Tao of Security Monitoring 107
Tao of Security Monitoring | |
author | Richard Bejtlich |
pages | 798 |
publisher | AWL |
rating | 10 |
reviewer | Anton Chuvakin |
ISBN | 0321246772 |
summary | Awesome and novel book on monitoring security |
The book starts with an fun, exciting background section introducing security, addressing both risks and the need to monitor networks and systems. Topics such as the classic "threat x vulnerability x value = risk" formula to threat modeling and limitation of attack prevention technologies are included. A nice thing on the process side is the "assess -> protect -> detect -> respond" loop, defining at a high level a reasonable security process for an organization. The threat-analysis material seems to have military origins, but is enlightening for other types of organizations as well.
The concept of network security monitoring, as in the book's title, is introduced as being 'beyond IDS' -- with some coverage on why IDS deployments fail and what else is needed (NSM process and tools, that is).
Bejtlich makes the important, rarely appreciated point that intruders are often smarter than defenders. It presents a stark contrast to the "staying ahead of the hackers" theme of many security books, an approach which makes no sense in many cases as the attackers are in fact far ahead to start with. The NSM approach will indeed work against advanced attackers, albeit (as the author admits) at a high resource cost to the defending organization. Such 'worst case' scenario preparations are extremely rare in other security books. Detecting such intruders is covered as part of a breakdown of the compromise process into five phases (from reconnaissance to using/abusing the system).
Another gem is the idea of a "defensible network": not "secure" or "protected," but defensible. A defensible network is one that can be watched, is configured to limit possible intruder actions, can be kept up to date, and runs only the minimum necessary services. A network so configured assures that if bad things happen there, they can be handled effectively.
I liked how the tools are covered in the book. The explanation of each tool is not simply a rephrasing of that tool's manual, but rather presents the tool's best use in the context of the entire system. While the paradigm "products perform collection, people perform analysis" might grow stale as the products get smarter, having training analysts still is one of the best investments in security. On the process side, the book covers complete analyst training. People are indeed the critical component of NSM, since most of the decision-making relies on trained analysts and their investigation, classification and escalation of alerts.
A chapter on netflow and other types of session/connectivity data presents considerable interest to those monitoring networks. Example case studies show how such data helped identify intrusion action that did not directly produce IDS alerts. Same applies to traffic visualization and statistical tools that enrich the IDS data and can sometimes provide early anomaly indications as well.
NSM event-driven analysis in Tao of NSM is centered on Sguil - a new GUI frontend to NIDS, session and other context data, facilitating easy and effective event classification and escalation (if needed).
Emergency NSM vs ongoing monitoring NSM procedures are also covered in the book. Even if an organization does not maintain an ongoing security monitoring program, it can still benefit from NSM that is deployed after a suspected intrusion.
Attacks against NSM processes and technologies also fill a dedicated section. Such attacks include intruder tools as well as attacks against the human (such as simply attempting to overwhelm the analysts) and process components of the NSM.
The book should be required reading for any security professional, and for those wishing to enter the field. It helps to broaden the horizons of seasoned professionals as well as educate the beginners in monitoring techniques. While the value of NSM as an approach can be debated in modern organizations (where tuned sensors and skilled analysts are an exception rather than the rule), the book is a superb security resource even for those who do not choose to implement NSM at the moment.
info-secure.org maintainer Anton Chuvakin, Ph.D., GCIA, GCIH is a security strategist and author of Security Warrior . You can purchase Tao of Security Monitoring from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
Re:Tao Now, Brown Cow! (Score:1, Offtopic)
Common Sense (Score:4, Insightful)
This seems like common sense. Shouldn't all network admins be doing this anyway?
Re:Common Sense (Score:4, Funny)
and someone is pinging your host...
Re:Common Sense (Score:1)
That ought to make people (and the surrounding cubicals) feel secure!
Re:Common Sense (Score:1)
Re:Common Sense (Score:1)
In any event, supporting all their log file formats should be easy. For starters I'll either go with pinball SFX or swipe the ones from Doom 2. (The port 445 sound is going to get used a hell of a lot!)
