Countering network resident threats in government networks

 

Connecting state and local government leaders

Network security monitoring is an operational and tactical method for incident detection and response.

The federal government owns, operates and uses some of the largest networks in the world, with millions of users distributed across thousands of locations. Due to their size and age, these networks host an exceptionally diverse set of systems and applications. Even when removing sensitive and classified networks from consideration, the remaining networks provide data and services upon which hundreds of millions of citizens and other constituents depend.

Because of this richness of systems, data and bandwidth, intruders of all varieties target federal networks. These threat actors possess a wide range of threat capabilities, beginning with the nuisance of denial-of-service attacks, continuing through the pain of ransomware and peaking with espionage, theft and computer network attack (CNA). Federal defenders struggle to balance their responsibilities against the resources allocated to protect their environments.

A certain class of threat actor is attracted to the federal environment. These are “network resident threats” – intruders who use and abuse networks for a sustained period of time. NRTs may or may not be so-called “advanced persistent threats,” sentient threat actors, not mindless code, who can operate in the full spectrum of computer intrusion and are formally tasked to accomplish a mission. APTs may or may not use a network to accomplish their goal. For example, an APT might try to insert human operatives into target organizations as a newly hired software engineer. Unless and until those operatives decide to use or abuse their network access, they are invisible to network security products.

Typically APT groups will gain access to a target network and establish mechanisms by which they can maintain remote access on demand. These so-called “persistence” measures explain the “P” in “APT.” (“P” also refers to the tendency of these groups to adopt a variety of methods to achieve their mission.) FireEye’s Mandiant division recently released the 2020 edition of its M-Trends report, which noted that the so-called “dwell time” for incident response activities was 56 days in 2019. This means that 56 days elapsed between the time a threat actor first achieved access and when that access was detected by internal or external incident responders. As the vast majority of these APT groups use network infrastructure to retain access to target data, they perfectly fit the description of a network resident threat.

Criminal groups, insider threats or other undesirable actors may also use and abuse the network to achieve their goals. While it is possible for criminal groups to perform close-access operations, such as tampering with hardware in point-of-sale devices, criminals prefer to compromise targets remotely. This preserves their ability to manage multiple criminal engagements while protecting their personnel and business models.

Malicious insiders may even make use of the network over prolonged periods of time. While insiders may evade network detection by carrying copies of documents on portable hard drives, they run the risk of being caught with such devices on their persons. Many choose to transmit stolen data digitally. For example, an engineer at one of the nation’s largest industrial firms was recently prosecuted for stealing files and emailing some of them from his corporate account to a personal email account. The act of acquiring those files usually takes place over a period of time and requires moving documents from a central server to the perpetrator’s workstation -- other aspects of network resident threat behavior.

Once it becomes clear that network resident threats represent a credible element of the risk equation to government network defenders, the question of how to deal with them naturally arises. If one accepts that “prevention eventually fails,” then the rapidity and accuracy of detection and response measures come to the forefront. Detection and response rely on four key elements: third-party sources, network data, application/infrastructure data and endpoint data. Of these, the network is the least common denominator and the only source that is common to all network resident threats. While one should never neglect the value of the other three forms of data, it is imperative to include network data when defending any government environment.

Network security monitoring is an operational and tactical method for incident detection and response. NSM relies on four data types to provide defenders with the information they need:  full content, extracted content, transaction data and alert data. Using these data types, agencies can record, extract, summarize and judge traffic, or essentially content.

Network defenders in the Air Force developed NSM in the late 1980s and throughout the 1990s to cope with the same problems facing modern government networks -- size, user account, diversity, remote access and target-rich data. Because Air Force networks were constantly attacked by a variety of threat actors, defenders realized they could only prevent a certain number of those intrusions. In order to win, defenders had to rapidly detect and respond to the attacks that started to achieve an intruder’s goal. If the defenders could stop and remove intruders before they could accomplish his mission, then the defenders won. This metric, rather than meaningless counts of packets stopped by network firewalls, reflected operational realities and impacts.

When considering ways to gain better network visibility and thereby identify and counter network resident threats, government enterprise defenders would benefit from keeping the principles and data types of NSM in mind. Although defenders have to plan for and wrestle with many sorts of intruders on a daily basis, there are proven ways to frustrate and ultimately defeat adversaries that operate as network resident threats.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.