Top Banner
Inter-Network Cooperation 5-2-1.inter-network-cooperation 1 Matsuzaki ‘maz’ Yoshinobu <[email protected]> stole some slides from Merike Kaeo
60

Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

Nov 04, 2019

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

Inter-NetworkCooperation

5-2-1.inter-network-cooperation 1

Matsuzaki ‘maz’Yoshinobu<[email protected]>

stolesomeslidesfromMerike Kaeo

Page 2: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

CooperationandCoordination

• tokeeptheInternetworking– wearerelyingoneachother

• it’sgoodtoknow– community– pointofcontact

5-2-1.inter-network-cooperation 2

Page 3: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

NOGs

• NetworkOperationsGroupisanopenforum– technologydiscussions– sharingoperationalbestpractices– compareexperience– peeringcoordination– establishingpersonalrelationships

5-2-1.inter-network-cooperation 3

Page 4: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

NOGs

• mailing-list– anyonecansubscribe– trafficdependsoneventsandtopics

• in-personmeeting– participationfeevaries,andcostsoftransports,accommodations

– highvalue

5-2-1.inter-network-cooperation 4

Page 5: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

NANOG

• NorthAmericanNetworkOperators’Group– evolvedfromtheNSFNET"Regional-Techs"meetingsin1994

• Threemeetingseachyear– NANOG70,Jun2017,Bellevue– NANOG71,Oct2017,SanJose– NANOG72,Feb2018,Atlanta

5-2-1.inter-network-cooperation 5

Page 6: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

https://www.nanog.org/

• program– 1daytutorial– 3daysplenary

• about500attendees– fromAsiaandEuropeaswell

5-2-1.inter-network-cooperation 6

Page 7: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

APRICOT

• AsiaandPacificOperationsConference– establishedin1996– co-locatedwithAP*meetings

• heldannuallyonthelastweekofFeb– APRICOT2017,HMC,VietNam– APRICOT2018,Kathmandu,Nepal

5-2-1.inter-network-cooperation 7

Page 8: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

http://www.apricot.net/

• program– 5daysworkshop– 4daysconferenceandtutorial– 1dayAPNICmembermeeting

• about600attendees

5-2-1.inter-network-cooperation 8

Page 9: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

SANOG

• SouthAsianNetworkOperatorsGroup– establishedin2003

• Twomeetingeachyear– SANOG29,Jan2017,Islamabad– SANOG30,Aug2017,India

5-2-1.inter-network-cooperation 9

Page 10: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

http://www.sanog.org/

• program– 5daysworkshop– 2daystutorial– 2daysconference

• about250attendees

5-2-1.inter-network-cooperation 10

Page 11: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

JANOG

• JapanNetworkOperators’Group– establishedin1997

• locallanguagecommunity- Japanese• Twomeetingseachyear

– JANOG39,Jan2017,Kanazawa– JANOG40,Jul2017,Koriyama

5-2-1.inter-network-cooperation 11

Page 12: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

http://www.janog.gr.jp/

• program– 3 dayplenary+BoF

• about700attendees

5-2-1.inter-network-cooperation 12

Page 13: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

BoFs

• birdsofafeather(BoF)isasmallmeetingfocusedonaspecifictopic– security,peering,andsoon

• usuallyscheduledinadvance,sometimesorganizedondemand

5-2-1.inter-network-cooperation 13

Page 14: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

coffeebreaksandsocialevents

• toexpandrelationships– businessandpersonal

• tostart/manageaproject– aface-to-facemeetinghelptostepforwardthings

5-2-1.inter-network-cooperation 14

Page 15: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

NOGoperation

• independent– formsacommitteetoleadtheNOG

• supportfromcrossindustry– ServiceProviders– ResearchandAcademics– Vendors– ISOC,NSRC,APNIC,APIA

5-2-1.inter-network-cooperation 15

Page 16: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

otherupcomingevents

• upcomingnetwork-relatededucationortrainingevents– http://ws.edu.isoc.org/calendar/– https://nsrc.org/calendar/

