SlideShare a Scribd company logo
1 of 39
Download to read offline
1
You Don’t Know What You Can’t See:
Network Security Monitoring in ICS
Chris Sistrunk Senior Consultant
Rob Caldwell Principal Consultant
S4x15
© Mandiant, A FireEye Company. All rights reserved. 2
Agenda
§  Overview of NSM
§  Instrumenting an ICS
§  Examples and Case Study
§  Tools
§  Conclusion
§  Questions
© Mandiant, A FireEye Company. All rights reserved.
If ICS are so
vulnerable, why
haven’t we seen
more attacks?
© Mandiant, A FireEye Company. All rights reserved. 4
Two Key Reasons
1.  Intention
2.  Visibility
© Mandiant, A FireEye Company. All rights reserved. 5
Intention
Why are targeted attacks different?
•  It’s a “Who”, not a “What”…
•  They are Professional, Organized & Well Funded…
•  If You Kick Them Out They Will Return
© Mandiant, A FireEye Company. All rights reserved. 6
Visibility
We are not looking!
“Prevention is ideal, but Detection is a must…”
© Mandiant, A FireEye Company. All rights reserved. 7
Visibility
© Mandiant, A FireEye Company. All rights reserved. 8
The IOC problem
There are numerous sources of IOCs, which are a means to describe threat
data like evidence of compromise/activity, attacker methodology, or malware.
For example, from the recent “Ongoing
Sophisticated Malware Campaign” from
ICS-CERT.
What do you do with this?
Most ICS operators have no capability to
consume IOCs, much less generate them for
“information sharing”.
Common sources of ICS IOCs are ICS-CERT, US-CERT, and
many of the recent “vendor” reports.
© Mandiant, A FireEye Company. All rights reserved. 9
Network Security Monitoring
“The collection, analysis, and escalation of indications and
warnings to detect and respond to intrusions. NSM is a way
to find intruders on your network and do something about
them before they damage your enterprise.”
- The Practice of Network Security Monitoring
Cliff Stoll
“Stalking the
Wily Hacker”
1988
Todd Herberlein
et al.
“A Network
Security
Monitor”
1990
US Air Force
Defense
Information
Systems
Agency
Lawrence
Livermore
National Lab
Early 1990s
NetRanger
RealSecure
Snort
and many
others
Late 1990s -
early 2000s
Formal
definition of
NSM
2002
© Mandiant, A FireEye Company. All rights reserved. 10
The NSM Cycle
Collection
DetectionAnalysis
•  Model for action, based on
network-derived data
•  Requires people and process, not
just technology
•  Focuses on the adversary, not the
vulnerability
© Mandiant, A FireEye Company. All rights reserved.
Methods of Monitoring
§  Network tap – physical device which relays a copy of
packets to an NSM server
§  SPAN or mirrored ports – switch configuration which
sends copies of packets to a separate port where NSM
can connect
§  Host NIC – configured to watch all network traffic flowing
on its segment
§  Serial port tap – physical device which relays serial
traffic to another port, usually requires additional
software to interpret data
Fluke Networks
Stratus Engineering
© Mandiant, A FireEye Company. All rights reserved.
Types of Data Collected
§  Full content data – unfiltered collection of packets
§  Extracted content – data streams, files, Web pages, etc.
§  Session data – conversation between nodes
§  Transaction data – requests and replies between nodes
§  Statistical data – description of traffic, such as protocol
and volume
§  Metadata – aspects of data, e.g. who owns this IP
address
§  Alert/log data – triggers from IDS tools, tracking user
logins, etc.
© Mandiant, A FireEye Company. All rights reserved.
Difficulties for NSM
§  Encrypted networks
§  Widespread NAT
§  Devices moving between network segments
§  Extreme traffic volume
§  Privacy concerns
Issues that most ICS do not face!
© Mandiant, A FireEye Company. All rights reserved.
Example ICS
14
Enterprise/IT
DMZ
Plant
Control
Web
