Preparation Identification Containment
Objective: Establish contacts, define procedures,
gather information and get familiar with intrusion
detection tools to save time during an attack.
Intrusion Detection Systems
 Ensure that the monitoring tools are up to date;
 Establish contacts with your network and security
operation teams;
 Make sure that an alert notification process is
defined and well-known from everyone.
Network
 Make sure that an inventory of the network
access points is available and up-to-date;
 Make sure that network teams have up to date
network maps and configurations;
 Look for potential unwanted network access
points (xDSL, Wifi, Modem, …) regularly and close
them;
 Ensure that traffic management tools and
processes are operational.
Baseline traffic
 Identify the baseline traffic and flows;
 Identify the business-critical flows.
Objective: Detect the incident, determine its
scope, and involve the appropriate parties.
Sources of detection:
 Notification by user/helpdesk;
 IDS alert;
 Detection by network staff;
 Complain from an external source.
Record suspect network activity
Network frames can be stored into a file and transmitted
to your incident response team for further analysis.
Use network capture tools (tshark, windump, tcpdump…)
to dump malicious traffic. Use a hub or port mirroring on
an affected LAN to collect valuable data.
Network forensic requires skills and knowledge . Ask
your incident response team for assistance or
advices.
Analyze the attack
 Analyze alerts generated by your IDS;
 Review statistics and logs of network devices;
 Try to understand the goal of the malicious traffic and
identify the infrastructure components affected by it;
 Identify the technical characteristics of the traffic:
- Source IP address(es)
- Ports used, TTL, Packet ID, …
- Protocols used
- Targeted machines/services
- Exploit(s)
- Remote accounts logged in
At the end of this step, the impacted machines
and the modus operandi of the attack should
have been identified. Ideally, the source of the
attack should have been identified as well. This
is where you should do your forensic
investigations, if needed.
If a compromised computer has been identified,
check IRM cheat sheets dedicated to intrusion.
Objective: Mitigate the attack effects on the
neighbouring IT resources.
If the issue is considered as strategic (sensitive
resources access), a specific crisis management cell
should be activated.
Depending on the criticality of the impacted resources,
the following steps can be performed and monitored:
 Disconnect the compromised area from the network.
 Isolate the source of the attack. Disconnect the
affected computer(s) in order to perform further
investigation.
 Find acceptable mitigation measures for the
business-critical traffic in agreement with the business
line managers.
 Terminate unwanted connections or processes on
affected machines.
 Use firewall/IPS rules to block the attack.
 Use IDS rules to match with this malicious behaviour
and inform technical staff on new events.
 Apply ad hoc actions in case of strategic issue:
- Block exfiltration destination or remote
location on Internet filters ;
- Restrict strategic file servers to reject
connections from the compromised computer;
- Select what kind of files can be lost / stolen
and restrict the access for confidential files;
- Create fake documents with watermarking
that could be use as a proof of theft;
- Notify targeted business users about what
must be done and what is forbidden;
- Configure logging capabilities in verbose
mode on targeted environment and store them
in a remote secure server.
11 22 33
Incident Response Methodology
IRM #5
Malicious network behaviour
Guidelines to handle a suspicious network activity
___________________________________________________
Author: CERT-SG / David Bizeul & Vincent Ferran-Lacome
IRM version: 1.4
E-Mail: cert.sg@socgen.com
Web: https://cert.societegenerale.com
Twitter: @CertSG
Abstract
Incident handling steps
Remediation Recovery
Aftermath
This Incident Response Methodology is a cheat sheet dedicated
to handlers investigating on a precise security issue.
Who should use IRM sheets?
 Administrators
 Security Operation Center
 CISOs and deputies
 CERTs (Computer Emergency Response Team)
IRM can be shared with all SG staff.
Remember: If you face an incident, follow IRM, take notes
and do not panic. Contact your CERT immediately if
needed.
6 steps are defined to handle security Incidents
 Preparation: get ready to handle the incident
 Identification: detect the incident
 Containment: limit the impact of the incident
 Remediation: remove the threat
 Recovery: recover to a normal stage
 Aftermath: draw up and improve the process
IRM provides detailed information for each step.
This document is for public use
Objective: Take actions to stop the malicious
behaviour.
Block the source
 Using analysis from previous steps identification and
containment, find out all communication channels used
by the attacker and block them on all your network
boundaries.
 If the source has been identified as an insider, take
appropriate actions and involve your management and/or
HR team and/or legal team.
 If the source has been identified as an external
offender, consider involving abuse teams and law
enforcement services if required.
Technical remediation
 Define a remediation process. If necessary, this
process can be validated by another structure, like your
incident response team for example.
 Remediation steps from intrusion IRM can also be
useful.
Test and enforce
 Test the remediation process and make sure that it
properly works without damaging any service.
 Enforce the remediation process once tests have
been approved by both IT and business.
44
Objective: Restore the system to normal
operations.
11.. Ensure that the network traffic is back to
normal
22.. Re-allow the network traffic that was used
as a propagation method by the attacker
33.. Reconnect sub-areas together if necessary
44.. Reconnect the area to your local network if
necessary
55.. Reconnect the area to the Internet if
necessary
All of these steps shall be made in a step-by-step
manner and with a technical monitoring.
55
Objective: Document the incident’s details,
retail collected data, and identify the
improvements.
Report
A report should be written and made available to all
of the actors.
The following themes should be described:
- Initial cause of the issue
- Actions and timelines
- What went right
- What went wrong
- Incident cost
Capitalize
Actions to improve the network intrusion
management processes should be defined to
capitalize on this experience.
66

