working document for discussion only crown copyright © 2004 1/24 ian bryant head niscc research...

24
Crown Copyright © 2004 1/24 Working Document for Discussion ONLY Working Document for Discussion ONLY Ian Bryant Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC Forensics for Forensics for Critical Information Infrastructure Critical Information Infrastructure Protection (CIIP) Protection (CIIP) National Infrastructure Security National Infrastructure Security Coordination Centre Coordination Centre

Upload: noe-dallin

Post on 15-Dec-2015

224 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 1/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Ian BryantIan BryantHead NISCC Research & Technology Group& MOD Permanent Representative to NISCC

Forensics forForensics forCritical Information Infrastructure Protection (CIIP)Critical Information Infrastructure Protection (CIIP)

National Infrastructure Security Coordination CentreNational Infrastructure Security Coordination Centre

Page 2: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 2/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Forensics in CIIPForensics in CIIP

• The CIIP ContextThe CIIP Context

• Forensics and TriageForensics and Triage

• QuestionsQuestions

Page 3: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 3/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

The CIIP ContextThe CIIP Context

Page 4: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 4/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Cyber AttackCyber Attack

• Selection of mechanismsSelection of mechanisms– 11stst Order Cyber effects Order Cyber effects

• MalWare (Collateral) ; DDOS (Directed)MalWare (Collateral) ; DDOS (Directed)

– 22ndnd Order Cyber effects Order Cyber effects• Collateral Physical effects of Cyber actsCollateral Physical effects of Cyber acts

• Cyber PsyOps e.g. Threats to HLS personnelCyber PsyOps e.g. Threats to HLS personnel

– 22ndnd / 3 / 3rdrd / n / nthth Order Kinetic effects Order Kinetic effects• Physical attack causing Cyber impactPhysical attack causing Cyber impact

Page 5: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 5/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Threat SpectrumThreat Spectrum

Monetary or

Physical Damage

Disobedience

Terror

Sabotage

Psychological Impact

War

Page 6: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 6/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Incidents Reported to UNIRASIncidents Reported to UNIRAS

1 10 100 1000 10000

Embarrassment

Safety

Privacy

Legal

Commercial Loss

Financial

Disruption

National Security

HMG

N.B. : Log scale

Page 7: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 7/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

The Multipartite ProblemThe Multipartite Problem

• Variety of interested partiesVariety of interested parties– Organisations detecting an IncidentOrganisations detecting an Incident

– Security StaffsSecurity Staffs

– Law EnforcementLaw Enforcement

– Technical StaffsTechnical Staffs

– National CIIP organisationsNational CIIP organisations

• DependenciesDependencies– Avoiding actions of one party adversely impacting on others’ Avoiding actions of one party adversely impacting on others’

interestsinterests

– Biggest challenge is to prevent Evidential contamination Biggest challenge is to prevent Evidential contamination during Detection / Triage during Detection / Triage

Page 8: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 8/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Communities of InterestCommunities of Interest

Protective Marking

Focus ofInterestMainly Threat

Mainly Vulnerability

Mainly Classified

Mainly Unclassified

CIP

LE

CSIRT

UK (NISCC)

National Span of Interest

Others

Defence

Intelligence

Page 9: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 9/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Is this Forensics ?Is this Forensics ?

FrequencyFrequency PortsPorts

Very HighVery High 21 (FTP), 21 (FTP), 80 (HTTP)80 (HTTP), 111 (SunRPC), 139 (NetBIOS-SSN), 1433 , 111 (SunRPC), 139 (NetBIOS-SSN), 1433 (MS-SQL)(MS-SQL)

HighHigh 22 (ssh), 23 (telnet), 22 (ssh), 23 (telnet), 25 (smtp)25 (smtp), 53 (domain), 137 (NetBIOS-NS), , 53 (domain), 137 (NetBIOS-NS), 443 (HTTP-S)443 (HTTP-S), 445 (MS-DS), 515 (lpdw0rm), 1080 (SOCKS), , 445 (MS-DS), 515 (lpdw0rm), 1080 (SOCKS), 1524 (Ingreslock), 3128 (Squid), 6112 (dtspc), 1524 (Ingreslock), 3128 (Squid), 6112 (dtspc), 8080 (HTTP-alt)8080 (HTTP-alt), , 27374 (SubSeven)27374 (SubSeven)

MediumMedium 3 (compressnet), 57 (privterm), 1024 (Jade), 1214 (Grokster), 3 (compressnet), 57 (privterm), 1024 (Jade), 1214 (Grokster), 1243 (Backdoor-G), 3072 (CSDmonitor), 3389 (MSTermSvc), 1243 (Backdoor-G), 3072 (CSDmonitor), 3389 (MSTermSvc), 5800 (VNC), 6588 (AnalogX), 8000 (irdmi), 8888 (ddi-tcp-1)5800 (VNC), 6588 (AnalogX), 8000 (irdmi), 8888 (ddi-tcp-1)

