INTRUSION PREVENTION AND EXPERT SYSTEMS

Size: px
Start display at page:

Download "INTRUSION PREVENTION AND EXPERT SYSTEMS"

Transcription

1 INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion detection systems industry. One of the most challenging expectations is that intrusion detection products be able to not only detect attacks, but also prevent them in real-time. This demand forces systems to be more independent from the human factor. Not relying on the human factor means that operations that were usually conducted by the security expert need now to be performed automatically by the systems themselves. These systems that the market is seeking are called intrusion prevention systems. The motivation behind the market s demand to transit from intrusion detection into intrusion prevention rests on two foundations: 1. The growth in the sophistication and frequency of attacks over the last few years. 2. More and more organizations are closely dependent on the Internet in order to conduct profitable business. Together these factors result in a demand for products with stronger processing power and faster response to attacks that threaten Internet connectivity and application integrity. In most cases, the human security expert cannot comply within the required response time. Intrusion prevention systems are needed in order to respond accurately and in a timely manner and thus meet the demands of the market. When analyzing which technologies will best fit the market s expectations, it becomes clear that developing an intrusion prevention system involves an integration of advanced behavioral analysis technologies. This article begins with a short explanation of the motivation behind the market s demand for intrusion prevention systems. It then explains the difficulties that this demand raises from a technological point of view. We then go on to explain why any intrusion prevention system, in order to be effective, must take control of some responsibilities that were before in the hands of the human security experts. The article includes a general explanation of the human brain s assessment methods and how these methods are used by the security expert in order to assess a communication as an attack, suspicious activity or normal Internet activity. The main issue is to characterize behavioral analysis technologies that will meet the goal of emulating the human security expert. Technologies such as adaptive expert decision engines and closed-feedback systems are briefly explained.

2 Old Approach and New Demands Intrusion detection systems (IDS) can be generally characterized as sensors. The sensor s duty is to monitor traffic and alert whenever a deterministic security rule is violated. Quite a few doubts have been raised as of late regarding the effectiveness of this method, especially when prevention actions need to be automatically implemented according to the IDS s alerts. The power of the sensor rests on its ability to watch and report when certain rules are breached. In the past, the market s expectation from an intrusion detection system never included the generation of automatic prevention measures independently. Therefore, IDSs were developed as passive devices, in other words, sensors. The effectiveness of the IDS is based on the assumption that there is always, or almost always, security expert personnel in place to analyze their reports, decide if the report poses a real threat, figure out the action that would eliminate the threat and generate it before too much damage is caused. Based on this assumption, it was a logical decision by the IDS vendors to separate between the detection and prevention responsibilities, letting the IDS take charge of the more basic operations, meaning monitoring and alerting, and assigning the security expert to complete the work which requires intelligence. IDS vendors followed this approach and, as a result, developed systems that are strongly dependent on the human factor (i.e., the human security expert). This expert is responsible for analyzing the IDS reports, filtering false positive events, deciding about the most appropriate countermeasures, and implementing them. Resting on the assumption that the expert s typical response time is acceptable, the synergy between the IDS and the human factor became a standard market requirement. Although some traditional IDS products can be configured to communicate with third-party devices that will do the blocking for them (for example, firewalls, routers), this type of method of prevention is limited to the filtering capabilities of the third-party devices, which are usually not granular enough to accurately mitigate attacks without disturbing the communication of legitimate users. Over the past years, few critical conditions have changed. Today we see a significant increase in Internet use by businesses and the criticalness of Internet reliability and speed in order for businesses to remain competitive. The Internet has become a lot faster and is the basis for thousands of proprietary and public applications. Organizations of all types and sizes have become heavily dependent on their own Internet infrastructures and, more significantly, those of third parties, to be able to conduct profitable business. Every moment without a transaction is a pure loss of business revenue. Moreover, successful hacking of a company s Internet application shows a weakness that hurts the company s reputation beyond the actual loss of revenue. This Internet dependence and critical role of the Internet for businesses makes Internet connections and public applications the most attractive targets for attackers. The lack of expert staff to analyze and respond to an increasing volume of attack activities has led the market to conclude that a security product needs to be able to automatically generate real-time prevention measures, and thus eliminate the dependency on the human factor. The information security industry has branded these new systems intrusion prevention systems. The Challenge A short examination of the requirements for automated real-time prevention reveals a major difficulty. Real-time prevention assumes that the system comprises some kind of computerized intelligence that will emulate the operations that were previously conducted by the security expert. Without this intelligence, any system that was previously required to perform sensor duties and is now also intended to prevent the detected attacks will generate false prevention measures. False prevention is something that the market cannot accept under any circumstance. In order to understand and confront the challenge of emulating the security expert, let us first characterize a potential process that the human brain executes in order to arrive at conclusions. Understanding the process will hopefully lead us to some conclusions regarding the technologies that may be effective in emulating the security expert. Human Assessment Methods In everyday life, the human brain encounters problems that involve varying degrees of freedom. These problems, whether they have to do with an analysis of communication systems or with basic physical operations such as walking, driving etc., can be extremely complicated. Despite this, they are all successfully handled by the human brain. Degree of Freedom A degree of freedom for a system is analogous to an independent variable for a mathematical function. All system degrees of freedom must be specified to fully characterize the system at any given time. In the simplest cases of physical systems, a degree of freedom is an independent displacement or rotation that a system may exhibit. In order to solve a multiple degrees of freedom problem, a very complicated mathematical procedure needs to be performed. The ability of our brain to perform the required complicated mathematical procedures doesn t really exist. However, we are still able to handle problems that include many degrees of freedom. The Analytical Approach and the Human Approach The questions of how we are able to solve multiple degrees of freedom problems so fast without really solving the analytical equations is not yet solved. However, a few suggestions for systems that could emulate human brain operations were raised over the past two or three decades. One of them follows the assumptions that are presented in this section: Qualitative Categories In order to see, feel or hear, we use our sensors (our eyes, ears, etc.). Although the sensors inputs can be very precise, we map the environmental inputs we are getting into qualitative categories. When we sense heat, for example, different intervals of temperatures will be associated with different qualitative categories. The same goes for quantities such as velocity, distance, etc. Every type of variable has its own set of qualitative categories that are constructed through time in an adaptive manner. Figures 1 and 2 illustrate two types of qualitative categories and how inputs from the environment are mapped into the domains of these categories. This set of qualitative categories enables us to map precise inputs into these illustrated groups. The position of every input on the x- axis and the category s shape define the output, which is the weight (y-axis). The weight represents the degree in which each input belongs to a specific category.

