A Quantitative Cross Comparative Analysis of Tools for Anamoly Detection
|
|
|
- Hilda Smith
- 9 years ago
- Views:
Transcription
1 A Quantitative Cross Comparative Analysis of Tools for Anamoly Detection Wayne Routly DANTE Riga, 20 th Jan. 2008
2 Quite obviously. For a small organization, doing a quantitative cross comparison of commercial tools for network security is lengthy and difficult
3 Moving on 1. The Problem 2. The Tools 3. What Are We Looking For? 4. The Process 5. The RESULTS!!! 6. In Conclusion
4 The Problem. 1.. A Transit Network 2. +/- 10 Million Speaking Hosts Per Day 3. 10Gbps Links 4. Unusual Traffic 1. Large FTP Transfers 2. Legitimate SSH & DNS Traffic 5. Intercontinental Peerings
5 The Difficult Part. You must give the tools the same data You must understand different tool terminology You must tune the tools to give similar results And you ll never get them to see exactly the same things You must not just trust the tool results, but verify them with other means Raw NetFlow analysis via NfSen, exchange of evidence with friendly CERTs You must work out your success criteria
6 Lengthy very lengthy It took us more than one year Preparation: 6-7 months Shortlist vendors, get in touch with them, convince them to engage in a comparative trial with no upfront commitment, make them spell out a price figure even before the trial, set up the legal bit, get the boxes delivered, installed and configured One (established) vendor pulled out (we remained with 3) Tool learning curve and tuning: 3-4 months Comparative testing: 1 month Result analysis and reporting: 1 month
7 What if you can t afford all that? 1. You decide on the basis of vendor s visits (cool! ) 2. You buy the cheapest, or the more expensive, but not what you need (cool! ) 3. You buy what others have bought, for their own network and needs (cool! ) 4. You don t buy at all (cool! ) We re showing some results, today, but we don t want you to convince to buy either or the two (best performing tools) we tested But we d very much like to discuss how small CERTs could share these experiences (and that d be really cool! )
8 The Good Stuff the Tools StealthWatch Lancope Per Host Behavioral Analysis Requires 1 Point to be Defined Normally Found in Campus Networks Netreflex - Guavus Fuses BGP & ISIS Data Creates a 18 x 18 Router Matrix
9 The Process 13 days of cross comparative testing (balancing MM - WR) 1066 Investigated anomalies, results precision bounds estimated 14 Anomoly Types Analyzed raw netflow using nfsen Certain Events forwarded to CERTS for Confirmation
10 THE RESULTS
11 True and False Positives SW 32.8 anomalies per day, followed by NetReflex (21.7) Number of false positives is 28% in SW, 21% in NetReflex
12 Type of Anomolies Scan vs DoS Other? No. of Anomolies Per Tool
13 Scan types
14 (D)DoS types
15 Origin of Anomalies (1/2) Stealthwatch & NRENS Unknown? Netreflex Balanced
16 Origin of Anomalies (2/2) DWS Clients =GRNET Several? International SRC s versus NRENs? Several: multipoint origin Unknown: could not track origin Others: 1 single, identified origin (but not within top 3)
17 Destination of Anomalies SW, Scans & NRENS NR versus SW Several: multipoint dest. Unknown: could not track dest. Others: 1 single, identified dest. (but not within top 3)
18 Origin and type: SealthWatch SCAN (D)DoS OTHER 5 0 NRENs NON NREN UNKNOWN SCANS Feature Prodominatly Primarily NRENS as SRCs GRNET CARNET FCCN ROEDUNET OTHER SCAN (D)DoS OTHER
19 Origin and type: NetReflex NRENs NON NREN UNKNOWN SCAN (D)DoS OTHER Fair Anomaly Type Distribution SCANS (D)DoS OTHER Dispersion of NREN & Non NREN SRCs 2 0 CHINA SEVERAL ROEDUNET INTERNET2 OTHER
20 In Conclusion Aquired Anomaly Detection Tools To Trial Installed, Configured, Tweaked.and Tweaked Again Captured & Investigated over 1000 events in 13 days Cross-compared results amongts all tools and validated results..and the descision is??????