More Related Content

PPTX
Firewall and It's Types
PDF
Microsoft power point intellectual property law trademarks remedies unit-v ...
PPTX
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
PDF
Introduction à l'IoT: du capteur à la donnée_Presentation Mix-IT2015
PPTX
TM Infringement- Rajeev Mandal.
DOCX
Vehicle Parking System Project
PPTX
Fraud analytics
PDF
The Real Estate SEO
Firewall and It's Types
Microsoft power point intellectual property law trademarks remedies unit-v ...
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
Introduction à l'IoT: du capteur à la donnée_Presentation Mix-IT2015
TM Infringement- Rajeev Mandal.
Vehicle Parking System Project
Fraud analytics
The Real Estate SEO

Viewers also liked (9)

PDF
How to properly seo your real estate website
PDF
Netcat cheat sheet
PDF
Kaysinger Basin Regional Planning Commission Broadband Study Findings
PDF
SEO for beginners
PDF
Windows 7-cheat-sheet
PDF
Windows logging cheat sheet
PDF
SEO - A Beginners' Guide
PDF
How to Build SEO into Content Strategy
PPTX
SEO Guide for Beginners, The Beginner Guide to SEO
How to properly seo your real estate website
Netcat cheat sheet
Kaysinger Basin Regional Planning Commission Broadband Study Findings
SEO for beginners
Windows 7-cheat-sheet
Windows logging cheat sheet
SEO - A Beginners' Guide
How to Build SEO into Content Strategy
SEO Guide for Beginners, The Beginner Guide to SEO
Ad

Similar to Irm 5-malicious networkbehaviour (20)

DOCX
Part 3 ApplicationEnd-User Security Recommendations.docx
PPT
DOCX
Running Head Security Assessment Repot (SAR) .docx
PPTX
Security protection On banking systems using ethical hacking.
PPTX
Mitigating worm attacks
PPT
Absolute Software Governance-Risk-Compliance
PPT
Absolute grc-
DOCX
ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx
PPT
Lesson 3- Effectiveness of IDPS
PDF
MITRE ATT&CK and 2017 FSB Indictment
PDF
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
PPTX
Cyber-Espionage: Understanding the Advanced Threat Landscape
PDF
Ii2514901494
PPTX
What is dr and bc 12-2017
PPTX
Cryptography and system security
PDF
CISA GOV - Seven Steps to Effectively Defend ICS
PDF
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
PDF
Defending Industrial Control Systems From Cyberattack
PDF
Seven recommendations for bolstering industrial control system cyber security
Part 3 ApplicationEnd-User Security Recommendations.docx
Running Head Security Assessment Repot (SAR) .docx
Security protection On banking systems using ethical hacking.
Mitigating worm attacks
Absolute Software Governance-Risk-Compliance
Absolute grc-
ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx
Lesson 3- Effectiveness of IDPS
MITRE ATT&CK and 2017 FSB Indictment
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
Cyber-Espionage: Understanding the Advanced Threat Landscape
Ii2514901494
What is dr and bc 12-2017
Cryptography and system security
CISA GOV - Seven Steps to Effectively Defend ICS
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
Defending Industrial Control Systems From Cyberattack
Seven recommendations for bolstering industrial control system cyber security
Ad

