Do We Have Logs for That? When Network Traffic Analysis Falls Short

  Рет қаралды 469

SANS ICS Security

SANS ICS Security

Жыл бұрын

SANS ICS Security Summit 2023
Do we have logs for that? When network traffic analysis falls short.
Speaker: Nikolas Upanavage, OT Cybersecurity Engineer, Bechtel Corporation
While developing a detection for a new cyber-attack scenario in Bechtel’s OT Cybersecurity Technical Center (Lab), the team encountered a challenge often mentioned with Industrial Control Systems: proprietary protocols. Due to time constraints, several common suggestions for approaching network traffic analysis of proprietary protocols were not feasible for the project. The team had to look for an alternative, which led to the question, “do we have logs for that?”
This presentation will review the approach taken to detect the cyber-attack. The key metric needed was tracking logic downloads to a controller from a major Distributed Control System (DCS) vendor. Like the proprietary protocol used in the communication between equipment, the team also had to determine how to work with a proprietary log file format, how to parse the logs, how to send the data to a SIEM, and more. The presenter will also discuss details of the attack used for the Lab’s cyber demo, including mapping to the MITRE ATT&CK framework.
This presentation will cover practical experience from both IT and OT Security Engineers in overcoming challenges of systems that use proprietary protocols. Attendees will learn an approach that is not often discussed at ICS conferences, which can supplement network traffic analysis methods for a better security posture of their systems. Finally, during the development of the detection, several other data points were found in available logs that enriched the detection dashboards. The presenter will highlight how these additional data points add more context to a SIEM, allowing for a quicker decision making during an incident response investigation.
View upcoming Summits: www.sans.org/u/DuS

Пікірлер: 1
@unominous4759
@unominous4759 Жыл бұрын
How did this show up in my subscription feed?
Multiverse of Convergence: Charting IT/OT Threat Overlap
33:11
SANS ICS Security
Рет қаралды 341
КАРМАНЧИК 2 СЕЗОН 7 СЕРИЯ ФИНАЛ
21:37
Inter Production
Рет қаралды 532 М.
Who has won ?? 😀 #shortvideo #lizzyisaeva
00:24
Lizzy Isaeva
Рет қаралды 46 МЛН
孩子多的烦恼?#火影忍者 #家庭 #佐助
00:31
火影忍者一家
Рет қаралды 49 МЛН
He sees meat everywhere 😄🥩
00:11
AngLova
Рет қаралды 11 МЛН
Interview with Senior Network Engineer - Dedan Langston (Hosted by INE)
42:11
Eli the Computer Guy
Рет қаралды 78 М.
How to Prepare for the Future of OT Cybersecurity | Verve Industrial
58:33
Verve Industrial, A Rockwell Automation Company
Рет қаралды 196
Woodturning - You've Got to Love a Laburnum Log !!
11:18
Andy Phillip
Рет қаралды 4,1 МЛН
What Happens When You Bury Logs in the Veggie Garden Raised Bed?
10:49
Self Sufficient Me
Рет қаралды 4,8 МЛН
Establishing Your Baseline
29:44
SANS ICS Security
Рет қаралды 387
Live Demo: Don’t Say a Peep
31:38
SANS ICS Security
Рет қаралды 602
КАРМАНЧИК 2 СЕЗОН 7 СЕРИЯ ФИНАЛ
21:37
Inter Production
Рет қаралды 532 М.