AbuseHelper

AbuseHelper is an open-source project initiated by CERT.FI (Finland) and CERT.EE (Estonia) with ClarifiedNetworks to automatically process incidents notifications.

This tool is being developed for CERTs (and ISPs) to help them in their daily job of following and treating a wide range of high-volume information sources. The framework can also be used for automatically processing (standardised) information from a wide range of sources.

Context

CERTs and ISPs have to handle a very high-volume of notifications (E-mail spam, Botnet, ...). These notifications are often normalized per feed (each feed typically uses different formats to report). There is also a lot of information about Internet abuse, available by different feed providers (Zone-H Zone-H, DShield Dshield, Zeus Tracker Zeus (Trojan horse) ...). There is a tremendous amount of information available, but it's not well utilized, as the amount of information is too big for manual processing AbuseHelper follows a number of sources and produces actionable reports and dashboard for the people that need to treat all these notifications. AbuseHelper also automates the enriching of information, such as finding the owners of reported IP addresses from public databaseses (such as Whois).

History

Technical developments that led to collaborative effort on solving the automated collection of Abuse Information

  • 2005 CERT-FI Autoreporter gen1, implemented with Perl
  • 2006-2007 CERT-FI Autoreporter generations 2&3 (incremental updates to gen1). Plans to rewrite
  • 2008-2009 CERT-FI Autoreporter gen4, proof-of-concept implementation using sh. Paper describing the prototype won the joint FIRST.org & CERT/CC contest for the best practices and advances in safeguarding the security of computer systems and networks in 2009
  • 2009 CERT-FI gen5, implemented with Python. Full rewrite
  • 2009-10 Clarified Networks & CERT-EE Abusehelper collaboration starts
  • 2009-11 CERT-FI joins.
  • 2010-01 AbuseHelper first public release
  • 2010-01 First training @ TF-CSIRT event in Germany
  • 2010-03 CERT.BE (Belgium) / BELNET CERT joined.
  • 2011-07 CERT.IS (Iceland) joined

Architecture

AbuseHelper is written in Python and developed relying on XMPP protocol (not mandatory) and agents. The base principle is to control agent via a central chat room where all bots are listening. Agents are exchanging information in subrooms. AbuseHelper is then scalable and each agent follows a KISS (Keep it Simple, Stupid) approach. Each user is able to produce the perfect workflow for his business. The user just needs to take the agents he needs and connect them together.

Sources

The goal of AbuseHelper is to be able to handle a large panel of sources and try to extract useful information for event follow-up. Currently, AbuseHelper is able to parse the following types of sources:

  • email containing an ARF attachment (Abuse Report Format) (like CleanMX or abusix or cyscon's C-SIRT);
  • email with a CSV (could be zipped) attachment or an URL to a CSV file (like ShadowServer) ;
  • IRC events (live feed);
  • XMPP events (live feed);
  • DShield events.

The community is working on being able to handle more type of input formats. Each type of input is handle by a dedicated bot.

Internal information processing

AbuseHelper is more than a pipe. In the workflow, it could be decided to add extra informations coming from other sources like:

  • Whois to retrieve abuse contact (typically people you have to contact when something security related happened);
  • CRM (Customer Relation Management) to retrieve the same kind of info than for Whois.

Output

As AbuseHelper should help to handle incidents, a large panels of output has also to be handled. Per default, AbuseHelper could produces the following kind of reports:

  • Mail reports with digests of events and a CSV attachments with all observed events for a time frame following some conditions;
  • Wiki report - AbuseHelper wrote the incidents to a wiki;
  • SQL report - AbuseHelper writes all events to a SQL database.

Generic agents

At all steps, there is some standards agents:

  • Roomgraph to transport events for one chat room to another based on some rules;
  • Historian to log all events observed in each chat room.

Community

AbuseHelper is developed by an open-source community composed by:

  • Clarified Networks
  • CERT-FI (Finland)
  • CERT.EE (Estonia)
  • CERT.BE (Belgium) / BELNET CERT /
  • CSC/FUNET (Finland)
  • University of Oulu (OUSPG)
gollark: The code for the virus is on GitHub? What? Why?
gollark: If you send it to me I can run `strings` on it or something, but that's all.
gollark: What can you do about it if it did exactly?
gollark: Actually reverse engineering it would be time consuming and unnecessary.
gollark: Just copy off the critical data, scan it thoroughly and wipe the entire thing.

References

As of this edit, this article uses content from "Workshops BruCON 2010", which is licensed in a way that permits reuse under the Creative Commons Attribution-ShareAlike 3.0 Unported License, but not under the GFDL. All relevant terms must be followed.

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.