Global Information Assurance Certification Paper - GIAC Certifications

Page created by Phyllis Young
 
CONTINUE READING
Global Information Assurance Certification Paper

                           Copyright SANS Institute
                           Author Retains Full Rights
  This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.

Interested in learning more?
Check out the list of upcoming events offering
"Security Essentials Bootcamp Style (Security 401)"
at http://www.giac.org/registration/gsec
DRAGON – An Intrusion Detection System

               Introduction

               How any other tool for Intrusion Detection, Dragon is a good cost-effective option.

                                                                                               s.
                                                                                            ht
               Dragon is a Network and Host IDS basically composed by these products: Dragon
               Sensor, Dragon Squire and Dragon Server. In this document, I will present some

                                                                                        rig
               information about all components that composed Dragon.

                                                                                    ull
                                                                                     f
               Dragon

                                                                                  ns
               Key fingerprint
               The Dragon      = AF19
                           solution    FA27 2F94
                                    includes three 998D  FDB5 DE3D
                                                   basic building      F8B5
                                                                  blocks.    06E4
                                                                          These areA169 4E46
                                                                                    Dragon Sensor,

                                                                               tai
               Dragon Squire and Dragon Server.

                                                                            re
                       -   Dragon Sensor is a network IDS that works on Linux and/or Unix. It monitors

                                                                        or
                           network packets for traffic that may indicate network misuse and/or abuse.

                                                                     th
                       -                                         Au
                           Dragon Squire is a host based IDS. It monitors key system files for evidence
                           of abuse and can also receive security information from routers and firewalls
                                                              2,
                           via SYSLOG or SNMP.
                                                          00

                       -   Dragon Server manages data from all of the Dragon Sensor and Dragon
                                                       -2

                           Squire engines. Based on Linux it also provides several real times, forensic
                           and trending web based interfaces for event analysis.
                                                   00
                                                20
                                            te
                                          tu
                                       sti
                                    In
                               NS
                            SA
                           ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                 Author retains full rights.
Dragon Sensor

               Dragon Sensor monitors live network packets and looks for signs of computer crime,
               network attacks, network misuse and anomalies. When it observes an event, the Dragon
               Sensor can send pages and e-mail messages, and then take action to stop the event and

                                                                                                s.
               record it for future forensic analysis.

                                                                                             ht
                                                                                         rig
               For signature selection, you can choose from over 1500 signatures. To be updated with
               new signatures go to https://63.210.52.6/. All Dragon events are categorized into

                                                                                     ull
               suspicious, probe, attack, compromise, success, failure, virus, collection and maintenance
               groups. While other NIDS concentrate on attack and probe detection, the Dragon Sensor

                                                                                     f
               can usually collect enough evidence to indicate if an attack has succeeded or failed.

                                                                                  ns
               These
               Key    groupings= are
                    fingerprint  AF19keyFA27
                                         to reducing false FDB5
                                              2F94 998D    positives.
                                                                  DE3D F8B5 06E4 A169 4E46

                                                                               tai
                                                                            re
               Dragon Squire

                                                                        or
                                                                     th
               Dragon Squire is a host-based intrusion detection and firewall monitoring system that
               looks at system logs for evidence of malicious or suspicious application activity, and
                                                                 Au
               monitors key system files for evidence of tampering in real time. Dragon Squire has been
               tuned to prevent high load levels and minimize any negative system impact to a server’s
                                                              2,

               performance. Besides being an excellent system security tool, Dragon Squire can also
                                                          00

               analyze firewall logs, router events and just about anything that can speak SNMP or
                                                       -2

               SYSLOG.
                                                   00

               Dragon Squire’s signature library includes suspicious events from a wide variety of
                                                20

               operating systems. These events check for suspicious file transfers, denied login attempts,
               physical messages (like an Ethernet interface set to promiscuous mode) and system
                                             te

               reboots. The library also includes security messages from many applications and services
                                          tu

               such as Secure Shell, Sendmail, Qmail, Bind and Apache Web servers.
                                       sti

               Dragon Squire is a complement to the Dragon Sensor network IDS. There are many
                                    In

               network attacks (such as web attacks sent over an SSL connection) which the Dragon
               Sensor (or any other NIDS) cannot observe. Correlating these host and network events
                               NS

               (along with firewall information) is accomplished at the Dragon Server.
                           SA

               Dragon Server
                        ©

               It provides an engine management, event alerting, analysis and correlation. Dragon
               Server facilitates secure management of all Dragon Sensors and Dragon Squires. It also
               aggregates all alerts into one central database so that disparate attack information can be
               correlated.
               Key          The =Dragon
                    fingerprint          Server2F94
                                  AF19 FA27     includes
                                                     998Da variety of reporting
                                                            FDB5 DE3D     F8B5 and
                                                                                06E4analysis tools as well as
                                                                                      A169 4E46
               the ability to customize alerts via e-mail, SNMP or SYSLOG messages.

