Dragon solution. Zdeněk Pala. ECIE certified engineer ECI certified instructor There is nothing more important than our customers

Size: px
Start display at page:

Download "Dragon solution. Zdeněk Pala. ECIE certified engineer ECI certified instructor zpala@enterasys.com. There is nothing more important than our customers"

Transcription

1 There is nothing more important than our customers Dragon solution Zdeněk Pala ECIE certified engineer ECI certified instructor A Division of Siemens Enterprise Communications GmbH & Co KG 2010 Enterasys Networks, Inc. All rights reserved.

2 The Internet and Network Security The wonderful thing about the Internet is that you re connected to everyone else. The terrible thing about the Internet is that you re connected to everyone else. - Vint Cerf 2010 Enterasys Networks, Inc. All rights reserved.

3 Web traffic analysis Zákazník: cca 250 uživatelů (660 síťových zařízení /VoIP, Kamery, tiskárny/) požadavků za 3 dny, zatříděno do kategorií 87% (12 669) Provoz přímo související s činností společnosti: 4% Mravně závadný obsah: 2% Nijak nesouvisející s činností společnosti: 38% 2010 Enterasys Networks, Inc. All rights reserved. 3

4 Time distribution 2010 Enterasys Networks, Inc. All rights reserved. 4

5 Threats 2010 Enterasys Networks, Inc. All rights reserved. 5

6 Causes of Intrusions Intrusions are caused by attackers accessing the systems from the Internet, authorized users of the systems who attempt to gain additional privileges for which they are not authorized, and authorized users who misuse the privileges given them NIST Special Publication on Intrusion Detection Systems 80 % of all data loss is due to internal threats Internal Threats External Threats 2010 Enterasys Networks, Inc. All rights reserved. 6

7 Detection Techniques Pattern Matching: - Look for patterns in the data filed that indicate an attack - Signatures Protocol Analysis: - Look for header values that indicate an attack - Do the headers match the RFC Behavior Based: - Does the current traffic pattern match the normal pattern - Flow Based 2010 Enterasys Networks, Inc. All rights reserved. 7

8 Responding to an Intrusion Assume an attacker has penetrated a network and corrupted some hosts. The ideal response gathers evidence of the attacker s activity, removes the attacker s access to the network, undoes the damage, and reconfigures the network to resist the attacker s penetration technique. NIST Interim Report (IR) 6416 IDS detects, monitors and reports it does not mitigate an attack IPS can prevent an attack from reaching its target but the attacker is not removed from the network DIR can remove or quarantine an attacker after the attack but it does not prevent the Attack from reaching its target 2010 Enterasys Networks, Inc. All rights reserved. 8

9 What is Dynamic Intrusion Response? Dynamic Intrusion Response uses IDS, ASM and Policy enabled switches to remove an attacker from the network or to limit his ability to continue the attack Respond ASM Notify Detect ( IDS ) Attack 2010 Enterasys Networks, Inc. All rights reserved. 9

10 A Complete IPS Solution IPS is used to detect and prevent the attack from reaching its target and DIR is used to remove the attackers ability to mount an additional attack Respond ASM Notify Detect and Prevent ( IPS ) Attack 2010 Enterasys Networks, Inc. All rights reserved. 10

11 There is nothing more important than our customers Dragon Intrusion Defense

12 Dragon 7 Event Detection Technology Anomaly Detection Pattern Matching Protocol Decoding Dragon 7.0 is built upon a multifaceted event detection engine. In addition to Dragon s extensive pattern matching capabilities, there are over 200 analysis functions that give Dragon its technical advantage Dragon s event detection methods include - Signature Based Pattern Matching Dragon looks for known patterns of malicious activity Enterasys has one of the most robust threat signature libraries in the market - Anomaly Detection Dragon looks for suspicious or out of the ordinary events - Protocol Decoding Dragon monitors for protocol anomalies 2010 Enterasys Networks, Inc. All rights reserved. 12