Historian or
other DB
DCS HistorianHMI
PLCs,
Controllers,
RTUs, PACs
© Mandiant, A FireEye Company. All rights reserved.
Anatomy of an Attack
15
Over all Mandiant attack investigations,
only a little more than half of victim computers have malware on them.
While attackers often use malware to gain an initial foothold,
they quickly move to other tactics to execute their attacks.
EVIDENCE OF COMPROMISE
Initial Compromise Establish Foothold Escalate Privileges Internal Recon Complete Mission
Move
Laterally
Maintain
Presence
Unauthorized
Use of Valid
Accounts
Known &
Unknown
Malware
Command &
Control Activity
Suspicious
Network Traffic
Files Accessed
by Attackers
Valid Programs
Used for Evil
Purposes
Trace Evidence
& Partial Files
© Mandiant, A FireEye Company. All rights reserved. 16
Attacker Objectives
Attacker’s goals:
§  Damage equipment
§  Affect or steal process info
§  Cause safety or compliance issue
§  Pivot from vulnerable ICS to
enterprise
Attacker’s options:
§  Gain physical access to an ICS
host
§  Gain remote access to an ICS
host
§  Compromise a highly-privileged
client machine with access to the
ICS network
Enterprise/IT
Plant DMZ
Control
Web
Historian or
other DB
SCADA HistorianHMI
PLCs,
Controllers,
RTUs, PACs
© Mandiant, A FireEye Company. All rights reserved.
NSM Collection
17
•  Firewall Logs
•  Netflow Data
•  NIDS/HIDS
•  Full packet capture or NetFlow
•  Windows Logs and syslog
•  SNMP (CPU % etc.)
•  Alerts from security agents
(AV, whitelisting, etc.)
DMZ
Plant
Control
Web
Historian or
other DB
DCS HistorianHMI
PLCs,
Controllers,
RTUs, PACs
Enterprise/ITEnterprise technology collectors Logs and/or Agent
Network sensors Logs only
© Mandiant, A FireEye Company. All rights reserved. 18
What Are We Looking For?
§  Exceptions from baseline (e.g. A talks to B but never C)
§  “Top Talkers”
§  Unexpected connectivity (to Internet, Business network)
§  Known malicious IPs and domains
§  Logins using default accounts
§  Error messages that could correlate to vulnerabilities
§  Unusual system and firewall log entries
§  Host-based IDS or other security system alerts
§  Unexpected file and firmware updates
§  Antivirus alerts
§  And others….
© Mandiant, A FireEye Company. All rights reserved.
•  IDS alerts
•  Anomaly detection
•  Firmware updates, other
commands
•  Login with default credentials
•  High CPU or network bandwidth
•  Door alarms when nobody is
supposed to be working
•  Devices going off-line or behaving
strangely
19
NSM Detection
Analyst looks at detected anomalies
or alerts then escalates to IR
Enterprise/IT
DMZ
Plant
Control
HMI
PLCs,
Controllers,
RTUs, PACs
!
DMZ
Plant
Control
Web
Historian or
other DB
DCS HistorianHMI
PLCs,
Controllers,
RTUs, PACs
© Mandiant, A FireEye Company. All rights reserved. 20
NSM Analysis
Incident responders analyze the
detected anomalies to find evil
Enterprise/IT
DMZ
Plant
Control
HMI
PLCs,
Controllers,
RTUs, PACs
•  Application exploitation
•  Third-party connections (ex. ICCP
or vendor access)
•  ICS-specific communication
protocol attacks (ex. Modbus,
DNP3, Profinet, EtherNet/IP)
•  Remote access exploitation
•  Direct network access due to poor
physical security
•  USB-delivered malware
DMZ
Plant
Control
Web
Historian or
other DB
DCS HistorianHMI
PLCs,
Controllers,
RTUs, PACs
© Mandiant, A FireEye Company. All rights reserved. 21
Top Talkers
FlowBat characterizes NetFlow data, showing which nodes have the most traffic
Web traffic
Web traffic
NetBios
NTP
© Mandiant, A FireEye Company. All rights reserved. 22
Address Spoofing
NetworkMiner can find potential ARP spoofing (as well as many other indicators)
© Mandiant, A FireEye Company. All rights reserved.
Bro IDS Logs
Modbus
DNP3
Bro parses Modbus and DNP3 packets, ELSA consolidates Bro logs
© Mandiant, A FireEye Company. All rights reserved. 24
