The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and
used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following
information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it
is not installed in accordance with NetScreen’s installation instructions, i t may cause interference wi th radio and tele vision reception. This equip ment has
been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These
specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that
interference will not occur in a particular installation. If this equipmen t does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipme nt and receive r. Consult t he dealer o r an experienced ra dio/TV
technician for help. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Caution: Changes or modifications to this product could void the user's warrant y and authority to operate this device.
Disclaimer
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET
THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE
SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY.
The Event Category Correlation Reference Guide provides you with information on
how to investigate various types of sec u rity threats using the Offense Manager,
Event Viewer , or Flow V iewer. You can sort offenses by category (such as, exploit,
policy, or malware).
ConventionsTable 1 lists conventions that are used throughout this guide.
Table 1 Icons
IconTypeDescription
Information noteInformation that describes important features or
instructions.
CautionInformation that alerts you to potential loss of
data or potential damage to an application,
system, device, or network.
WarningInformation that alerts you to potential personal
injury.
Technical
Documentation
Documentation
Feedback
You can access technical documentation, technical notes, and release notes
directly from the Juniper networks Support Web site at
www.juniper.net/support/.
http://
We encourage you to provide feedback, comments, and suggestions so that we
can improve the documentation. Send your comments to
techpubs-comments@juniper.net, orfill out the documentation feedback form at
http://www.juniper.net/techpubs/docbug/docbugreport.html. If you are using e-mail, be
sure to include the following information with your comments:
•Document name
•Document part number
•Page number
•Software release version
STRM Event Category Correlation Reference Guide
2ABOUT THIS GUIDE
Requesting
Support
•Open a support case using the Case Management link at
http://www.juniper.net/support/ or call 1-888-314-JTAC (from the United States,
Canada, or Mexico) or 1-408-745-9500 (from elsewher e).
STRM Event Category Correlation Reference Guide
EVENT CATEGORY CORRELATION
This document provides information on the types of event categories and the
processing of events. For example, the event category determines if events will
have an offense automatically created, real-time flow analysis, rate analysis, and
the default correlation tests performed. This document provides information on
event correlation including:
•About Event Category Correlation
•Recon
•DoS
•Authentication
•Access
•Exploit
•Malware
About Event
Category
Correlation
•Suspicious Activity
•System
•Policy
•CRE
•Potential Exploit
•SIM Audit
•VIS Host Discovery
•Application
An Event Processor processes events collected from one or more Event
Collector(s). Once received, the Event Processor correlates the information from
STRM and distributes to the appropriate Correlation Group for processing.
The Correlation Groups perform tests on the events to determine factors such as
vulnerability data, relevance of the targets, import ance, or credibility of the events.
The results of the Correlation Group tests appear as annotations in the Offense
Manager and Event Viewer. Also, custom rules are applied to additional events for
specific incident recognition. Once complete, the Event Processor stores the event
STRM Event Category Correlation Reference
2EVENT CATEGORY CORRELATION
in the Ariel database and, in some circumstances, performs real-time flow analysis
to determine the appropriate routing of the event.
For example, Figure 2-1 provides a representation of the process within the Event
Processor for processing events. Once the Event Processor receives an event, the
Category Router determines the appropriate Correlation Group to apply tests to
the event. Once complete, the event is passed through the Custom Rules Engine
to determine the custom rules that apply to the event. The event is then passed
through the Ariel database for storage and the Flow Context and Routing
components to determine if real-time flow analysis should be performed and if the
event should automatically generate a new offense or become part of an existing
offense. If this is the case, the event is sent to the Magistrate. If real-time flow
analysis is requested of the event, a request is sent to the Classification Engine to
determine routing.