5-2-1.inter-network-cooperation 16

Page 17: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

CSIRT

• ComputerSecurityIncidentResponseTeam(CSIRT) providestheincidenthandlingserviceforitsconstituency– mayofferotherrelatedservicesaswell

• ThefirstCSIRT- CERT/CCwascreatedin1988inresponsetotheMorriswormincident

5-2-1.inter-network-cooperation 17

Page 18: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

computersecurityincident

• Anyrealorsuspectedadverseevent• examples:

– attacksto/fromyournetwork– compromisedhost– account/informationtheft– spamorITpolicyviolation

5-2-1.inter-network-cooperation 18

Page 19: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

needsforresponse

• tolimitthedamage• tolowerthecostofrecovery

• aneffectiveresponsebenefitsfororganizations– motivationtohaveaCSIRTinyourorganization

5-2-1.inter-network-cooperation 19

Page 20: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

Theincidenthandlingservice

• asinglepointofcontacttoreceiveincidentreports– providesresponseandsupporttothereport– announcementtodiscloseinformationaboutspecificattack/incident

– feedbacktothereport/request

5-2-1.inter-network-cooperation 20

Page 21: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

WhatIncidentsShouldBeReported?

• Anysuspiciousactivityshouldbereported– Thisincludessuspicioususeraccountbehavior,computersystemfailuresormisbehavior,accidentalpublicationofinternalemail,lossofequipment/accountinformation,etc.

• Reportingmethods– Internal

• Onlinesupportticketingsystem• Technicalsupportemail

– External• Abuse/incidentemailcontact• Publicweb-basedcontactform• Telephonenumberspecificallyforreportingabuse

5-2-1.inter-network-cooperation 21

Page 22: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

InformationforReportingAnIncident

• Dateandtimeoftheevent• Descriptionoftheevent• Assetsthatareaffectedoratriskasaresultoftheevent

• Whethertheeventisinprogressorhasconcluded• Actionstakenbythepartyreportingtheevent• Informalassessmentoftheharmorimpacttotheasset• Informalassessmentofcollaterallyaffectedassets• Data(logs,files,reports)thatmayassisttheCIRTinanalyzingtheevent

5-2-1.inter-network-cooperation 22

Page 23: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

IncidentResponse

• Itisalwaysbesttohaveaplaninplacebeforesomethingbadhappens

• DONOTPANIC!• Ifyousetappropriateguidelinesnow,itwillmakethingsaloteasierwhenasecurityincidenthappens

5-2-1.inter-network-cooperation 23

Create a checklist that can be followed whena significant security incident does occur!!

Page 24: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

SixPhasesofIncidentResponse

5-2-1.inter-network-cooperation 24

PREPARATIONPrep the networkCreate toolsTest toolsPrep proceduresTrain teamPractice

IDENTIFICATIONHow do you know about the attack?What tools can you use?What’s your process for communication?

CONTAINMENTWhat kind of attack is it?ERADICATION

Where is the attack coming from?Where and how is it affecting the network?

RECOVERYWhat options do you have to remedy?Which option is the best under the circumstances?

POST MORTEMWhat was done?Can anything be done to prevent it?How can it be less painful in the future?

Page 25: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

Preparation• Includestechnicalandnon-technicalelements• Knowtheenemy

– Understandwhatdrivesthemiscreants– Understandtheirtechniques

• Createthesecurityteamandplan– Whohandlessecurityduringanevent?Isitthesecurityfolks?

Thenetworkingfolks?

• Hardenthedevices• Preparethetools

5-2-1.inter-network-cooperation 25

Page 26: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

Identification

• Goalistogatherevents,analyzethemanddeterminewhetheryouhaveanincident

• AssignIncidentHandlers– Selectapersontohandleidentificationandassessment

– Empowerthemtoescalateifneeded• ControltheFlowofInformation

– Enforce“needtoknow”policy– Telldetailstominimumnumberofpeoplepossible

• CreateTrustedCommunicationChannels

5-2-1.inter-network-cooperation 26

Page 27: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

HowDoYouKnowYouAreUnderAttack?