Re:Common Sense (Score:1)
Re:Common Sense (Score:2, Funny)
Re:Common Sense (Score:3, Funny)
Broadcasting ?
as in
# ping -b 255.255.255.255
Windows does that automatically ? Would that explain why Windows hosts generate so much traffic on Ethernets ?
Or is every packet rewritten so that the return address is 127.0.0.1 which would explain why quite a few things appear not to work for mysterious reasons when I try Windows networking (I admit to not using Windows much).
Or has somebody from the sales department been set loose
Re:Common Sense (Score:2, Interesting)
I've seen enough bad patches/upgrades to wonder if they might be right.
Re:Common Sense (Score:4, Insightful)
Re:Common Sense (Score:1)
ND
Re:Common Sense (Score:4, Insightful)
at the very least, i imagine many networks have an admin budget that is too small to allow as much thoroughness in securing the network as the Tao of NSM would recommend - both in money to buy proprietary products, and in manpower to set up, monitor, and maintain them.
Re:Common Sense (Score:1)
Re:Common Sense (Score:3, Funny)
Yes of course. You should spend an hour a day in silent contemplation of the "The Spinning Cube of Potential Doom [nersc.gov]".
BTW, If you think common sense is common, your sample size is to small.
Re:Common Sense (Score:1)
Try "good sense". Common sense is not necessarily a good thing.
A good definition for should is: "ought to but not necessarily will".
Re:Common Sense (Score:2, Insightful)
As someone who has worked as both a Network Engineer and a System Administrator, I can tell you that Management and common sense do not go together. Many a time we asked for tools and software to help stop the hackers, but management refused under the grounds that they thought "security through obscurity" would work. They figured no one would hack into us. When we did testing and found holes in the security that script kid
No need! (Score:4, Funny)
Re:All Night Long? (Score:4, Funny)
His Other Book (Score:4, Informative)
Hmm. I wonder if it has a chapter on finger pointing and avoiding blame?
Re:His Other Book (Score:3, Funny)
Upon learning that your systems have been penetrated, proper incident response is as follows:
1. Scream. Hold head between hands and moan.
2. Check passport, one-way tickets to South American country of choice. Express relief that the emergency escape kit is still operational.
3. Remember advising boss to recind deparmental policy of secure sticky-note-on-the-monitor storage for passwords. Recall boss' gales of laughter in
Re:His Other Book (Score:1)
Re:His Other Book (Score:2)
It's inevitable. The robots have finally learnt to tell joken better than humans.
I, slashdotter.
Different authors, no? (Score:2)
Has someone gotten married in some unknown country where men take their wives' family names? Or are was your comment in response to a parent that has been modded into oblivion?
At any rate, Incident Response is an excellent book, whoever it's by.
Re:Join the Crusade!!!! (Score:3, Funny)
Re:Join the Crusade!!!! (Score:2, Funny)
Best quote from the book: (Score:4, Interesting)
"If you're serious about security and aren't afraid of the mailing lists, OpenBSD is really the only way to go."
- Richard Bejtlich
So much for that... (Score:2, Interesting)
Re:Best quote from the book: (Score:1)
Re:Best quote from the book: (Score:1)
(No, Windows doesn't get brownie points for using BSD's TCP/IP stack.)
Re:Best quote from the book: (Score:1)
Re:Best quote from the book: (Score:2)
Then you will need a very dedicated attacker to hand craft executable code for your architecture and not for some generic Intel box. Exit all the script kiddies.
Not the ultimate solution but it will certainly make things more complicated for attackers.
It is Officially . . . (Score:5, Funny)
Thank you for your attention regarding this matter.
-Peter
Re:It is Officially . . . (Score:5, Funny)
So my plans to publish "The Tao of Zen" should be put on hold?
Re:It is Officially . . . (Score:2, Funny)
-Peter
Re:It is Officially . . . (Score:5, Funny)
You needed more catchphrases. Might I suggest "Pushing the Envelope While Thinking Outside the Box: The Paradigm Shifts of Zen and the Art of Tao Maintenance"?
Re:It is Officially . . . (Score:3, Funny)
Re:It is Officially . . . (Score:2)
Dangit, that's the name of my blog!
Re:It is Officially . . . (Score:2)
Yes folks, Jesus is coming, and he's bringing that book with him. Pheer.
