OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

cti-cybox message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [cti-cybox] Network flow object suggestions


Hi Ivan,

IMHO the network connection object should model what a network connection can do. And that is a single host sending to a single destination address (be that a multicast address or broadcast address).

To describe a DDoS we have seen we can use the ObservedData object containing a Network Connection object that describes an example of the traffic with a count to describe the number of times it was seen, and also containing a list of IP address objects that were also seen sending traffic the same as the example network connection. We could then use CybOX relationships to join those the IP addresses with the network connection object.

We don't necessarily require another DDoS object if we have the right CybOX relationships created. 

Cheers

Terry MacDonald | Chief Product Officer







On Tue, Aug 30, 2016 at 7:57 AM, Kirillov, Ivan A. <ikirillov@mitre.org> wrote:

Based on this discussion thread and that on Slack, it seems like we have a few options with regards to the Network Connection Object in this context:

·         Option 1: Keep the Object the way it is (i.e., src/dst_refs and src/dst_ports)

o    Pros: Supports characterizing DDoS, port scanning, basic point-to-point connections, and everything in between

o    Cons: Semantic overloading of src_refs leads to complexity, especially from a user’s standpoint. Could lead to interoperability issues with CybOX content that uses the Network Connection Object.

·         Option 2: Restrict src/dst_refs and src/dst_ports to singletons (i.e. src_ref/dst_ref and src_port/dst_port) and add a “Superflow” extension (with src_refs/dst_refs and src_ports/dst_ports)

o    Pros: Base set of properties are clear and easy to use, DDoS and port scanning are supported by extension and can still use “valid” properties such as protocols. Extension can be created and added post-MVP.

o    Cons: Semantic overlap between base src/dst properties and those on the Superflow extension

·         Option 3: Restrict src/dst_refs and src/dst_ports to singletons (i.e. src_ref/dst_ref and src_port/dst_port) and add a new “Superflow” Object (with src_refs/dst_refs and src_ports/dst_ports)

o    Pros: Base set of properties are clear and easy to use, DDoS and port scanning are supported by new Object. Object can be created and released post-MVP, and could have its own capabilities, such as the ability to specify port ranges (as an example).

o    Cons: Semantic overlap between Network Connection Object – some properties (e.g., protocols) would likely need to be duplicated.

Personally, I I’m leaning towards option 2 or 3. I think we need to make sure that the “base” Network Connection Object is semantically accurate and easy to use by implementers, and we can add support for DDoS and port scanning characterization down the road.

>>The second is around the list of options in the protocols field. We should probably provide an open vocabulary taken from both the IANA protocol list and the IANA services list to provide people a list of common options they should use. Otherwise we'll hit problems like people putting in 'ip' rather than ipv4 or ipv6, which is ambiguous.

Agreed – given that there’s no single definitive source of protocols, I think we’ll likely have to create an open vocabulary with a set of common protocols taken from IANA and other places.

 

Regards,

Ivan

 

From: <cti-cybox@lists.oasis-open.org> on behalf of Ivan Kirillov <ikirillov@mitre.org>
Date: Monday, August 29, 2016 at 7:49 AM
To: Terry MacDonald <terry.macdonald@cosive.com>, Jason Keirstead <Jason.Keirstead@ca.ibm.com>
Cc: "cti-cybox@lists.oasis-open.org" <cti-cybox@lists.oasis-open.org>, Bret Jordan <bret.jordan@bluecoat.com>
Subject: Re: [cti-cybox] Network flow object suggestions

 

It sounds like we need another call on this topic. Trey and I are available at 10:00am EDT tomorrow if that works – let’s try to address this topic and put the finishing touches on Network Connection.

 

Regards,

Ivan

 

From: <cti-cybox@lists.oasis-open.org> on behalf of Terry MacDonald <terry.macdonald@cosive.com>
Date: Saturday, August 27, 2016 at 9:57 PM
To: Jason Keirstead <Jason.Keirstead@ca.ibm.com>
Cc: "cti-cybox@lists.oasis-open.org" <cti-cybox@lists.oasis-open.org>, Bret Jordan <bret.jordan@bluecoat.com>
Subject: Re: [cti-cybox] Network flow object suggestions

 

True you can't model all the ddos connections in the sighting object, but my understanding is that you were only supposed to model a selection of connections within the sighting as examples of the connection if you were wanting to track connections. You wouldn't model all the connections you saw. In which case you would have 3 or 4 observed data objects, each with an example of one ddos connection in them (out something like that).

I don't like the idea of conflating yet another layer of 'multiplicity' into CybOX/STIX.

Cheers
Terry MacDonald
Cosive

 

On 27/08/2016 7:45 AM, "Jason Keirstead" <Jason.Keirstead@ca.ibm.com> wrote:

I am unsure how you would encode a DDOS using sighting in this manner without duplicating the network connection, can you give an example?

-
Jason Keirstead
STSM, Product Architect, Security Intelligence, IBM Security Systems
www.ibm.com/security | www.securityintelligence.com

Without data, all you are is just another person with an opinion - Unknown


active hide details for Terry MacDonald ---08/26/2016 04:18:57 PM---WhicTerry MacDonald ---08/26/2016 04:18:57 PM---Which is what the multiplicity in the STIX sighting relationship object is for. We should keep the n



From: Terry MacDonald <terry.macdonald@cosive.com>
To: Jason Keirstead/CanEast/IBM@IBMCA
Cc: cti-cybox@lists.oasis-open.org, Bret Jordan <bret.jordan@bluecoat.com>
Date: 08/26/2016 04:18 PM
Subject: Re: [cti-cybox] Network flow object suggestions
Sent by: <cti-cybox@lists.oasis-open.org>





Which is what the multiplicity in the STIX sighting relationship object is for. We should keep the network flow object for recording one flow, and use the sighting for saying 'and other stuff like this'.

Cheers
Terry MacDonald
Cosive


On 26/08/2016 22:13, "Jason Keirstead" <Jason.Keirstead@ca.ibm.com> wrote:

Multiple sources and dests is not to handle multicast. It is an encoding optimization to handle DDOS and port scan attempts. Without it, to encode a DDOS you may have 100,000 duplicate objects.

Sent from IBM Verse


Jordan, Bret --- Re: [cti-cybox] Network flow object suggestions ---

From:

"Jordan, Bret" <bret.jordan@bluecoat.com>

To:

"Terry MacDonald" <terry.macdonald@cosive.com>

Cc:

cti-cybox@lists.oasis-open.org

Date:

Thu, Aug 25, 2016 7:16 PM

Subject:

Re: [cti-cybox] Network flow object suggestions



Good catch, I have not really gotten to that object yet...  So yes, I would agree, I am not sure why we would allow a list for the source/src/initiator 


Thanks,

Bret



Bret Jordan CISSP
Director of Security Architecture and Standards | Office of the CTO
Blue Coat Systems
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." 

On Aug 25, 2016, at 15:24, Terry MacDonald <terry.macdonald@cosive.com> wrote:

Hi all

I have some questions about the network flow object.

----

The first is about the multiplicity of the source_refs.

Multicast traffic always so comes from a single source. So does a network broadcast. So is there any reason to have the source as a list when there is always just one source? Am I missing something?

We should really change its name to src_ref, and restrict it to one object-ref.

----

The second is around the list of options in the protocols field. We should probably provide an open vocabulary taken from both the IANA protocol list and the IANA services list to provide people a list of common options they should use. Otherwise we'll hit problems like people putting in 'ip' rather than ipv4 or ipv6, which is ambiguous.

Cheers
Terry MacDonald
Cosive

 







[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]