21 Questions? THANK-YOU
Anomaly Detection in Backbone Networks: Building A Security Service Upon An Innovative Tool
Anomaly Detection in Backbone Networks: Building A Security Service Upon An Innovative Tool Wayne Routly, Maurizio Molina - (DANTE) Ignasi Paredes-Oliva - Universitat Politècnica de Catalunya (UPC) Ashish
How To Protect Gante From Attack On A Network With A Network Security System
NSHaRP: Network Security Handling and Response Process Wayne Routly, DANTE TF-CSIRT Technical Seminar Malahide.ie, 03 June 2011 Contents GEANT : Who What How GEANT : Security Protecting GEANT Users A Security
Firewall on Demand Multidomain
Firewall on Demand Multidomain S E C U R I T Y V I A B G P F L O W S P E C & A W E B P L A T F O R M Leonidas Poulopoulos GRNET NOC Wayne Routly DANTE Jeffrey Haas JUNIPER Firewall on Demand Multidomain
The Value of Flow Data for Peering Decisions
The Value of Flow Data for Peering Decisions Hurricane Electric IPv6 Native Backbone Massive Peering! Martin J. Levy Director, IPv6 Strategy Hurricane Electric 22 nd August 2012 Introduction Goal of this
This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.
This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the
Expanding the TALAIA NETWORKS market: From the Academic to the Private Sector
Josep Solé Pareta ([email protected]) 7/24/2013 http://www.talaianetworks.com 1 Brief description and objectives (I) Talaia Networks (http://www.talaianetworks.com/) is a company providing IP traffic monitoring
DDoS Mitigation Strategies
DDoS Mitigation Strategies Internet2 Security Working Group 23 Feb 2016 Mark Beadles Information Security Officer [email protected] Kevin Nastase Network Security Engineer [email protected] www.oar.net Slide
Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope
Maximize Network Visibility with NetFlow Technology Andy Wilson Senior Systems Engineer Lancope Agenda What is NetFlow Introduction to NetFlow NetFlow Examples NetFlow in Action Network Operations User
NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow use cases ICmyNet / NetVizura, [email protected] Soneco d.o.o. Serbia Agenda ICmyNet / NetVizura overview Use cases / case studies Statistics per exporter/interfaces Traffic Patterns NREN
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
F5 Silverline DDoS Protection Onboarding: Technical Note
F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection onboarding F5 Networks is the first leading application services company to offer a single-vendor hybrid solution
with NetFlow Technology Adam Powers Chief Technology Officer [email protected]
Maximize Network Visibility with NetFlow Technology Adam Powers Chief Technology Officer [email protected] www.lancope.com com Agenda What is NetFlow h Introduction to NetFlow h NetFlow Examples NtFl
Internet Traffic Trends A View from 67 ISPs
Internet Traffic Trends A View from 67 ISPs Craig Labovitz ([email protected]) Danny McPherson ([email protected]) Scott Iekel-Johnson ([email protected]) Mike Hollyman ([email protected]) Internet Statistics
Outline. The Problem BGP/Routing Information. Netflow/Traffic Information. Conclusions
Outline The Problem BGP/Routing Information BGP-Inspect Information Extraction from BGP Update messages VAST Internet AS topology Visualization Netflow/Traffic Information Flamingo Internet Traffic Exploration
Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
Choosing Routers for the Campus
Choosing Routers for the Campus Network Startup Resource Center These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Internet Routing Protocols Lecture 04 BGP Continued
Internet Routing Protocols Lecture 04 BGP Continued Advanced Systems Topics Lent Term, 008 Timothy G. Griffin Computer Lab Cambridge UK Two Types of BGP Sessions AS External Neighbor (EBGP) in a different
HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS
HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS John Pierce [email protected] 1 CREATING THE AUDIT TRAIL 2 Network Auditing Basics Maximize Visibility Don t trust the host Store audit data in a central location
Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery
Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 Introduction What s in a name? SIEM? SEM? SIM? Technology Drivers Challenges & Technology Overview Deciding what s right for you Worst
BGP Convergence in much less than a second Clarence Filsfils - [email protected]
BGP Convergence in much less than a second Clarence Filsfils - [email protected] 1 Down Convergence T1 Down Convergence T2 Default metric = 1 Src R R 20 F Dst Link L Assume a flow from Src to Dest T1: when
Network Tomography and Internet Traffic Matrices
Network Tomography and Internet Traffic Matrices Matthew Roughan School of Mathematical Sciences 1 Credits David Donoho Stanford Nick Duffield AT&T Labs-Research Albert
DDoS Mitigation Techniques