IDS GUIs
Alerts in Sguil of scanning activity
© Mandiant, A FireEye Company. All rights reserved. 25
Malformed Modbus
Deep packet inspection of Modbus by Wireshark
© Mandiant, A FireEye Company. All rights reserved.
Syslog
Syslog can be configured to send to the SO server, or detected in network
traffic if sent elsewhere.
© Mandiant, A FireEye Company. All rights reserved.
15 minutes of network traffic capture data revealed
external DNS requests (to some dubious hosts…)
Case Study – ICS Operator
27
© Mandiant, A FireEye Company. All rights reserved. 28
Abnormal DNS Traffic
“Strange” DNS requests originating from within the ICS
© Mandiant, A FireEye Company. All rights reserved. 29
Abnormal DNS Traffic
DNS requests shown in ELSA
© Mandiant, A FireEye Company. All rights reserved.
NSM Tools
Security Onion Linux distribution
‒  Easy to install and lots of documentation
§  Full packet capture – Tcpdump/Wireshark/NetworkMiner
§  Extracted content – Xplico/NetworkMiner
§  Session data – Bro/FlowBat
§  Transaction data – Bro
§  Statistical data – Capinfos/Wireshark
§  Meta data – ELSA (Whois)
§  Alert data – Snort, Suricata, Sguil, Snorby
Peel Back the Layers of Your Network
© Mandiant, A FireEye Company. All rights reserved.
Security Onion Tools
© Mandiant, A FireEye Company. All rights reserved. 32
Security Onion Implementation
§  Test in a lab first
§  Select suitable hardware platform
‒  More RAM is better
‒  Bigger hard drive is better (longer retention)
§  Mirrored/SPAN port on router/switch or a good network
tap
§  Select proper placement of SO sensor
‒  The Practice of Network Security Monitoring
‒  Applied Network Security Monitoring
§  Work with the right stakeholders if placing in production
© Mandiant, A FireEye Company. All rights reserved. 33
NetFlow Tools
SiLK & FlowBAT
§  Install on Security Onion with 2 scripts
§  www.flowbat.com
© Mandiant, A FireEye Company. All rights reserved. 34
Takeaways
§ You can implement NSM in ICS
today – without impacting your
operations
§ ICS IoCs are becoming more
common – need tools to look
for them
© Mandiant, A FireEye Company. All rights reserved.
People…
…the most important part of NSM!
§  Gigabytes of data and 1000s of IDS alerts are useless without
interpretation
§  Analyze data collected to understand what’s normal – and
what’s not
§  Identify adversary TTPs and act to disrupt them
Remember, adversaries are a “Who”,
not a “What
© Mandiant, A FireEye Company. All rights reserved. 36
Set the Right Goal
DETECT
ICS network
instrumented with
security technology
and monitored by
security personnel
RESPOND
Effective process for
response to ICS
cyber security
incidents
CONTAIN
Business continuity
and DR planning
consider ICS asset
compromise
Showing evidence of
conformance/compliance
Finding indications of
compromise
© Mandiant, A FireEye Company. All rights reserved.
Redefine the Win
Reconnaissance Weaponization Delivery Exploitation Installation
Command &
Control
Actions on
Objectives
http://papers.rohanamin.com/wp-content/uploads/papers.rohanamin.com/2011/08/iciw2011.pdf
Halting the attacker anywhere
in the cycle stops them from
achieving their objective
© Mandiant, A FireEye Company. All rights reserved.
§  The Cuckoo’s Egg by Cliff Stoll
https://www.youtube.com/watch?v=EcKxaq1FTac
1-hour NOVA Special (1990)
§  The Practice of Network Security Monitoring by Richard
Bejtlich
http://www.nostarch.com/nsm
§  Applied Network Security Monitoring by Chris Sanders &
Jason Smith
http://www.appliednsm.com/
§  The NSM Wiki http://nsmwiki.org
§  Security Onion distribution http://securityonion.net
NSM References/Resources
38
© Mandiant, A FireEye Company. All rights reserved. 39
Questions?
chris.sistrunk@mandiant.com
@chrissistrunk
robert.caldwell@mandiant.com
@robac3

