The IP Attack Map application comprises of 6 main components that sums up to render a pool of data utilized for detailed security analysis. The IP attack map displays data pertaining to the security zones of the Crystal Eye network through the Banned IPs Table, Real Time Attack Tracker, Protocol Traffic Size Indicator, Device Traffic Size Indicator, Alert Report, and Alert Analysis.
The data gathered becomes the basic platform facilitating in-depth security analysis. The attack is visually depicted on the world map clearly specifying the origin and the destination of the attack. The visual depiction of the attack is also colour coded to specify the protocol that was used in the attack. All this is simulated on the world map and has a parallel database called the Alert Report which further provides the attack details such as the Timestamp, Source IP, Destination IP, Country Name, Region Name etc.
In the screenshot below, an attack is depicted in the world map specifying its origins in United States and was targeted towards a network secured with Crystal Eye in Western Australia. The attack is color coded as green which means HTTPS protocol was used. The visual depiction on the world map can also be co-related with the corresponding Alert Report below the map where the attack details are mentioned.
Every attack that is detected and simulated in the IP attack map is triggered by pre-configured IDS/IPS rules updated by Red Piranha’s Security Operations Team. These IDS/IPS rules can be modified or can be escalated to RP’s security operations team if there is a requirement to review them.
Note: The CE administrators can have access to all features of the IP Attack Map application from the Security Dashboard as well. However, the IP Attack Map PDF report can only be attained from the IP Attack Map application.
The IP Attack Map application is installed by default and can be accessed from the left-hand navigation panel.
Left-hand Navigation Panel > Reports > IP Attack Map Application
The Crystal Eye appliance bans any IP address that exceeds the login attempts threshold while accessing the CE itself. Once the IP address is banned the details are displayed in the Banned IPs Table with the Timestamp, Country Name and Region Name. If the CE administrator wishes to allow or whitelist a banned IP it can be done with a click of a button.
The forcefield feature of Crystal Eye plays the role of safeguarding the CE itself by blocking IPs that exceeds the login attempt threshold. The CE administrator can download a PDF report having information about the list of IPs that has been blocked by the Forcefield application.
Note: The Banned IPs can be whitelisted or allowed from the IP attack map in the security dashboard. While a customized report of these IPs can be downloaded from the Log section of the Forcefield application.
How to Whitelist or Allow a Banned IP Address?
Step 1: In the IP Attack Map application page, click the Allow button in the Banned IPs Table.
The Real-time Attack Tracker displays a well summarised simulation of the incoming attacks on a world map. It shows the origins of the attack and also specifies the target. The graphical attack simulations are IDS/IPS alerts that have been triggered by pre-configured rules. The protocol used during the attack can be detected as they are colour coded (example: red is FTP, Yellow is TELNET etc.). Some of the attack protocols that are detected and displayed here are FTP, SSH, TELNET, EMAIL, WHOIS, DNS, HTTP, HTTPS, SQL, SNMP, SMB, AUTH, RDP, DoS, and ICMP. If the attack protocols are different from the ones mentioned above, then it would be recorded under ‘others’.
How to Interpret the Data Shown in the Real-Time Attack Tracker?
Step 1: In the IP Attack Map application page, observe an attack simulated in the world map (the attack observed in the screenshot below is circled in red).
Step 2: Now observe the corresponding entry of the attack in the alert table.
Note: In the above screenshot, the Alert Table shows the time and date of the attack, the origin, the destination IP of the attack, country of origin, region name, description, action, rule type, port map and severity.
The Protocol Traffic Size Indicator shows the size of the data transferred using a particular protocol. The Crystal Eye appliance detects the protocol and automatically calculates the traffic size transferred over a period of time and displays it in a tabular format. The traffic size is measured in Megabytes (MB).
Where to Locate the Protocol Traffic Size Indicator in the IP Attack Map application?
Step 1: In the IP Attack Map application page, you will find the Protocol Traffic Size Indicator in the top-right corner.
Note: Apart from the IP Attack Map application, the top traffic size with respect to the protocol used can also be viewed in the IP Attack Map section under Security Dashboard and Top Protocols section of the Protocol Detail Report application.
The Device Traffic Size Indicator shows the device name (as mapped with CE) and the amount of data that it had received and sent over a period of time. The Device Traffic Size is measured in Megabytes (MB).
How to Locate the Device Traffic Size Indicator in the IP Attack Map application?
Step 1: In the IP Attack Map application page, you will find the Device Traffic Size Indicator in the top-right corner.
The IDS/IPS Alert Report displays attack specific data also known as IDS/IPS alerts generated on a real-time basis. These attacks and the protocols involved are visually depicted in the Real Time Attack Tracker. When an attack is initiated, the origin of the attack and the target CE network is visually depicted in the Real Time Attack Tracker. The Crystal Eye administrator can also view elaborated details of the attack such as the source IP, destination IP, country (from where the attack originated), region name, description of the attack, severity etc. in the IDS/IPS Alert Report.