More from Kasper de Waard (12)

PDF
Cheatsheet: Netcat
PDF
Cheatsheet: Metasploit
PDF
Cheatsheet: Hex file headers and regex
PDF
Cheatsheet: Google Search
PDF
Irm 15-trademark infringement
PDF
Irm 14-scam
PDF
Irm 13-phishing
PDF
Irm 12-insiderabuse
PDF
Irm 10-social engineering
PDF
Irm 8-blackmail
PDF
Irm 6-website-defacement
PDF
Irm 4-ddos
Cheatsheet: Netcat
Cheatsheet: Metasploit
Cheatsheet: Hex file headers and regex
Cheatsheet: Google Search
Irm 15-trademark infringement
Irm 14-scam
Irm 13-phishing
Irm 12-insiderabuse
Irm 10-social engineering
Irm 8-blackmail
Irm 6-website-defacement
Irm 4-ddos

Recently uploaded (20)

PDF
Course Overview and Agenda cloud security
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PPTX
IT-Human Computer Interaction Report.pptx
PPTX
Basic_of_Computer_System.pptx class-8 com
PPTX
Digital Project Mastery using Autodesk Docs Workshops
PPTX
using the citation of Research to create a research
PDF
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
PPTX
Networking2-LECTURE2 this is our lessons
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PDF
JuanConnect E-Wallet Guide for new users.pdf
PPTX
Basic understanding of cloud computing one need
PPTX
Artificial_Intelligence_Basics use in our daily life
PPTX
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
PDF
ilide.info-huawei-odn-solution-introduction-pdf-pr_a17152ead66ea2617ffbd01e8c...
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
PPTX
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
PDF
Computer Networking, Internet, Casting in Network
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PPTX
Introduction to networking local area networking
Course Overview and Agenda cloud security
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
IT-Human Computer Interaction Report.pptx
Basic_of_Computer_System.pptx class-8 com
Digital Project Mastery using Autodesk Docs Workshops
using the citation of Research to create a research
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
Networking2-LECTURE2 this is our lessons
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
JuanConnect E-Wallet Guide for new users.pdf
Basic understanding of cloud computing one need
Artificial_Intelligence_Basics use in our daily life
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
ilide.info-huawei-odn-solution-introduction-pdf-pr_a17152ead66ea2617ffbd01e8c...
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Viva Digitally Software-Defined Wide Area Network.pptx
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
Computer Networking, Internet, Casting in Network
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
Introduction to networking local area networking