More Related Content

What's hot

How to Plan Purple Team Exercises
How to Plan Purple Team ExercisesHow to Plan Purple Team Exercises
How to Plan Purple Team ExercisesHaydn Johnson
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onSplunk
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution hashnees
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxAbimbolaFisher1
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghOWASP Delhi
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceVishal Kumar
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 

What's hot (20)

How to Plan Purple Team Exercises
How to Plan Purple Team ExercisesHow to Plan Purple Team Exercises
How to Plan Purple Team Exercises
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Introduction IDS
Introduction IDSIntroduction IDS
Introduction IDS
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
ISACA -Threat Hunting using Native Windows tools .pdf
ISACA -Threat Hunting using Native Windows tools .pdfISACA -Threat Hunting using Native Windows tools .pdf
ISACA -Threat Hunting using Native Windows tools .pdf
 

Viewers also liked

BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseChris Sistrunk
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS CommunicationsDigital Bond
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?Digital Bond
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaDigital Bond
 
Remote Control Automobiles at ESCAR US 2015
Remote Control Automobiles at ESCAR US 2015Remote Control Automobiles at ESCAR US 2015
Remote Control Automobiles at ESCAR US 2015Digital Bond
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Digital Bond
 
Dynamic Zoning Based On Situational Activity in ICS (Japanese)
Dynamic Zoning Based On Situational Activity in ICS (Japanese)Dynamic Zoning Based On Situational Activity in ICS (Japanese)
Dynamic Zoning Based On Situational Activity in ICS (Japanese)Digital Bond
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityChris Sistrunk
 
ICS Security Training ... What Works and What Is Needed (Japanese)
ICS Security Training ... What Works and What Is Needed (Japanese)ICS Security Training ... What Works and What Is Needed (Japanese)
ICS Security Training ... What Works and What Is Needed (Japanese)Digital Bond
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat SheetICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat Sheetqqlan
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 
Havex Deep Dive (English)
Havex Deep Dive (English)Havex Deep Dive (English)
Havex Deep Dive (English)Digital Bond
 
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...Digital Bond
 
The RIPE Experience
The RIPE ExperienceThe RIPE Experience
The RIPE ExperienceDigital Bond
 
Windows Service Hardening
Windows Service HardeningWindows Service Hardening
Windows Service HardeningDigital Bond
 
Incubation of ICS Malware (English)
Incubation of ICS Malware (English)Incubation of ICS Malware (English)
Incubation of ICS Malware (English)Digital Bond
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case StudyDigital Bond
 
Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)Digital Bond
 

Viewers also liked (20)

BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
 
Remote Control Automobiles at ESCAR US 2015
Remote Control Automobiles at ESCAR US 2015Remote Control Automobiles at ESCAR US 2015
Remote Control Automobiles at ESCAR US 2015
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
 
Dynamic Zoning Based On Situational Activity in ICS (Japanese)
Dynamic Zoning Based On Situational Activity in ICS (Japanese)Dynamic Zoning Based On Situational Activity in ICS (Japanese)
Dynamic Zoning Based On Situational Activity in ICS (Japanese)
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
ICS Security Training ... What Works and What Is Needed (Japanese)
ICS Security Training ... What Works and What Is Needed (Japanese)ICS Security Training ... What Works and What Is Needed (Japanese)
ICS Security Training ... What Works and What Is Needed (Japanese)
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat SheetICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
Havex Deep Dive (English)
Havex Deep Dive (English)Havex Deep Dive (English)
Havex Deep Dive (English)
 
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
 
The RIPE Experience
The RIPE ExperienceThe RIPE Experience
The RIPE Experience
 
Windows Service Hardening
Windows Service HardeningWindows Service Hardening
Windows Service Hardening
 
Incubation of ICS Malware (English)
Incubation of ICS Malware (English)Incubation of ICS Malware (English)
Incubation of ICS Malware (English)
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)
 

Similar to Network Security Monitoring in ICS

All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael FirstenbergTI Safe
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...TI Safe
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Unisys Corporation
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceChristopher Gerritz
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewSymantec
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeLancope, Inc.
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...CODE BLUE
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsJohn Gilligan
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
 
Defcon 23 - Chris Sistrunk - nsm 101 for ics
Defcon 23 -  Chris Sistrunk - nsm 101 for ics Defcon 23 -  Chris Sistrunk - nsm 101 for ics
Defcon 23 - Chris Sistrunk - nsm 101 for ics Felipe Prado
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 

