Using Network Analysers as a Security Tool

Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features make the
analyzer an excellent tool to locate network security breaches, and to help identify and isolate virus-infected systems. This article shows how using a network analyzer can enhance network security, which analyzer features are essential for this task and how an analyzer should
be a part of any IT professional's security incident response plan.
Using a Network Analyzer as a Security Tool
Summary Because firewalls and other defensive security measures are not failsafe, you need additional tools to detect and respond to security breaches as they occur. A network analyzer can detect known (and even some unknown)virus attacks and make the cleanup process much more efficient.
Background A protocol analyzer shows you what is happening on your network by decoding the different protocols that devices on the network use to communicate, and presenting the results in human-readable form. Most mature analyzers
also include some statistical reporting functionality. The usefulness of such a tool for day-to-day troubleshooting is obvious; less obvious (and therefore underutilized) is how essential an analyzer becomes when responding to
security threats such as hacker intrusions, worms, and viruses.
The purpose of this article is to explain how an analyzer can augment firewalls and other perimeter defenses.
Even the Best Every administrator of a corporate LAN of any size these days has already built strong defenses against hackers Defenses Fail and virus attacks. But the viruses and hackers continue to get through. Why? Anti-virus and IDS systems are designed to prevent the incursion of known viruses and attacks. The hackers and
“script kiddies” have the same access to all the threat bulletins and Windows patches that you have, and are always looking for the new vulnerabilities. In short, your firewalls and operating systems often won’t get a patch
until the damage is already done. Imported disks, deliberate actions by employees, and visitors bringing infected laptops are some other weak spots in your security system that perimeter defenses alone cannot address.
A good network analyzer can both help you detect when breaches have already occurred, and make the
cleanup/recovery far less painful once a breach has been identified.
Breach Detection Viruses and hacker attacks typically generate a recognizable pattern or “signature” of packets. A network analyzer
can identify these packets and alert the administrator to their presence on the network via email or page.
Most analyzers let you set alarms to be triggered when a particular pattern is seen. Some analyzers can be programmed to send an email or page when these conditions are met. Of course, this assumes that the virus and its signature have been seen before and incorporated the analyzer’s list of packet filters. (A filter specifies the set of
criteria under which an analyzer will capture packets or trigger an alarm or some other action.)
1.Probes are deployed on each
segment and configured to watch
for suspicious patterns of traffic.
The console lets an administrator
capture packets and monitor statistics
from and segment on the network.
The console lets an administrator
capture packets and monitor statistics
from any segment on the network.
Probes are deployed on each
segment and configured to watch
for suspicious patterns of traffic.
New viruses and worms have different signatures depending on the vulnerabilities they are trying to exploit, but once systems have been successfully breached, there are a relatively small number of things that hackers actually
want to do with your network, the top ones being:
• Use your systems in a Denial of Service (DoS) on a third party. A good network analyzer can easily identify such systems by the traffic they generate.
• Use your system as an FTP server to distribute “warez” and other illegal files. You can configure an analyzer to look for FTP traffic or traffic volume where it is unexpected.
The very nature of viruses and worms is to produce unusual levels of network traffic. High frequency of broadcast packets or specific servers generating an unusual number of packets are logged in the analyzer’s record of longer term traffic, allowing the administrator to follow up on suspicious traffic patterns.
The analyzer can also help in identifying inappropriate traffic which may leave your network open to attack, or may signify potential weaknesses. This would vary with the particular network or corporate policy, but could include
automatic notification of traffic such as MSN, NNTP or outbound telnet.
To be useful as a corporate security tool, the analyzer must be “distributed” so that it covers all the areas of your network. It must also be able to capture and decode all of the protocols from all of the media (Ethernet,WAN, 802.11, etc.) on which your corporate data flows. The other crucial feature is flexible filtering that
allows triggered notification.
What “Distributed” Means A network analyzer can only capture and decode the information that it can “see.” In a switched network and Why it is Essential environment, an analyzer is only able to see traffic local to the switch.
To overcome this, most modern analyzers are supplied with multiple agents or probes that are installed on each switch in the LAN. An analyzer console can then query the probe for either raw packets or statistical traffic reports.
When an analyzer is used in a general troubleshooting or monitoring mode, it is nice to have as much visibility as possible. When used in a protection mode, the visibility is vital. So – the more distributed the analyzer, the better.
The distribution needs to be reviewed in both qualitative as well as quantitative terms. Look for an analyzer that can install probes or agents on the topologies present within both your existing network, and any planned
enhancements. Look not only for Ethernet capabilities, but WAN and wireless capabilities if these are either present or possible additions.

Post a Comment

0 Comments