1 of 19

Enterprise Network Security

Enterprise Network 101 Workshop

2 of 19

Security is Hard

• Securing and monitoring the security of a campus network is

difficult

• Campus networks need to be fairly open

• Always will have viruses, attacks, and people generally acting bad

3 of 19

Enterprise Networks and Security

• Goal: Prepare for problems you will have

– You will have compromises and hackers

– You will have viruses�

• You get a call from your ISP saying that they have a report that

one of your hosts is participating in a Denial of Service (DoS) attack

– What do you do?

– How do you find the host (can be very hard with NAT)?

4 of 19

Security is a Process

You can never achieve security – it is a process that you have to

continually work on

– Assessment – what is at risk

– Protection – efforts to mitigate risk

– Detection – detect intrusions or problem

– Response – respond to intrusion or problem

– Do it all over again

5 of 19

Policy Framework

Why are policies important?

– IT is part of the basic and foundational infrastructure of your institution

– You must have policies to guide how cybersecurity operates

– These policies need to be developed and approved by the institutional

leadership

What kind of policies do you include?

– Policy to form cybersecurity group

– Policy to describe types or categories of data your institution holds and

who is responsible for this data

– Policy to describe how to respond to security incidents

– You need to have procedures to handle common cases

6 of 19

Security Foundation

• You must have managed equipment in your network

• You must have some basic network monitoring and management in place

• Network Monitoring and Management is the foundation that virtually all network security framework operates on

7 of 19

Classical Network Management Tools

• Are some devices not responding or responding poorly, possibly

because of a DoS attack or break-in?

– Nagios

– Smokeping

• Are you seeing unusual levels of traffic?

– Cacti

– LibreNMS

– NetFlow with NfSen (sFlow, J-Flow, IPFix)

8 of 19

Modern Network Management Tools

• Software stacks that allow for real-time network state monitoring

• Generally, involve the mixed use of SNMP, http and agents installed

on servers using both a pull and push models

• Are more complex, but provide

– alerting on events,

– detailed dashboards of network state,

– detection of anomalies,

– trend analysis

– network traffic inspection using network flows

• Some popular software stacks include:

– Prometheus

– ELK

– TICK and many others

9 of 19

Network Traffic Analysis

• It is important to know what traverses your network

– You learn about a new virus and find out that all infected machines

connect to 128.129.130.131

– Can find out which machines have connected?

• What tools are available?

– NetFlow: you will learn about this

– Snort, Suricata, Zeek (formerly Bro) and others: open source intrusion detection systems that are very useful to find viruses

10 of 19

Log Analysis

• Can be just as important as traffic analysis

• Central syslog server and gather logs from:

– DHCP server, DNS servers, Mail servers, switches, routers, etc.

– Now, you have data to look at

– Given an IP, you can probably find user

• Lots of tools to correlate logs and alarm on critical events

11 of 19

Network Flows

• Routers can generate summary records about every traffic

session seen

– src addr, src port, dst addr, dst port, bytes/packets

• Software to record and analyze this data

– Nfdump + NfSen (traditional)

– ElastiFlow, ntop-ng (modern)

• Easily identify the top bandwidth users

• Drill down to find out what they were doing

12 of 19

13 of 19

Anomalous Traffic

• Intrusion Detection Systems (e.g. Snort) can identify suspicious

traffic patterns, e.g.

– machines using Bittorrent

– machines infected with certain viruses/worms

– some network-based attacks

• Typically connect IDS to a mirror port on a switch

• Risk of false positives, need to tune the rules

• Starting point for further investigation

14 of 19

How useful are firewalls?

• A long time ago, end user machines used to get infected through

direct network attacks (no action by the user)

• All end-user systems have firewalls turned on by default

– Windows (since XP SP2), MacOS, and Linux

– Don’t turn the end-user systems firewalls off!

• User machines don’t get viruses without users’ action

• We've already discussed how firewalls don’t help

• People still design networks as if firewalls would help

15 of 19

Where to put Firewalls

• Traditional recommendation for firewalls is based on old

experience with Windows prior to XP service pack 2

– Windows machines would get infected from the Internet just by being on the network

• Firewalls were placed to do NAT and to protect entire enterprise

• This is a very “Corporate” approach and doesn’t allow for

innovation by users

16 of 19

Firewall Placement

• Firewalls don’t protect users from getting viruses that come via

the two most common mechanisms

– “clicked links” while web browsing

– Email attachments

– Both are encrypted and firewalls won't help

• As bandwidth increases, in-line firewalls limit performance for all

users. This gets to be a bigger problem at higher speeds.

17 of 19

Firewall Placement

18 of 19

Questions/Discussion?

19 of 19