02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Attack tools are more difficult to detect and discover, due to <strong>the</strong> anti-forensic nature, dynamic<br />

behavior, and modularity <strong>of</strong> <strong>the</strong>se tools. Attack tool developers use techniques to<br />

hide <strong>the</strong> nature <strong>of</strong> <strong>the</strong>ir attack. Some tools can vary <strong>the</strong> patterns and behaviors at random,<br />

through predefined decision paths, or through direct intruder management. And <strong>the</strong><br />

modularity <strong>of</strong> some tools can allow polymorphic tools to self-evolve, as well as tools that<br />

can run on multiple operating system platforms.<br />

• faster discovery <strong>of</strong> vulnerabilities<br />

The number <strong>of</strong> newly discovered vulnerabilities reported to <strong>the</strong> CERT/CC continues to<br />

double each year, making it more difficult for administrators to keep up to date with<br />

patches.<br />

• increasing permeability <strong>of</strong> firewalls<br />

Although firewalls are <strong>of</strong>ten relied upon to provide primary protection from intruders,<br />

technologies and protocols are being designed to bypass typical firewall configurations.<br />

Some <strong>of</strong> this also arises from increased demands for <strong>of</strong>f-site access and more complex<br />

protocols being allowed through <strong>the</strong> firewall.<br />

• increasingly asymmetric threat<br />

A single attacker can relatively easily employ a large number <strong>of</strong> distributed systems to<br />

launch devastating attacks against a single victim. Each Internet system’s exposure to attack<br />

depends on <strong>the</strong> state <strong>of</strong> security <strong>of</strong> <strong>the</strong> rest <strong>of</strong> <strong>the</strong> systems attached to <strong>the</strong> global<br />

Internet.<br />

• increasing threat from infrastructure attacks<br />

Attacks that affect key components <strong>of</strong> <strong>the</strong> Internet can broadly affect organizations and<br />

users who have increasing dependency on <strong>the</strong> Internet. Distributed DoS attacks, worms<br />

and viruses, attacks on <strong>the</strong> Internet Domain Name System (DNS)), and attacks against<br />

routers are among <strong>the</strong> infrastructure attacks that have <strong>the</strong> potential to disrupt day-to-day<br />

business. The impacts <strong>of</strong> <strong>the</strong>se infrastructure attacks are denial <strong>of</strong> service, compromise <strong>of</strong><br />

sensitive information, misinformation, and having time and resources diverted from o<strong>the</strong>r<br />

tasks.<br />

These trends still hold true at <strong>the</strong> date <strong>of</strong> <strong>the</strong> publishing <strong>of</strong> this report. One trend that has actually<br />

continued to increase, creating a major impact on CSIRTs and <strong>the</strong>ir related constituencies,<br />

is <strong>the</strong> speed <strong>of</strong> attacks. With worms such as Slammer and Blaster, and mass email<br />

spreading viruses like Sobig.F, <strong>the</strong> time to respond to an incident has become drastically reduced.<br />

Because <strong>of</strong> this, CSIRTS and <strong>the</strong>ir constituencies need to be more prepared to take<br />

actions that previously might not have been acceptable, such as blocking certain types <strong>of</strong> traffic<br />

or shutting down certain services to stop <strong>the</strong> spread <strong>of</strong> activity. Some <strong>of</strong> <strong>the</strong> actions taken<br />

may cause undesirable affects. For example, when <strong>the</strong> Slammer worm hit in January 2003,<br />

many sites had to block SQL traffic, causing an impact on legitimate services running on<br />

non-infected systems, as part <strong>of</strong> a way to stop <strong>the</strong> worm from spreading. In cases such as<br />

<strong>the</strong>se, CSIRT and IT staff have to take quick action; <strong>the</strong>re may not be time for discussion with<br />

CMU/SEI-2003-TR-001 111

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!