LowLow 135 (epmap), 1434 (MS-SQL), 2049 (NFS), 4000 135 (epmap), 1434 (MS-SQL), 2049 (NFS), 4000 (BackBackDoor), 4001 (newoak), 4002 (pxc-spvr), 4003 (pxc-(BackBackDoor), 4001 (newoak), 4002 (pxc-spvr), 4003 (pxc-splr), 8081 (BlackIce)splr), 8081 (BlackIce)

Very LowVery Low (All others)(All others)

Page 10: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 10/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Forensics and TriageForensics and Triage

Page 11: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 11/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

TriageTriage

(Tr-äzh, Träzh)(Tr-äzh, Träzh)

1.1. A process for sorting injured people into groups A process for sorting injured people into groups based on their need for or likely benefit from based on their need for or likely benefit from immediate medical treatment. immediate medical treatment.

2.2. A system used to allocate a scarce commodityA system used to allocate a scarce commodity

3.3. A process in which things are ranked in terms of A process in which things are ranked in terms of importance or priorityimportance or priority

Page 12: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 12/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Incident TriageIncident Triage

Main CategoriesMain Categories

– Offensive Information OperationsOffensive Information Operations

– Serious Security BreachSerious Security Breach

– Serious Criminal OffenceSerious Criminal Offence

– Other Electronic AttackOther Electronic Attack

– Other Technical IncidentOther Technical Incident

– Other Criminal OffenceOther Criminal Offence

– Other Security IncidentOther Security Incident

Page 13: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 13/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Response Profile (1)Response Profile (1)

TypeType Offensive Information OperationsOffensive Information Operations

CharacteristicsCharacteristics Malicious Electronic Attack (MEA)Malicious Electronic Attack (MEA)• HERF weaponsHERF weapons• Denial of Service (DOS)Denial of Service (DOS)• Targeted MalWareTargeted MalWare

Threat Actor(s)Threat Actor(s) • Hostile Power(s)Hostile Power(s)• Empowered Small Agent(s)Empowered Small Agent(s)

LeadLead National GovernmentNational Government

Forensics Forensics RequirementRequirement

• 2 phase : Rapid Assessment followed by Post Event Analysis2 phase : Rapid Assessment followed by Post Event Analysis• Evidential quality not usually paramountEvidential quality not usually paramount• Rapid restoration of serviceRapid restoration of service

RemarksRemarks Typically Military responseTypically Military response(if permitted by Rules of Engagement (RoE))(if permitted by Rules of Engagement (RoE))

Page 14: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 14/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Response Profile (2)Response Profile (2)

TypeType Serious Security BreachSerious Security Breach

CharacteristicsCharacteristics Compromise of:Compromise of:• Highly Sensitive InformationHighly Sensitive Information• Highly Critical SystemsHighly Critical Systems

Threat Actor(s)Threat Actor(s) • Hostile Intelligence Service(s)Hostile Intelligence Service(s)• IndividualsIndividuals

LeadLead Security / Counter-Intelligence StaffsSecurity / Counter-Intelligence Staffs

Forensics Forensics RequirementRequirement

• 2 phase: Assessment, then Comprehensive Incident Analysis2 phase: Assessment, then Comprehensive Incident Analysis• Evidential quality will varyEvidential quality will vary• Timely restoration of serviceTimely restoration of service

RemarksRemarks Forensic requirement will vary with Attribution, as actions by Forensic requirement will vary with Attribution, as actions by Individuals may lead to a ProsecutionIndividuals may lead to a Prosecution

Page 15: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 15/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Response Profile (3)Response Profile (3)

TypeType Serious Criminal OffenceSerious Criminal Offence

CharacteristicsCharacteristics Typical categoriesTypical categories• TheftTheft• Misuse (obscene material)Misuse (obscene material)

Threat Actor(s)Threat Actor(s) • IndividualsIndividuals

LeadLead Law EnforcementLaw Enforcement

Forensics Forensics RequirementRequirement

• 1 phase: Comprehensive Incident Analysis1 phase: Comprehensive Incident Analysis• Evidential quality paramountEvidential quality paramount• Timely restoration of serviceTimely restoration of service

RemarksRemarks Police and Criminal Evidence Act, and ACPO Code of Practice, Police and Criminal Evidence Act, and ACPO Code of Practice, govern Evidential Requirementsgovern Evidential Requirements

Page 16: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 16/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Response Profile (4)Response Profile (4)

TypeType Other Electronic AttackOther Electronic Attack

CharacteristicsCharacteristics Directed attack, or Collateral Attack with Major Impact :Directed attack, or Collateral Attack with Major Impact :• DDOSDDOS• DefacementDefacement• MalWare with malicious payloadMalWare with malicious payload

Threat Actor(s)Threat Actor(s) • Empowered Small Agent(s)Empowered Small Agent(s)• Individual(s)Individual(s)

LeadLead CSIRTs (“CERTs”)CSIRTs (“CERTs”)

Forensics Forensics RequirementRequirement

• 2 phase: Assessment, then Comprehensive Incident Analysis2 phase: Assessment, then Comprehensive Incident Analysis• Evidential quality will varyEvidential quality will vary• Rapid restoration of serviceRapid restoration of service

