Splunk

Splunk

National University Corporation Chiba University

The first CSIRT organization at a national university uses Splunk Critical information is extracted in real time by cross-searching large volumes of logs Cyberattacks are monitored by a SOC organization that does not rely on human ability

POINT

  • Realization of operation to extract important detection information from huge logs and notify the administrator by e-mail
  • Cross-search multiple server logs at once in near real time without preprocessing
  • I also realized the possibility of using it for normal system operation, troubleshooting, and user services.
Mr. Toshiaki Ito

National University Corporation Chiba University
Integrated Information Center
System operation manager
Information Planning Section Information Infrastructure Office Manager
Mr. Toshiaki Ito

Mr. Yoshiyuki Nakamura

National University Corporation Chiba University
Integrated Information Center
Information Planning Section, System Operation Manager
Information Technology Office Technical Staff
Mr. Yoshiyuki Nakamura

Mr. Takashi Imaizumi

National University Corporation Chiba University
Integrated Information Center Information Crisis Response Team
C-csirt team leader (PoC)
Professor Doctor of Engineering
Mr. Takashi Imaizumi

Kyoji Kiyomiya

National University Corporation Chiba University
Integrated Information Center
System operation manager
Information Planning Division Information Infrastructure Office
Kyoji Kiyomiya

Mr. Shingo Suzuki

National University Corporation Chiba University
Planning and General Affairs Department
Information Planning Division
Information Promotion Section Manager
Mr. Shingo Suzuki

Mr. Naoya Hasegawa

National University Corporation Chiba University
Planning and General Affairs Department
Information Planning Division
Information promotion technical staff
Mr. Naoya Hasegawa

Delays in log searches have become a major issue as threats evolve from moment to moment

In recent years, cyber attacks on universities and research institutes have been on the rise, and measures to strengthen cyber security have become an important issue in order to protect intellectual property such as research results. At National University Corporation Chiba University (hereafter referred to as Chiba University), there are mainly two organizations that support the strengthening of security. One of them is the Institute of Management and Information Technologies. (hereafter referred to as the Integrated Information Center). Although it is an organization responsible for the development, maintenance, operation and management of information infrastructure, it also strives to strengthen security as part of the sophistication, maintenance and enhancement of information environment infrastructure. Another organization is the Chiba University Information Crisis Response Team "C-csirt" (ChibaUniversity - Cyber Security IncidentResponse Team). In response to security incidents such as information leaks due to cyber-attacks, unauthorized access, and malware infections, preventive activities, response when they occur, consideration and proposal of improvement measures.

Splunk Enterprise, a machine data analysis platform provided and supported by Macnica, was introduced in 2017 to collaborate between the integrated information center and C-csirt and streamline integrated monitoring and analysis of logs. Splunk).

In the past, there were three major issues in utilizing logs. First, there were many types of servers and they were redundant, so the logs were huge. According to Mr. Ito of the Integrated Information Center, "We installed multiple webmail servers to distribute the load, but the logs were scattered, so we couldn't search them all at once, and the problem was that we couldn't get the results right away. ” says.

Second, there was a directory for each machine, and the number of files was increasing day by day. According to Mr. Nakamura of the Integrated Information Center, ``Since we had to manually match up disparate search results, it took a lot of time to analyze the results if the search period was long.''

And third, it was difficult to cross-search the logs of multiple servers in real time. Since the administrator was manually collecting and analyzing the logs, it was not operated to search and visualize in real time. "If an unauthorized login is made to webmail, we try to find the trace by looking at the log of the webmail server, the log of the authentication server, and the login status of the wireless LAN. However, there are multiple servers, and the amount of logs is enormous. Therefore, it took too much time and effort to manually look at the raw logs, and the delay in responding to threats that progressed from moment to moment was a major issue,” says Ito.

Extract only necessary items from huge logs and alert to C-csirt without time lag

LPWA vibration diagnosis

In 2016, in conjunction with the expiration of the maintenance contract for Chiba University's academic information infrastructure system (the system infrastructure that integrates the core network, mail system, high-speed calculation server for research, and educational terminals for self-study), In September 2009, an introduction proposal was made as part of the log management of the information infrastructure system, and the adoption was decided as a result of the bidding. After completing construction of the new academic information infrastructure system, full-scale operation began in March 2017.

