<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower Rule for Layer-2 Attack and APT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-rule-for-layer-2-attack-and-apt/m-p/4687585#M1093385</link>
    <description>&lt;P&gt;Hello Audie,&lt;/P&gt;
&lt;P class="p1"&gt;I agree, signature based cannot detect Zero-Day attaks. But Cisco Secure IPS (NGIPS) has both signature based and Anomaly based detection.&lt;/P&gt;
&lt;P class="p1"&gt;The anomalies detetcion will be done using the packet decoder and preprocessors. With the combination of Stateful Inspection Anomalies and TCP Session Hijacking part of the preprocessors, one can defend Mac address/layer-2 level anomaly dehaviour/attack.&lt;/P&gt;
&lt;P class="p1"&gt;As mentioned, ATPs are Often based on exploiting vulnerable softwares. (along with Social Engineering) and the exploitation happens (mostly) once the vulnerability info published/known.&lt;/P&gt;
&lt;P class="p1"&gt;Cisco Secure IPS solution can identify and block attack traffic that target vulnerabilities in a wide array of operating systems, network services, applications, and protocols, and provide protection from new worms and viruses prior to their vulnerabilities becoming known or published.&lt;/P&gt;
&lt;P class="p1"&gt;This is (the high level summary) how one can defend Zero-Day and ATP attacks, using only Cisco Secure IPS.&lt;/P&gt;
&lt;P class="p1"&gt;Again just to reiterate,a&amp;nbsp; Standalone product to tackle security threat will continue to have inherent gaps. To avoid the gaps in security, organizations need to take a holistic approach. This will require a multilayered, integrated security solution.&lt;BR /&gt;Hope it helps.&lt;/P&gt;
&lt;P class="p1"&gt;Thanks&lt;BR /&gt;Divya Jain&lt;/P&gt;</description>
    <pubDate>Thu, 15 Sep 2022 05:23:23 GMT</pubDate>
    <dc:creator>Divya Jain</dc:creator>
    <dc:date>2022-09-15T05:23:23Z</dc:date>
    <item>
      <title>Firepower Rule for Layer-2 Attack and APT</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-for-layer-2-attack-and-apt/m-p/4675388#M1092957</link>
      <description>&lt;P&gt;Dear Cisco IDS/IPS Experts,&lt;/P&gt;&lt;P&gt;I have two questions:&lt;/P&gt;&lt;P&gt;1. Can the Firepower IDS/IPS detect Layer-2 attack based on EtherType and MAC address anomalies?&lt;/P&gt;&lt;P&gt;2. Based on my experience 4-5 years ago, no IDS/IPS can detect A&lt;SPAN&gt;dvanced Persistent Threat (&lt;/SPAN&gt;&lt;EM&gt;APT&lt;/EM&gt;&lt;SPAN&gt;). The anomaly behavior based feature was useless. Experts gave up on it, since Zero-Day detection was just a dream. How is it now?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank You,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Audie&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 14:24:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-for-layer-2-attack-and-apt/m-p/4675388#M1092957</guid>
      <dc:creator>AudieO</dc:creator>
      <dc:date>2022-08-25T14:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule for Layer-2 Attack and APT</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-for-layer-2-attack-and-apt/m-p/4683642#M1093259</link>
      <description>&lt;P&gt;Hello Audie,&lt;/P&gt;
&lt;P class="p1"&gt;1.&amp;nbsp;&lt;SPAN class="s1"&gt;&lt;SPAN class="s2"&gt;To combat zero day attacks and&amp;nbsp;&lt;SPAN&gt;Layer-2 attack based on EtherType and MAC address anomalies - its done at initial authentication level&amp;nbsp; - 802.1x auth, LDAP authentication, ISE.&amp;nbsp; IDS / IPS policies only&amp;nbsp; works at application level.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;2. IPS/IDS are signature based detectors&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;APTs often use social engineering tactics or exploit software vulnerabilities in organizations with high value information.&lt;BR /&gt;&lt;SPAN class="s1"&gt;You can read more about it here -- &lt;A href="https://www.cisco.com/c/en/us/products/security/advanced-persistent-threat.html" target="_blank"&gt;&lt;SPAN class="s2"&gt;https://www.cisco.com/c/en/us/products/security/advanced-persistent-threat.html&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;Now to talk about cisco's approach towards APT and tackling zero day attack -&lt;BR /&gt;A zero-day attack hits after a network vulnerability is announced but before a patch or solution is implemented. Attackers target the disclosed vulnerability during this window of time. Zero-day vulnerability threat detection requires constant awareness.&lt;/P&gt;
