Skip to the content.

Alerting and Monitoring

Alerting and Monitoring

Alerting and monitoring are critical components of cybersecurity, focusing on the continuous observation of systems to detect and respond to security incidents promptly.

Alerting

The process of generating notifications or alarms when specific conditions or thresholds indicative of security issues are met. Its purpose is to provide timely warnings about potential security threats or anomalies.

Components:

Monitoring

The continuous observation and analysis of system activities, network traffic, and security events. Its purpose is to detect, analyze, and respond to security incidents and ensure ongoing system health.

Components:

Monitoring Resources

Monitoring resources involves continuously tracking and analyzing various system and network components to ensure optimal performance and security.

System Monitoring

Observing server and application performance metrics such as utlization and consumption of its resources in order for us to identify any potential issues that could affect the system’s stability.

Baseline

Application Monitoring

Keeping an eye on the health and performance of software applications to ensure they are running smoothly.

Infrastructure Monitoring

Infrastructure monitoring involves the continuous observation and analysis of an organization’s physical and virtual IT infrastructure to ensure optimal performance, availability, and security

Alerting and Monitoring Activities

Alerting and monitoring activities are crucial for maintaining the integrity, availability, and performance of an organization’s infrastructure.

Log Aggregation

The process of collecting and consolidating log data from various sources into a central repository. It facilitate comprehensive analysis and correlation of events.

GDPR Compliance

Alerting

The mechanism for generating notifications when specific events or thresholds are met.

Scanning

Systematically checking systems, networks, and applications for vulnerabilities, configuration issues, or policy violations.

Tools:

Types of scans:

Reporting

The creation and distribution of reports based on monitored data and alerts. These reports can provide insights into system performance, security incidents, compliance status, and other aspects.

Archiving

The process of securely storing log data and reports for long retention periods of future reference and compliance.

Alert Response and Remediation

The actions taken in response to alerts to address and mitigate identified issues.

Remediation refers to steps used to resolve identified issues or vulnerabilities which could include:

Validation involves verifying that the remediation implemented was actually successful and has effectively addressed the given vulnerability.

SNMP

Simple Network Management Protocol (SNMP) is a widely used protocol for network management and monitoring. It allows network administrators to remotely monitor and manage network devices, such as routers, switches, servers, and printers, from a central management station.

Sample diagram:

Components

Operations

The SNMP Manager can send and receive messages to the agents using three message types;

Types of Trap Messages

Management Information Base

Used to describe the structure of the management data of a device subsystem using a hierarchical namespace containing object identifiers.

Variable-binding

Data in SNMP traps are stored in a simple key-value pair configuration known as variable-binding. Sample:

Site: Main-HQ 
Criticality: High 
Severity: Low 
Alarm Description: High Temperature  

Versions

There are three SNMP versions with varying security:

Both SNMPv1 and SNMPv2 uses a community strings to access the managed devices.

In SNMPv3, three enhancements are added to ensure integrity and confidetiality.

Another benefit of SNMPv3 is it groups the SNMP components into different entities with different authorization and access privileges.

SIEM

SIEM, or Security Information and Event Management, is a comprehensive approach to security management that combines SIM (Security Information Management) and SEM (Security Event Management) functions into a single, integrated solution.

SIEM can provide details such as:

Key Features

Deployment

A SIEM can be implemented in a couple of ways:

It can also be agent-based or agent-less.

Considerations

Recommendations

Recommendations:

Available SIEM solutions:

SCAP

Security Content Automation Protocol (SCAP) is a collection of open standards developed by the National Institute of Standards and Technology (NIST) to automate vulnerability management, measurement, and policy compliance evaluation.

Supported Languages

Three main languages used inside a SCAP:

Enumeration Methods

There are also different methods of enumerating assets.

CVSS

CVSS, or Common Vulnerability Scoring System, is a framework for assessing the severity and potential impact of security vulnerabilities. It provides a standardized method for rating vulnerabilities to help organizations prioritize their responses and allocate resources effectively.

CVSS Ratings:

CVSS Score Range Severity Rating
0.0 - 3.9 Low
4.0 - 6.9 Medium
7.0 - 8.9 High
9.0 - 10.0 Critical

Benchmarks

A benchmark is a set of security configuration rules for some specific set or products to provide a detailed checklist that can be used to secure systems to a specific baseline.

Network Traffic Flow

Packet Captures

Full Packet Captures, captures the entire packet, including the header and the payload for all traffic entering and leaving a network.

In the example below, we can see the source and destination IP, as well as the sequence of packets targeting different ports over time which suggests a port scanning activity.