3 Adaptation After qualitative categories have been shaped and positioned along their reference axis, it is assumed that the order and shapes styles will not change over time, unless a drastic change in the environment s rules takes place. However, the position of the categories can be shifted along the reference axis (i.e., x-axis), as well as categories actual shapes within their styles according to an adaptive process. For example, if we take the distance set of category shapes (very close, close, etc. in Figure 2) and use those in order to quantify the distance between our location and that of a person standing in front of us, then 70 miles will be considered far away. In most cases, this seems to be a reasonable decision. But if we want to use the same set of distance category shapes in order to quantify how near an asteroid is, then a 70-mile input will have to produce very close output. The adaptation process helps us to shift and to scale (shrink or stretch) the category shapes along the reference distance axis according to the environment that surrounds us. Each environment defines a different scale; in this case, a different scale of distance. To illustrate this adaptation process, let s examine the following adapted qualitative categories in Figure 3. Compared to Figure 2, the x-axis scale was adapted to fit different environments, such as an environment that needs to deal with measuring distance between an asteroid and Earth. As shown, the order of the categories along the x-axis and the shapes did not change. Correlation Rules Intelligence After the inputs are mapped into categories, giving each one of them a suitable weight (level of belonging), expert rules that define the relationships between the weights need to be established. As opposed to differential operators, which are used in order to correlate between the variables in multiple degrees of freedom mathematical equations, these rules are much simpler. For example: 1. if the asteroid DISTANCE is far away AND its velocity is slow then (LEVEL OF ALERT IS LOW) ELSE 2. if the asteroid DISTANCE is not far AND its velocity is slow then (LEVEL OF ALERT IS MEDIUM) ELSE 3. if the asteroid DISTANCE is close AND its velocity is medium then (LEVEL OF ALERT IS HIGH) ELSE A set of such rules will create correlation that in the end generates a decision followed by an action or inaction. As long as these rules are built logically and more cases (rules) are adapted and piled up, the decision becomes more robust. As long as these rules are logically consistent, the level of intelligence becomes higher. Closed Feedback Closed-feedback operations are necessary for any kind of system that isn t purely analytical, like the human brain or the alternative we present in this article. The brain constantly examines the actual result of its actions and compares them to the desired results. This operation is responsible for tuning actions until an acceptable result is achieved. The Security Expert Let us use the previously described process on the operation that the information security expert needs to perform. Figure 1: Temperature Qualitative Categories Figure 2: Distance Qualitative Categories In order for the security expert to be able to analyze communication parameters, decide about their level of threat and the appropriate prevention methods, the following operations are required: 1. Sensors sensors are the tools that enable the security expert to watch and aggregate communication characteristic parameters. With the sensors inputs, the security expert can create qualitative categories. 2. Creating Qualitative Categories the security expert adapts the network environment. He need to know which: Services are running inside the network. Types of protocols these services use and how these protocols are distributed. He also needs to know approximately the number of: Packets rates. Requests generated to his servers. Protocol error replies returning form his servers. The security expert builds qualitative categories in his mind. These categories are not different from the ones described in the previous section. According to his acquired knowledge, he adapts a shape and position to each category, probably in the same way described in the previous section as an adaptation process. For example, the number of protocol error replies can be characterized as seen in Figure 4. It should be emphasized that one communication parameter that was characterized as high in a certain environment can be