13 Packet Flow Dragon Network Sensor Analysis Stages Signature Detection Application Anomaly Analysis IP Session Analysis Layer 4 (UDP/TCP/ ICMP) Layer 3 Complex Signature analysis Case sensitive/insensitive searching with support for wildcarding of and character types Protocol Decoding Analysis Specific application security event analysis Generic Denial of Service testing Pattern Matching in the IP Headers of IP TCP/UDP/ICMP TCP Analyze and Store header variables TCP Checksum verification TCP options verification and logging TCP flags verification and logging UDP Analyze and Store header variables ICMP ICMP Logging Backdoor Checks Data Collection for out of band processing Stream Reassembly Port Scan and Sweep Detection IP Options Logging IP Protocol Logging Header Verification and Analysis IDS Evasion Checking IP Fragment Reassembly & Event Logging IP Address Checks IP Header Values Retrieved/Checked/Stored Events Events Events Events Events Enterprise Manager System Interface Dragon Network Sensor analyses network traffic at all layers. Dragon first ensures the validity of the network traffic in layers 2, 3 and 4. Dragon reassembles fragmented frames and reconstructs UDP and TCP application streams to counter act detection evasion tools. Dragon further uses advanced techniques such as protocol decoding analysis and complex signature analysis to detect advanced threats. Layer 2 Layer 1 Frame Filtering Basic security checks Frame Capture Events 2010 Enterasys Networks, Inc. All rights reserved. 13

14 Dragon s Threat and Event Detection Coverage Dragon s Signature Detection technology covers a wide and diverse range of threats and events. Dragon supports approximately 7500 signatures. Signature Distribution - Compromises & Backdoors Detect compromised systems and backdoors - Network Misuse Detect network misuse and monitors for compliance. - Web Events Detects Web delivered attacks and vulnerabilities - Client Attacks Detects activities directed to client systems - Adaptive Signatures Detects attacks and events regardless of whether the vulnerability is known or unknown - Advanced Detection Employ advanced detection methodologies such as anomalous data and overflow functions, data ordering analysis and others - VoIP signatures - Worms & Viruses Compromises & Backboors Web Events Adaptive Signatures Network Misuse Client Attacks Advanced Detection 2010 Enterasys Networks, Inc. All rights reserved. 14

15 Day 0 Detection Adaptability Dragon s Threat Detection Engine Adapts to Day 0 threats. This adaptability is derived from the flexibility built into its signature definition language and threat detection engine. Viruses, exploits and vulnerabilities are almost always variations of previously know threats. Dragon s detection engine looks for similarities in multiple generations of the threats allowing a very high probability of the detecting these threats. Threat Red is similar to know threat purple, send alert to EMS 2010 Enterasys Networks, Inc. All rights reserved. 15

16 Intrusion Defense System Dragon Three types of architecture: - Network Intrusion Defense NIDS - Host Intrusion Defense HIDS - Server for corelation and management HIDS NIDS NIDS Internet Interal LAN Switch Firewall Dragon Server HIDS DMZ 2010 Enterasys Networks, Inc. All rights reserved. 16

17 There is nothing more important than our customers Dragon 7 Network Sensor

18 Dragon Network Sensors Dragon Network Sensors can be purchased as software or as network appliances - Multiple hardware options are available that scale in capacity and performance. Performances scales from 10 Mbps to 10 Gbps per sensor. - Dragon customers can choose to purchase Dragon 7.x software directly and deploy it on their own systems. Built in path to Intrusion Prevention Functionality - Every Dragon appliance or software license is upgradeable to Dragon Intrusion Prevention 2010 Enterasys Networks, Inc. All rights reserved. 18

19 Virtual Sensors Virtual Sensor Technology (VST) enables a single Dragon network sensor to operate as multiple individually configurable sensors. This advanced capability provides a more flexible deployment model for internal enterprise deployments. - Multiple Wiring Closets VLANs within Enterprise can be monitored. - Multiple DMZ segments can be guarded simultaneously. - Enterprises can have customized policies per application being monitored. Virtual Sensor analysis is defined by configuring Dragon to associate each virtual sensor with IP Addresses, VLAN Tags, IP Protocol, TCP/UDP port or physical interface. Subnet 1 DMZ Policies Subnet 1 Web Portal Policies Campus Policies VLAN 10 TCP 80 VLAN Enterasys Networks, Inc. All rights reserved. 19

