Cloud Security - Characteristics, Advantages and Disadvantages

Size: px
Start display at page:

Download "Cloud Security - Characteristics, Advantages and Disadvantages"

Transcription

1 The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai , China, jtj2000@163.com 2 College of Electronics & Information, Shanghai Dianji University, Shanghai , China, wangxg@sdju.edu.cn doi: /jdcta.vol5. issue3.30 Abstract The cloud security is a new technology and developing trend in the field of internet and network security. On the basis of summarizing the cloud security s characteristics, superiority and core technologies, this paper proposes a new method to design and realize intelligent IPS model with dynamic cloud firewall linkage based on cloud security and analyzes the model s structure and features. This model has important practical significance for the research and development of advanced technologies of the network security. Keywords: Cloud Security, Cloud Firewall, Intrusion Prevention System( IPS), Model Design. 1. Introduction The cloud computing is a supercomputing mode using the huge internet which provides computational resource environment and services. It mainly assembles, cooperates and immediately processes all kinds of information resources storing in network linkage devices. The working principle of dynamic cloud security is that using distributed computing technologies to divide the computational processing program into many agent by network, making use of many servers to compose enormous system, and realizing network resource sharing by way of cooperative search, computation, analysis and processing. The technology s structure has become the newest application in the field of network security[1]. The firewall is really an access control system which detects outer network s information according to security policy, thereby protects inner one from outside illegal access and. From software, hardware, ASIC to UTM, the firewall always uses passive protection principle and cannot monitor inner network s abnormal behavior[2,3]. The main characteristic of the fifth generation cloud firewall include preventing corpse network or Trojan horse, protecting the host computers safety in inner network, Linking cloud detection and Intrusion Prevention System, joining SSL VPN by cloud security, supporting netflow by cloud monitoring, and realizing the unification of NOC and SOC. On the basis of discussing the characteristics, structure, functions and IPS s key technologies of the cloud computing and cloud firewall, this paper briefly analyzes the features, superiority and core technologies of the cloud security, proposes a new method of designing and realizing intelligent IPS model with dynamic cloud firewall linkage based on cloud security. 2. The characteristics and core technologies of the cloud security 2.1. The characteristics and superiority of the cloud security The three main characteristics of the cloud computing include dynamically dividing computing resources, centering on web and supporting network payment services. Through web standard, it makes the network having complicated technology structure and existing distinction become the cloud computing platform running different services and systems. By constructing a dynamic network security structure, the platform dynamically deploys and distributes computing resources, real time monitoring and security characteristic detection and protection so as to attain the high effective use of

2 network resources and some new technologies about safety protection for the cloud security, mixing together distributed and parallel processing, grid computing and abnormal behavior detection etc, which can obtain the new information of some kind of viruses and malign programs, send them to the Server sides to automatically analyze and deal with, and reversely push optimized solutions to the Client sides. Web is the center of realizing and implementing the cloud security, and it gradually possesses the features of intelligence and awareness, which can make new generational network security protection structure really play its role. The characteristics and superiority of the cloud security mainly includes as follows[4]: (1) Providing the safeguards. There are some aspects of risk evaluation for data integrity, data recovery and privacy protection. The data is centrally stored in different data centers, which carry out unified management and maintenance, take charge of resource allocation and deployment, safety control and execute further safe and reliable realtime monitoring. (2) Unique mechanism of anticipating control. It is the most special mechanism in the cloud computing platform, can greatly improve users work environment and the settings of safe anticipating control, and realizes real time security prevention based on specific requirement. (3) The cloud environment realtime monitoring. It indexes and monitors the log recording dynamic information according to real requirement, supports extending log record using system s special C2 pattern of audit tracking, and may monitor unusual access attempts to database. (4) Safety performance test. It regularly carries out SAAS safety performance and password strength test for the cloud platform to guarantee system security and the reliability of password strength in time. (5) Updating traditional antivirus patterns. The most feature of the cloud security structure is becoming previous killing virus patterns into network cooperative ones, greatly enhances the efficiency of virus samples extraction and software update. Users neither need entirely setup and frequently upgrade antivirus software, nor occupy massive internal memory and network bandwidth The core technologies of the cloud security The cloud security based network protection structure is a kind of new generation of security infrastructure in the cloud client sides, which blocks and filters the new threats before they arrive on so as to achieve network security intelligence and active defense. The structure mainly makes use of the seven core technologies of the cloud security that include Web Reputation Service(WRS), Reputation Service(ERS), File Reputation Service(FRS), behavioral correlation analysis technologies, Automatic security information feedback mechanism, Threatening information collection and Virus characteristic blacklist technologies. The core of the structure surpasses the traditional methods to obstruct web threats, constructs the security structure in the cloud client sides on the basis of WRS, ERS and FRS, stores most of feature codes files into the cloud databases in internet and makes them keep minimum quantity in the terminals, with the help of whole reputation databases, may determine reputation parameters according to the factors of the website pages, the changes of historic locations and the indication of suspicious activities which are found through malicious software features and behavioral analysis, thus traces the reliability of the website pages. The structure reduces the consumption of bandwidth as well as provides faster timely protection all around[5]. 3. The structural characteristics and functions of the cloud firewall 3.1. The characteristics of the cloud firewall The firewall mainly uses network access security policies and the filtering choice of data packets as basic principles, supports adding or altering security policies and rules, as required, applies filtering technology to allow and prohibit appointed services and data packets, makes use of FTP and Telnet services to install and implement advanced identification measures, offers friendly interfaces and easily programming IP filtering, can filter information according to data packets properties, reduces the direct connection of SMTP services with external services and centralizes to deal with the whole

