LicenseOpenSource from

Ohio State

OpenSource

from

SourceForge

Commercial

NetFlow Versions V5 and up V5 and up V5 and up

IPv6? Yes Yes Yes

SyntaxCommand-line,

like ACLsCommand-line,

like tcpdumpGUI, API

SupportAd-hoc via

Google CodeUp-to-date Up-to-date

Page 12: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

NetFlow at Cisco Before StealthWatch

• OSU FlowTools

• 25+ systems running in parallel

- Speeds up query time, but routers have to point at each collector

• 20+ Tb of physical storage

- Files were stored in native nfdump/flowtools compressed format

• No flow aggregation• Some connections passed through multiple devices, causing duplicate flows

• Routers splitting up long running flows

• Exporter information obscured by fanout tool

12

Page 13: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

NetFlow Challenge: Support

• Support of open source tools

• OS support

• Training staff

• Feature requests

• Protocol changes (NetFlow and IP)

• Difficult to monitor for flow loss

13

Page 14: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

NetFlow Investigation with OSU FlowToolsQuery

14

[mynfchost]$ head bot.aclip access-list standard bot permit host 69.50.180.3ip access-list standard bot permit host 66.182.153.176

[mynfchost]$ flow-cat /var/local/flows/data/2007-02-12/ft* | flow-filter -Sbot -o -...

Start End Sif SrcIPaddress SrcP DIf DstIPaddress DstP0213.08:39:49.911 0213.08:40:34.519 58 10.10.71.100 8343 98 69.50.180.3 313370213.08:40:33.590 0213.08:40:42.294 98 69.50.180.3 31337 58 10.10.71.100 83

Page 15: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

NetFlow Investigation with OSU FlowToolsCustom NetFlow report generator

15

Page 16: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

Deployment

Page 17: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Internet

Data Centre

ISP Gateways

NetFlow Collector

DC Gateways

Corporate Backbone

NetFlow exported

at network choke

points

NetFlow Export at CiscoCollect at chokepoints for egress detection

17

Page 18: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

NetFlow Architecture

• Redundant forwarding

• Regional storage

• Global search

18

Page 19: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Lancope Devices and Count

StealthwatchManagement Console

UDP DirectorFlowSensor FlowCollector

2

13 16 21

19

Page 20: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

NetFlow Retention

20

SJC4-18 months

RCDN10 months RTP

4 months

LON26 months

BGL5-9 months

17 Billion flows per day

Page 21: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

Problems Solved

Page 22: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

30s 30s 30s

NetFlow Challenge: Flow Timeouts

One 90s flow creates 6 flows30s timeout 90/30 = 3 x 2 collectors

30s 30s 30s

NetFlow creates 3 flows NetFlow creates 3 flows

Lab gateway ISP gateway

22

Page 23: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Business Benefit #1 Storage Capacity

30s 30s 30s 30s 30s 30s

NetFlow creates 3 flows NetFlow creates 3 flows

Lab gateway ISP gateway

23

Page 24: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Business Benefit #2 Ease of Support

• IPv4/IPv6 both supported

• Netflow v5/v9 both supported

• All supported on the same system, on the same port!

• No system administration required

• Alarms built in for monitoring of lost flows

24

Page 25: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Business Benefit #3 Ease of Use

26

Page 26: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

• Other variables: host groups, time range,interfaces, ports

• Defaults to 2000 flow records returned

• Much simpler than syntax for CLI (examplebelow)

Flow Table Query

1. Create a file called‘flow.acl’with a named access list:

linux-machine# cat ip access-list standard botnet permit ip10.31.33.7 >flow.acl

2. Run a query for the time period you are interested in using the ACL

linux-machine# flow-cat /var/local/flows/data/2006-12-01/ft*

| flow-filter -f ~/flow.acl -Sbotnet -o -Dbotnet | flow-

print -f5

27

Page 27: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Flow Table Output

28

Page 28: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

FlowTable Results

Server, DNS, and Country

Traffic Type & Volume

29

Page 29: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Role Based Access

30

• Twofold restriction– Functional roles: configure appliances, policies,

etc.

– Data roles: view/edit x, y, z host groups

• Notes

– Granular data restriction

– No audit log of configuration changes!

