TARINOITA TUOTANTOLINJALTA
Transcription
TARINOITA TUOTANTOLINJALTA
HAVARO AUTOREPORTER + TARINOITA TUOTANTOLINJALTA Viimeiset 6 tuntia 2012-10-28 11:00 Jani Kenttälä, Clarified Networks Oy, part of Codenomicon Group • “Kyky, motivaatio • “Vähistä ja asenne” - pragmaattinen lähestymistapa resursseista mahdollisimman paljon irti” - innovaatio • “Public/Private partnership (including universities) HAVARO yksi kulminaatiopiste 1 4 1. Howard Smidt briefing Mr. Bush about Finnish Security Research Group Findings 2. Analyzer used in Bredolab botnet takedown, Dutch TV-channel covers 5 Mikko Hyppönen (F-Secure) and Bob Burls (eCrime-unit in UK) keynote, Analyzer used to visualize evidence against m00p gang. 3. Critical Infra SA deployment for the Estonian Government 2 4. Situation rooms for NATO CCDCOE cyber exercises. 3 6 5. Clarified Visualization in Mikko Hyppönen’s TED talk, 500 000 views as of 2011-09 6. News coverage of CERT.be fighting against website hacks, TV-premiere for our abuse handling tools. PREVIOUS EPISODES RESULTS - CASE FINLAND OTHERS SAW IT TOO Finland is known as having networks with the fewest malicious software (malware) infections, and within Finland, the telecommunications company TeliaSonera prides itself in being the “cleanest of the clean.” --Microsoft Case Study “The infection rates and other metrics for Finland have consis tently been below the world-wide average s, and we have often wondere d ourselves what the reason is for this” - Kimmo Bergius, Microsoft’s Ch ief Security Advisor WORLD IS FOLLOWING, NEXT STEP WE ARE NOT STANDING STILL Don’t try this on national level CASE EINSTEIN (BASED ON PUBLIC INFORMATION) 2008: buged addition: $0.37 per US citizen 2011: 38 page article by Bellovin, Diffie et al. about fundamental issues in using EINSTEIN in Critical Infra context. FOR US IT STARTED 2010 2010-12-08 01:19:44 Marko Laakso • saulin kanssa psyykattiin mallia että AH:sta lähtis senseroille ip osoitteita ja tyyppi miksi se on epäilyttävä, per kriittinen sensoriasiakas vois olla sit lista tyypeistä (tai *) mitkä ne hyväksyy sensorin triggeroivan, ip:t menis capture filtteriksi, sensori tallettaa triggeröivien osotteiden pcap:t talteen ja lähtettää niistä flow tiedot takaisin viville missä ne ruokitaan havaintoina takaisin ah:n jonka yli on tilannekuva vsr:llä ROUGH IDEA BUILD ON TOP OF EXISTING CAPABILITY 2011 - WARP 9 Production pilot Pilot 2011 Sensor-integration Contracts Procurement process END OF 2011 • Within half a year CERT-FI has executed the plan, • system is operational, • integrating CERT-FI’s existing processes and tools, • adding new capability with a minimum impact to resourcing and required tool know-how. • 2012 will continue, focus will be on scaling internal know-how, coverage of CIP-organizations and potentially adding new capabilities. HAVARO - IN NUMBERS 6 640 000 Events 49 822 IP addresses in observations 20 000 Suspected malicious events Challenge for automation Challenge for people 259 Reports 49 Reports with severity mediocre 16 Reports with severity high KEEPING HUMAN EFFORT BEARABLE Suspected malicious events HAVARO CAPABILITIES • Abuse Alerts: • netflow monitoring, raise alert if traffic to known malicious identity • Abuse Records: • record all traffic to known malicious identities • IDS alerts: • observe • Real-time also malicious behavior situation awareness • Computer assisted reporting AUTOREPORTER + HAVARO CIP5 CIP4 CIP3 CIP2 CIP1 Sensor Enterprise1 ISP2 ISP3 ISP4 ISP1 Best in cleaning. Get alerts and records. Analyze & report. Feed malicious identities. CERT Best in aggregating and reporting. Blogs, mailing lists Add discoveries from the daily media follow-ups in to the mix. Feeders Best in monitoring. PRESIDENT OF ESTONIA 2012-06-08