20 Advanced Forensics Dragon provides an unmatched set of forensic analysis tools which enable security personnel to analyze and remediate attacks after they have occurred - Offending Packet Capture Network Sensor captures the packet that tripped the signature and can be configured to collect additional packets and even the entire session. This is critical in understanding why a signature tripped and identifying the true from the false positive. - Session Reconstruction Network Sensor can reconstruct an attackers session and display it for the user. This an absolute requirement in identifying true attacks from false positives. - Session VCR Network Sensor can be configured to collect all session information for services such as HTTP, FTP, and POP and/or certain IPs or networks. This is extremely valuable in collecting forensic information pertaining to known or suspected misuse on the network. - Pre-event Collection Capture packets preceding but related to the packets that triggered the attack. Enables seeing activity that led up to the attack Results can be viewed in the Real Time Console 2010 Enterasys Networks, Inc. All rights reserved. 20

21 Dragon Network Sensor Key Features Open and customizable signatures - Signatures are written in a high-level language and are exposed to the user. This is critical in tuning signatures and in developing signatures unique to the operating environment. DOS Detection - Network Sensor employs multiple methods, including signature and protocol analysis techniques, in identifying known and unknown DOS techniques, including distributed attacks. Backdoor and rogue server detection - Protocol analysis - Session analysis - ICMP traffic profiling. Intrusion Prevention - Event Sniping Terminate sessions via a TCP reset or ICMP unreachable message - Shunning Configure ACLs on third-party firewalls and routers Advanced buffer overflow detection - Recognizes unique patterns sent during an attack. Requires a database of known buffer overflow attacks IDS evasion and DOS countermeasures (protect the IDS from being a victim of DOS) - IP de-fragmentation and TCP/UDP stream reassembly - Protocol decoding HTTP FTP Telnet Etc. - DOS countermeasures techniques for defeating tools such as stick and snot that attempt to DOS an intrusion detection system Enterasys Networks, Inc. All rights reserved. 21

22 There is nothing more important than our customers Dragon 7 Host Sensor

23 Dragon 7 Host Sensor Solutions Host-based intrusion defense via a modular, flexible architecture for today s most common operating system Protects at the host and application level by monitoring the operating system and crucial applications Application Intrusion Prevention module averts attacks on the most commonly targeted applications DNS servers, mail servers, web servers Built-in upgradeability for Web and Host Intrusion Protection technology - Dragon 7.0 introduces Web Server Intrusion Prevention. Every 7.0 HIDS can be upgraded with IIS or Apache IPS modules - Dragon 7.1 introduces full featured kernel level Intrusion Prevention Enterasys Networks, Inc. All rights reserved. 23

24 Dragon 7 Host Sensor Methods Multi-method detection - Log file analysis Analyze any file against a signature policy whether it s the system log, the security log, or a custom built application. - File attribute monitoring Monitor of specific file attributes such as: owner, group, permissions and file size for changes. - File integrity checking (MD5) Monitoring files to determine if there content has been changed via MD5. - Backdoor service monitoring Monitor a system for new TCP and UDP ports, providing critical protection against backdoor unauthorized access through the firewall and/or being a staging point for a distributed denial of service or outright attack. - Registry monitoring Host Sensor will analyze the Windows registry for attributes that should not be accessed and/or modified. This is essential in identifying attacks against often-targeted Microsoft servers. - SysInfo monitoring Monitor of system information: memory usage, CPU usage, disk usage, NIC usage,... - Kernel monitoring IRQ, drivers, modules Enterasys Networks, Inc. All rights reserved. 24