The main sources collected by Splunk are DNS, LDAP, DHCP, wireless LAN controllers, proxies, webmail, multi-factor authentication, mail Box, IPS, Active Directory, etc., mainly for the following four purposes. are making use of it. The first is monitoring user communications. Important detection information such as detection by proxy and IPS (intrusion prevention system), DNS query status, DHCP acquisition information, etc. is sent to the administrator by e-mail with Splunk. The second is to grasp the usage status of the wireless LAN. Collect information such as connection to the wireless LAN controller, authentication, and DHCP acquisition information. The third is to check the login and operation history of Web mail. The dashboard makes it easy to use the dashboard to check the login failures in real time, and to understand the OTP transmission status, such as external webmail logins and multi-factor authentication. The fourth is a cross-search based on basic information such as user numbers and IP addresses. For example, in the case of proxy detection → DHCP lease history hit from the IP address of the originating host → wireless LAN host, the user ID is identified from the authentication at the time of connection.

With the introduction of Splunk, it became possible to search by keyword regardless of the data format, and even if an incident occurred in Web mail, it became possible to easily search across multiple servers by email address. The advantage of being able to search almost in real time is great. “Up until now, when the amount of logs was large, we created a program that redefines the format, and then grep the logs after formatting them. The more you change, the easier it is,” says Mr. Nakamura of the Integrated Information Center. Due to the huge amount of firewall logs, it took 7 to 8 hours to process each day, and the analysis results for the previous day were available in the evening, but after introducing Splunk, it is possible to extract only the necessary firewall logs. As a result, the process is simplified and the result is obtained immediately, so it is possible to send an alert to C-csirt without time lag.

Realizing a safe and secure information system environment by further complementing enhanced security

LPWA vibration diagnosis

The C-csirt team also sees significant benefits. Mr. Suzuki, a C-csirt dedicated staff member, said, "Because it is difficult to monitor all logs 24/7, we have focused on webmail login monitoring and botnet searches, and sent only critical logs that require special attention by e-mail. We have asked the Integrated Information Center to notify us, which has enabled C-csirt to obtain information in real time."

Mr. Hasegawa, who is also in charge of C-csirt, said, "Chiba University has significantly strengthened security, so no major incidents have occurred, but Splunk's email notification has made the initial response to the investigation faster. We can also expect the effect of clarifying the priority of analysis.”

Chiba University also uses a one-time password (OTP) when using webmail from outside. It is said that traces such as whether or not can be grasped on the Splunk dashboard. Mr. Kiyomiya of the Integrated Information Center says, "I feel that the Splunk dashboard can be used not only for security, but also for normal system operation, troubleshooting, and user services."

In the future, at Chiba University, some mail server logs that are not currently collected, logs of public web servers installed in each faculty and research center using virtual domains, and logs used by faculty and graduate students will be collected. We plan to add remote access VPN logs to Splunk as well. In addition, the company plans to take on the challenge of visualizing network traffic.

Mr. Imaizumi, the C-csirt team leader, said, "The enhanced security provided by Splunk has been further complemented, and an information system environment that is even safer and more secure than before has been realized. Various threats are appearing every day. However, in order to respond to that, we would like to continue to find ways to use Splunk effectively.”

User Profile

National University Corporation Chiba University
URLs

http://www.chiba-u.ac.jp/

Founded in 1949. As of 2019, it has 10 faculties and 13 graduate schools, and has four campuses (Nishi-Chiba, Inohana, Matsudo, and Kashiwanoha) with approximately 14,000 students and approximately 3,400 faculty members. Based on our basic philosophy of "always striving for excellence," we actively collaborate with domestic and overseas educational and research institutions, governments, local communities, companies, etc. The goal is to contribute to the development of culture and science.

Inquiry/Document request

In charge of Macnica Splunk Co., Ltd.

Mon-Fri 8:45-17:30