Similar to Network Security Monitoring in ICS (20)

All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
 
Honeypot
Honeypot Honeypot
Honeypot
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
Lesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPSLesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPS
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
Defcon 23 - Chris Sistrunk - nsm 101 for ics
Defcon 23 -  Chris Sistrunk - nsm 101 for ics Defcon 23 -  Chris Sistrunk - nsm 101 for ics
Defcon 23 - Chris Sistrunk - nsm 101 for ics
 
Juniper idp overview
Juniper idp overviewJuniper idp overview
Juniper idp overview
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Presentation1
Presentation1Presentation1
Presentation1
 

More from Digital Bond

The Future of ICS Security Products
The Future of ICS Security ProductsThe Future of ICS Security Products
The Future of ICS Security ProductsDigital Bond
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsDigital Bond
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014Digital Bond
 
Unidirectional Security Appliances to Secure ICS
Unidirectional Security Appliances to Secure ICSUnidirectional Security Appliances to Secure ICS
Unidirectional Security Appliances to Secure ICSDigital Bond
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing KeynoteDigital Bond
 
Survey and Analysis of ICS Vulnerabilities (Japanese)
Survey and Analysis of ICS Vulnerabilities (Japanese)Survey and Analysis of ICS Vulnerabilities (Japanese)
Survey and Analysis of ICS Vulnerabilities (Japanese)Digital Bond
 
Unsolicited Response - Getting BACnet Off of the Internet (Japanese)
Unsolicited Response - Getting BACnet Off of the Internet (Japanese)Unsolicited Response - Getting BACnet Off of the Internet (Japanese)
Unsolicited Response - Getting BACnet Off of the Internet (Japanese)Digital Bond
 
Sharing Plant Data with Phones, Tablets and the Cloud (Englsh)
Sharing Plant Data with Phones, Tablets and the Cloud (Englsh)Sharing Plant Data with Phones, Tablets and the Cloud (Englsh)
Sharing Plant Data with Phones, Tablets and the Cloud (Englsh)Digital Bond
 
Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)Digital Bond
 
Industrial Wireless Security (Japanese)
Industrial Wireless Security (Japanese)Industrial Wireless Security (Japanese)
Industrial Wireless Security (Japanese)Digital Bond
 
S4x14 Session: You Name It; We Analyze It
S4x14 Session: You Name It; We Analyze ItS4x14 Session: You Name It; We Analyze It
S4x14 Session: You Name It; We Analyze ItDigital Bond
 
Writing ICS Vulnerability Analysis
Writing ICS Vulnerability AnalysisWriting ICS Vulnerability Analysis
Writing ICS Vulnerability AnalysisDigital Bond
 
HART as an Attack Vector
HART as an Attack VectorHART as an Attack Vector
HART as an Attack VectorDigital Bond
 
PLC Code Protection
PLC Code ProtectionPLC Code Protection
PLC Code ProtectionDigital Bond
 

More from Digital Bond (14)

The Future of ICS Security Products
The Future of ICS Security ProductsThe Future of ICS Security Products
The Future of ICS Security Products
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS Solutions
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014
 
Unidirectional Security Appliances to Secure ICS
Unidirectional Security Appliances to Secure ICSUnidirectional Security Appliances to Secure ICS
Unidirectional Security Appliances to Secure ICS
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing Keynote
 
Survey and Analysis of ICS Vulnerabilities (Japanese)
Survey and Analysis of ICS Vulnerabilities (Japanese)Survey and Analysis of ICS Vulnerabilities (Japanese)
Survey and Analysis of ICS Vulnerabilities (Japanese)
 
Unsolicited Response - Getting BACnet Off of the Internet (Japanese)
Unsolicited Response - Getting BACnet Off of the Internet (Japanese)Unsolicited Response - Getting BACnet Off of the Internet (Japanese)
Unsolicited Response - Getting BACnet Off of the Internet (Japanese)
 
Sharing Plant Data with Phones, Tablets and the Cloud (Englsh)
Sharing Plant Data with Phones, Tablets and the Cloud (Englsh)Sharing Plant Data with Phones, Tablets and the Cloud (Englsh)
Sharing Plant Data with Phones, Tablets and the Cloud (Englsh)
 
Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)
 