3 website s , allows the public to access the website which isolates information services from other internal services, supports log management and statistic analysis, and can take part in intrusion detection system(ids)to realize linkage. But the major defect of the firewall is passively static defense which cannot monitor internal abnormal behavior so that hackers may often bypass the firewall to and destroy internal network. The cloud firewall is based on the cloud security and dynamically distributed core technologies which greatly improve the above defect of the firewall. Its key thought is becoming protecting into dynamic, cooperative and active intelligent access control and defensive system. Combining the cloud security with dynamically distributed intelligence firewall, it can be deployed by cooperative each other and dynamically interactive unification. The cloud firewall possesses some characteristics as follows[6]: (1) SensorBase-based dynamic updating polices. The cloud database-sensorbase deployed in internet is the core of the cloud firewall, which can around the world collect some kind of malicious URL, the websites inserted by Trojan horse and the features of detected s and viruses, and timely sends dynamic update to world wide client side users. This is the most characteristic of the cloud firewall. (2) Building reputation-associated cooperation with IPS. The cloud firewall records the operating actions reputation value of users threatening network security, and when the value decrease to fixed threshold, the reputation link is automatically closed. The users having good reputaion once in a while are ed by viruses or misoperation, they only are given a warning prompt. (3) The virtual cloud sides mobile safety access. Presently, mobile network security access has aroused significant attention. The cloud security can realize the safeguard of mobile access through SSL VPN technology. (4) Real time monitoring the netflow in the cloud. The one of import means of the cloud security and network protection is monitoring the abnormal netflow. In the cloud firewall, such as Netflow V9 technology adopted by Cisco, not only is the netflow detected by it, but the network administrators make use of it to manage network The structure and functions of the cloud firewall On the basis of the above analysis about the technologies characteristics of the cloud security and the cloud firewall, this paper designs a new dynamic intelligence cloud firewall model, as shown in figure1. Figure 1. The dynamic intelligence cloud firewall structural model The structural model and functions mainly include as follows: (1) After external information is trained through credible database in the data switcher, they can only enter credible knowledge base to learn and compare with the feature rules repository or policies. The credible knowledge base may firstly be trained through credible database, then execute feature extraction and data mining to obtain knowledge or rules which only pass adaptive learning to