• Understandthedetailsandscopeoftheattack– Identificationisnotsufficient;onceanattackisidentified,details

matter– Guidessubsequentactions

• Qualifyandquantifytheattackwithoutjeopardizingservicesavailability(e.g.,crashingarouter):– Whattypeofattackhasbeenidentified?– What’stheeffectoftheattackonthevictim(s)?– Whatnextstepsarerequired(ifany)?

• Attheveryleast:– Sourceanddestinationaddress– Protocolinformation– Portinformation

5-2-1.inter-network-cooperation 27

Page 28: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

Containment

• StoppingtheDamage– Preventattackerfromgettinganydeeperintotheimpactedsystems,orspreadingtoothersystems

• InformManagement• Notifyyourlocalororganizationalincidenthandlingteam

• Additional3phases– Shorttermcontainment– Gatheringevidence/backup– Longtermcontainment

5-2-1.inter-network-cooperation 28

Page 29: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

ShortTermContainment• Trytopreventattackerfromcausingmoredamage• Wantuntaintedevidence• Somepossibleactions:

– Disconnectnetworkcable– Pullthepowercable(losesvolatilememoryandmaydamagedrive)

– Isolateswitchportsothatsystemcannolongersend/receivedata

– Applyfilterstoroutersand/orfirewalls– Changeatarget’snameinDNStopointtoadifferentIPaddress

5-2-1.inter-network-cooperation 29

Page 30: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

Gatheringevidence

• Thisisnevereasyunderpressure• Hint:Playwiththesetoolsandmakesureyouknowhowtousethembeforeanincidenthappens– dd forUnix/LinuxandWindows– Ghost(thelatestversions– defaultisnotbit-by-bitsoknowhowtoconfigure)

– Driveduplicatorhardwareandwriteblockers

5-2-1.inter-network-cooperation 30

Page 31: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

LongTermContainment

• Onceback-upcreatedforforensicsanalysisthechangesforlongtermcontainmentcanbegin

• Applytemporarysolution(s)tostayinproductionwhilebuildingacleansystem– Patchsystem– Changepasswords– Removeaccountsusedbyhacker– Changefilepermissions– Shutdownbackdoorprocessesusedbyattacker

5-2-1.inter-network-cooperation 31

Page 32: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

Eradication

• Goalistogetridofanytracesonnetworkdevice(s)thatanattackoccurred

• Determinehowtheattackwasexecutedfromthegatheredevidence

• Restoreoperatingsystemsandconfigurationsfromcleanbackups

• Mayrequirestartingfromcompletelywipedsystems

• Improvedefenses

5-2-1.inter-network-cooperation 32

Page 33: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

Recovery

• Goalistogetimpactedsystemsbackintoproductioninasafemanner

• Performsystemvalidations– Runvulnerabilityscanners– Carefullycheckapplicationanddevicelogs

• Usenetworkandhost-basedintrusiondetectionsystemstomonitorreoccurrenceofattack

• Applyanynewlyidentifiedmitigationtechniques

5-2-1.inter-network-cooperation 33

Page 34: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

PostMortem• Apostmortemwillhelpanalyzetheeventafternormaloperationshasresumed(andpeoplehavecaughtuponsleep)

• Havethemeetingsoonaftertheincidentpassedsoeveryonehasdetailsfreshintheirminds

• DoNOTblameanyonefordoingsomethingincorrectly

• Theprimarygoalistoaddresslessonslearnedandnotmakethesamemistakesnexttime

• Whatcanyoudotomakerecoveryfaster,easier,lesspainfulinthefuture?