10:00:01.000000 IP 192.168.1.100 > 192.168.1.200: ICMP echo request, id 1234, seq 1, length 64
10:00:02.000000 IP 192.168.1.100 > 192.168.1.200: ICMP echo request, id 1234, seq 2, length 64
10:00:03.000000 IP 192.168.1.100 > 192.168.1.200: ICMP echo request, id 1234, seq 3, length 64
10:00:04.000000 IP 192.168.1.100 > 192.168.1.200: ICMP echo request, id 1234, seq 4, length 64
10:00:05.000000 IP 192.168.1.100 > 192.168.1.200: ICMP echo request, id 1234, seq 5, length 64
10:00:06.000000 IP 192.168.1.100 > 192.168.1.200: ICMP echo request, id 1234, seq 6, length 64
10:00:07.000000 IP 192.168.1.100 > 192.168.1.200: ICMP echo request, id 1234, seq 7, length 64
10:00:08.000000 IP 192.168.1.100 > 192.168.1.200: ICMP echo request, id 1234, seq 8, length 64

Note that the specific ports being targeted might not be visible in the packet data itself, as ICMP echo requests do not contain port information, unless the scanning technique involves sending packets directly to specific ports.

Below is another example which shows a possible DoS and DDoS attack. The packet captures show the same source IP sending packets but are not receiving any ACK from the client.

10:00:01.000000 IP 203.0.113.10 > 198.51.100.20: TCP [SYN] Seq=12345, Win=1024, Length=0
10:00:02.000000 IP 203.0.113.10 > 198.51.100.20: TCP [SYN] Seq=23456, Win=1024, Length=0
10:00:03.000000 IP 203.0.113.10 > 198.51.100.20: TCP [SYN] Seq=34567, Win=1024, Length=0
10:00:04.000000 IP 203.0.113.10 > 198.51.100.20: TCP [SYN] Seq=45678, Win=1024, Length=0
10:00:05.000000 IP 203.0.113.10 > 198.51.100.20: TCP [SYN] Seq=56789, Win=1024, Length=0
10:00:06.000000 IP 203.0.113.10 > 198.51.100.20: TCP [SYN] Seq=67890, Win=1024, Length=0
10:00:07.000000 IP 203.0.113.10 > 198.51.100.20: TCP [SYN] Seq=78901, Win=1024, Length=0
10:00:08.000000 IP 203.0.113.10 > 198.51.100.20: TCP [SYN] Seq=89012, Win=1024, Length=0

DDoS would look similar but the difference is that the attack will be coming from different source IPs.

10:00:01.000000 IP 192.0.2.10 > 198.51.100.20: TCP [SYN] Seq=12345, Win=1024, Length=0
10:00:02.000000 IP 192.0.2.11 > 198.51.100.20: TCP [SYN] Seq=23456, Win=1024, Length=0
10:00:03.000000 IP 192.0.2.12 > 198.51.100.20: TCP [SYN] Seq=34567, Win=1024, Length=0
10:00:04.000000 IP 192.0.2.13 > 198.51.100.20: TCP [SYN] Seq=45678, Win=1024, Length=0
10:00:05.000000 IP 192.0.2.14 > 198.51.100.20: TCP [SYN] Seq=56789, Win=1024, Length=0
10:00:06.000000 IP 192.0.2.15 > 198.51.100.20: TCP [SYN] Seq=67890, Win=1024, Length=0
10:00:07.000000 IP 192.0.2.16 > 198.51.100.20: TCP [SYN] Seq=78901, Win=1024, Length=0
10:00:08.000000 IP 192.0.2.17 > 198.51.100.20: TCP [SYN] Seq=89012, Win=1024, Length=0

Flow Analysis

Flow analysis relies on a flow collector, which records metadata and statistics rather than recording each frame that passes through the network.

NetFlow, Zeek, and MRTG

NetFlow is a Cisco-developed means of reporting network flow information to a structured database.

Information that we can find in a NetFlow:

Zeek is a hybrid tool that passively monitors a network like a sniffer, but only logs full packet capture data of potential interest.

Multi Router Traffic Grapher (MRTG) creates graphs showing traffic flows through the network interfaces of routers and switches by polling the appliances using SNMP.

Single Pane of Glass

A central point of access for all the informattion, tools, and systems that the security needs to effectively monitor, manage, and secure an organization’s IT environment.

There are five main steps in implementing a single pane of glass (SPOG)

Defining the requirements

Identifying and integrating data sources

Customizing the interface

Developing SOPs and documentations

Continuously monitoring and maintaining the solution


Back to main page