Do We Have Logs for That? When Network Traffic Analysis Falls Short

  Рет қаралды 469

SANS ICS Security

SANS ICS Security

Жыл бұрын

SANS ICS Security Summit 2023
Do we have logs for that? When network traffic analysis falls short.
Speaker: Nikolas Upanavage, OT Cybersecurity Engineer, Bechtel Corporation
While developing a detection for a new cyber-attack scenario in Bechtel’s OT Cybersecurity Technical Center (Lab), the team encountered a challenge often mentioned with Industrial Control Systems: proprietary protocols. Due to time constraints, several common suggestions for approaching network traffic analysis of proprietary protocols were not feasible for the project. The team had to look for an alternative, which led to the question, “do we have logs for that?”
This presentation will review the approach taken to detect the cyber-attack. The key metric needed was tracking logic downloads to a controller from a major Distributed Control System (DCS) vendor. Like the proprietary protocol used in the communication between equipment, the team also had to determine how to work with a proprietary log file format, how to parse the logs, how to send the data to a SIEM, and more. The presenter will also discuss details of the attack used for the Lab’s cyber demo, including mapping to the MITRE ATT&CK framework.
This presentation will cover practical experience from both IT and OT Security Engineers in overcoming challenges of systems that use proprietary protocols. Attendees will learn an approach that is not often discussed at ICS conferences, which can supplement network traffic analysis methods for a better security posture of their systems. Finally, during the development of the detection, several other data points were found in available logs that enriched the detection dashboards. The presenter will highlight how these additional data points add more context to a SIEM, allowing for a quicker decision making during an incident response investigation.
View upcoming Summits: www.sans.org/u/DuS

Пікірлер: 1
@unominous4759
@unominous4759 Жыл бұрын
How did this show up in my subscription feed?
Multiverse of Convergence: Charting IT/OT Threat Overlap
33:11
SANS ICS Security
Рет қаралды 341
A clash of kindness and indifference #shorts
00:17
Fabiosa Best Lifehacks
Рет қаралды 37 МЛН
Looks realistic #tiktok
00:22
Анастасия Тарасова
Рет қаралды 96 МЛН
Live Demo: Don’t Say a Peep
31:38
SANS ICS Security
Рет қаралды 602
Interview with Senior Network Engineer - Dedan Langston (Hosted by INE)
42:11
Eli the Computer Guy
Рет қаралды 78 М.
Panel | We Hear You Cloud and Clear
57:35
SANS ICS Security
Рет қаралды 252
What Size Winch Do I Need for Urban Logging? - Ask Matt #26
18:25
Matthew Cremona
Рет қаралды 83 М.
What Happens When You Bury Logs in the Veggie Garden Raised Bed?
10:49
Self Sufficient Me
Рет қаралды 4,8 МЛН
Do NOT buy a LOG SPLITTER until you watch this!
9:31
OFF GRID with DOUG & STACY
Рет қаралды 552 М.
Woodturning - You've Got to Love a Laburnum Log !!
11:18
Andy Phillip
Рет қаралды 4,1 МЛН
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
A clash of kindness and indifference #shorts
00:17
Fabiosa Best Lifehacks
Рет қаралды 37 МЛН