Tao of Zen? (Score:1)
Re:Tao of Zen? (Score:2, Funny)
p.s. someone help me, please! I've chipped in to the community. You should too. [freeipods.com]
Re:It is Officially . . . (Score:1)
Re:It is Officially . . . (Score:2)
But "Tantric Security Monitoring" brings up nasty images of overweight guys screwing their networks, and "Pray for Security Monitoring" doesn't inspire confidence...
author's blog (Score:5, Informative)
If you are in to BSD/Security, you should really check it out.
Finding a trojan (Score:4, Interesting)
I Couldn't reproduce the errors, so it took some time to get futher with finding the cause. After some time I looked at the eventviewer (Yes it is Win2000 and not linux) and saw that the computer rebooted on average twice a day. The error messages said "Unexpected reboot". The sysadmin could find a cause also. In most cases this error was caused by a hardware error. So what I did is download etherreal and monitor the network traffic from the server. (This shows how nice opensource is. You just download in for free as in bear. If there was not FOSS i couldn't do this). I saw some strange network trafic to port 445 on the computer. I also saw that it uses a specific function. When I googled with this function I saw that there was I bug in the 'lsass' program regarding this bug. Then I checked the network traffic from the source host and saw some strange network traffic to outside the organisation on port 445, what is verry strange. After the investigation of the computer (desktop) they found the pedodo (I think it is called this way) trojan. (It collect passwords and creditcard numbers)
Now we patched the server (it was only SP4) and every thing was fine. This solved the problem. So I think this solved the problem. Mine conclusion was that this trojan disturbed the server.
This showes how fucked windows is and how great foss is.
Re:Finding a trojan (Score:1)
Re:Finding a trojan (Score:1)
Linux kernel "security problem" (Score:4, Insightful)
I know I've said this before, but that particular report of a "security problem" (why that's in quotes, I'll get to in a moment) in the Linux kernel is an excellent illustration of the difference between Microsoft's (and presumably other proprietary vendors) attitude to "security" vs. most open source projects.
This problem can be simplistically summarized thusly: "Someone who can log into a linux system can conceivably run a malicious program that might crash or lock up the Operating System". In Linux, this is characterized as a "Security Problem".
Now, think about it - if you called Microsoft (picking on them since that's the proprietary vendor we're talking about at the moment) and said "Hey, I have a program that when I run it, it crashes the system"...what kind of response will you get? "Well, don't run that program. It's obviously either defective or a trojan." Which would be the truth. But they have historically not considered that a problem in the OS AT ALL, let alone a security problem. Remember all those years ago when they claimed that most windows crashes are caused by anti-virus software?...)
Yes, FOSS also has flaws. Sometimes even serious ones. But it usually seems like FOSS projects more readily and more quickly address those flaws than proprietary ones do.
Re:Linux kernel "security problem" (Score:1)
Yes, FOSS has it's faults. The same ones [slashdot.org] it would seem. Nobody wants to chase bugs in other people's compiled crud.
Re:Finding a trojan (Score:2)
This showes how fucked windows is and how great foss is.
Really? Maybe you haven't heard of all of the kernel level rootkits available for cracking linux boxes. Crackers don't really discriminate. They will use ANY exploit on ANY platform.
Re:Finding a trojan (Score:1)
Re:Finding a trojan (Score:1)
Btw they changed the virus scanner, such that it is update daily.... better late than never.
Free bear! (Score:1)
Free bears? What next, Armed bears? [sourceforge.net]
Re:Free bear! (Score:1)
Once we had a herd of 40 mad cows walking on the field near our office. They where broken out some grazing land. One of the cows spoke to me , and said that he was Durl MoeBride. He kept repeating ' I need Scoe Code , I need Scoe Code'. I don't know what he was talking about. Nobody did either.
Any way
Re:Finding a trojan (Score:1)
If you did that, your "bug" would never had surfaced.
If only people stop running Windows servers the same way they run thier switches and routers. the Internet might be a better place.
-B
---
I had a sig once... Then I didn't.
Re:Finding a trojan (Score:1)
I'm not responsebel for patching because I can't. I'm just a softwareprogrammer and a application maintainer.
Re:Finding a trojan (Score:1)
Why was it reachable on port 445? Why could the box connect to outside hosts AT ALL?