4 knowledge base and feature rules repository which go through continuous learning to update knowledge, rules and polices. (2) Interactively linking with the defending agents, the expert system and the detecting and identifying agents to realize integrated linking unification and interactive cooperation, realtime defense and detection and identification. If the abnormal behaviors and data packets are detected, the monitor station can automatically carry out defending filter, prevention and warning, then give auditing record. (3)If the abnormal behaviors and data packets are not detected, the authorized users may be allowed to access the internal network and real time interchange the monitoring information with the control workstation of the content detection, which includes dynamically realtime monitoring internal abnormal behaviors and data packets. (4) Only if the dynamic distributed intelligence cloud firewall needs to further cooperate with IPS, it can better bring system s effect such as whole coordination, optimization and real time interactive defense. 4. The design of the cloud security intelligent IPS 4.1. The main characteristics and key technologies of IPS Intrusion Prevention System(IPS) possesses the functions such as actively filtering, intelligent intrusion detection, prevention and access decision. It detects the abnormal behavior and data packets, real time judges to block access, and uses filter to intercept any operation attacking system s weakness. It real time defends network by multi layer, deep layer and active way to effectively protect network resource s safety [5]. The technologies of IPS have four great characteristics: Using imbedding pattern to real time intercept the abnormal behavior and data packets so as to realize realtime security protection; deep analyzing the attacking types and policies to certainly intercept the malicious netflow; efficiently running by high quality of intruding feature repository; making use of special hardware accelerating system to efficiently handle the suspicious data packets. IPS has four key technologies: The first one is actively defending technology which overall protects and strengthen the key host computers and services data, and properly limits users rights. It can positively distinguish the known attacks, refuse the malicious access, and prevent unknown attacking behaviors. The second one is linking technology with the firewall. The firewall proceeds access control defense of the first layer, IPS executes detecting intrusion defense of the second layer to filter the malicious communication, then informs the firewall to block the ones. The third one is comprehensive detection method. With a view to avoiding misoperation and blocking legal network events which cause data loss, it uses various detection methods such as misuse detection and abnormity detection to exactly judge the known and unknown attack. The fourth one is the hardware accelerating system that uses special technology to efficiently deal with data packets so as to achieve the functions of deep data packets detection and blocking in complicated network having a great rate of netflow[7] The structure of the cloud security intelligent IPS The cloud security is classified into two types: The first one is the storing and sharing of feature or resembling feature repository in the cloud sides; the second one is a new system that quickly collects, converges and respond to deal with malicious codes, junk mail or fishing site URL etc[8,9]. The cloud security integrates users with intelligent technology platforms through internet to comprise a safety network monitoring, searching, killing and defending the Trojan horses and attacking instructions. This paper constructs a new type of intelligent IPS model based on dynamically distributed cloud firewall linkage, as shown in figure

5 Figure 2. The intelligent IPS model based on dynamically distributed cloud firewall linkage The main functions of the intelligent IPS are as follows: When internal network s users access external network resources, the intelligent IPS uses the cloud security s feature detection and recognition mode, through the working ways of intelligent IPS s collection, recognition, feature extraction, adaptive learning and so on, to automatically analyze and judge the safety of resources accessed by users, and uses terminal browser to interact with the cloud firewall, then deep analyzes and identifies to choose by the expert system in the cloud firewall. Using the resource information of users behaviors, files, web pages and so on to perform reputation modeling, then judges the level of the resources reputation[10]. 5. Acknowledgement This research was partially supported by The Natural Science Foundation of China( ), The Important Discipline of Shanghai Dianji University Fund (07XKJ01). 6. Conclusion On the basis of analyzing the characteristics, superiority and core technologies of the cloud computing, cloud security, cloud firewall and IPS, this paper proposes a new method to design and realize intelligent IPS model with dynamic cloud firewall linkage based on cloud security. The new generation of internet security protection system based on the cloud security s policies and the technologies of intelligently active defense can seamlessly integrate intelligent defensive system with software of killing virus, as a result, the occupation of computer s resources is greatly decreased. The proposed model can in time find, intercept and deal with a large number of latest abnormal attacks such as computer viruses and malicious websites, then timely send the solutions to all users sides so that they may in advance defend all kinds of new threat in network. 7. References [1] Lin Fan, Zeng Wenhua, Jiang Yi, Li Jianmin, Liang Qi, "A Group Tracing and Filtering Tree for REST DDos in Cloud", JDCTA, Vol. 4, No. 9, pp. 212 ~ 224, 2010 [2] Jia Tiejun etc., Network Security Management and Practical Technologies, Beijing: Machine Press, CHN,2010 [3] Jia Tiejun etc., Network Security Technologies and Application,,Beijing: Machine Press, CHN,2009 [4] Do-Yoon Ha, Chang-Yong Lee, Hyun-Cheol Jeong, Bong-Nam Noh, "Design and Implementation of SIP-aware DDoS Attack Detection System", AISS, Vol. 2, No. 4, pp. 25 ~ 32, 2010 [5] Jia Tiejun, Wang Xiaogang, The Construction and Realization of the Intelligent NIPS Based on the Cloud Security,2009 IEEE International conference on information science and technology