Industrial Wireless Security (Japanese)
Industrial Wireless Security (Japanese)Industrial Wireless Security (Japanese)
Industrial Wireless Security (Japanese)
 
S4x14 Session: You Name It; We Analyze It
S4x14 Session: You Name It; We Analyze ItS4x14 Session: You Name It; We Analyze It
S4x14 Session: You Name It; We Analyze It
 
Writing ICS Vulnerability Analysis
Writing ICS Vulnerability AnalysisWriting ICS Vulnerability Analysis
Writing ICS Vulnerability Analysis
 
HART as an Attack Vector
HART as an Attack VectorHART as an Attack Vector
HART as an Attack Vector
 
PLC Code Protection
PLC Code ProtectionPLC Code Protection
PLC Code Protection
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Network Security Monitoring in ICS

  • 1. 1 You Don’t Know What You Can’t See: Network Security Monitoring in ICS Chris Sistrunk Senior Consultant Rob Caldwell Principal Consultant S4x15
  • 2. © Mandiant, A FireEye Company. All rights reserved. 2 Agenda §  Overview of NSM §  Instrumenting an ICS §  Examples and Case Study §  Tools §  Conclusion §  Questions
  • 3. © Mandiant, A FireEye Company. All rights reserved. If ICS are so vulnerable, why haven’t we seen more attacks?
  • 4. © Mandiant, A FireEye Company. All rights reserved. 4 Two Key Reasons 1.  Intention 2.  Visibility
  • 5. © Mandiant, A FireEye Company. All rights reserved. 5 Intention Why are targeted attacks different? •  It’s a “Who”, not a “What”… •  They are Professional, Organized & Well Funded… •  If You Kick Them Out They Will Return
  • 6. © Mandiant, A FireEye Company. All rights reserved. 6 Visibility We are not looking! “Prevention is ideal, but Detection is a must…”
  • 7. © Mandiant, A FireEye Company. All rights reserved. 7 Visibility
  • 8. © Mandiant, A FireEye Company. All rights reserved. 8 The IOC problem There are numerous sources of IOCs, which are a means to describe threat data like evidence of compromise/activity, attacker methodology, or malware. For example, from the recent “Ongoing Sophisticated Malware Campaign” from ICS-CERT. What do you do with this? Most ICS operators have no capability to consume IOCs, much less generate them for “information sharing”. Common sources of ICS IOCs are ICS-CERT, US-CERT, and many of the recent “vendor” reports.
  • 9. © Mandiant, A FireEye Company. All rights reserved. 9 Network Security Monitoring “The collection, analysis, and escalation of indications and warnings to detect and respond to intrusions. NSM is a way to find intruders on your network and do something about them before they damage your enterprise.” - The Practice of Network Security Monitoring Cliff Stoll “Stalking the Wily Hacker” 1988 Todd Herberlein et al. “A Network Security Monitor” 1990 US Air Force Defense Information Systems Agency Lawrence Livermore National Lab Early 1990s NetRanger RealSecure Snort and many others Late 1990s - early 2000s Formal definition of NSM 2002
  • 10. © Mandiant, A FireEye Company. All rights reserved. 10 The NSM Cycle Collection DetectionAnalysis •  Model for action, based on network-derived data •  Requires people and process, not just technology •  Focuses on the adversary, not the vulnerability
  • 11. © Mandiant, A FireEye Company. All rights reserved. Methods of Monitoring §  Network tap – physical device which relays a copy of packets to an NSM server §  SPAN or mirrored ports – switch configuration which sends copies of packets to a separate port where NSM can connect §  Host NIC – configured to watch all network traffic flowing on its segment §  Serial port tap – physical device which relays serial traffic to another port, usually requires additional software to interpret data Fluke Networks Stratus Engineering
  • 12. © Mandiant, A FireEye Company. All rights reserved. Types of Data Collected §  Full content data – unfiltered collection of packets §  Extracted content – data streams, files, Web pages, etc. §  Session data – conversation between nodes §  Transaction data – requests and replies between nodes §  Statistical data – description of traffic, such as protocol and volume §  Metadata – aspects of data, e.g. who owns this IP address §  Alert/log data – triggers from IDS tools, tracking user logins, etc.