25 Dragon 7 Web Intrusion Prevention Dragon 7.x WIPS is based on dual protective application components, Dragon HIDS and the Web IPS. WIPS is an application level program that protects the web server at the packet level, and is configurable per attack type. - This allows Dragon WIPS to detect Network IDS evasion tactics such as those used by Nikto (formerly Whisker) Dragon WIPS dynamically reloads its configuration when the Web server is brought up, ensuring that the web server is never unprotected. Dragon HIDS monitors the WIPS as well as the Web Server LOGs and server applications (CGI/ASP etc) for threats that may not be stopped by the WIPS. - This ensures fail safe protection Dragon HIDS Kernel Integrity System health Deceptive Services TCP/UDP backdoors Monitors File Content & web logs, SNMP traps for 1900 attack signatures Monitors for File Integrity and, inappropriately changed File Attributes Web Logs CGI/ASP/.Net Apache Microsoft IIS Dragon Web IPS Operating System Windows, Unix or Linux XML/HTML 2010 Enterasys Networks, Inc. All rights reserved. 25

26 There is nothing more important than our customers Prevention / protection 26

27 Dragon Intrusion Defense Dragon not only can detect security threats, but can respond to them Dragon ensures Enterprise security through integrated Active Response functions and by enabling Enterasys Dynamic Intrusion Response Solution Dragon Active Response supports the following network protection mechanisms: - Event Snipping Dragon will dynamically interfere with TCP session between a treat source and its target - Event Shunning Dragon will automatically configure Checkpoint Firewalls and network routers to dynamically filter threat traffic System is attempting to break into system , disrupt the session System is attempting to break into the network, program the firewall to block it 2010 Enterasys Networks, Inc. All rights reserved. 27

28 IPS techniques Dragon allows for preventive actions to be assigned to any event or group of events generated within the system. Initial support for three Prevention Actions, each of which can be enabled or disabled on a per event or threshold basis. Drop Packet action All packets that match a signature or cause an event to be generated will be dropped. Packets can be dropped after a configurable threshold is reached. Session Disruption through transport error messages Disrupts the operation of TCP or UDP protocols involved in the malicious session Dynamic Firewall Policy Rule Used to block all future traffic from a threat source Rules can be persistent or temporary (user configurable 2010 Enterasys Networks, Inc. All rights reserved. 28

29 There is nothing more important than our customers Dragon management

30 Dragon 7 Advanced Management Advanced management framework designed for scalability to meet the needs of Enterprises and Managed Security Service Providers. True Client Server Architecture with role based access control - Per sensor access control Unified Management System - All components of the Dragon System can be managed from one system Enhancement for greater interoperability with Netsight Automated Security Manager in a Dynamic Intrusion Response Solution - Dynamic Dragon Alerts suppression per Source IP or Destination IP when multiple events recorded Support for IPv6 management communication 2010 Enterasys Networks, Inc. All rights reserved. 30

31 Conclusion Dragon Intrusion Defense is a key element in Enterasys Secure Networks Strategy. Dragon is a family of products that provides comprehensive threat detection for LAN, WAN and Wireless Networks while also protecting host and server systems. Dragon technology is adaptive and has the ability to detect Day 0 threats. Dragon uses multiple threat detection techniques to ensure that no threat goes undiscovered. Dragon is managed by a highly scalable and flexible management framework that include role based access control. Dragon enhances the capabilities of existing routers, firewalls and third party security platforms by providing direct analysis of the threat data they gather. Dragon enables network wide threat prevention with built-in intrusion response capabilities Enterasys Networks, Inc. All rights reserved. 31

32 There is nothing more important than our customers Dynamic Intrusion Response

33 Enterasys Dynamic Intrusion Response Enterasys Dynamic Intrusion Response is a comprehensive threat remediation solution that combines the threat detection capabilities of Dragon with the system location and the network device configuration capabilities of Netsight Automated Security Manager. In this solution, Dragon Network and Host Sensors monitor the network and its resources for security threats and network misuse. The Dragon Enterprise Manager System and Netsight Automated Security Manager work in conjunction to automate network responses to threats detected by the Dragon Sensors. This solution automates the location and mitigation of threats thus ensuring the quickest resolution of events 2010 Enterasys Networks, Inc. All rights reserved. 33