DDoS Mitigation Techniques Ron Winward, ServerCentral CHI-NOG 03 06/14/14 Consistent Bottlenecks in DDoS Attacks 1. The server that is under attack 2. The firewall in front of the network 3. The internet
Passively Detecting Remote Connectivity Issues Using Flow Accounting. 2nd EMANICS Workshop on Netflow/IPFIX usage in network management
Passively Detecting Remote Connectivity Issues Using Flow Accounting 2nd EMANICS Workshop on Netflow/IPFIX usage in network management 08.10.2009 Jacobs University Bremen, Germany Tim Kleefass, Simon Leinen
and reporting Slavko Gajin [email protected]
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin [email protected] AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
Anomaly detection. Problem motivation. Machine Learning
Anomaly detection Problem motivation Machine Learning Anomaly detection example Aircraft engine features: = heat generated = vibration intensity Dataset: New engine: (vibration) (heat) Density estimation
plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels
Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to
CAREN NOC MONITORING AND SECURITY
CAREN CAREN Manager: Zarlyk Jumabek uulu 1-2 OCTOBER 2014 ALMATY, KAZAKHSTAN Copyright 2010 CAREN / Doc ID : PS01102014 / Address : Chui ave, 265a, Bishkek, The Kyrgyz Republic Tel: +996 312 900275 website:
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery
Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
Using Lancope StealthWatch for Information Security Monitoring
Cisco IT Case Study February 2014 How CSIRT uses StealthWatch Using Lancope StealthWatch for Information Security Monitoring How the Cisco Computer Security Incident Response Team (CSIRT) uses Lancope
Challenges in Cyber Security Experiments: Our Experience
Challenges in Cyber Security Experiments: Our Experience Annarita Giani, UC Berkeley, George Cybenko, Dartmouth College Vincent Berk, Dartmouth College Eric Renauf, Skaion Outline 1. The Situational Awareness
Traffic Monitoring using sflow
Making the Network Visible www.sflow.org Traffic Monitoring using sflow With the ever-increasing reliance on network services for business critical applications, the smallest change in network usage can
Load Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
Using NetFlow for Anomaly Detection in Operational Networks
Using NetFlow for Anomaly Detection in Operational Networks Maurizio Molina (DANTE) [email protected] 1 st COST TMA PhD Winter school Torino, 10 th Feb, 2010 General Outline Introduction to IP
Choosing a Computer for Running SLX, P3D, and P5
Choosing a Computer for Running SLX, P3D, and P5 This paper is based on my experience purchasing a new laptop in January, 2010. I ll lead you through my selection criteria and point you to some on-line
Firewalls P+S Linux Router & Firewall 2013
Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network
HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS
HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS Tom Cross [email protected] Charles Herring [email protected] 1 CREATING THE AUDIT TRAIL 2 Creating the Trail Logging Provides user and application details
STEALTHWATCH MANAGEMENT CONSOLE
System STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations
Report of Independent Auditors
Ernst & Young LLP Suite 3300 370 17th Street Denver, Colorado 80202-5663 Tel: +1 720 931 4000 Fax: +1 720 931 4444 www.ey.com Report of Independent Auditors To the Management of NTT America, Inc.: We have
Network-Wide Change Management Visibility with Route Analytics
Network-Wide Change Management Visibility with Route Analytics Executive Summary Change management is a hot topic, and rightly so. Studies routinely report that a significant percentage of application
NetFlow Performance Analysis
NetFlow Performance Analysis Last Updated: May, 2007 The Cisco IOS NetFlow feature set allows for the tracking of individual IP flows as they are received at a Cisco router or switching device. Network
Firewall-on-Demand. GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF. Leonidas Poulopoulos
Firewall-on-Demand GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF Leonidas Poulopoulos 1 leopoul@nocgrnetgr 1 NOC/Greek Research and Technology Network
Build Your Business with Mobile
Build Your Business with Mobile The 4 Essential Steps to Building Your Business with Mobile 2103 MoFuse Inc. 1-800-MOFUSE-8 www.mofuse.com We are addicted to our smartphones. Your customers are more likely
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
SecureTrack. Securing Network Segments and Optimizing Permissive Rules with the Automatic Policy Generator. www.tufin.com
SecureTrack Securing Network Segments and Optimizing Permissive Rules with the Automatic Policy Generator www.tufin.com Table of Contents The Challenge: Avoiding and Eliminating Permissive Security Policies...