The above screenshot depicts that there was an attack that originated from Argentina and was targeted towards a network secured with Crystal Eye in India. The attack is denoted in the map and its corresponding details are also mentioned in the Alert Report.
Upon clicking a particular IDS/IPS alert the Crystal Eye administrator can view alert details, escalate an attack alert to Red Piranha’s Security Operation’s Team, and view the IDS/IPS rules that triggered the alert.
The Crystal Eye appliance displays various real-time alerts that can be viewed and analysed. The analysis process includes viewing the IDS/IPS Alerts and the rules that trigger these alerts. The real-time alert pops-up in the alerts report and is triggered by rules which can be converted to pass, drop, or reject. If a rule triggers too many false positives, then the Crystal Eye administrator can also disable those rules as a part of the rules tuning process. The CE administrator also has the leverage to escalate an alert attack to Red Piranha’s security operations centre team.
We have discussed various ways to analyse IDS/IPS alerts below:
How to view IDPS alert details and the rules that triggers the IDPS alert?
Step 1: In the Security Dashboard, click any of the IDS/IPS alerts in the Alert Report section.
Step 2: You will now see a detailed report of the IDS/IPS alert details and the IDS/IPS rule details that triggered the alert.
How to convert the IDPS rules to Drop, Pass or Alert after it triggers an attack alert?
The IDPS rules plays a vital role in stopping detected incidents that occur in the Crystal Eye network. However, the characteristics of these specially created rules can be changed.
These rules can be converted to Pass, Drop and Reject further defining the nature of the rules as discussed below.
Convert to Pass: Post conversion of the rule to Pass, if a signature matches, the packets are not scanned anymore, and the scanning process is skipped to the end of all rules for the current packet)
Convert to Drop: Post conversion of the rule to Drop, if a signature matches then the packet will be stopped and will not be allowed to move further into the network.
Convert to Reject: Post conversion of the rule to Reject, if a signature matches then the packet will not go through, and both the sender and receiver will receive a reject packet.
Step 1: In the Security Dashboard, click an IDPS alert in the Alert Report.
Step 2: You will now see a detailed report of the IDPS alert details and the IDPS rule details that triggered the alert.
Step 3: Click the Change Rules Actions button in the IDPS alert details pop-up.
Step 4: You will now see the Change Rule Actions pop-up. Select Alert, Pass or Reject from the default_ruleset dropdown and click the Update button.
How to disable a particular IDS/IPS rule that triggered an IDPS alert?
Crystal Eye administrator might come across situations when the IDS/IPS rule that triggered the alert must be disabled. In this case, the IDS/IPS alert must be clicked and then the disable IDS/IPS alert button must be clicked.
Step 1: In the Security Dashboard page, click the IDPS alert for which the IDPS rule needs to be disabled.
Step 2: You will now see the Alert Details and the Rule Details. Read the details and then click the Disable button.
How to escalate an attack alert to Red Piranha’s security operations centre team for analysis from the IP Attack Map application?
All attack alerts can be escalated to the SOC team after Incident Response Services application is installed. Escalations will not be processed until the Incident Response Services application is installed and configured. The details of the alerts that are escalated are also mentioned in the Escalated Alerts section of the of the IDS/IPS Alerts application where a PDF report can also be generated for the same. Apart from IP Attack Map application, the IDS/IPS alerts can also be escalated to RP’s Secops team from the IDS/IPS Alerts Report section of the Security Dashboard and the Inbox Report section and the Alerts section of the IDS/IPS Alert application.
Note: If the Incident Response Services application is not installed and configured then the following error message will be displayed.
Step 1: In the Security Dashboard page, click the IDPS alert that needs to be escalated.
Note: Before you initiate the process of alert escalation to Red Piranha’s SOC team make sure that the Incident Response Services application is installed and configured. Click here to know how to configure the Incident Response Services application.
Step 2: You will now see the Alert Details and the Rule Details. Read the details and then click the Escalate button.
Step 3: You will now see a Comment Box. Add the comment and click the Submit button.
A Crystal Eye administrator can download IP Attack Reports covering various parameters related to security analysis. The key components of this report are Protocol Traffic Size Indicator, Device Traffic Size Indicator and the Alert Report.
The Protocol Traffic Size Indicator (labelled as Protocol Details in the IP Attack Map PDF Report) is also mentioned in the IP Attack Map application. This can be understood with the screenshot below. The IP Attack Map PDF Report is on the left and the IP Attack Map application GUI is in the right.
The Device Traffic Size Indicator (labelled as Device Details in the IP Attack Map PDF Report) is also mentioned in the IP Attack Map application. This can be understood with the screenshot below. The IP Attack Map PDF Report is on the left and the IP Attack Map application GUI is on the right.
The Alerts in the PDF Report is also mentioned in the IP Attack Map application. This can be understood with the screenshot below. The IP Attack Map PDF Report is below and the IP Attack Map application GUI is on the top.
Powered by Grav + with by Trilby Media.