Re:Finding a trojan (Score:1)
Re:Finding a trojan (Score:1)
Re:Finding a trojan (Score:1)
* Yes there is much wrong with our IT. But i'm not a sysadmin and I'am not part of the IT department so i can't change anything about that.
* The sysadmin with I needed to deel with is a mcse
* I even need to explain to them that the need to protected their citrix servers for spyware. The mcse guy didn't even know what spywhare was (even he was a mcse).
* And yes there is a lot wrong with firewalling. But that is not mine rep
Another Great book (Score:4, Informative)
It's for real [wired.com]. I normally don't go for these things but...Free ipods (click here to get yours) [freeipods.com] .
Re:Another Great book (Score:4, Insightful)
SGUIl (Score:4, Interesting)
My own personal pet peeve (Score:2, Interesting)
Tell me I'm misinformed, tell me I don't know everything, I'll agree with you. Tell me that some hacker is smarter than I am, and I'll tell you that you need to find a new definition of smarter. The only thing that hacker might have on me is knowledge of a few things I don't.
Anyway, rant over, and this actually soun
Re:My own personal pet peeve (Score:1)
ND
Re:My own personal pet peeve (Score:2)
Uh, which would make them SMARTER then you, on that particular subject.
Hell, I know virtually nothing about automotive things, nor really want to, and my friend who is a wiz on cars knows precious little about programming...
So, we're smarter then each other in our respective fields, but stupid in the field we're not strong in.
Somehow I also doubt you are the "smartest" person in your field either... actually, I don't thin
Re:My own personal pet peeve (Score:1)
Uh, which would make them SMARTER then you, on that particular subject.
First of all, it's than not then.
Smart != Knowledge
My little, silver-dapple dachshund is not very smart (compared to some people...there's a fairly good-sized overlap between the smartest animals and the dumbest people), but she's knowledgeable enough to know that when I put a shirt on at suppertime, I'm getting ready to go pick up food and she's at
How does it compare (Score:1)
Would you consider this a compliment to, or overlap of aforementioned text? If so, in what ways?
Re:How does it compare (Score:4, Informative)
That's a really good question. To me the bible is Stevens TCP/IP Illustrated Vol I [amazon.com]. While Northcutt's book is a great introduction to IDS and anaylsis for beginners, I think Rich's book goes beyond that (as evident in reviews [amazon.com] from respected members in the community like Lance Spitzner from the Honey Net Project [honeynet.org]). To quote Ron Gula from the foreword [awprofessional.com] of Richard's book.
You can also read a couple of sample chapters [awprofessional.com] from the book.
Of course, I am a little bias. Rich is a great friend, but I truly think he did an awesome job of creating something that should be required reading for anyone involved in network secuirty.
Bammkkkk
A half a night's sleep?! (Score:3, Funny)
.
.
.
Because that would be too long.
Absolutely essential! (Score:5, Interesting)
Things like fast-spreading infectors that got past your A/V proxies because they got to them before the vendor's new pattern file did.
Attempts by employees to download things like Back Orifice for use as revenge tools.
Engineering failures.
Misconfigurations.
Vendor screwups.
Stealthy host sweeps that dribble one TCP/21 packet every 75 minutes into your Internet-facing DMZ. No, that last one totally blew by our worthless network IDS; we ended up blackholing the IP at the border router. No choice, our DMZ ftp server used wu-ftpd.
Porn download attempts.
Boxes in your trusted network infected by viruses.
I spent twenty months doing log monitoring. I caught all these event types and more. There is a whole wide, wacky wonderful World Of Hurt out there that you can duck or mitigate if you just monitor your logfiles. And most shops never really do.
I dislike this author just from the title. (Score:1)
As a Taoist, I'm more than a little bugged that the word Tao is used haphazardly by every joe shmoe to title their new instructional book.
Using the word without understanding it or true reverance is almost sacreligous for me.
Just goes to show that no matter what religion (Score:2)
Maybe when you have a little less ego and a bit more Tao in you you can come back and do something Lao Tzu would have appreciated.
Laugh at it.
Re:Just goes to show that no matter what religion (Score:1)
Finally, even if I did become too attached to the word "Tao", it doesn't mean I need