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                    Author retains full rights.
Dragon Sensor Architecture

               Dragon Sensor is a network packet based intrusion detection system. It collects network
               packets and analyzes them for a variety of suspicious activities. This suspicious activity
               may indicate network abuse, probes, intrusions or vulnerabilities. Dragon Sensor is

                                                                                                s.
               highly configurable and extremely fast. Multiple Dragon Sensors can operate jointly to

                                                                                             ht
               provide enterprise coverage of complex networks.

                                                                                         rig
               Dragon Sensor focuses on network performance and the collection of forensic evidence.

                                                                                     ull
               A variety of analysis tools are included to process collected data. For example, these tools
               sort through the collected data and produce flat log files, summary information, activity

                                                                                     f
               graphs and rebuild network sessions for inspection.

                                                                                  ns
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                               tai
               Dragon Sensors take two configuration files named dragon.net and dragon.sigs which

                                                                            re
               control what type of network traffic and event data is logged to the hard drive. The
               dragon.net file controls basic Sensor configuration, IP/TCP/UDP header anomalies, port

                                                                        or
               scan/sweep detection, policy driven events (such as finding new web servers), filtering,

                                                                     th
               SNMP alerting and protocol reconstruction. The dragon.sigs file specifies unique network
               patterns which may indicate probes, attacks and compromises and many other types of
                                                                 Au
               network abuse.
                                                              2,

               The Dragon Sensor basically logs to the hard drive because the component of the Dragon
                                                          00

               Sensor/Squire/Server architecture which enables enterprise communication is a
                                                       -2

               client/server program named Dragon Rider. For a Dragon Sensor being managed from a
               Dragon Server, a Dragon Rider Client program would be placed onto the Dragon Sensor.
                                                   00

               The Dragon Rider Client program watches all new event information being added to the
                                                20

               Sensor's event log and sends new events to the Dragon Server. If the Server has new
               configuration information, the Dragon Rider Client will receive it and then restart the
                                            te

               Sensor with the new configurations.
                                          tu

               The only other file that is required by Dragon Sensor at start up is a 'key' file. This file,
                                       sti

               named dragon.key, performs license management. The dragon.key file is tied to a specific
                                    In

               set of Dragon functions. These are Dragon Sensor, Dragon Squire and Dragon Server. A
               key file will contain one or more hostnames which have been authorized to become a
                               NS

               Sensor, Squire or Server. All software can be installed on the same system, but the key
               has to reflect that.
                           SA

               A Dragon Sensor can be configured to be 100% stand-alone. That is, a Sensor can be
                        ©

               deployed such that no IP stacks on any of it's network interfaces exist. In this case, the
               box must be managed from the physical console, or through a remote terminal server. In
               many cases, Sensors are deployed with one interface utilizing an IP stack, or two
               interfaces with only one IP stack. On any open network interface, it is highly
               recommended
               Key  fingerprintto= secure the operating
                                   AF19 FA27            system
                                                2F94 998D      before
                                                            FDB5  DE3Dinstalling the Dragon
                                                                         F8B5 06E4          Sensor.
                                                                                      A169 4E46
               Assuming that the box will only be administered by a small number of people, the focus
               should be on disabling remote services such as Sendmail and Telnet. If tight host based
               security is desired for the Dragon Sensor platform, consider deploying OpenBSD.

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                   Author retains full rights.
Dragon Squire Architecture

               Dragon Squire is a Host-Based IDS (HIDS) that can be run standalone or fully integrated
               into the Dragon Server architecture. Events can either be stored locally on the HIDS
               machine or forwarded to the Dragon Server and reported via the Dragon Fire interface. In

                                                                                               s.
               either configuration Dragon Squire can generate SNMP traps for designated events.

                                                                                            ht
               When storing the events locally, a set of the Dragon command line tools is stored on the

                                                                                        rig
               machine to provide reporting and analysis capabilities.