34 Automated Security Manager How Does it Work? Quarantine Role - No Access to Business Services - No Access to Other Users Quarantine policy Role centrally configured with NetSight Atlas Policy Manager (Role contains restrictive security policy to limit network resource exposure) Policy distributed to network accessible points and server distribution points Guest - Highly Restricted Web Access - Security Scanning of Client System NetSight Atlas V2 Staff RoamAbout R2 Sales RoamAbout R2 XSR1850 XSR3020 Matrix N7 XSR1805 VPN Matrix E7 Matrix N7 XSR 3250 CORE Matrix N7 Matrix N7 Matrix E7 Matrix N7 X-Pedition ER-16 Dragon IDS RADIUS Server DATA CENTER Engineer EDGE DISTRIBUTION 2010 Enterasys Networks, Inc. All rights reserved. 34

35 Automated Security Manager How Does it Work? Quarantine Role - No Access to Business Services - No Access to Other Users Network intrusion detected with Dragon IDS - Highly Restricted Web Access - Security Scanning of Client System Intrusion event information dynamically sent to NetSight Atlas Automated Security Manager application Guest NetSight Atlas Staff V2 RoamAbout R2 Sales RoamAbout R2 XSR1850 XSR3020 XSR1805 VPN Matrix N7 Matrix E7 Matrix N7 XSR 3250 CORE Matrix N7 Hacker Matrix N7 Dragon IDS Matrix N7 X-Pedition ER-16 RADIUS Server DATA CENTER Matrix E7 Engineer EDGE DISTRIBUTION 2010 Enterasys Networks, Inc. All rights reserved. 35

36 Automated Security Manager How Does it Work? Quarantine Role - No Access to Business Services - No Access to Other Users Intruder location services launched from NetSight Atlas Console upon arrival of event information from Dragon Source of intrusion determined Guest - Highly Restricted Web Access - Security Scanning of Client System NetSight Atlas Staff V2 RoamAbout R2 Sales RoamAbout R2 XSR1850 XSR3020 XSR1805 VPN Matrix N7 Matrix E7 Matrix N7 XSR 3250 CORE Matrix N7 Hacker Matrix N7 Dragon IDS Matrix N7 X-Pedition ER-16 RADIUS Server DATA CENTER Matrix E7 Engineer EDGE DISTRIBUTION 2010 Enterasys Networks, Inc. All rights reserved. 36

37 Automated Security Manager How Does it Work? Quarantine Role - No Access to Business Services - No Access to Other Users User causing security event is quarantined by the dynamic application of the Quarantine Policy Role to the network access port where the user is connected Guest - Highly Restricted Web Access - Security Scanning of Client System NetSight Atlas Staff V2 RoamAbout R2 Sales RoamAbout R2 XSR1850 XSR3020 XSR1805 VPN Matrix N7 Matrix E7 Matrix N7 XSR 3250 CORE Matrix N7 Hacker Matrix N7 Dragon IDS Matrix N7 X-Pedition ER-16 RADIUS Server DATA CENTER Matrix E7 Engineer EDGE DISTRIBUTION 2010 Enterasys Networks, Inc. All rights reserved. 37

38 There is nothing more important than our customers SIEM

39 What is SIEM? Without SIEM SIEM SIEM Administrators Present Prioritize Correlate Store Normalize Firewalls Host systems Routers / switches IDS / IPS Servers & applications 2010 Enterasys Networks, Inc. All rights reserved.

40 Questions? 2010 Enterasys Networks, Inc. All rights reserved. 40

41 There is nothing more important than our customers

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Intrusion Prevention System

Intrusion Prevention System DATA SHEET Intrusion Prevention System Distributed Intrusion Prevention & Response for Edge-to-Core and Data Center Benefits EXTENDS IPS PROTECTION TO THE NETWORK EDGE Protect networked resources by removing

More information

Dragon 6.1 Intrusion Defense System

Dragon 6.1 Intrusion Defense System A complete intrusion defense system with scalability to meet the requirements of enterprises of all sizes and types Powerful and responsive enough to stop hackers in their tracks Leading multimethod detection

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Intrusion Prevention System

Intrusion Prevention System DATA SHEET Intrusion Prevention System Distributed Intrusion Prevention & Response for Edge-to-Core and Data Center Benefits EXTENDS IPS PROTECTION TO THE NETWORK EDGE Protect networked resources by removing

More information

Network- vs. Host-based Intrusion Detection

Network- vs. Host-based Intrusion Detection Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

