You are on page 1of 8

Solutions for Telecom Infrastructure Security

IBM Telecom Core Infrastructure


Security Solution

Changing dynamics in the telecom


security landscape
Significant changes have occurred
in the telecommunications (telecom)
security landscape. From embedded
worms traveling in the communication
clouds and infecting scores of
networks to denial of service attacks
that are designed to disrupt commerce,
malicious attacks over the Internet
The IBM Telecom Core Infrastructure Security Solution monitors and manages the health of both the have historically been targeted at “end-
network elements and the actual traffic itself from a single, integrated system. points” through their telecom links.
The burden of protecting against these
Highlights attacks is falling more and more on the
owners of these telecom networks.
• Optimizes operational security • Addresses end-to-end security:
systems investments networks, systems, users
In the past, there was no need for
telecom service providers to provide
• Reduces time to market for new • Addresses increasing customer
security for the connections that
security services to customers demands and Service Level
end-point customers used to access
Agreements
the Internet. The telecom role has
• Addresses the security in the traditionally been that of “a purveyor of
“cloud” • Provides integrated and reusable
bits.” End-point customers would buy
components
bandwidth, and would pay for it by the
bit—regardless of whether those bits
were clean data, viruses, or worms.
The burden of responsibility between As telecoms surveyed the landscape SLAs that once triggered small
the user, enterprise, and telecom has of available technology for securing penalties for passing infected traffic
shifted. Let’s take a closer look at these their infrastructure, they found newly can now cost the telecom a month of
changing dynamics. evolving network elements that can bandwidth charges per instance or,
help secure a carrier-class network in some cases, even more. Moreover,
Evolving relationship between user, combined with enterprise-class as bandwidth prices become a
enterprise, and telecoms appliances. commodity, aggressive SLAs have
The first of these dynamics is driven become a much more prominent tool in
primarily by the changing role of the Shifting burden of managing the the competitive arsenal of telecoms as
telecom. As the average revenue per complexities of defending against attack they try to attract new customers.
user for traditional voice service has The second of these dynamics is
declined, the telecom industry has driven by the dramatic acceleration To meet the diverse security demands
re-directed its efforts into launching of the frequency, sophistication, of their enterprise customers while
and delivering a full suite of IP-based and malevolence of attacks. This driving additional revenue, telecoms
services. acceleration and its substantial are beginning to offer managed
increase in complexity have severely security services. These services
Some examples of IP-based services taxed the ability of enterprise require that the technology used to
are Voice over Internet Protocol (VoIP), customers to defend their networks secure their own core be extended to
Internet Protocol Television (IPTV), effectively. In addition, IT managers reach out to the enterprise and work
Push to Talk, and instant messaging. must now protect against threats from with the security components already
This change in focus is magnified inside their network and not just from installed.
by the consolidation of wireline and the outside.
wireless carriers as service providers Requirements for a comprehensive
race to deliver “any service on any Despite their investments in security security protection solution
device.” technology, most customers can only Telecom service providers cannot
hope to identify an attack after it has wait for emerging network elements
Now that telecoms are themselves occurred and try to prevent the same to develop because attacks are
IP service providers, they are also, attack from occurring more than once. continuously experienced. Some are
by definition, end-point owners. To that end, enterprise customers are only being reported after the damage
Therefore, telecom assets are now just now expecting their telecom vendors has been done. A comprehensive
as vulnerable to attack as any other to shoulder a significant portion of “security protection” solution
end-point device. In fact, an entirely the load. They are demanding “clean therefore must meet the needs of
new breed of attack has emerged, one pipes” from their service providers, and both core telecom carrier security
that is specifically designed to cripple the service level agreements (SLAs) and downstream enterprise security
key IP service components such as SIP from the telecoms are reflecting those effectively. To do so, it must have the
proxy servers (used for VoIP and IPTV), demands. following attributes:
DNS servers, and even the network
routers themselves.

2
In addition, the Core Infrastructure
• A unified view of the network with the • Robust storage capability to meet the Security Solution features powerful,
ability to perform real-time analysis storage requirements of historical flexible mitigation options that network
of all the traffic on the network while and trend analysis operators can use to take action and
simultaneously understanding the enforce policy either manually or
underlying infrastructure through a • Scalability to meet the demands automatically. This solution is scalable
combination of discovery and event of large, highly distributed carrier to meet the demands of large, highly
collection networks distributed carrier networks.