&lt;P class="p1"&gt;A Standalone product to tackle security threat &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;will continue to&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;have inherent gaps. To avoid these gaps in security, organizations need to take a holistic approach. This requires a multilayered, integrated security solution. Deploying a portfolio of products that can seamlessly work together is the best way to enhance security.&lt;BR /&gt;To combat these :&amp;nbsp;&lt;BR /&gt;-- Sandboxing using&amp;nbsp;&lt;STRONG&gt;Secure Malware analytics&lt;/STRONG&gt; -&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/products/security/threat-grid/index.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/security/threat-grid/index.html&lt;/A&gt;&lt;BR /&gt;-- With &lt;STRONG&gt;Cisco TALOS,&lt;/STRONG&gt; we get intelligence feeds from all across the globe.&lt;BR /&gt;&lt;SPAN class="s1"&gt;-- This is 1 article about &lt;STRONG&gt;secure end point&lt;/STRONG&gt; and how it helps with zero day attack : &lt;SPAN class="s2"&gt;&lt;A href="https://community.cisco.com/t5/security-blogs/stop-ransomware-and-zero-day-threats-with-cisco-secure-endpoint/ba-p/4506378" target="_blank"&gt;https://community.cisco.com/t5/security-blogs/stop-ransomware-and-zero-day-threats-with-cisco-secure-endpoint/ba-p/4506378&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;-- This is link about how &lt;STRONG&gt;secure firewall provides malware defence&lt;/STRONG&gt; - &lt;SPAN class="s2"&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/amp-appliances/datasheet-c78-733182.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/amp-appliances/datasheet-c78-733182.html&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;-- Other such solution is&lt;STRONG&gt; SASE network ( Secure Access Service Edge&lt;/STRONG&gt;) -- &lt;SPAN class="s2"&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/at-a-glance-c45-2391315.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/at-a-glance-c45-2391315.html&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;In All cisco products we get feeds from Cisco TALOS all these solutions together help with Zero day attacks and APT.&lt;/P&gt;
&lt;P class="p1"&gt;Talking about IPS policy --&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Guide link -- &lt;SPAN class="s2"&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/overview_of_network_analysis_and_intrusion_policies.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/overview_of_network_analysis_and_intrusion_policies.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;In the secure Firewall there is proper line of defence for different checks at every later before allowing the traffic.&lt;BR /&gt;Intrusion prevention as the system’s last line of defense before traffic is allowed to proceed to its destination. Intrusion policies govern how the system inspects traffic for security violations and, in inline deployments, can block or alter malicious traffic. The main function of intrusion policies is to manage which intrusion and preprocessor rules are enabled and how they are configured.&lt;BR /&gt;&lt;BR /&gt;As a part IPS/IDS system, a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG id="concept_D87B73A83ACA42CCA656F0041F9D860B__ID-2247-0000001c" class="ph b"&gt;network analysis policy&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;governs how traffic is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM id="concept_D87B73A83ACA42CCA656F0041F9D860B__ID-2247-0000001d" class="ph i"&gt;decoded&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM id="concept_D87B73A83ACA42CCA656F0041F9D860B__ID-2247-0000001e" class="ph i"&gt;preprocessed&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;so it can be further evaluated, especially for anomalous traffic that might signal an intrusion attempt.&lt;/P&gt;
&lt;P class="p1"&gt;&lt;BR /&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="s2"&gt;&lt;BR /&gt;&amp;nbsp;&lt;SPAN&gt;&lt;BR /&gt;-----------------------------------------&lt;BR /&gt;You can also learn more about Secure Firewall (formerly known as NGFW) through our live Ask the Experts (ATXs) session. Check out Cisco Network Security ATXs Resources [&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-network-security-ask-the-experts-resources/ta-p/4416493" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-network-security-ask-the-experts-resources/ta-p/4416493&lt;/A&gt;] to view the latest schedule for upcoming sessions, as well as the useful references, e.g. online guides, FAQs.&lt;BR /&gt;-----------------------------------------&lt;BR /&gt;&lt;BR /&gt;Thanks and Regards&lt;BR /&gt;Divya Jain&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Sep 2022 13:24:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-for-layer-2-attack-and-apt/m-p/4683642#M1093259</guid>
      <dc:creator>Divya Jain</dc:creator>
      <dc:date>2022-09-08T13:24:23Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule for Layer-2 Attack and APT</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-for-layer-2-attack-and-apt/m-p/4683867#M1093268</link>