Cisco dan. 31. 3. 2016. Hotel Crowne Plaza Beograd, Srbija. www.ciscoday.com
Cisco dan 31. 3. 2016. Hotel Crowne Plaza Beograd, Srbija www.ciscoday.com Three Friends in Security : Identity, Visibility and Enforcement Stop the bad guys immediately György Ács IT Security Consulting
DNS Best Practices. Mike Jager Network Startup Resource Center [email protected]
DNS Best Practices Mike Jager Network Startup Resource Center [email protected] This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be
Detecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
NetFlow & BGP multi-path: quo vadis?
NetFlow & BGP multi-path: quo vadis? Paolo Lucente Elisa Jasinska Netnod, Stockholm Agenda About Netflix About pmacct Brief digression on BGP ADD-PATHS Putting all
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
Automatic Network Protection Scenarios Using NetFlow
Automatic Network Protection Scenarios Using NetFlow Vojt ch Krmí ek, Jan Vykopal {krmicek vykopal}@ics.muni.cz FloCon 2012 January 9-12, Austin, Texas Part I Flow-based Network Protection Krmicek et al.
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
Peering Analysis: GenieATM 6000 July 2013
Application Note Peering Analysis: July 2013 1. Application background As the internet activity is expected to expand continuously, ISPs across the globe are looking for ways to optimize their operations
Metric Matters. Dain Perkins, CISSP [email protected]
Metric Matters Dain Perkins, CISSP [email protected] My Perspective Information security metrics do not show us how we need to improve our defenses Image: http://abcnews.go.com/sports/2014-fifa-world-cup-us-goalie-tim-howard/story?id=24400295
Network Security: Network Flooding. Seungwon Shin GSIS, KAIST
Network Security: Network Flooding Seungwon Shin GSIS, KAIST Detecting Network Flooding Attacks SYN-cookies Proxy based CAPCHA Ingress/Egress filtering Some examples SYN-cookies Background In a TCP 3-way
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Introduction Characteristics of intrusion detection systems Some sample intrusion detection systems Page 1 Page
Mining Anomalies in Network-Wide Flow Data. Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot
Mining Anomalies in Network-Wide Flow Data Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot SANOG-7, Mumbai, January, 00 Network Anomaly Diagnosis Am I being attacked? Is someone scanning
2011 Pearson Education. Elasticities of Demand and Supply: Today add elasticity and slope, cross elasticities
2011 Pearson Education Elasticities of Demand and Supply: Today add elasticity and slope, cross elasticities What Determines Elasticity? Influences on the price elasticity of demand fall into two categories:
How do I load balance FTP on NetScaler?
