Top Banner
KNOW THE UNKNOWN ® NIKSUN Inc., CONFIDENTIAL This document and the confidential information it contains shall be distributed, routed or made available solely to persons having a written obligation to maintain its confidentiality. The Art of Cybersecurity (on a 5G canvas) Darryle Merlette, CISSP Executive Director – Security Solutions, NIKSUN Inc. IEEE 5G Summit May 26, 2015
36

The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Mar 31, 2018

Download

Documents

dangbao
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

KNOW THE

UNKNOWN®

NIKSUN Inc., CONFIDENTIAL This document and the confidential information it contains shall be distributed, routed or made available solely to persons having a written obligation to maintain

its confidentiality.

The Art of Cybersecurity (on a 5G canvas) Darryle Merlette, CISSP

Executive Director – Security Solutions, NIKSUN Inc. IEEE 5G Summit

May 26, 2015

Page 2: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Hackers and Painters

Slide 2 NIKSUN Confidential – Restricted Access See Title Page for Restrictions

What hackers and painters have in common is that they're both makers. Along with composers, architects, and writers, what hackers and painters are trying to do is make good things.

-- Paul Graham (Hackers and Painters)

Page 3: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Evolution

Slide 3 NIKSUN Confidential – Restricted Access See Title Page for Restrictions

Page 4: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

1G (analog) All band radio receiver to eavesdrop

Clone phones to steal airtime

2G/3G GSM hack using IMSI catcher to impersonate tower (2G)

Noise generator and amplifier to knock 3G network offline, then downgrade to 2G.

3G/4G/5G

All the vulnerabilities of IP networks…

85% of all internet traffic is WWW Promise of WWWW will likely cause increase

Eavesdropping, Cloning, Spoofing…and IP

NIKSUN Inc., CONFIDENTIAL. INTERNAL USE ONLY. See confidentiality restrictions on title page

Slide 4

Page 5: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Monthly global mobile data traffic will surpass 15 Exabytes by 2018.

The number of mobile-connected devices exceeds the world’s population.

The average mobile connection speed will surpass 2 Mbps by 2016.

Due to increased usage on smartphones, smartphones will reach 66 percent of mobile data traffic by 2018.

Monthly mobile tablet traffic will surpass 2.5 Exabytes per month by 2018.

4G traffic will be more than half of the total mobile traffic by 2018.

More Mobile Phones than people on Earth

Source: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013–2018

NIKSUN Inc., CONFIDENTIAL - INTERNAL USE ONLY. See confidentiality restrictions on title page. Slide 5

Page 6: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Proliferation of Apps and Devices

NIKSUN, Inc. CONFIDENTIAL -- See confidentiality restrictions on title page. Slide 6

Convergent & Rich Virtual & SAS Games and Apps

Portable & Capable Rich Multimedia Chats

ANYWHERE ANYTIME REAL-TIME

DYNAMIC INTERACTIVE

Page 7: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Many traditional web-based malware also affect mobile devices

Wirelurker and Masque (iOS) Creates trojaned versions of apps for binary file replacement

If same bundle identifier is used, can replace apps installed through App Store (but not preinstalled apps)

Roughly 25% of all Google Play apps are clones (Columbia University)

Mobile Malware and Attacks

NIKSUN Inc., CONFIDENTIAL. INTERNAL USE ONLY. See confidentiality restrictions on title page

Slide 7

Page 8: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Slide 8 NIKSUN Confidential – Restricted Access See Title Page for Restrictions

The Internet of Things

Page 9: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Slide 9 NIKSUN Confidential – Restricted Access See Title Page for Restrictions

Shodan – Search Engine for IoT

Page 10: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Slide 10 NIKSUN Confidential – Restricted Access See Title Page for Restrictions

Shodan – Default password device search

Page 11: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Slide 11 NIKSUN Confidential – Restricted Access See Title Page for Restrictions

Shodan – SCADA search

Page 12: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Slide 12 NIKSUN Confidential – Restricted Access See Title Page for Restrictions

Shodan – IP Address search

Page 13: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Two Broad Categories

Signature Detection Specific patterns in packets

Similar to anti-virus paradigm

Must be periodically updated

Vulnerable to evasion and new attacks

Anomaly Detection Deviations from statistical/behavioral norms

Can either “learn” or “be told” what is “normal”