5-2-1.inter-network-cooperation 34

Page 35: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

buildingyourCSIRT

• missionstatement– what/howtodo

• constituency– forwhom

• structure– budget,positionwithinorganization

• relationshipwithotherCSIRTs

5-2-1.inter-network-cooperation 35

Page 36: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

CSIRTtypes

• NationalCISRTs– anationalpointofcontacttocoordinateanincidenthandling,reducethenumberofsecurityincidentsinthatcountry

• ISP/xSP CSIRTs– provideasecureenvironmentfortheircustomer,andprovideresponsetotheircustomersforsecurityincidents

5-2-1.inter-network-cooperation 36

Page 37: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

CSIRTtypes

• VendorsCSIRTs– improvethesecurityoftheirproducts

• EnterpriseCSIRTs– improvethesecurityoftheircorporation’sinfrastructure,andprovideon-siteresponseforsecurityincidents

• andmanymore

5-2-1.inter-network-cooperation 37

Page 38: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

PointofContact

5-2-1.inter-network-cooperation 38

CSIRT

constituency

National CSIRT

Page 39: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

Securitycommunity

• Thefollowingaresomeexamplewhichwillprovideyouatoolandcontextofthetypesofgroups.– Someareopentoall– Somearepersonalitydriven– Someareinterestdriven– Somearehighlypeervetted

5-2-1.inter-network-cooperation 39

Page 40: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

SphereofTrust

• Thecommunitytogethercanbeseeasasphere,realm,zone,oftrust.– basedonchainofTrust

5-2-1.inter-network-cooperation 40

Page 41: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

NeedtoKnow inOperationSecurity

• Itrustyou.YouaresomeoneIcandependon,butyoudon’treallyneedtoknowaboutthedetailsofthisincident.

• NotbeinginaNeedtoKnowSphere doesnotmeanyouarenottrusted.

5-2-1.inter-network-cooperation 41

Sphere of Trust

Need to Know

Page 42: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

SphereofAction• Youtrustsomeone,butwilltheybeabletodosomething,beresponsive,and/ormakesomethinghappen?

• SphereofActionandChainofActionisanewconceptforvettingpeersintooperationalcommunities.

• Somecommunitieswouldliketojustknowsomethingwillhappen.

5-2-1.inter-network-cooperation 42

I've been working an attack against XXX.YY.236.66/32 and XXX.YY.236.69/32. We're seeing traffic come from <ISP-A>, <ISP-B>, <IXP-East/West> and others.

Attack is hitting both IP's on tcp 53 and sourced with x.y.0.0.

I've got it filtered so it's not a big problem, but if anyone is around I'd appreciate it if you could filter/trace on your network. I'll be up for a while :/

Page 43: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

ExpectationofAction

• “Lurking”isbadbehavioronOperationalSecurityCommunities.

• Thereisanexpectationofaction– whereyouusetheinformationtodosomethingwithinyourspanofcontrol&influencetofightthebadness.– Collectmoredataandshare.– Useyourproducttoact.– Usetheinformationtoact(i.e.operator)– Improveyourproductornetwork.

• Inabilitytomeetexpectationserodestrustandyourreputationofsomeonewhoacts.

5-2-1.inter-network-cooperation 43

Page 44: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

Community’sIntegrity

• Maintainingintegrityiscommonsense• Neverever forwardinformationpostingwithinaoperationalsecuritygroupwithouttheexplicitpermissionofthepersonwhopostedtheinformation– Immediatebreachoftrust– Violationoftheintegrityofthecommunity

• Eachindividualisaccountabletobeastewardoftheinformationpostedanddiscussedwithinthecommunity

5-2-1.inter-network-cooperation 44

Page 45: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

FIRST

• FIRSTisinternationalconfederationoftrusted CISRTsandsecurityteams.– Teamconstituency,ratherthanindividuals– Teamsfromawidevarietyoforganizationsincludingeducational,commercial,vendor,governmentandmilitary