                                                                                    ull
               Squire's capabilities include the following:

                                                                                     f
               FILE CHANGE MONITORING

                                                                                  ns
                      Files can= be
               Key fingerprint      defined
                                 AF19   FA27in2F94
                                               the Dragon SquireDE3D
                                                    998D FDB5     configuration file (dsquire.net)
                                                                        F8B5 06E4    A169 4E46 by

                                                                               tai
                      specifying a name of a file and the full pathname to the file. For each defined file,

                                                                            re
                      many attributes can be monitored like: MD5 Hash Values, File Permissions, File
                      User Ownership, File Group Ownership, Inode Values, File Deletion, Truncated

                                                                        or
                      Files, Growing Files and Modification Time Changes

                                                                     th
                      These file definitions help to comprise a security policy for each Dragon Squire.
                      Security policies can be maintained via the Dragon Server web interface.
                                                                 Au
               SIGNATURE PROCESSING
                                                              2,

                    The contents of log files can be scanned to alarm if specified signature patterns
                                                          00

                    occur. This is configured by specifying a FILE_FORMAT describing the record
                                                       -2

                    layout for a defined file and then defining signatures that pattern match within the
                    FILE_FORMAT. The dsquire.net file contains the list of files to be monitored and
                                                   00

                    their log formats, and the dsquire.sigs file contains a list of signatures which are to
                                                20

                    be applied to each file.
                                            te

               SERVICE MONITORING
                                         tu

                    On Linux platforms, specific TCP and UDP services can be monitored to generate
                    events as services are started or existing services are terminated. The 'p roc' file
                                      sti

                    system is monitored for notification of network service starts and terminations.
                                    In

               SNMP MONITORING
                               NS

                    Dragon Squire can also listen to a stream of SNMP traps from a variety of
                    devices. The SNMP traps may be from firewalls, from routers or from any other
                           SA

                    type of device which can generate a trap. Signatures can be written for application
                    to the received SNMP traps. This allows Dragon Squire agents to monitor a
                        ©

                    variety of network devices.

               Dragon Squire operates with the Dragon Server through the use of the Dragon Rider
               Client which operates in a 'diskless' mode. By diskless, we mean that as long as the
               network
               Key      connection
                    fingerprint     to the
                                = AF19     Dragon
                                        FA27  2F94Server
                                                    998D is present,
                                                         FDB5   DE3D detected eventsA169
                                                                        F8B5 06E4    flow 4E46
                                                                                          immediately to
               the Dragon Server.

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                  Author retains full rights.
Dragon Server Architecture

               The Dragon Server is the "hub" of all enterprise security operations for the entire Dragon
               products. It can control many Dragon Sensors and Dragon Squire engines. It receives
               information from them and presents the information for alerting and analysis to Dragon

                                                                                              s.
               administrators. The Server is also the focal point for all configuration management of

                                                                                           ht
               each engine. When administrators change an engine configuration, the Dragon Server

                                                                                       rig
               will push the policy out to the modified Dragon engine.

                                                                                   ull
               The major features of Dragon Server are:

                                                                                    f
               Centralized Network IDS, Host IDS, Firewall and Network Monitoring

                                                                                 ns
                      The Dragon
               Key fingerprint     Server
                               = AF19 FA27brings
                                             2F94event
                                                  998Dcentralization
                                                        FDB5 DE3DtoF8B5 the both
                                                                             06E4theA169
                                                                                      Dragon
                                                                                          4E46Sensor and

                                                                              tai
                      Dragon Squire products. Since Dragon Squire can monitor log feeds from many

                                                                           re
                      major firewall vendors and several major network components (such as routers
                      and DNS servers), correlation of security events across all of these platforms

                                                                       or
                      provides a complete security picture.

                                                                    th
               Encrypted Event Centralization                   Au
                     All Dragon Squire and Dragon Sensor engines can have their events centralized to
                     the Dragon Server. This process is accomplished through the use of a single
                                                             2,

                     BLOWFISH encrypted TCP connection. BLOWFISH is an extremely fast
                                                          00

                     encryption algorithm. Filters can be placed at each Dragon engine such that only
                                                      -2

                     certain types of event data get forwarded to the Server.
                                                  00

               Engine Management
                                               20

                      All Dragon engines can be managed individually or in groups. This makes
                      management of large numbers of engines very easy. Also, all management is
                                            te

                      accomplished through a web interface which can be secured with any SSL web
                                         tu

                      server.
                                      sti

               Custom Signature Management
                                   In

                     The Dragon Server maintains several databases of known malicious network
                     traffic. Dragon Server administrators can write their own signatures and create
                               NS

                     their own custom signature libraries. All signature management is accomplished
                     through a web interface and hooks are in place to link to online resources from
                           SA

                     CERT, Bugtraq and the CVE project.
                        ©

               Live Signature Updates
                      Enterasys constantly monitors a variety of online security resources and quickly
                      writes Dragon Sensor and Dragon Squire signatures when new security threats are
                      published. Enterasys also conducts a variety of R&D efforts to produce entire
                      libraries=ofAF19
               Key fingerprint     signatures
                                        FA27 which  attempt
                                              2F94 998D     to detect
                                                         FDB5   DE3Dnew  varieties
                                                                      F8B5  06E4 of  misuse.
                                                                                   A169  4E46Any
                      Dragon customer who has purchased a Dragon Sensor license can subscribe their
                      server to automatically download new signatures from Enterasys.