RemarksRemarks Forensic requirement will vary with Attribution, as if perpetrator Forensic requirement will vary with Attribution, as if perpetrator can be identified, may lead to a Prosecutioncan be identified, may lead to a Prosecution

Page 17: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 17/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Response Profile (5)Response Profile (5)

TypeType Other Technical IncidentsOther Technical Incidents

CharacteristicsCharacteristics Typically “undirected”, but of significant impact:Typically “undirected”, but of significant impact:• Intensive Scans and ProbesIntensive Scans and Probes• SpammingSpamming• MalWare without malicious payloadMalWare without malicious payload

Threat Actor(s)Threat Actor(s) • Individual(s)Individual(s)

LeadLead CSIRTs (“CERTs”) or WARPsCSIRTs (“CERTs”) or WARPs

Forensics Forensics RequirementRequirement

• Normally only Assessment requiredNormally only Assessment required• Occasional need for Comprehensive Incident AnalysisOccasional need for Comprehensive Incident Analysis• Rapid restoration of serviceRapid restoration of service

RemarksRemarks Forensic requirement will vary with both Novelty and Attribution: Forensic requirement will vary with both Novelty and Attribution: • If event is unique or unusual, Technical details of most interestIf event is unique or unusual, Technical details of most interest• If clear perpetrator can be identified, may lead to a ProsecutionIf clear perpetrator can be identified, may lead to a Prosecution

Page 18: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 18/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Response Profile (6)Response Profile (6)

TypeType Other Criminal OffenceOther Criminal Offence

CharacteristicsCharacteristics Major categoriesMajor categories• MisappropriationMisappropriation• Criminal DamageCriminal Damage

Threat Actor(s)Threat Actor(s) • IndividualsIndividuals

LeadLead Law EnforcementLaw Enforcement

Forensics Forensics RequirementRequirement

• 1 phase: Comprehensive Incident Analysis1 phase: Comprehensive Incident Analysis• Evidential quality paramountEvidential quality paramount• Timely restoration of serviceTimely restoration of service

RemarksRemarks Police and Criminal Evidence Act, and ACPO Code of Practice, Police and Criminal Evidence Act, and ACPO Code of Practice, govern Evidential Requirementsgovern Evidential Requirements

Page 19: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 19/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Response Profile (7)Response Profile (7)

TypeType Other Security IncidentOther Security Incident

CharacteristicsCharacteristics Minor ImpactMinor Impact• Misuse (excluding obscene material)Misuse (excluding obscene material)• Failure to observe security regulationsFailure to observe security regulations

Threat Actor(s)Threat Actor(s) • IndividualsIndividuals

LeadLead Local Security StaffsLocal Security Staffs

Forensics Forensics RequirementRequirement

• Not normally requiredNot normally required• Minimal impact on service if invokedMinimal impact on service if invoked

RemarksRemarks If Forensics required, will normally only be for limited Evidential If Forensics required, will normally only be for limited Evidential quality for internal disciplinary concernsquality for internal disciplinary concerns

Page 20: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 20/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

SummarySummary

So where So where does thisdoes this

lead lead us?us?

Page 21: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 21/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

No “One Size Fits All” SolutionNo “One Size Fits All” Solution

Speed

Evidential Quality

Continuity of Service

Page 22: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 22/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

ConclusionsConclusions

• Widespread need for Forensic services in Widespread need for Forensic services in Information AssuranceInformation Assurance

• A Triage process is essential to determine A Triage process is essential to determine speed, scope, and purpose when Forensic speed, scope, and purpose when Forensic involvement requiredinvolvement required

• Forensics activity must not become a Denial Forensics activity must not become a Denial of Service (DOS) itselfof Service (DOS) itself

• Biggest challenge to Forensics is outside the Biggest challenge to Forensics is outside the control of its own community :control of its own community :– Prevention of Evidential contamination during Prevention of Evidential contamination during

Detection / TriageDetection / Triage

Page 23: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 23/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Questions ?Questions ?

Page 24: Working Document for Discussion ONLY Crown Copyright © 2004 1/24 Ian Bryant Head NISCC Research & Technology Group & MOD Permanent Representative to NISCC

Crown Copyright © 2004 24/24Working Document for Discussion ONLYWorking Document for Discussion ONLY

Ian BryantIan BryantHead of Research & TechnologyHead of Research & Technology

NISCCNISCC

PO Box 832, London, SW1P 1BG, England PO Box 832, London, SW1P 1BG, England

Telephone:Telephone: +44-20-7821-1330 x 4565 (PA)+44-20-7821-1330 x 4565 (PA)+44-20-7821-1330 x 4561 (Direct)+44-20-7821-1330 x 4561 (Direct)

Facsimile : Facsimile : +44-20-7821-1686+44-20-7821-1686

Internet Internet mailto:[email protected]:[email protected]://http://www.niscc.gov.ukwww.niscc.gov.uk

Contact DetailsContact Details