• Both macro and granular visibility • Flexibility and customization that The solution features three core
of traffic and network elements for includes configurable reporting, a components. IBM Tivoli® Security
monitoring the behavior of the configurable user interface that can Operations Manager provides the
network as a single entity while also interface with any network element, monitoring and correlation of the
providing full-packet capture and and the ability to create custom elements found in the network while
forensics capabilities down to a algorithms to detect any type of NarusInsight™ Secure Suite (NSS)
single IP address anomaly provides similar monitoring and
correlation of the network traffic itself.
• Full correlation that can span all IBM Telecom Core Infrastructure IBM Tivoli Netcool® then acts as the
traffic and network elements with Security Solution manager of the managers by providing
the ability to detect even the most The IBM Telecom Core Infrastructure an additional tier of correlation between
distributed of attacks with extremely Security Solution monitors and Tivoli Security Operations Manager
high accuracy and very low false manages the health of network and NSS. User interfaces for reporting
positives or negatives elements (or the cloud) and the actual and portal access are provided by
traffic itself from a single, integrated Netcool Impact and Webtop.
• Flexible attack mitigation to support system. It features a powerful
both manual and automatic forms of combination of technology designed • Complete monitoring of both IP traffic
attack mitigation, providing access to detect virtually any malicious threat and network elements
control similar to a circuit-switch or network anomaly, no matter where it With the Tivoli Netcool Precision
network for the operator originates. component, the Core Infrastructure
Security Solution can provide flexible,
• Superior reporting and management From worms and viruses propagating automated discovery of all Layer 1, 2,
capabilities with a management from outside the network perimeter to and 3 devices in the IP network from
console that can provide a single, insider threats emanating from within the transport layer optical devices to
unified view of the health of all traffic the network, this solution can detect routers, switches, and IP addresses.
and network elements, flexible pre- these threats early and accurately. Netcool Precision generates an
configured reports, and real-time, accurate up to date inventory of
dashboard-style reports devices, systems, and applications
within an infrastructure.

3
Tivoli Netcool Precision also provides a network behavior. Using this multi- • Unique analytics and forensics
snapshot of the network topology and tiered correlation capability, the With the solution, users have access
a basic mapping of applications to their solution detects the widest possible to a top-down, macro view and the
underlying servers. This view is critical range of attacks with significantly granular, IP-address specific view of
to monitoring the health of network increased accuracy. both traffic and network elements. With
elements and is the first line of defense this “zoomable” view, operators can
against attacks in or originating from The NSS component correlates traffic rapidly investigate detected anomalies
the network. features across multiple sophisticated and make mitigation decisions in
security algorithms that are based on near real time. NSS is not visible to
To monitor and detect threats from Signal Processing and Information the installed security infrastructure
outside the network, the solution Entropy. In this way, it can monitor even (for example, firewalls, IDS/IPS) and
uses the NSS component, which can the largest network as a single entity. can immediately enable full-packet
analyze and profile live IP traffic in real capture on the traffic after an anomaly
time and inspect packets from layer In addition to detecting changes is detected.
2 to layer 7. The NSS Semantic Traffic in traffic volume or known worm
Analyzer monitors traffic directly as a signatures, NSS can use the NSS provides real-time analysis of
“smart probe” by passively tapping Information Entropy technology questionable traffic with powerful
the network. Alternatively, using a to detect minute shifts in features forensics capabilities. It can quickly
software agent, NSS can interface with such as “traffic randomness” that identify the nature of the anomaly, its
any network element such as a router are the precursor warning signs of source IP address, and its propagation
(Cisco Netflow or Juniper cflowd), malicious threats. This leads to much path and create a signature for the
IDS/IPS/Firewall, RADIUS server, earlier detection of even the lowest- threat. NSS can also distinguish
SNMP MIB or DBMS. NSS is typically volume, most-distributed attacks, malicious threats (for example, worms
deployed in carrier networks close to such as DDoS, Zero-day worms, and viruses) from benign ones (for
the core (between the gateway router and Polymorphic worms. NSS can example, a mis-configured router).
and the backbone router) and can also detect an entire class of attacks
monitor traffic at speeds up to 10 Gb/ directed at layer 7 applications (such NSS analyzes packet headers and
sec (OC 192). as VoIP, DNS, http, and SMTP) and the payloads for behavioral signs of
Border Gateway Protocol (BGP) routing malicious activity, and it can detect
• Multi-tiered correlation capability infrastructure found at Layer 3. many classes of attack that IDS/IPS
The Tivoli Security Operations Manager systems might not see (such as
and NSS components offer correlation Tivoli Security Operations Manager fragmented or “TearDrop” attacks, for
between network elements and IP can also provide infrastructure feature example). Moreover, NSS can detect
traffic features. It also offers correlation correlation between data generated by these traffic-based attacks as they
between its software components to both discovery and event collection. occur, providing faster response and
provide the most complete picture of It offers several correlation methods, even mitigation.
including event reduction and device-
level, policy, and service correlation.