6 (icise 2009) pp , Feb 22-24,2009. [6] Zi Shi, The cloud computing in china, The Cloud Security Makes Internet Become Largest Software Killing Viruses, =29, [7] Sohu IT, Intelligentizing Cloud Firewall Realizes Active Safety Defense, / n shtml, [8] Shi Meijun, The Intelligent Scheduling Center and Cloud Firewall Safeguard Network s Best Connectivity, [9] Zhang Weiming, Tang Jianfeng, The Cloud Computing Profoundly Changes the Future, Beijing: Science Press, CHN, 2009 [10]Yi Yin, Kazuaki Hida, Yoshiaki Katayama, Naohisa Takahashi, Implementation of Filter Reverse Search System based on Spatial Relationships of Filters, JCIT, Vol. 3, No. 2, pp.6-12,

Construction and Implementation of Intelligent HIPS Based on Cloud

Construction and Implementation of Intelligent HIPS Based on Cloud Construction and Implementation of Intelligent HIPS Based on Cloud 1 Jia Tiejun, 2 Feng Zhaohong, 3 Wang Xiaogang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 201306, China,

More information

Log Audit Ensuring Behavior Compliance Secoway elog System

Log Audit Ensuring Behavior Compliance Secoway elog System As organizations strengthen informatization construction, their application systems (service systems, operating systems, databases, and Web servers), security devices (firewalls and the UTM, IPS, IDS,

More information

PART D NETWORK SERVICES

PART D NETWORK SERVICES CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

Huawei Eudemon1000E-X series Firewall. Eudemon 1000E-X Series Firewall. Huawei Technologies Co., Ltd.

Huawei Eudemon1000E-X series Firewall. Eudemon 1000E-X Series Firewall. Huawei Technologies Co., Ltd. Eudemon 1000E-X Series Firewall Huawei Technologies Co., Ltd. Product Overview With the dramatic increase in threats to networks, users are become ever more concerned by application- and service-based

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4) Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware

More information

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key

More information

Bypass Network Security Detection Model for Virtual Machine Intranet

Bypass Network Security Detection Model for Virtual Machine Intranet Bypass Network Security Detection Model for Virtual Machine Intranet 1 Jiao Guo, 2 Hang Wei, 2 Donghui Liu,* 2 Qinqun Chen, 2 Yuan Zheng, 2 Hongmin Cai, 2 Hao Chen 1 Guangzhou university of chinese medicie,guangzhou,guojiao@gzucm.edu.cn

More information

Huawei Eudemon200E-N Next-Generation Firewall

Huawei Eudemon200E-N Next-Generation Firewall Huawei 200E-N Next-Generation Firewall With the popularity of mobile working using smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of works. This change in IT

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

A solution for comprehensive network security

A solution for comprehensive network security Applied mathematics in Engineering, Management and Technology 2 (6) 2014:22-26 www.amiemt-journal.com A solution for comprehensive network security Seyed Mehdi Mousavi Payam Noor University (PNU), IRAN

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

Zscaler Internet Security Frequently Asked Questions

Zscaler Internet Security Frequently Asked Questions Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Innovative Defense Strategies for Securing SCADA & Control Systems

Innovative Defense Strategies for Securing SCADA & Control Systems 1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: info@plantdata.com Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet

More information

Secospace elog. Secospace elog

Secospace elog. Secospace elog Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page

More information

Research on The Informatization Management of Enterprises under The

Research on The Informatization Management of Enterprises under The Research on The Informatization Management of Enterprises under The SaaS Model Anyang Institute of Technology, Anyang, Henan, 455000, China E-mail:liyan5175@163.com Abstract The rapid development of global

More information

Secure networks are crucial for IT systems and their

Secure networks are crucial for IT systems and their ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform) McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

Banking Security using Honeypot

Banking Security using Honeypot Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai smchaware@gmail.com Abstract New threats are constantly emerging to the security of organization s information

