Defensive Security Project
by: [Dylan Adams, Vernon Worthy II, Jimmy Nguyen, Cameron Harding, Hamza Suraj, Kysten Raleigh]
1
Table of Contents
This document contains the following resources:
Monitoring Environment
Attack Analysis
Project Summary & Future Mitigations
2
01
02
03
Monitoring Environment
3
Scenario
4
Whois XML IP Geolocation API
5
Whois XML IP Geolocation API
6
Whois XML IP Geolocation API
7
Whois XML IP Geolocation API Images
8
Whois XML IP Geolocation API Images
9
Logs Analyzed
These logs contain user accounts, user and Windows activities, as well as security events categorized by severity.
Windows Logs
These are attack logs from the Apache servers that run VSI’s back-end systems. They were captured during the time when the attack occurred.
Apache Logs
10
1
2
Windows Logs
11
Reports—Windows
Designed the following Reports:
12
Report Name | Report Description |
Signatures and IDs | A table of windows log signatures and their corresponding ID number. |
Top Windows Severity | Shows the count and percent of the severity for the logs. |
Top Windows Status | A comparison between the success and failure of windows activities. |
Images of Reports—Windows
13
Report Image
Report Image
Report Image
Report Image
Signatures and IDs
Top Windows Status
Top Windows Severity
Alerts—Windows
Designed the following alerts:
14
Alert Name | Alert Description | Alert Baseline | Alert Threshold |
Hourly Level of Failed Windows Activity Spike | Does an hourly check for failed windows activity | 8 | 12 |
JUSTIFICATION: The hourly events stuck around 5 with occasional spikes up to around 9-10, so to prevent the normal spikes from being caught we set it at 12.
Alerts—Windows
Designed the following alerts:
15
Alert Name | Alert Description | Alert Baseline | Alert Threshold |
Level of Hourly Successful Logins | Runs an hourly check for successful logins | 12 | 25 |
JUSTIFICATION: Most of the activity jumped around 8-14 with the peak reaching 21 for one hour. In order to prevent a peak like 21 from being caught often we set it a bit above to 25.
Alerts—Windows
Designed the following alerts:
16
Alert Name | Alert Description | Alert Baseline | Alert Threshold |
Number of Account Deletions Spike | Looks for sudden spikes in hourly account deletions | 15 | 30 |
JUSTIFICATION: Most of the activity sat between 9-16 with two notable jumps too 21 and 22. To prevent normal activity from triggering the alert it was set at 30 for a bit of leeway.
Dashboards—Windows
17
Place image here
Place image here
Line Chart of Signatures Over Time
Line Chart of User Activity Over Time
Dashboards—Windows
18
Place image here
Place image here
Chart of Signatures
Chart of User Activity
Radial Chart of Modified Actions Over Time
Apache Logs
19
Reports—Apache
Designed the following reports:
20
Report Name | Report Description |
HTTP Method Table | Displays Counts and Types of HTTP Methods (GET, POST, HEAD, OPTIONS) |
Top Referrer Domains Table | Displays Counts and Names of Top 10 Referred Domains |
HTTP Response Code Table | Displays the Top HTTP Status Codes and their Counts |
Images of Reports—Apache
21
Report Image
Report Image
Report Image
Top Left - HTTP Method Table
Top Right - Top Referrer Domains Table
Bottom Left - HTTP Response Codes
Alerts—Apache
Designed the following alerts:
22
Alert Name | Alert Description | Alert Baseline | Alert Threshold |
High Activity Outside of The United States | Activity from Countries Outside the U.S. are Monitored Hourly | 90 Counts | 135 |
JUSTIFICATION: The baseline from the Apache Logs sat at around 90 counts with some going up too 100 and others going down to 80. We set the threshold at 135 in order to be alerted to any significant spikes.
Alerts—Apache
Designed the following alerts:
23
Alert Name | Alert Description | Alert Baseline | Alert Threshold |
HTTP POST High Activity | Creates an Alert for High Number of HTTP POST Requests | 3-4 Counts | 9 Counts |
JUSTIFICATION: The baseline for the POST activity was sitting between 3 and 4 counts per hour with one spike to 7. We decided that anything at 9 or more counts should probably be observed in order to remain secure.
Dashboards—Apache
24
Place image here
Place image here
Place image here
Place image here
Signatures Over Time
Clientip Cluster Map
URI Pie Chart
Top 10 Countries Table
Dashboards—Apache
25
Place image here
Place image here
User Agent Pie Chart
Successful POST Request Radial Guage
Attack Analysis
26
Attack Summary—Windows
Summarize your findings from your reports when analyzing the attack logs.
27
Attack Summary—Windows
Summarize your findings from your alerts when analyzing the attack logs. Were the thresholds correct?
28
Attack Summary—Windows
Summarize your findings from your dashboards when analyzing the attack logs.
29
Screenshots of Attack Logs
30
Attack Summary—Apache
Summarize your findings from your reports when analyzing the attack logs.
31
Attack Summary—Apache
Summarize your findings from your alerts when analyzing the attack logs. Were the thresholds correct?
32
Attack Summary—Apache
Summarize your findings from your dashboards when analyzing the attack logs.
33
Screenshots of Attack Logs
34
Dashboard During Attack
Dashboard Before Attack
Summary and Future Mitigations
35
Project 3 Summary - Findings
36
Project 3 Summary - Further Mitigations
37