– CSIRT manages all SMC access and privileges

Page 30: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

NetFlow Challenge: Limited Detection Capability

• No concept of host groups for query

• Effective for forensics

• Can do basic DOS detection

• Any other queries required writing algorithms

31

Page 31: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Suspected Data Loss

High File Sharing Index

Max Flows Served

Business Benefit #4: Analytics

32

Page 32: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

Use Cases

Page 33: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

NetFlow CNC Discovery

34

2. Investigate other internal hosts communicating with the same CnC

1. Detect host communicating with external Command-and-Control

3. Uncover other malicious, external entities from the compromised hosts

Page 34: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Targeted Monitoring:DoS Detection

35

Page 35: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public 36

Targeted Monitoring:DoS Detection

Page 36: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public 37

Targeted Monitoring – Data Loss

Page 37: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

StealthWatch Host Locking

38

Inside hosts

SyslogSend syslog for any traffic seen between

insides hosts and known C&C servers

Page 38: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

StealthWatch Host Locking

39

Inside hosts

Intelligence feed

SyslogModify known C&C server list via API

Page 39: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

CRiTs [email protected]

40

Page 40: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

CRiTS Indicator Actions

41

Prevent

DNS RPZ

host IDSBGP

Detect

Syslog

In Progress

passive DNS

Share

Govt

Current

Future

CSIRT

Mandiant

ESA

HIPSLUPA/PCAP

WSA

Partner

CRITS

MD5

IPV4

Regkey

AV SBG

CDSA

Lancope

Page 41: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public 42

CRiTs Netflow Alarms

Page 42: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Splunk Integration – SMC Alarms

Requirement: integrate flow events with other logs for a single investigation interface

Solution: send relevant alarms as syslog messages to in-house Splunk™ architecture

Page 43: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

StealthWatch Splunk Alerts

Link to StealthWatchhost snapshot

Page 44: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

API Use Cases

Requirement Problem API Script Solution

Pull all flows for given

time period

SMC Flow Collector

query limit

Run consecutive, small

queries then

concatenate

Keep SMC host groups

up to date

Manual configuration,

old data

Query internal source of

truth, push subnet lists

to host groups

automatically

Look up events for a

particular IP for a

specific timeframe

No user attribution (yet) Find IP and lease time

from internal source of

truth, query

StealthWatch for related

events45

Page 45: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Network SubnetsMapped from IPAM

Page 46: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Network SubnetsMap to Lancope Zones

47

Page 47: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Splunk Integration - GetFlows

• Find NetFlow Events via Lancope API with the respective src/dst

Page 48: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Splunk Integration - GetFlows

49

Page 49: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

Conclusion

Page 50: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Conclusion

• Robust data set

• Due to size and deduplication, significant retention possible

• Ability to integrate NetFlow data with other security tools leveraging API

51

NetFlow benefits to Incident Respons teams

Page 51: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Participate in the “My Favorite Speaker” Contest

• Promote your favorite speaker through Twitter and you could win $200 of Cisco Press products (@CiscoPress)

• Send a tweet and include

– Your favorite speaker’s Twitter handle <Speaker – enter your twitter handle here>

– Two hashtags: #CLUS #MyFavoriteSpeaker

• You can submit an entry for more than one of your “favorite” speakers

• Don’t forget to follow @CiscoLive and @CiscoPress

• View the official rules at http://bit.ly/CLUSwin

Promote Your Favorite Speaker and You Could be a Winner

52

Page 52: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Continue Your Education

• Demos in the Cisco Campus

• Walk-in Self-Paced Labs

• Meet the Expert 1:1 meetings

53

Page 53: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

Q & A

Page 54: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs

© 2015 Cisco and/or its affi liates. All rights reserved.BRKSEC-2073 Cisco Public

Give us your feedback and receive a

Cisco Live 2015 T-Shirt!

Complete your Overall Event Survey and 5 Session

Evaluations.

• Directly from your mobile device on the Cisco Live

Mobile App

• By visiting the Cisco Live Mobile Site

http://showcase.genie-connect.com/clmelbourne2015

• Visit any Cisco Live Internet Station located

throughout the venue

T-Shirts can be collected in the World of Solutions

on Friday 20 March 12:00pm - 2:00pm

Complete Your Online Session Evaluation

Learn online with Cisco Live! Visit us online after the conference for full

access to session videos and

presentations. www.CiscoLiveAPAC.com

Page 55: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs
Page 56: Cisco CSIRT: Security Analytics and Forensics with … Live 2015 Melbourne/Cisco Live... · Cisco CSIRT: Security Analytics and Forensics with NetFlow ... Command-line, like ACLs