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

USG6600 Next-Generation Firewall

USG6600 Next-Generation Firewall USG6600 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The

More information

Modern Accounting Information System Security (AISS) Research Based on IT Technology

Modern Accounting Information System Security (AISS) Research Based on IT Technology , pp.163-170 http://dx.doi.org/10.14257/astl.2016. Modern Accounting Information System Security (AISS) Research Based on IT Technology Jiamin Fang and Liqing Shu Accounting Branch, Jilin Business and

More information

Cyber Situational Awareness for Enterprise Security

Cyber Situational Awareness for Enterprise Security Cyber Situational Awareness for Enterprise Security Tzvi Kasten AVP, Business Development Biju Varghese Director, Engineering Sudhir Garg Technical Architect The security world is changing as the nature

More information

EndUser Protection. Peter Skondro. Sophos

EndUser Protection. Peter Skondro. Sophos EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application

More information

USG6300 Next-Generation Firewall

USG6300 Next-Generation Firewall USG6300 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The

More information

Building of Cloud Computing in University Employment Information

Building of Cloud Computing in University Employment Information Building of Cloud Computing in University Employment Information Library Department of Information Management and Engineering, Hebei Finance University, Baoding Hebei 071051, China Abstract Cloud computing

More information

Available online at www.sciencedirect.com Available online at www.sciencedirect.com

Available online at www.sciencedirect.com Available online at www.sciencedirect.com Available online at www.sciencedirect.com Available online at www.sciencedirect.com Physics Physics Procedia Procedia 00 (2011) 24 (2012) 000 000 2293 2297 Physics Procedia www.elsevier.com/locate/procedia

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

Astaro Gateway Software Applications

Astaro Gateway Software Applications Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

CISCO IOS NETWORK SECURITY (IINS)

CISCO IOS NETWORK SECURITY (IINS) CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

More information

A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin

A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin A Prevention & Notification System By Using Firewall Log Data By Pilan Lin 1 Table Of Content ABSTRACT... 3 1 INTRODUCTION... 4 2. Firewall Log data... 6 2.1 How to collect log data... 6 3. Prevention

More information

Bridging the gap between COTS tool alerting and raw data analysis

Bridging the gap between COTS tool alerting and raw data analysis Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading

More information

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose

More information

Product Overview. www.sangfor.net. customers in the business of service provider, enterprise, financial services, and public sectors.

Product Overview. www.sangfor.net. customers in the business of service provider, enterprise, financial services, and public sectors. www.sangfor.net Cost effective WANO solutions for midsize enterprises Product Overview customers in the business of service provider, enterprise, financial services, and public sectors. infrastructure

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

Radware s Behavioral Server Cracking Protection

Radware s Behavioral Server Cracking Protection Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information

More information

SECURITY SOLUTIONS AND SERVICES

SECURITY SOLUTIONS AND SERVICES SECURITY SOLUTIONS AND SERVICES OVERVIEW The Internet brings us closer together. Via Internet, the several of utilities are shared that also means many risks of information security are threatening users.

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions

More information

Huawei Network Edge Security Solution

Huawei Network Edge Security Solution Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD. Huawei Network Edge Security Solution Huawei Network Edge Security 1 Overview

More information

Cisco IOS Advanced Firewall

Cisco IOS Advanced Firewall Cisco IOS Advanced Firewall Integrated Threat Control for Router Security Solutions http://www.cisco.com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 All-in-One Security

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? (cont d) Firewall is a set of related programs, located at a network gateway server. Firewalls

More information

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion

More information

The Power Marketing Information System Model Based on Cloud Computing

The Power Marketing Information System Model Based on Cloud Computing 2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V51.96 The Power Marketing Information

More information

Evolutionism of Intrusion Detection

Evolutionism of Intrusion Detection Evolutionism of Intrusion Detection Jackie Lai The network technology changes with each passing day; and the attack technique of hacker also weeds through the old to bring forth the new. Worms such as

More information

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000 Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business

More information

Hillstone Intelligent Next Generation Firewall

Hillstone Intelligent Next Generation Firewall Hillstone Intelligent Next Generation Firewall Kris Nawani Solution Manager (Thailand) 12 th March 2015 1 About Hillstone Networks Founded 2006 by Netscreen visionaries World class team with security,