Irm 5-malicious networkbehaviour

  • 1. Preparation Identification Containment Objective: Establish contacts, define procedures, gather information and get familiar with intrusion detection tools to save time during an attack. Intrusion Detection Systems  Ensure that the monitoring tools are up to date;  Establish contacts with your network and security operation teams;  Make sure that an alert notification process is defined and well-known from everyone. Network  Make sure that an inventory of the network access points is available and up-to-date;  Make sure that network teams have up to date network maps and configurations;  Look for potential unwanted network access points (xDSL, Wifi, Modem, …) regularly and close them;  Ensure that traffic management tools and processes are operational. Baseline traffic  Identify the baseline traffic and flows;  Identify the business-critical flows. Objective: Detect the incident, determine its scope, and involve the appropriate parties. Sources of detection:  Notification by user/helpdesk;  IDS alert;  Detection by network staff;  Complain from an external source. Record suspect network activity Network frames can be stored into a file and transmitted to your incident response team for further analysis. Use network capture tools (tshark, windump, tcpdump…) to dump malicious traffic. Use a hub or port mirroring on an affected LAN to collect valuable data. Network forensic requires skills and knowledge . Ask your incident response team for assistance or advices. Analyze the attack  Analyze alerts generated by your IDS;  Review statistics and logs of network devices;  Try to understand the goal of the malicious traffic and identify the infrastructure components affected by it;  Identify the technical characteristics of the traffic: - Source IP address(es) - Ports used, TTL, Packet ID, … - Protocols used - Targeted machines/services - Exploit(s) - Remote accounts logged in At the end of this step, the impacted machines and the modus operandi of the attack should have been identified. Ideally, the source of the attack should have been identified as well. This is where you should do your forensic investigations, if needed. If a compromised computer has been identified, check IRM cheat sheets dedicated to intrusion. Objective: Mitigate the attack effects on the neighbouring IT resources. If the issue is considered as strategic (sensitive resources access), a specific crisis management cell should be activated. Depending on the criticality of the impacted resources, the following steps can be performed and monitored:  Disconnect the compromised area from the network.  Isolate the source of the attack. Disconnect the affected computer(s) in order to perform further investigation.  Find acceptable mitigation measures for the business-critical traffic in agreement with the business line managers.  Terminate unwanted connections or processes on affected machines.  Use firewall/IPS rules to block the attack.  Use IDS rules to match with this malicious behaviour and inform technical staff on new events.  Apply ad hoc actions in case of strategic issue: - Block exfiltration destination or remote location on Internet filters ; - Restrict strategic file servers to reject connections from the compromised computer; - Select what kind of files can be lost / stolen and restrict the access for confidential files; - Create fake documents with watermarking that could be use as a proof of theft; - Notify targeted business users about what must be done and what is forbidden; - Configure logging capabilities in verbose mode on targeted environment and store them in a remote secure server. 11 22 33
  • 2. Incident Response Methodology IRM #5 Malicious network behaviour Guidelines to handle a suspicious network activity ___________________________________________________ Author: CERT-SG / David Bizeul & Vincent Ferran-Lacome IRM version: 1.4 E-Mail: [email protected] Web: https://cert.societegenerale.com Twitter: @CertSG Abstract Incident handling steps Remediation Recovery Aftermath This Incident Response Methodology is a cheat sheet dedicated to handlers investigating on a precise security issue. Who should use IRM sheets?  Administrators  Security Operation Center  CISOs and deputies  CERTs (Computer Emergency Response Team) IRM can be shared with all SG staff. Remember: If you face an incident, follow IRM, take notes and do not panic. Contact your CERT immediately if needed. 6 steps are defined to handle security Incidents  Preparation: get ready to handle the incident  Identification: detect the incident  Containment: limit the impact of the incident  Remediation: remove the threat  Recovery: recover to a normal stage  Aftermath: draw up and improve the process IRM provides detailed information for each step. This document is for public use Objective: Take actions to stop the malicious behaviour. Block the source  Using analysis from previous steps identification and containment, find out all communication channels used by the attacker and block them on all your network boundaries.  If the source has been identified as an insider, take appropriate actions and involve your management and/or HR team and/or legal team.  If the source has been identified as an external offender, consider involving abuse teams and law enforcement services if required. Technical remediation  Define a remediation process. If necessary, this process can be validated by another structure, like your incident response team for example.  Remediation steps from intrusion IRM can also be useful. Test and enforce  Test the remediation process and make sure that it properly works without damaging any service.  Enforce the remediation process once tests have been approved by both IT and business. 44 Objective: Restore the system to normal operations. 11.. Ensure that the network traffic is back to normal 22.. Re-allow the network traffic that was used as a propagation method by the attacker 33.. Reconnect sub-areas together if necessary 44.. Reconnect the area to your local network if necessary 55.. Reconnect the area to the Internet if necessary All of these steps shall be made in a step-by-step manner and with a technical monitoring. 55 Objective: Document the incident’s details, retail collected data, and identify the improvements. Report A report should be written and made available to all of the actors. The following themes should be described: - Initial cause of the issue - Actions and timelines - What went right - What went wrong - Incident cost Capitalize Actions to improve the network intrusion management processes should be defined to capitalize on this experience. 66