  • 13. © Mandiant, A FireEye Company. All rights reserved. Difficulties for NSM §  Encrypted networks §  Widespread NAT §  Devices moving between network segments §  Extreme traffic volume §  Privacy concerns Issues that most ICS do not face!
  • 14. © Mandiant, A FireEye Company. All rights reserved. Example ICS 14 Enterprise/IT DMZ Plant Control Web Historian or other DB DCS HistorianHMI PLCs, Controllers, RTUs, PACs
  • 15. © Mandiant, A FireEye Company. All rights reserved. Anatomy of an Attack 15 Over all Mandiant attack investigations, only a little more than half of victim computers have malware on them. While attackers often use malware to gain an initial foothold, they quickly move to other tactics to execute their attacks. EVIDENCE OF COMPROMISE Initial Compromise Establish Foothold Escalate Privileges Internal Recon Complete Mission Move Laterally Maintain Presence Unauthorized Use of Valid Accounts Known & Unknown Malware Command & Control Activity Suspicious Network Traffic Files Accessed by Attackers Valid Programs Used for Evil Purposes Trace Evidence & Partial Files
  • 16. © Mandiant, A FireEye Company. All rights reserved. 16 Attacker Objectives Attacker’s goals: §  Damage equipment §  Affect or steal process info §  Cause safety or compliance issue §  Pivot from vulnerable ICS to enterprise Attacker’s options: §  Gain physical access to an ICS host §  Gain remote access to an ICS host §  Compromise a highly-privileged client machine with access to the ICS network Enterprise/IT Plant DMZ Control Web Historian or other DB SCADA HistorianHMI PLCs, Controllers, RTUs, PACs
  • 17. © Mandiant, A FireEye Company. All rights reserved. NSM Collection 17 •  Firewall Logs •  Netflow Data •  NIDS/HIDS •  Full packet capture or NetFlow •  Windows Logs and syslog •  SNMP (CPU % etc.) •  Alerts from security agents (AV, whitelisting, etc.) DMZ Plant Control Web Historian or other DB DCS HistorianHMI PLCs, Controllers, RTUs, PACs Enterprise/ITEnterprise technology collectors Logs and/or Agent Network sensors Logs only
  • 18. © Mandiant, A FireEye Company. All rights reserved. 18 What Are We Looking For? §  Exceptions from baseline (e.g. A talks to B but never C) §  “Top Talkers” §  Unexpected connectivity (to Internet, Business network) §  Known malicious IPs and domains §  Logins using default accounts §  Error messages that could correlate to vulnerabilities §  Unusual system and firewall log entries §  Host-based IDS or other security system alerts §  Unexpected file and firmware updates §  Antivirus alerts §  And others….
  • 19. © Mandiant, A FireEye Company. All rights reserved. •  IDS alerts •  Anomaly detection •  Firmware updates, other commands •  Login with default credentials •  High CPU or network bandwidth •  Door alarms when nobody is supposed to be working •  Devices going off-line or behaving strangely 19 NSM Detection Analyst looks at detected anomalies or alerts then escalates to IR Enterprise/IT DMZ Plant Control HMI PLCs, Controllers, RTUs, PACs ! DMZ Plant Control Web Historian or other DB DCS HistorianHMI PLCs, Controllers, RTUs, PACs
  • 20. © Mandiant, A FireEye Company. All rights reserved. 20 NSM Analysis Incident responders analyze the detected anomalies to find evil Enterprise/IT DMZ Plant Control HMI PLCs, Controllers, RTUs, PACs •  Application exploitation •  Third-party connections (ex. ICCP or vendor access) •  ICS-specific communication protocol attacks (ex. Modbus, DNP3, Profinet, EtherNet/IP) •  Remote access exploitation •  Direct network access due to poor physical security •  USB-delivered malware DMZ Plant Control Web Historian or other DB DCS HistorianHMI PLCs, Controllers, RTUs, PACs
  • 21. © Mandiant, A FireEye Company. All rights reserved. 21 Top Talkers FlowBat characterizes NetFlow data, showing which nodes have the most traffic Web traffic Web traffic NetBios NTP
  • 22. © Mandiant, A FireEye Company. All rights reserved. 22 Address Spoofing NetworkMiner can find potential ARP spoofing (as well as many other indicators)