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall

More information

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

Next Generation Firewall

Next Generation Firewall Next Generation Firewall Product Overview SANGFOR Next-Generation Firewall is designed with Application Control, Intrusion Prevention and Web Security in mind, providing deep and fine-grained visibility

More information

Research on Situation and Key Issues of Smart Mobile Terminal Security

Research on Situation and Key Issues of Smart Mobile Terminal Security Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has

More information

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer

More information

Practical Threat Intelligence. with Bromium LAVA

Practical Threat Intelligence. with Bromium LAVA Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Proxies. Chapter 4. Network & Security Gildas Avoine

Proxies. Chapter 4. Network & Security Gildas Avoine Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open

More information

Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved. Internet Performance

Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved. Internet Performance Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved Internet Performance Reasons for Internet Performance Issues: 1) Hardware Old hardware can place a bottleneck

More information

Training Course on Network Administration

Training Course on Network Administration Training Course on Network Administration 03-07, March 2014 National Centre for Physics 1 Network Security and Monitoring 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 Crafting a Secure

More information

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link) NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering

More information

Application Security Backgrounder

Application Security Backgrounder Essential Intrusion Prevention System (IPS) & DoS Protection Knowledge for IT Managers October 2006 North America Radware Inc. 575 Corporate Dr., Lobby 1 Mahwah, NJ 07430 Tel: (888) 234-5763 International

More information

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal

More information

Software Engineering 4C03 SPAM

Software Engineering 4C03 SPAM Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as

More information

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott Symantec Enterprise Firewalls From the Internet Thomas Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are

More information

THE ROLE OF IDS & ADS IN NETWORK SECURITY

THE ROLE OF IDS & ADS IN NETWORK SECURITY THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker

More information

The Application and Development of Software Testing in Cloud Computing Environment

The Application and Development of Software Testing in Cloud Computing Environment 2012 International Conference on Computer Science and Service System The Application and Development of Software Testing in Cloud Computing Environment Peng Zhenlong Ou Yang Zhonghui School of Business

More information

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY Babul K Ladhe 1, Akshay R Jaisingpure 2, Pratik S Godbole 3, Dipti S Khode 4 1 B.E Third Year, Information Technology JDIET, Yavatmal ladhebabul23@gmail.com

More information

Getting a Secure Intranet

Getting a Secure Intranet 61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like

More information

Chapter 11 Cloud Application Development

Chapter 11 Cloud Application Development Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

DDoS Protection Technology White Paper

DDoS Protection Technology White Paper DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

How To Create A Network Access Control (Nac) Solution

How To Create A Network Access Control (Nac) Solution Huawei Terminal Security Management Solution Create Enterprise Intranet Security Terminal Security Management Solution 01 Introduction According to the third-party agencies such as the Computer Security

More information

High End Information Security Services

High End Information Security Services High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Host-based Intrusion Prevention System (HIPS)

Host-based Intrusion Prevention System (HIPS) Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively

More information

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly

More information

Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com Outline of Information Security Introduction Impact of information Need

More information

Our Mission. Provide traveling, remote and mobile laptop users with corporate-level security

Our Mission. Provide traveling, remote and mobile laptop users with corporate-level security Our Mission Provide traveling, remote and mobile laptop users with corporate-level security The Challenge When connecting to the Internet from within the corporate network, laptop users are protected by

More information

Big Data Analytics for United Security

Big Data Analytics for United Security Big Data Analytics for United Security What Advantages Does an Agile Network Bring? (Issue 2) By Swift Liu, President Enterprise Networking Product Line Huawei Enterprise Business Group Agile means quick

More information

HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper

HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper Doc. code HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper Issue 1.0 Date 2014-08-21 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2012. All rights

More information

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Why a Network-based Security Solution is Better than Using Point Solutions Architectures Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

Promoting Network Security (A Service Provider Perspective)

Promoting Network Security (A Service Provider Perspective) Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL hsgupta@bsnl.co.in DNW, BSNL 1 Agenda Importance of Network Security

More information

System insecurity ± firewalls

System insecurity ± firewalls Mayur S. Desai Assistant Professor, School of Business, Indiana University Kokomo, Kokomo, Indiana, USA Thomas C. Richards Professor, Business Computer Information Systems Department, The University of

More information

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/ An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at

More information