Once You Let Them on the
Download
Report
Transcript Once You Let Them on the
Once you let them connect,
how do you make sure they
are behaving?
Joseph Karam
Director, Network & Telecommunication Services,
Hamilton College
ResNet 2007
Hamilton College
Liberal Arts college in Clinton, New York
Chartered in 1812 – one of the oldest
colleges in New York State.
1,800 undergraduate students
200 Faculty
400 Administrators and Staff
Network Services @ Hamilton
4.5 full-time administrators
Team Leader
2.5 Network & Systems Administrators
Telephone Administrator
Wiring Technician (outsourced)
Interns
Network Infrastructure @ Hamilton
6,000+ network jacks on-campus
160+ Cisco Switches
200+ Cisco Wireless Access Points
50+ Windows Servers
10 UNIX Servers
5 Macintosh Servers
50 Mbps Internet connection
Hamilton College Philosophy
All devices are allowed to
connect and use the network
unless they are behaving in a
manner which impacts the
operation of the network and
the ability for other devices to
reliably use the network.
Network Security Monitoring Tools
Firewalls
Network Access Control (NAC) Systems
Intrusion Detection/Prevention Systems
Network Behavior Analysis Systems
Log & Event Management Systems
Virus/Spyware/Spam Gateways
Etc.
Network Behavior Monitoring
Network behavior monitoring involves:
monitoring a network for deviations
in typical activity
detecting the unusual activity
stopping the unusual activity from
impacting network operations.
Network Behavior Monitoring vs.
Intrusion Detection Systems
Intrusion Detection Systems perform signature
detection examining the network for packet sequences
known to be malicious.
Network behavior monitoring systems perform anomaly
detection based on behaviors that fall outside predefined
accepted guidelines.
Intrusion Detection Systems detect ‘intrusions’ from
outside a protected network segment.
Network behavior monitoring systems detect malicious
behavior from endpoints inside & outside the network.
Benefits of Network Behavior Monitoring
Secure against new “zero-day”
vulnerabilities that intrusion systems and
firewalls cannot recognize.
Detect virus and worm attacks before they
impact network operations.
Stop threats that start inside the network.
Provides visibility into the network to really
understand how the network is being used.
Unwanted Network Behaviors
Network attacks (nmap, TCP/UDP port scans,
ICMP floods, port scans)
Excessive connections (P2P, Gaming)
Unauthorized Servers (Mail, Web, FTP,
DHCP, DNS)
Unauthorized Routers/Gateways
Excessive Bandwidth
Unauthorized Applications
Network Behavior Monitoring Products
Mirage Networks
Mazu Networks
Lancope
Q1 Labs
Stealthwatch
Cisco MARS
Arbor Networks
PeakFlow X
GraniteEdge
Networks
PacketFence
(OpenSource)
NetFort
Technologies
SourceFire
Network Behavior Monitoring with
Mirage Networks
ARP Cache Manipulation
Deception (Honey Pot)
Reverse Access Restriction
Web page redirection or quarantine
Help Desk Support
Passive device
Alerts, analysis, and reporting
Pre-Admission compliance checking
MAC/IP address and OS checking
Network Design
Implementation with Mirage
Configured on network in ½ day.
Monitored network for 2 to 4 weeks.
Configured exceptions.
Implemented deception on each VLAN
individually.
Adjusted profiles for security threats.
Implemented security threat restrictions one
at a time.
Mirage Zones
Priority 5 – Full Access
Priority 4 – Monitored Access
Priority 2 – Out of Policy – Pre-Admission Compliance
Priority 1 – Security Threat
Mirage Restrict Access Profiles in
Security Threat Zone
Too Many Managed
TCP Scan
Too Many Unmanaged
UDP Scan
Too Many Unused
Nmap Usage
Too Many SMTP Hosts Port Scan
Too Many SMTP SYNs IRC Heartbeat
Stolen Devices
Unauthorized TFTP
IP Telephony Attacks
Port Scan Restriction Example
Port Scanning 500 TCP ports on one IP
Address in 60 seconds.
Too Many Unmanaged
Restriction Example
Connecting to more than 800 IP Addresses in
60 seconds
Too Many SMTP Hosts
Restriction Example
Launch 30 SMTP connections in 60 seconds.
Student Perspective Example
Student connects computer to the network
and gain full access if compliance
requirements are met.
Student computer starts scanning network
due to a virus or worm.
Mirage system automatically detects the
attack and restricts network access to the
student computer.
Student receives web page notice saying
they are removed from the network.
Student Perspective Example
(continued)
Student contacts Help Desk for assistance.
Help Desk uses Mirage System to assist in
their troubleshooting and cleaning student
computer.
Once attack has stopped, Mirage system
automatically re-enables student computer to
obtain full access to the network.
Computer with Full Access
Computer with Full Access
Computer with Restricted Access
Computer with Restricted Access
Computer with Restricted Access
Number of Computers Restricted
2004
2005
2006
January
84
31
17
September
52
24
44*
10 to 20
5 to 20
5 to 20
Other Months
* Increase due to rule changes to restrict access of P2P abuse.
Conclusion
Saves staff time from monitoring logs and
manually disconnecting/reconnecting
computers from network.
Decreases the number of infected computers
by stopping attacks quickly.
Requires no changes to user experience.
Provides enhanced troubleshooting into
network issues.
Does not punish ‘good’ network users.
Future Goals for Hamilton
Self-help remediation quarantine area
Pre-admission authentication and compliance
for student computers
Questions?
www.resnetsymposium.org/resnet2007
Joe Karam
Hamilton College
[email protected]
315-859-4167