many destination hosts (i.e. destination IP addresses)
were involved under that alert category (i.e. 30
hosts).
As the analyst has now found out that there is
potential web attack traffic targeting some of the
company’s web services, the next step would be to
narrow down the search and verify if any of the web
servers has been successfully compromised. To do
this the analyst searches for Access to a Potentially
Vulnerable Web Application alerts among those 30
destination IP addresses. Eventually, by carefully
examining the search result (i.e. 1,672 events in
total) the analyst found that a Cybercop Scan
activity (i.e. 2 events) was detected for a particular
destination IP address; the analyst has now
successfully identified the web server that has been
potentially compromised.
3.2 Use Case 2: Determine Type of
Attack
In the second use case the SOC analyst wants to
determine the actual type of attack or security breach
on web servers that he/she suspected may have been
compromised. This is important in order to assess
the damage that could have been caused by
successful attack and to allow the administrators
take suitable mitigation actions such as blocking
inbound web traffic or shutting down the server
completely.
The analyst will first look for all Snort IDS alerts
that relate to Detection of a Network Scan
classification (i.e. 694 events). This query results in
a list of matching alerts with different attack
signature names, one of which catches the analyst’s
attention, i.e. WEB_SERVER IIS 8.3 Filename With
Wildcard (Possible File/Dir Bruteforce) with 22
events. The analyst then retrieves the list of
destination IP addresses reported with that attack
signature which indicates directory traversal activity
(i.e. 16 IP addresses).
The analyst now needs to know if the attacker
was able to successfully compromise any of the IIS
(Internet Information Services) web servers
deployed in the network. He/she starts looking for
alerts classified as Web Application Attack and spots
a set of alerts with signature name WEB-IIS
Directory Traversal Attempt (i.e. 874 events). The
analyst collects the involved 29 destination IP
addresses and checks them against the list of
destination IP addresses obtained earlier (i.e. for
WEB_SERVER IIS 8.3 Filename With Wildcard) in
order to determine the actual servers that have been
targeted by the attacker.
This is a typical scenario, where the analyst has
to compare alerts collected from one event possibly
at network level with events at host level to verify
that the network scanning activity detected as attacks
towards web server’s directory traversal matches the
attack at host with directory traversal attempt.
Following the comparison the analyst identifies 15
destination IP addresses that were involved in both
attack signatures which may lead to root access to
the web server using the Directory Traversal
method. To narrow down the search further, the
analyst may need to investigate the system logs to
check who managed to log into the system and
compare the login time with the collected Snort
alerts and gather more evidence of successful attack.
4 ATTACK DETECTION TOOL
4.1 Introduction
Our attack detection tool allows cyber-defence
analysts to automate the process of correlating
specific security, system and network events that
may have been logged at different places in the
network over short or long period of time. In order
to correlate two separate events correctly an analyst
normally needs to verify whether the same machine
or device is involved in both events. For example, if
there are some IDS alerts involving a device with
particular IP address, the analyst may then want to
check whether there is any suspicious outbound
traffic coming from that device in subsequent
periods of time. Regular checks with DHCP
(Dynamic Host Configuration Protocol) records are
thus needed to make sure that the IP address still
matches the same device. The tool helps automate
this type of checks and correlates past events with
subsequent series of new events to save analyst a lot
of time in monitoring the progress of potential
attacks.
4.2 Attack Detection Plan
Attack detection plans are used for triggering and
automating the process of detecting various types of
cyber-attacks. Each plan indicates a series of events
that collectively may form logical steps and phases
of cyber kill chain; the plan sets the conditions under
which the events could be correlated with each
other, leading to certain conclusions, e.g. preparation
for implanting a backdoor within the target system.
Essentially the plan represents the step-by-step
process of investigating cyber incidents that
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
184