IntruPro TM IPS. Inline Intrusion Prevention. White Paper IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert

More information

Intelligent. Data Sheet

Intelligent. Data Sheet Cisco IPS Software Product Overview Cisco IPS Software is the industry s leading network-based intrusion prevention software. It provides intelligent, precise, and flexible protection for your business

More information

How To Protect Your Network From Attack From A Hacker On A University Server

How To Protect Your Network From Attack From A Hacker On A University Server Network Security: A New Perspective NIKSUN Inc. Security: State of the Industry Case Study: Hacker University Questions Dave Supinski VP of Regional Sales Supinski@niksun.com Cell Phone 215-292-4473 www.niksun.com

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

Fifty Critical Alerts for Monitoring Windows Servers Best practices

Fifty Critical Alerts for Monitoring Windows Servers Best practices Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite

More information

Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of

Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code

More information

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12 Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984

More information

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep

More information

FIREWALLS & CBAC. philip.heimer@hh.se

FIREWALLS & CBAC. philip.heimer@hh.se FIREWALLS & CBAC philip.heimer@hh.se Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that

More information

Barracuda Intrusion Detection and Prevention System

Barracuda Intrusion Detection and Prevention System Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques

More information

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

This chapter covers the following topics:

This chapter covers the following topics: This chapter covers the following topics: Components of SAFE Small Network Design Corporate Internet Module Campus Module Branch Versus Headend/Standalone Considerations for Small Networks C H A P T E

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHAT S INSIDE: 1. GENERAL INFORMATION 1 2. EXECUTIVE SUMMARY 1 3. BACKGROUND 2 4. QUESTIONS FOR CONSIDERATION

More information

Passive Vulnerability Detection

Passive Vulnerability Detection Page 1 of 5 Passive Vulnerability Detection "Techniques to passively find network security vulnerabilities" Ron Gula rgula@securitywizards.com September 9, 1999 Copyright 1999 Network Security Wizards

More information

Intrusion Detection in AlienVault

Intrusion Detection in AlienVault Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those

More information

Internet Security Firewalls

Internet Security Firewalls Internet Security Firewalls Ozalp Babaoglu ALMA MATER STUDIORUM UNIVERSITA DI BOLOGNA Overview Exo-structures Firewalls Virtual Private Networks Cryptography-based technologies IPSec Secure Socket Layer

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton

More information

Internet Security Firewalls

Internet Security Firewalls Overview Internet Security Firewalls Ozalp Babaoglu! Exo-structures " Firewalls " Virtual Private Networks! Cryptography-based technologies " IPSec " Secure Socket Layer ALMA MATER STUDIORUM UNIVERSITA

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion

More information

The Ultra-Secure Network Architecture

The Ultra-Secure Network Architecture The Ultra-Secure Network Architecture You almost cannot open a newspaper, news magazine, a news Web site or your electronic mail without finding out that another company has suffer a security breach and

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

IDS : Intrusion Detection System the Survey of Information Security

IDS : Intrusion Detection System the Survey of Information Security IDS : Intrusion Detection System the Survey of Information Security Sheetal Thakare 1, Pankaj Ingle 2, Dr. B.B. Meshram 3 1,2 Computer Technology Department, VJTI, Matunga,Mumbai 3 Head Of Computer TechnologyDepartment,

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

Technical Note. ForeScout CounterACT: Virtual Firewall

Technical Note. ForeScout CounterACT: Virtual Firewall ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...

More information

Name. Description. Rationale

Name. Description. Rationale Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Security Analysis Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced

More information

Chapter 15. Firewalls, IDS and IPS

Chapter 15. Firewalls, IDS and IPS Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet

More information

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

DDoS Protection Technology White Paper

DDoS Protection Technology White Paper DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall

More information

Firewalls. Chapter 3

Firewalls. Chapter 3 Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware 1 Corresponding Author: lawal5@yahoo.com 1 O.B. Lawal Computer Science Department,

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls CSE 4482 Computer Security Management: Assessment and Forensics Protection Mechanisms: Firewalls Instructor: N. Vlajic, Fall 2013 Required reading: Management of Information Security (MIS), by Whitman

More information

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Cconducted at the Cisco facility and Miercom lab. Specific areas examined Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security

More information

Network Based Intrusion Detection Using Honey pot Deception

Network Based Intrusion Detection Using Honey pot Deception Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.