Can often detect new attacks

Network Detection

NIKSUN Inc., CONFIDENTIAL. INTERNAL USE ONLY. See confidentiality restrictions on title page

Slide 13

Page 14: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

3G/4G/LTE Monitoring Points

Slide 14

S11

S1-U

SGi

eNB

Internet

CSBC

PSTN

MGW

External

IP

Networks

Mb

P-CSCF

S-CSCF

MRFP

MRFC

Mp

Mw

Mw

S1-MME

Other Types of Signaling

GTP-U [incl. RTP+SIP]

GTP-C /GRE

NIKSUN Interfaces

SIP Signaling

Diameter Signaling

EGCP

RTP

SGI

S1-MME

Firewall

User Data

HSS

SGW

S6a

S5/S8 PGW

MME

Trusted

None 3gpp

IP access

S2a ePDG

S2b

Untrusted

None 3gpp IP

access

S10

SGSN

S6d S3

3GPP AAA

Server

S6b

S4

PCRF/PCEF

OCS

Gy

IMS Charging

Unit

UTRAN

Rf

Cx/Dx

Gm

S16

Gx

GERAN

eNB

I-CSCF

NIKSUN Inc., CONFIDENTIAL - INTERNAL USE ONLY. See confidentiality restrictions on title page. Slide 14

Page 15: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Detunneling for detection

NIKSUN Inc., CONFIDENTIAL - INTERNAL USE ONLY. See confidentiality restrictions on title page. Slide 15

Page 16: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

IMSI values as part of alerts

NIKSUN Inc., CONFIDENTIAL - INTERNAL USE ONLY. See confidentiality restrictions on title page. Slide 16

Page 17: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

LTE GTP KPIs

NIKSUN Inc., CONFIDENTIAL - INTERNAL USE ONLY. See confidentiality restrictions on title page. Slide 17

Page 18: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

LTE GTP KPIs

NIKSUN Inc., CONFIDENTIAL - INTERNAL USE ONLY. See confidentiality restrictions on title page. Slide 18

Page 19: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

LTE GTP KPIs

NIKSUN Inc., CONFIDENTIAL - INTERNAL USE ONLY. See confidentiality restrictions on title page. Slide 19

Page 20: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Excessive (failed) sessions per UE eNodeB pair/SGW/MME

Excessive Bytes per IMSI

Excessive Average Bearer Setup Time

Tunnels per SGW/MME/UE/eNodeB/PGW

Alarms available on IMS-GM, S6a, CDMA as well…

LTE Security and Performance Alarms

NIKSUN Inc., CONFIDENTIAL. INTERNAL USE ONLY. See confidentiality restrictions on title page

Slide 20

Page 21: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

As 4G matures and 5G emerges, the expanding landscape of devices and apps presents an attractive canvas for hackers to paint

Scalable and holistic monitoring solutions will be needed to help track and mitigate attacks

As new attack paradigms emerge, innovative solutions must be developed

Humans are still the weakest link when it comes to security…

Conclusions

NIKSUN Inc., CONFIDENTIAL. INTERNAL USE ONLY. See confidentiality restrictions on title page

Slide 21

Page 22: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Security?

Slide 22 NIKSUN Confidential – Restricted Access See Title Page for Restrictions

There is no security on this earth. There is only opportunity. -- Gen. Douglas MacArthur

Page 23: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

NIKSUN:

Helping You Know the Unknown®

Visit us at niksun.com or

email to [email protected]

For additional information:

NIKSUN, Inc. CONFIDENTIAL -- See confidentiality restrictions on title page. Slide 23

Page 24: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Signatures Shellshock (content "() {“ )

Known rogue User Agents (eg., content:"User-Agent|3a| ezula“)

Known shellcode sequences (eg., 0x90 0x90 0x90…)

Stuxnet (content:"/index.php?data=66a96e28“)

Anomaly Detection (with DAR and GeoIP) Host pair bytes, Host pair packets, Host Flood, Host Scan, Port Scan …

Covert IRC: apptype irc and not tcp port (194 or 667 or 6660-6669 or 7000)

From China: geo host CN and apptype irc and not tcp port (194 or 667 or 6660-6669 or 7000)

Botnet behavior – low bytes over long connection

Tunneling: not apptype http and tcp port (80 or 8080 or 8008 or 8081 or 591)

Some Example Detections

NIKSUN Inc., CONFIDENTIAL. INTERNAL USE ONLY. See confidentiality restrictions on title page

Slide 24

Page 25: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

No more script kiddies!