• Mostservicesareformembersonly• https://www.first.org/

5-2-1.inter-network-cooperation 45

Page 46: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

FIRSTmembers

5-2-1.inter-network-cooperation 46

Page 47: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

5-2-1.inter-network-cooperation 47

Page 48: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

tobeaFIRSTmember1. FindtwoexistingFullMembersfornominatingyourteam

("sponsors")2. InformFIRSTSecretariat(FSS)thatyourteamwantstojoinFIRST.3. Workwithyoursponsorssotheyhaveathoroughunderstanding

ofyourteam4. Arrangeforasitevisitbyatleastonesponsor5. Provideallthemandatoryinformationrequestedinsupportto

yournomination(seeSection2.1.2oftheFIRSTMembershipProcessdocumentfordetails).

6. ProvideanyadditionalinformationrequestedbyFIRST7. Yoursponsorwillsubmityourapplication(aftera6-monthperiod,

atmost).8. BoardofDirectorswilldeliveronyourspecificnomination9. Ifapplicationisapproved,paythemembershipaffiliationfee.

5-2-1.inter-network-cooperation 48https://www.first.org/membership

Page 49: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

FIRSTevents

• annualconference– everyJune– 28th annualconference

• Seoul,12-17June2016

– anyonecanattend• otherregionalmeetings

– mostlymembersonly

5-2-1.inter-network-cooperation 49

Page 50: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

industrybasedcommunity- ISAC

• InformationSharingandAnalysisCenter• Securityrisksarealmostsimilarinanindustry

– TelecomISAC– FinancialISAC– ElectricitySectorISAC– ...andmanymore

• Mostlyaimingtoprotectnationalcriticalinfrastructures

5-2-1.inter-network-cooperation 50

Page 51: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

individualbasedcommunity• NSP-SEC

• https://puck.nether.net/mailman/listinfo/nsp-security

• OPS-TRUST• https://openid.ops-trust.net/about

5-2-1.inter-network-cooperation 51

Page 52: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

5-2-1.inter-network-cooperation 52

Page 53: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

5-2-1.inter-network-cooperation 53

Page 54: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

CVE

• CommonVulnerabilitiesandExposures• Dictionaryofcommonnames(ex.CVEidentifiers)forpubliclyknownsecurityvulnerabilities

• https://cve.mitre.org/

• Wecanuseacommonnametospecifyasecurityvulnerability

5-2-1.inter-network-cooperation 54

Page 55: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

example:CVE-2015-5986

• http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5986

• target– ISCBIND9.9.7before9.9.7-P3and9.10.xbefore9.10.2-P4

• impact– vulnerableISCBINDallowsremoteattackerstocauseadenialofservices

5-2-1.inter-network-cooperation 55

Page 56: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

ISCBINDreleasenote

• https://kb.isc.org/article/AA-01301/81/BIND-9.10.2-P4-Release-Notes.html

Introduction:BIND9.10.2-P4addressessecurityissuesdescribedinCVE-2015-5722andCVE-2015-5986.

5-2-1.inter-network-cooperation 56

Page 57: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

CVSS

• CommonVulnerabilityScoringSystem• https://www.first.org/cvss/

– CVSSv3wasreleasedin2015• AnopenframeworkforcommunicatingthecharacteristicsandimpactofITvulnerabilities

5-2-1.inter-network-cooperation 57

Page 58: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

CVSSScores

• BaseScore– technicalevaluation

• TemporalScore– environmentalevaluation– proofofconceptcode/attackcode– couldbechangedoverthetime

5-2-1.inter-network-cooperation 58

Page 59: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

CVSSScores

SecurityLevel ScoreCritical 9- 10High 7- 8.9Medium 4- 6.9Low 0.1- 3.9Info 0

5-2-1.inter-network-cooperation 59

Page 60: Inter-Network Cooperation · •The first CSIRT -CERT/CC was created in 1988 in response to the Morris worm incident 5-2-1.inter-network-cooperation 17. computer security incident

5-2-1.inter-network-cooperation 60