Events
Event Collector
Correlation
Group 1
Classification Engine
Correlation
Group 2
Events
Event Processor
Category Router
Correlation
Group 3
Custom Rules
Engine
Ariel DB Storage
Flow Context and Routing
Events
Correlation
Group 4
Event Collector
Correlation
Group 5
Magistrate
External Event
Exported to:
E-mail
Syslog
SNMP
Figure 2-1 Event Category Correlation Process
This section includes:
•High-Level Event Categories
•Event Correlation Processing
•Additional Event Processing
STRM Event Category Correlation Reference
About Event Category Correlation3
High-Level Event
Categories
The high-level event categories include:
Table 2-1 High-Level Event Categories
CategoryDescription
ReconEvents relating to scanning a nd other techniqu es used to id entify
network resources, for example, network or host port scans.
DoSEvents relating to Denial of Service (DoS) or Distributed Denial of
Service (DDoS) attacks against services or hosts, for example,
brute force network DoS attacks.
AuthenticationEvents relating to authentication controls, group, or privilege
change, for example, log in or log out.
AccessEvents resulting from an attempt to access network resources,
for example, firewall accept or deny.
ExploitEvents relating to application exploits and buffer overflow
attempts, for example, buffer overflow or web application
exploits.
MalwareEvents relating to viruses, trojans, back door attacks, or other
forms of hostile software. This may include a virus, trojan,
malicious software, or spyware.
Suspicious
Activity
The nature of the threat is unknown but behavior is suspicious
including protocol anomalies that potentially indicate evasive
techniques, for example, packet fragmentation or known IDS
evasion techniques.
SystemEvents related to system changes, software installation, or status
messages.
PolicyEvents regarding corporate policy violations or misuse.
CREEvents generated from an offense or event rule. For more
information on creating custom rules, see the STRM Administration Guide.
Potential ExploitEvents relating to potential application exploits and buffer
overflow attempts.
SIM AuditEvents relating to user interaction with the Console and STRM
Administration Console.
VIS Host
Discovery
Events relating to the host, ports, or vulnerabilities that the VIS
component discovers.
ApplicationEvents relating to application activity.
STRM Event Category Correlation Reference
4EVENT CATEGORY CORRELATION
Event Correlation
Processing
For each event category, the Correlation Group determines the correlation rules
(tests) that are performed on each event. Each test is performed and assigned a
value between 0 and 10. Once all tests are complete, all test results are weighted
and the data for the event is provided in the event viewer. Table 2-2 provides a list
of possible correlation rules (tests).
Table 2-2 Correlation Rules (Tests)
RuleDescription
Relevance of the
day of the week
Determines the relevance of the day of the week for this event.
For example, if the event occurs on the weekend, an attack may
have a higher relevance.
Device credibility Credibility rating can be applied on a per device basis that allows
users to associate a credibility to a device based on the level of
trust for the device and the validity of the produced event. For
example, a highly tuned IDS in front of a key server may have a
credibility of 7 while an IDS outside the corporate network may
have a credibility of 3.
Event rate Determines if the event rate of this event type is greater than
normal. This is determined on a category by category basis.
AttackerDetermines if the attacker is one of the configured assets.
TargetDetermines if the target is one of the configured assets.
Source portDetermines if the source port is less than 1024. If the port is less
than 1024, the attacker may be attempting to fool a stateless
firewall.
Attacker ageDetermines the relative importance of how long the attacker has
been known to the system. If the attacker is new, the relevance of
this attacker increases.
Target age Determines the relative importance of how long the target has
been known to the system.
Remote attackerDetermines the relative importance of the attacker network.
Remote targetDetermines the relative importance of the target network.
Target port Determines if the target port is included in the list of most
attacked ports provided by the incidents.org data.
Attacker riskDetermine the overall risk assessment value for the attacker
based on the asset profile data.
Target riskDetermine the overall risk assessment value for the target.
Time of the attack Determines the time of attack. For example, if the attack occurs
in the middle of the night, which is deemed to be a low traffic
time, this indicates a higher relevance of the attack .
Vulnerable
targeted port
If the port is open, determine if the targeted port is vulnerable to
the current exploit.