  • 23. © Mandiant, A FireEye Company. All rights reserved. Bro IDS Logs Modbus DNP3 Bro parses Modbus and DNP3 packets, ELSA consolidates Bro logs
  • 24. © Mandiant, A FireEye Company. All rights reserved. 24 IDS GUIs Alerts in Sguil of scanning activity
  • 25. © Mandiant, A FireEye Company. All rights reserved. 25 Malformed Modbus Deep packet inspection of Modbus by Wireshark
  • 26. © Mandiant, A FireEye Company. All rights reserved. Syslog Syslog can be configured to send to the SO server, or detected in network traffic if sent elsewhere.
  • 27. © Mandiant, A FireEye Company. All rights reserved. 15 minutes of network traffic capture data revealed external DNS requests (to some dubious hosts…) Case Study – ICS Operator 27
  • 28. © Mandiant, A FireEye Company. All rights reserved. 28 Abnormal DNS Traffic “Strange” DNS requests originating from within the ICS
  • 29. © Mandiant, A FireEye Company. All rights reserved. 29 Abnormal DNS Traffic DNS requests shown in ELSA
  • 30. © Mandiant, A FireEye Company. All rights reserved. NSM Tools Security Onion Linux distribution ‒  Easy to install and lots of documentation §  Full packet capture – Tcpdump/Wireshark/NetworkMiner §  Extracted content – Xplico/NetworkMiner §  Session data – Bro/FlowBat §  Transaction data – Bro §  Statistical data – Capinfos/Wireshark §  Meta data – ELSA (Whois) §  Alert data – Snort, Suricata, Sguil, Snorby Peel Back the Layers of Your Network
  • 31. © Mandiant, A FireEye Company. All rights reserved. Security Onion Tools
  • 32. © Mandiant, A FireEye Company. All rights reserved. 32 Security Onion Implementation §  Test in a lab first §  Select suitable hardware platform ‒  More RAM is better ‒  Bigger hard drive is better (longer retention) §  Mirrored/SPAN port on router/switch or a good network tap §  Select proper placement of SO sensor ‒  The Practice of Network Security Monitoring ‒  Applied Network Security Monitoring §  Work with the right stakeholders if placing in production
  • 33. © Mandiant, A FireEye Company. All rights reserved. 33 NetFlow Tools SiLK & FlowBAT §  Install on Security Onion with 2 scripts §  www.flowbat.com
  • 34. © Mandiant, A FireEye Company. All rights reserved. 34 Takeaways § You can implement NSM in ICS today – without impacting your operations § ICS IoCs are becoming more common – need tools to look for them
  • 35. © Mandiant, A FireEye Company. All rights reserved. People… …the most important part of NSM! §  Gigabytes of data and 1000s of IDS alerts are useless without interpretation §  Analyze data collected to understand what’s normal – and what’s not §  Identify adversary TTPs and act to disrupt them Remember, adversaries are a “Who”, not a “What
  • 36. © Mandiant, A FireEye Company. All rights reserved. 36 Set the Right Goal DETECT ICS network instrumented with security technology and monitored by security personnel RESPOND Effective process for response to ICS cyber security incidents CONTAIN Business continuity and DR planning consider ICS asset compromise Showing evidence of conformance/compliance Finding indications of compromise
  • 37. © Mandiant, A FireEye Company. All rights reserved. Redefine the Win Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Actions on Objectives http://papers.rohanamin.com/wp-content/uploads/papers.rohanamin.com/2011/08/iciw2011.pdf Halting the attacker anywhere in the cycle stops them from achieving their objective
  • 38. © Mandiant, A FireEye Company. All rights reserved. §  The Cuckoo’s Egg by Cliff Stoll https://www.youtube.com/watch?v=EcKxaq1FTac 1-hour NOVA Special (1990) §  The Practice of Network Security Monitoring by Richard Bejtlich http://www.nostarch.com/nsm §  Applied Network Security Monitoring by Chris Sanders & Jason Smith http://www.appliednsm.com/ §  The NSM Wiki http://nsmwiki.org §  Security Onion distribution http://securityonion.net NSM References/Resources 38
  • 39. © Mandiant, A FireEye Company. All rights reserved. 39 Questions? chris.sistrunk@mandiant.com @chrissistrunk robert.caldwell@mandiant.com @robac3