      <description>&lt;P&gt;Thank you Divya for replying!&lt;/P&gt;&lt;P&gt;"1. To combat zero day attacks and Layer-2 attack based on EtherType and MAC address anomalies - its done at initial authentication level - 802.1x auth, LDAP authentication, ISE. IDS / IPS policies only works at application level.""&lt;/P&gt;&lt;P&gt;802.1x or other Authentication methods cannot prevent any workstation from advanced Malware infections. I'm referring to state-sponsored exploits.&lt;/P&gt;&lt;P&gt;"2. IPS/IDS are signature based detectors"&lt;/P&gt;&lt;P&gt;This signature based is useless against Zero Day and APT exploits. Yes, I had performed Sandboxing to see advanced Malware "Calling Home".&lt;/P&gt;&lt;P&gt;So it seems everything about IDS/IPS is still the same as 4-5 years ago. Anomaly behavior based still a dream.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Sep 2022 21:43:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-for-layer-2-attack-and-apt/m-p/4683867#M1093268</guid>
      <dc:creator>AudieO</dc:creator>
      <dc:date>2022-09-08T21:43:02Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule for Layer-2 Attack and APT</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-for-layer-2-attack-and-apt/m-p/4687585#M1093385</link>
      <description>&lt;P&gt;Hello Audie,&lt;/P&gt;
&lt;P class="p1"&gt;I agree, signature based cannot detect Zero-Day attaks. But Cisco Secure IPS (NGIPS) has both signature based and Anomaly based detection.&lt;/P&gt;
&lt;P class="p1"&gt;The anomalies detetcion will be done using the packet decoder and preprocessors. With the combination of Stateful Inspection Anomalies and TCP Session Hijacking part of the preprocessors, one can defend Mac address/layer-2 level anomaly dehaviour/attack.&lt;/P&gt;
&lt;P class="p1"&gt;As mentioned, ATPs are Often based on exploiting vulnerable softwares. (along with Social Engineering) and the exploitation happens (mostly) once the vulnerability info published/known.&lt;/P&gt;
&lt;P class="p1"&gt;Cisco Secure IPS solution can identify and block attack traffic that target vulnerabilities in a wide array of operating systems, network services, applications, and protocols, and provide protection from new worms and viruses prior to their vulnerabilities becoming known or published.&lt;/P&gt;
&lt;P class="p1"&gt;This is (the high level summary) how one can defend Zero-Day and ATP attacks, using only Cisco Secure IPS.&lt;/P&gt;
&lt;P class="p1"&gt;Again just to reiterate,a&amp;nbsp; Standalone product to tackle security threat will continue to have inherent gaps. To avoid the gaps in security, organizations need to take a holistic approach. This will require a multilayered, integrated security solution.&lt;BR /&gt;Hope it helps.&lt;/P&gt;
&lt;P class="p1"&gt;Thanks&lt;BR /&gt;Divya Jain&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 05:23:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-for-layer-2-attack-and-apt/m-p/4687585#M1093385</guid>
      <dc:creator>Divya Jain</dc:creator>
      <dc:date>2022-09-15T05:23:23Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule for Layer-2 Attack and APT</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-for-layer-2-attack-and-apt/m-p/4687864#M1093405</link>
      <description>&lt;P&gt;Thank you again Divya for the response!&lt;/P&gt;&lt;P&gt;My question directly specifically to state-sponsored APT's (by Russia, North Korea, Iran, etc.), not by organizations nor individuals. If a vendor can claim (and proof) that their product was able to stop a state-sponsored APT, I would like to know about it.&lt;/P&gt;&lt;P&gt;Most (if not all) cyber experts agreed that best way to prevent APT's are User Trainings (do not download and click), network and computer hardening, and multi-layer security. IDS/IPS has become a secondary layer defense, which is great for aftermath forensic if you can filter out the countless false-positives.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 13:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-for-layer-2-attack-and-apt/m-p/4687864#M1093405</guid>
      <dc:creator>AudieO</dc:creator>
      <dc:date>2022-09-15T13:11:16Z</dc:date>
    </item>
    <item>
      <title>Hi Audie, This is Talos link and it give report for year...</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-for-layer-2-attack-and-apt/m-p/4919993#M1104106</link>
      <description>&lt;P&gt;Hi Audie,&lt;BR /&gt;This is Talos link and it give report for year 2022.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://blog.talosintelligence.com/apt-topic-summary-report-cisco-talos-year-in-review-2022/" target="_blank"&gt;https://blog.talosintelligence.com/apt-topic-summary-report-cisco-talos-year-in-review-2022/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Let me know if this helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Divya jain&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 07:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-for-layer-2-attack-and-apt/m-p/4919993#M1104106</guid>
      <dc:creator>Divya Jain</dc:creator>
      <dc:date>2023-09-08T07:15:28Z</dc:date>
    </item>
  </channel>
</rss>