More information

THE ROLE OF IDS & ADS IN NETWORK SECURITY

THE ROLE OF IDS & ADS IN NETWORK SECURITY THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2. Intrusion Detection and Prevention Systems

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2. Intrusion Detection and Prevention Systems FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 13 Intrusion Detection and Prevention Systems By Whitman, Mattord, & Austin 2008 Course Technology Learning Objectives Describe

More information

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ

More information

White Paper: Combining Network Intrusion Detection with Firewalls for Maximum Perimeter Protection

White Paper: Combining Network Intrusion Detection with Firewalls for Maximum Perimeter Protection White Paper: Combining Network Intrusion Detection with Firewalls for Maximum Perimeter Protection April 2001 Abstract 2 What is a network intrusion detection system? 2 Electronic security mimics physical

More information

Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800, 2900, 3800 and 3900 Series Integrated Services Routers

Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800, 2900, 3800 and 3900 Series Integrated Services Routers Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800, 2900, 3800 and 3900 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module (IPS AIM) and Network Module

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Security Toolsets for ISP Defense

Security Toolsets for ISP Defense Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.

More information

Managing Latency in IPS Networks

Managing Latency in IPS Networks Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

SonicWALL Unified Threat Management. Alvin Mann April 2009

SonicWALL Unified Threat Management. Alvin Mann April 2009 SonicWALL Unified Threat Management Alvin Mann April 2009 Agenda Who is SonicWALL? Networking Drivers & Trends SonicWALL Unified Threat Management (UTM) Next Generation Protection SonicWALL CONFIDENTIAL

More information

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection

More information

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) 1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories

More information

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate

More information

How Cisco IT Protects Against Distributed Denial of Service Attacks

How Cisco IT Protects Against Distributed Denial of Service Attacks How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

Gaining Operational Efficiencies with the Enterasys S-Series

Gaining Operational Efficiencies with the Enterasys S-Series Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction

More information

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order

More information

TECHNICAL NOTE 10/03 DEPLOYMENT GUIDANCE FOR INTRUSION DETECTION SYSTEMS

TECHNICAL NOTE 10/03 DEPLOYMENT GUIDANCE FOR INTRUSION DETECTION SYSTEMS TECHNICAL NOTE 10/03 DEPLOYMENT GUIDANCE FOR INTRUSION DETECTION SYSTEMS 19 NOVEMBER 2003 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor

More information

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional

More information

How To Protect A Network From Attack From A Hacker (Hbss)

How To Protect A Network From Attack From A Hacker (Hbss) Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment

More information

By David G. Holmberg, Ph.D., Member ASHRAE

By David G. Holmberg, Ph.D., Member ASHRAE The following article was published in ASHRAE Journal, November 2003. Copyright 2003 American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. It is presented for educational purposes

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

On-Premises DDoS Mitigation for the Enterprise

On-Premises DDoS Mitigation for the Enterprise On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has

More information

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

How To Prevent Hacker Attacks With Network Behavior Analysis

How To Prevent Hacker Attacks With Network Behavior Analysis E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal

More information

Intrusion Detection and Prevention Systems (IDS/IPS) Good Practice Guide

Intrusion Detection and Prevention Systems (IDS/IPS) Good Practice Guide Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-INFR-0068.01 Prog. Director Mark Ferrar Status Approved Owner James Wood Version 2.0 Author Jason Alexander

More information

Network Intrusion Detection Systems. Beyond packet filtering

Network Intrusion Detection Systems. Beyond packet filtering Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Sygate Secure Enterprise and Alcatel

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

More information

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

Firewall Security. Presented by: Daminda Perera

Firewall Security. Presented by: Daminda Perera Firewall Security Presented by: Daminda Perera 1 Firewalls Improve network security Cannot completely eliminate threats and a=acks Responsible for screening traffic entering and/or leaving a computer network

More information