4
Tivoli Security Operations Manager mitigation. A reporting interface that Historical data analysis can drive
uses network infrastructure logs that can be customized displays reports a wide range of decision support
include events that have actually and dashboard alerts. In addition, systems. Now operators can access
occurred, so it can detect attacks operators can access the solution historical data to decide in real time
outside the flow of the traffic itself. In using a portal that they can define. which actions to take based on
other words, it can monitor not only successful actions taken in the past. In
device event records, but also user and For automatic mitigation, the solution addition, trend analysis can facilitate
file access activity. This means that it interfaces directly with any third- many business decisions such as
can track changes to file permissions, party device such as IBM Tivoli capacity forecasting, bandwidth
attempts to install new executables, or Provisioning Manager and Cisco SCE usage, and revenue forecasting.
attempts to access privileged services. for automated, real-time traffic shaping
and blocking. For automatic quarantine • Scalability
• Powerful reporting and mitigation: “the and infected traffic cleansing, the The Core Infrastructure Security
manager of managers” solution interfaces with products such Solution offers scalability in the
Tivoli Security Operations Manager as Cisco Guard. monitoring of network elements,
and NSS have been integrated with network links, and sheer volume of
IBM Tivoli Netcool®/OMNIbus and • Integrated storage featuring traffic. From the network element
Netcool Impact so that the solution significant capacity perspective, Tivoli Security Operations
has flexible reporting and mitigation IBM Telecom Core Infrastructure Manager supports 200 different
capabilities. The solution supports a Security Solution offers significant devices such as routers, IDS/IPS, and
wide range of reporting and mitigation storage facilities for historical data firewalls. Netcool/OMNIbus supports
options, from manual notifications analysis. The solution can archive most even more devices, which means the
that guide human decisions to fully types of data—from finely granular solution can scale to Tier-1 carrier
automated device-level clearing and information to summarized metadata— traffic. Meanwhile, NSS offers real-
diagnostics to direct interfaces to into most database management time traffic monitoring and analysis
3rd party traffic shaping, blocking, or systems (such as DB2, MySQL, and at speeds up to 10 Gb/ sec. Currently
quarantine products. Tivoli Security Oracle) and retrieve it at the time it is monitoring Tier-1 carrier networks that
Operations Manager and NSS both needed with negligible latency. pass over 2.5 petabytes of traffic each
use Tivoli Netcool as the common day, NSS is designed to support an
policy management engine for unlimited number of network links on a
manual notification and automatic carrier network (including high-speed
peering links).

5
Core Infrastructure Security Solution
data flow
The IBM Core Infrastructure Security
Solution consists of IBM software and
systems and NSS. Figure 1 illustrates
the data flow of the solution. The role
each of the products plays is as follows:

1. Anomalies are detected by TSOM


(using network element analysis)
and NarusInsight Secure Suite
(using real-time traffic analysis)
running on IBM BladeCenter®
servers. Information about these
anomalies is either passed to Tivoli
Netcool in the form of security Figure 1: IBM Core Infrastructure Security Solution data flow

events, or into a DBMS (IBM


DB2®, Oracle, MySQL, and so on)
as metadata for historical trend 6. Netcool provides mitigation either The Sasser worm scans IP addresses
analysis (or both). directly to a given device or it can using port 445 for vulnerable
use an external mitigation system machines. As soon as this worm
2. IBM Tivoli Netcool adds additional such as IBM Policy Manager, Cisco detects an unpatched system, it drops
correlation of the security Guard, or Cisco CSE. a script that downloads a copy of itself.
events from TSOM and NSS and This spreads the infection wide and
delivers these correlated events Sample attack scenario: NSS and TSOM in deep through Internet without targeting
to the DBMS so that the events action detecting Sasser worm attack a specific customer. Figure 2 shows
are available for querying and In this section, we describe an attack NSS detecting the Sasser worm as
reporting. scenario for a managed security soon as the first machine (192.1.1.2) is
service environment and the strengths infected by registering a change in the
3. The reporting engine developed of the combined solution to tackle this structure and randomness of the traffic
in Netcool Reporter can be used problem. In this scenario, one machine as a whole. In this case, the infected
to query the correlated security is infected by the Sasser worm. machine begins to request open
events and the traffic classification
metadata in the DBMS .