Nation States Espionage

Intellectual Property

Critical Infrastructure

Cyber-Criminals Identify Theft

Corporate Fraud

Financial Infrastructure

Hacktivists Political Action

Corporate Shaming

Spear Phishing

Who Are the Bad Guys?

NIKSUN Inc., CONFIDENTIAL. INTERNAL USE ONLY. See confidentiality restrictions on title page

Slide 25

Stealth is the New Black

Page 26: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Bad Guys Are Winning…

Slide 26 NIKSUN Confidential – Restricted Access See Title Page for Restrictions

69 to 158 new malware variants created every minute! -- McAfee/PandaLabs

Page 27: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Traditional Tools: Log Analysis -- Great… But

Slide 27 NIKSUN Confidential – Restricted Access See Title Page for Restrictions

Consider the physical analog…

Bank robbery: identify and catch the robber from transaction records

Convenience store: identify and catch a thief from sales transaction receipts

Office visitor theft: identify and catch perpetrator based on sign-in/sign-out logs

Why rely on logs in the network world?

Page 28: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

NIKSUN Knowledge

Warehouse

Capture all Network Traffic

Generate Meta Data and Compute Analytics

Store this information in a High Performance and Scalable Database

DATA

INFORMATION

BUSINESS

INTELLIGENCE

NIKSUN, Inc., CONFIDENTIAL - INTERNAL USE ONLY. See confidentiality restrictions on title page.

NIKSUN’s Solution Architecture

Slide 28

Page 29: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Dynamic Application Recognition

Slide 29 NIKSUN, Inc., CONFIDENTIAL

See confidentiality restrictions on title page.

Page 30: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Slide 30 NIKSUN Confidential – Restricted Access See Title Page for Restrictions

Detection Made Easy!

Page 31: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

Slide 31 NIKSUN Confidential – Restricted Access See Title Page for Restrictions

Be Careful With Your Data!

Page 32: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

NIKSUN Solutions

NIKSUN, Inc. CONFIDENTIAL -- See confidentiality restrictions on title page.

Surveillance, Detection and Forensics

Cyber Security

Proactive Network, Service and Application Monitoring

Performance and Security Monitoring for Cellular Networks

Network Performance

Mobility

Slide 32

Page 33: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

NIKSUN Product Portfolio

NIKSUN, Inc. CONFIDENTIAL -- See confidentiality restrictions on title page. Slide 33

NetDetector® NetDetectorLive™

Security Monitoring Detection & Alerting Forensics

NetVCR® FlowAggregator™ NetBlackBox Pro®

Performance Monitoring

Flow Monitoring Troubleshooting

NetMobility® NetVoice®

NetRTX™ NetSLM™ NetMulticast™ NetPoller™

3G & 4G Analysis VoIP Performance

SLA/QoS Alerting Advanced Analysis

NetOmni™ NetX™ Central Manager™ NetTrident™

Scalable Monitoring Reports Alerts Forensics

NetReporter™ NetXperts™

Reporting Expert Analysis

Page 34: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

NIKSUN Security Solutions

NetDetector®

NetDetectorLive™

NIKSUN, Inc. CONFIDENTIAL -- See confidentiality restrictions on title page. Slide 34

Comprehensive and actionable solution for network security

Lightning fast search & application reconstruction for real-time network

security forensics

Page 35: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

NIKSUN Mobility Solutions

NetMobility®

NetVoice®

NIKSUN, Inc. CONFIDENTIAL -- See confidentiality restrictions on title page. Slide 35

Performance and Security Analysis for 3G and 4G Networks

VoIP Monitoring & Troubleshooting Solution

Page 36: The Art of Cybersecurity (on a 5G canvas)5gsummit.org/docs/slides/Darryle-Merlette-5GSummit-Princeton... · Hackers and Painters NIKSUN Confidential – Restricted Access See Title

NIKSUN Enterprise Solution

NetOmni™

NIKSUN, Inc. CONFIDENTIAL -- See confidentiality restrictions on title page. Slide 36

Single Unifying Information Portal For All Network Data