© SANS Institute 2000 - 2002               As part of GIAC practical repository.                  Author retains full rights.
Dragon Server Web Components

               Dragon Server Web Interface
                     This web server interface is dedicated to management of the Dragon engine
                     configurations and will also monitor the performance of the engines as well. It is

                                                                                              s.
                     based on a combination of CGI-BIN PERL scripts and works with the Apache

                                                                                           ht
                     web server. Security can be enhanced by using an SSL version of the Apache web

                                                                                       rig
                     server.

                                                                                   ull
               Dragon Fire
                      The Dragon Fire interface is also a set of CGI-BIN PERL scripts which can

                                                                                    f
                      analyze events collected at the Dragon Server. All analysis is performed on each

                                                                                 ns
                      day's logs.
               Key fingerprint    Suspicious
                               = AF19        events998D
                                      FA27 2F94     can be correlated,
                                                         FDB5   DE3D sessions canA169
                                                                       F8B5 06E4    be replayed
                                                                                         4E46 and

                                                                              tai
                      many other forms of analysis are available as well.

                                                                           re
               Sorcerer

                                                                       or
                      The Sorcerer application is a trending tool. It requires an SQL database to perform

                                                                    th
                      long term storage of Dragon events. The web server interface to Sorcerer is also a
                      set of CGI-BIN PERL scripts which perform database queries to display trending
                                                                Au
                      information. The database can be kept entirely on a separate system which may
                      increase performance.
                                                             2,
                                                         00

               Alarmtool
                                                      -2

                     The Alarmtool is used to send SNMP traps, SMTP emails, SMTP pages,
                     SYSLOG messages, or execute commands based on a policy. The policy is
                                                  00

                     defined through a custom web interface which generates a configuration file. The
                                               20

                     'alarmtool' program receives events at the Dragon Server and then alerts the
                     Dragon dministrators.
                                           te
                                         tu

               Dragon Console
                     Because Dragon Server databases can grow to extremely large sizes, using the
                                      sti

                     Dragon Fire interface can become very slow. The Dragon Console allows Dragon
                                   In

                     administrators to analyze events as they occur in real time. Several web interfaces,
                     similar to Dragon Fire, exist to help organize the recent events and make a variety
                               NS

                     of displays in real time. No event detail, such as packet payload, is available, but
                     up to 2,000,000 events can be stored in memory at one time. For large networks,
                           SA

                     this may be 2-5 days of typical event traffic. For small networks, this could be
                     several months worth of traffic.
                        ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002               As part of GIAC practical repository.                 Author retains full rights.
Conclusions

               Security is possible, using the most up to date tools that are available, to protect against
               virtually every type of threat that is currently known about. Unfortunately, new threats
               and security holes in some software package or another are being discovered on a daily

                                                                                                 s.
               basis.

                                                                                              ht
                                                                                          rig
               It is important in any environment to know what types of threats you might be facing. Be
               aware of any potential security holes in your system, and take care to prevent attacks

                                                                                      ull
               against these.

                                                                                     f
               The Dragon tools and signatures are regularly updated to include information about new

                                                                                  ns
               threats
               Key     as they are
                    fingerprint    discovered,
                                = AF19         however
                                        FA27 2F94  998Dit is important
                                                          FDB5  DE3DtoF8B5
                                                                       keep06E4
                                                                             up to A169
                                                                                   date with
                                                                                         4E46the latest

                                                                               tai
               version of these files.