How do I load balance FTP on NetScaler? Introduction: File transfer protocol is a standard for the exchange of files across a network. It is based on a client/server model with an FTP client on a user
Cisco NetFlow Reporting Instruction Manual Version 1.0
Cisco NetFlow Reporting Instruction Manual Version 1.0 WiredCity 777 Davis St, Suite 250 San Leandro CA 94577 Ph: + 1 510 297 5874 Fax: +1 510-357-8136 [email protected] www.wiredcity.com www.wiredcity.com
MikroTik Invisible Tools. By : Haydar Fadel 2014
MikroTik Invisible Tools By : Haydar Fadel 2014 E-mail Tool A tool that allows you to send e-mail from the router. It can be used, along with other tools, to send the network administrator regular configuration
Whitepaper. NetFlow vs. sflow: A Technical Review. plixer. International
Whitepaper NetFlow vs. sflow: A Technical Review 1 plixer Table of Contents Abstract Introduction NetFlow sflow Lab Configuration Hardware Collection and Analysis Utilization Measurements Top Hosts Don
FIREWALL AND NAT Lecture 7a
FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security
SolarWinds Log & Event Manager
Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Comprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
IPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager ([email protected]) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
- Classful vs. Classless Routing -
lassful vs lassless outing v1.10 Aaron Balchunas 1 - lassful vs. lassless outing - lassful vs lassless routing protocols lassful routing protocols do not send subnet mask information with their routing
Bond Pricing Fundamentals
Bond Pricing Fundamentals Valuation What determines the price of a bond? Contract features: coupon, face value (FV), maturity Risk-free interest rates in the economy (US treasury yield curve) Credit risk
How to configure an Advanced Expert Probe as NetFlow Collector
created by: Rainer Bemsel Version 1.0 Dated: Jan/31/2012 There are two types of NetFlow collectors in Observer. In most cases, it will likely be the NetFlow Trending collector being configured. The Trending
WatchGuard XCS Exam Study Guide
WatchGuard XCS Exam Study Guide The WatchGuard XCS Exam tests your knowledge of how to configure and manage a WatchGuard XCS device. This exam is appropriate for network administrators who have experience
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
Threat intelligence visibility the way forward. Mike Adler, Senior Product Manager Assure Threat Intelligence
Threat intelligence visibility the way forward Mike Adler, Senior Product Manager Assure Threat Intelligence The modern challenge Today, organisations worldwide need to protect themselves against a growing
Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:
Computer Networks II Master degree in Computer Engineering Exam session: 11/02/2009 Teacher: Emiliano Trevisani Last name First name Student Identification number You are only allowed to use a pen and
How good can databases deal with Netflow data
How good can databases deal with Netflow data Bachelorarbeit Supervisor: bernhard [email protected] Inteligent Networks Group (INET) Ernesto Abarca Ortiz [email protected] OVERVIEW
Invisible attacks visible in your network. How to see and follow the tracks?
Invisible attacks visible in your network. How to see and follow the tracks? Jochen Belke - Regional Technical Director at Lancope, CISSP Mariusz Sawczuk - Manager of Technical Sales Support Team at Sevenet
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
A Talari Networks White Paper. Turbo Charging WAN Optimization with WAN Virtualization. A Talari White Paper
A Talari Networks White Paper Turbo Charging WAN Optimization with WAN Virtualization A Talari White Paper 2 Introduction WAN Virtualization is revolutionizing Enterprise Wide Area Network (WAN) economics,
Part I: Overview. Core concepts presented:
Part I: Overview Core concepts presented: What is network monitoring What is network management Getting started Why network management Attack detection Consolidating the data The big picture What is network
Introduction to perfsonar
Introduction to perfsonar Loukik Kudarimoti, DANTE 27 th September, 2006 SEEREN2 Summer School, Heraklion Overview of this talk Answers to some basic questions The need for Multi-domain monitoring What
Network Security Policy: Best Practices White Paper
Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security
VIDEO TRANSCRIPT: Content Marketing Analyzing Your Efforts 1. Content Marketing - Analyzing Your Efforts:
VIDEO TRANSCRIPT: Content Marketing Analyzing Your Efforts 1 Content Marketing - Analyzing Your Efforts: This is a transcript of a presentation originally given live at the Growth Powered by Risdall Fall