4. Pre-configured reports and


dashboard alerts are delivered to
the user from a portal developed
with Netcool Webtop.

5. After an anomaly is detected, the


policy of the organization (either
manual or automatic) is then
enforced by Netcool.

Figure 2: NSS detects the Sasser worm as soon as the first machine (192.1.1.2) is infected.

6
sessions from a significant number of
hosts, but it always requests the same
port number. This subtle change in the
randomness of the traffic is detected
well before any significant change
in traffic volume is noticed, and well
before it reaches the enterprise network
running Netcool.

Figure 3 shows NSS as it begins to see


the Sasser worm propagate across the
network. As soon as more machines
are infected by the worm, NSS reports Figure 3. NSS begins to see the Sasser worm propagate across the network

an anomaly to the Tivoli Netcool server


inside the enterprise network. NSS
provides Netcool with detail records so
that it can decide whether or not to take
any action.

The customer has designed a policy for


worm enforcement for Tivoli Netcool.
After NSS has informed Netcool of a
worm outbreak, Netcool then enforces
that policy. In this case the policy calls
for NSS to extract the unique fingerprint
(or signature) of the worm and deliver Figure 4. Tivoli Netcool contains a policy for worm enforcement designed by the customer

that fingerprint back to Netcool. Figure


4 shows this process. Netcool then
forwards the worm signature to all of
the IDS/IPS/firewalls located on the
edge of the network so that they can
immediately update their databases.

As Figure 5 demonstrates, by the


time the worm reaches the customer
perimeter, it is bounced at the edge of
the network IDS/IPS/firewalls. Tivoli
Netcool mitigates the attack using NSS
anomaly records.
Figure 5. Worms reaching the customer perimeter are bounced at the edge of the network.

7
Core Infrastructure Security How IBM can help
components IBM has a long history of working with
telecommunications companies to
© Copyright IBM Corporation 2007
Key professional services: make them more efficient and secure, IBM Corporation
• Security consulting for carriers which makes us an ideal partner for New Orchard Road
Armonk, NY 10504
• Secure solution design for core infrastructure security. IBM is
U.S.A.
telecommunications a leader in the application software,
• Pilot/proof-of-concept implementation hardware, and services critical for Produced in the United States of America 03-07.

• Solution implementation for telecom monitoring and managing the health of All Rights Reserved

security networks and network traffic.


IBM, the IBM logo, ibm.com, BladeCenter,

Technology platform: IBM helps plan and design core DB2, System Storage, Tivoli, Netcool, and Tivoli

• IBM systems infrastructure security solutions for Security Operations Manager are trademarks or

• IBM System Storage™ telecom carriers. We have the broad registered trademarks of International Business

• IBM BladeCenter capability, industry expertise, leading- Machine Corporation in the United States, other

edge technology, and experience to countries, or both.

System software: help you build the right telecom core


• IBM Tivoli Netcool infrastructure security solution. Linux is a registered trademark of Linus Torvalds

• IBM DB2 in the United States, other countries, or both.

• IBM Tivoli Security Operations To learn more about IBM, contact your
Manager IBM representative. Other company, product, or service names may

• NarusInsight Secure Suite (NSS) be trademarks or service marks of others.

Enablers: References in this publication to IBM products

• Linux® or services do not imply that IBM intends to

make them available in all countries in which IBM

operates.
Summary

• IBM Telecom Core Infrastructure Security Solution monitors and manages the
health of network elements and the actual traffic itself from a single, integrated
system.
• Built with world-class, best-of-breed technology, the solution is able to detect a much
wider range of threats early.
• The solution has multi-tiered correlation capability. It can provide much greater
detection accuracy and better data points, so that telecoms can make faster and
better decisions.
• Powerful analytics, forensics, and reporting capabilities help you target and
mitigate threats as quickly as possible.
• Carriers can take advantage of integrated data storage with capacity, which
supports historical analysis, faster attack detection, greater network capacity, more
bandwidth, and revenue forecasting.
• Because the solution is designed to scale from the enterprise to the largest carrier
network, carriers can now obtain a comprehensive, integrated “security protection”
solution from a single vendor.

You might also like