Vulnerable portDetermines if the port is vulnerable to any type of atta ck or
exploit.
Open target portDetermines if the target port is open.
STRM Event Category Correlation Reference
About Event Category Correlation5
Table 2-2 Correlation Rules (Tests) (continued)
RuleDescription
Remote Target Determines if the target network is defined as a remote network
in STRM views.
Geographic
Location
Determines the relative importance of the geographic location of
the target.
Remote attackerDetermines if the attacker network is defined as a remote
network in STRM views.
Attacker IP
address
Determines if the attacker IP address is included in the list of IP
addresses that are highlighted as suspicious in the Remote
Services View.
Attacker portDetermines if the attacker port is included in the list of ports from
which attacks originate as provided by the incidents.org data.
Each low-level event category is processed by one of five event Correlation
Groups. This section provides information on the Correlation Groups including:
•Correlation Group 1
•Correlation Group 2
•Correlation Group 3
•Correlation Group 4
•Correlation Group 5
STRM Event Category Correlation Reference
6EVENT CATEGORY CORRELATION
Correlation Group 1
The Correlation Group 1 correlation model provides tests for the following traffic
types:
Table 2-3 Correlation Group 1 Tests
Traffic TypeCorrelation Rules (Tests)
Local-to-LocalCorrelation Group 1 performs the following tests for
Local-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker
• Target
• Source port
• Target port
• Cross host
• Attacker age
• Target age
• Attacker network
• Target network
• Vulnerable targeted port
• Attacker risk
• Target risk
• Time of the attack
• Open target port
• Vulnerable port
Note: For test details, see
Table 2-2.
STRM Event Category Correlation Reference
About Event Category Correlation7
Table 2-3 Correlation Group 1 Tests (continued)
Traffic TypeCorrelation Rules (Tests)
Local-to-RemoteCorrelation Group 1 performs the following tests for
Local-to-Remote traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker
• Source port
• Target port
• Attacker age
• Attacker network
• Attacker risk
• Remote Target
• Geographic Location
• Time of the attack
Note: For test details, see
Table 2-2.
Remote-to-LocalCorrelation Group 1 performs the following tests for
Remote-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Target
• Source port
• Target age
• Attacker port
• Remote attacker
• Attacker IP address
• Geographic location
• Time of the attack
• Target network
• Target risk
• Open target port
• Vulnerable targeted port
• Vulnerable port
Note: For test details, see
Table 2-2.
STRM Event Category Correlation Reference
8EVENT CATEGORY CORRELATION
Correlation Group 2
The Correlation Group 2 correlation model provides tests for the following traffic
types:
Table 2-4 Correlation Group 2 Tests
Traffic TypeCorrelation Rules (Tests)
Local-to-LocalCorrelation Group 2 performs the following tests for
Local-to-RemoteCorrelation Group 2 performs the following tests for
Local-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker
• Target
• Source port
• Attacker age
• Target age
• Attacker network
• Target port
• Attacker risk
• Target risk
• Time of the attack
• Open target port
Note: For test details, see
Table 2-2.
Local-to-Remote traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Attacker
• Source port
• Target port
• Attacker age
• Attacker network
• Attacker risk
• Remote target
• Target
• Geographic location
• Time of the attack
Note: For test details, see
Table 2-2.
STRM Event Category Correlation Reference
About Event Category Correlation9
Table 2-4 Correlation Group 2 Tests (continued)
Traffic TypeCorrelation Rules (Tests)
Remote-to-LocalCorrelation Group 2 performs the following tests for
Remote-to-Local traffic:
• Relevance of the day of the week
• Device credibility
• Event rate
• Target
• Source port
• Target age
• Attacker port
• Target port
• Remote Attacker
• Attacker IP address
• Geographic location
• Time of the attack
• Target network
• Target risk
• Open target port
Note: For test details, see
Table 2-2.
STRM Event Category Correlation Reference
Loading...
+ 35 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.