                                                                            re
                                                                        or
               References

                                                                     th
               1. Dragon Intrusion Detection                     Au
                  http://www.enterasys.com/ids/
                                                              2,

               2. Intrusion Detection, Theory and Practice by David "Del" Elson, March 27, 2000
                                                          00

                  http://www.securityfocus.com/frames/index.html?focus=ids
                                                       -2

               3. Ron Gula, Why Dragon ?, 1999
                                                   00

                  http://www.securitywizards.com/intro.htm
                                                20

               4. Documentation for Dragon Sensor
                                             te

                  https://63.210.52.6/sensor/index.html
                                          tu

               5. Documentation for Dragon Squire
                                       sti

                  https://63.210.52.6/squire/index.html
                                    In

               6. Documentation for Dragon Server
                               NS

                  https://63.210.52.6/server/index.html
                            SA
                        ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                    Author retains full rights.
Last Updated: June 18th, 2020

       Upcoming Training

Cyber Defence Australia Online 2020                        , Australia              Jun 22, 2020 - Jul 04, 2020   CyberCon

Instructor-Led Training | Jun 22                           , PA                     Jun 22, 2020 - Jun 27, 2020   CyberCon

Live Online - SEC401: Security Essentials Bootcamp Style   , United Arab Emirates   Jun 24, 2020 - Jul 31, 2020       vLive

SANS Japan Live Online July 2020                           , Japan                  Jun 29, 2020 - Jul 11, 2020   CyberCon

SANS Summer of Cyber | Jul 6                               , VA                     Jul 06, 2020 - Jul 17, 2020   CyberCon

Live Online - SEC401: Security Essentials Bootcamp Style   , United Arab Emirates   Jul 13, 2020 - Aug 01, 2020       vLive

SANS SEC401 Europe Online July 2020                        , United Arab Emirates   Jul 13, 2020 - Jul 18, 2020   CyberCon

SANS Rocky Mountain Summer 2020                            , CO                     Jul 20, 2020 - Jul 25, 2020   CyberCon

SANS Summer of Cyber | Jul 27                              , NC                     Jul 27, 2020 - Aug 01, 2020   CyberCon

Instructor-Led Training | Aug 3 ET                         , MA                     Aug 03, 2020 - Aug 08, 2020   CyberCon

Instructor-Led Training | Aug 10 MT                        , WA                     Aug 10, 2020 - Aug 15, 2020   CyberCon

SANS SEC401 Europe Online August 2020                      , United Arab Emirates   Aug 10, 2020 - Aug 15, 2020   CyberCon

SANS SEC401 Multi-Week Europe Online 2020                  , United Arab Emirates   Aug 17, 2020 - Aug 28, 2020       vLive

Cyber Defence APAC Live Online 2020                        , Singapore              Aug 17, 2020 - Aug 22, 2020   CyberCon

Instructor-Led Training | Aug 17 ET                        , DC                     Aug 17, 2020 - Aug 22, 2020   CyberCon

SANS Virginia Beach 2020                                   Virginia Beach, VA       Aug 30, 2020 - Sep 04, 2020   Live Event

SANS Virginia Beach 2020 - Live Online                     Virginia Beach, VA       Aug 30, 2020 - Sep 04, 2020   CyberCon

SANS London September 2020                                 London, United           Sep 07, 2020 - Sep 12, 2020   Live Event
                                                           Kingdom
SANS Baltimore Fall 2020                                   Baltimore, MD            Sep 08, 2020 - Sep 13, 2020   Live Event

SANS Baltimore Fall 2020 - Live Online                     Baltimore, MD            Sep 08, 2020 - Sep 13, 2020   CyberCon

SANS Munich September 2020                                 Munich, Germany          Sep 14, 2020 - Sep 19, 2020   Live Event

SANS Network Security 2020 - Live Online                   Las Vegas, NV            Sep 20, 2020 - Sep 25, 2020   CyberCon

SANS Network Security 2020                                 Las Vegas, NV            Sep 20, 2020 - Sep 25, 2020   Live Event

SANS Australia Spring Online 2020                          , Australia              Sep 21, 2020 - Oct 03, 2020   CyberCon

SANS Northern VA - Reston Fall 2020 - Live Online          Reston, VA               Sep 28, 2020 - Oct 03, 2020   CyberCon

SANS Northern VA - Reston Fall 2020                        Reston, VA               Sep 28, 2020 - Oct 03, 2020   Live Event

SANS Amsterdam October 2020                                Amsterdam, Netherlands   Oct 05, 2020 - Oct 10, 2020   Live Event

SANS Tokyo Autumn 2020                                     Tokyo, Japan             Oct 05, 2020 - Oct 17, 2020   Live Event

SANS Orlando 2020                                          Orlando, FL              Oct 12, 2020 - Oct 17, 2020   Live Event

SANS October Singapore 2020                                Singapore, Singapore     Oct 12, 2020 - Oct 24, 2020   Live Event

SANS Orlando 2020 - Live Online                            Orlando, FL              Oct 12, 2020 - Oct 17, 2020   CyberCon
You can also read