4 characterized as low in another, according to the adaptation process. 3. Correlation ( Intelligence ) Relying on an assessment of each communication parameter independently of the other type will usually lead to a wrong decision (usually called false positive decision). Therefore, the security expert correlates between all weights (degrees of belonging to a category) through logical rules he has constructed in his mind. These expert rules are deterministic relationships that will eventually define the level of decision accuracy. In the case of error replies (Figure 4), the security expert might adhere to the following rules (adding additional parameters), in order to come to a decision: a. If the error rate is high AND the number of source IP addresses that cause the errors is high then (Level Of Threat Is Medium) Else, b. If the error rate is high AND the number of source IP addresses that cause the errors is low then (Level Of Threat Is High) Else If rule b is true, then there is a higher probability that the cause for these protocol error replies is a real attacker. 4. Closed-Feedback Operation In order to reduce false positives, the security expert conducts closed-feedback operations. These operations enable him to fix inaccurate decisions. When a decision on some kind of action (prevention measure) is made, the expert checks the results of this action. If the difference between the desired result and the actual result is acceptable, then the same action needs to be continued. If the difference isn t acceptable, then the expert would stop using the last action and continue to search for a more appropriate one. A Technology Gap Without adapting a technology that will enable an appropriate alternative to at least some of the security expert s operations, the transition from a system that acts as a sensor to a system that is supposed to automatically block attacks cannot be made. Applicable Behavioral Analysis Technologies and Expert Systems (ES) Tools An expert system is a software that works with both knowledge and information. Expert systems aid in formulating a decision the way an expert in the field might. In order to do this, expert human rules need to be formulated in such a way that the system will be able to use them in the decision-making process. Expert systems provide a way of drawing definite conclusions from vague, ambiguous or imprecise information. Therefore, expert system algorithms can overcome analysis difficulties that Internet communication usually raises. Some of the generic components of an expert system are described below: Knowledge Base: A store of factual and heuristic knowledge. This knowledge can be expressed through mathematical functions that formulate qualitative category shapes, as described in the previous sections. Decision Engine: Inference mechanisms for manipulating the outputs (weights) of each category function in order to form a line of reasoning in solving a problem. The inference mechanism can be constructed through chaining of IF-THEN rules such as those described before as Correlation Rules. Knowledge Acquisition System: This system helps to build knowledge bases. Collecting knowledge is needed in order to adapt the network s Figure 3: Adapted Qualitative Categories Figure 4: Error Replies Qualitative Categories environment. This knowledge is important in order to tune the system s decision and can be understood as the adaptation process that was described before. Closed-Feedback Systems: Feedback control is an error-driven strategy; corrections are made on the basis of a difference between the system s current state and the desired state. In the simplest case of linear feedback control, the corrections are proportional to the magnitude of the difference or error. Closed-feedback algorithms help to minimize false positive decisions. Figure 5 describes the closed-feedback process. After a decision takes place (1- process), the system checks the difference between the existing and desired result (2) and generates actions accordingly. The desired result is adapted from the environment (adapted knowledge base/3 desired set) and compared to the existing result. The closed-feedback operation is responsible for fixing the process accordingly (4 controller) until an acceptable result is achieved. Conclusions Over the last two years, the requirements from network intrusion prevention systems (NIPS) have been defined in the following ways: 1. In-line Devices As opposed to sensors (passive) devices that usually sit out of the line; IPS products must have the capability to sit in-line, thus enabling very fast responses to attacks. 2. Stability and Redundancy As an in-line device, IPS must be

5 extremely reliable. This fact forces IPS vendors to develop products that support redundancy and fail-over capabilities. 3. Reduce False Positives In-line devices that automatically block attacks must have a negligible percentage of false positive detections. 4. Behavioral Analysis In order to reduce the high number of false positives that was usually associated with traditional network IDS sensors, NIPS needs to include behavioral analysis technologies alongside the state-of-the-art traditional technologies such as attack signature detections and protocol anomaly (enforcement of protocol rules) detection engine. The first two requirements are mainly a matter of engineering. The other two requirements might involve a lot more than that. Unfortunately, succeeding to overcome the challenge of automatic prevention forces IPS vendors to answer these requirements. Behavioral analysis technologies need to be integrated into intrusion prevention systems in order to perform some of the operations that were before the responsibility of the security expert. As long as human intelligence remains an unsolved mystery, we cannot expect an intrusion prevention system to provide us with a complete solution, and it will always be necessary to flag suspicious activity for further human investigation. However, in this article, we have reviewed and characterized the process in which the human security expert comes to conclusions. These characteristics are similar to the ones that exist today in expert systems. The field of expert systems is a developed discipline and is researched all over the world in both academic institutions and the industry. In the future it will be beneficial to use the expert systems outlined in this article in order to successfully emulate the security expert. Unfortunately, the majority of IPS vendors have not yet integrated behavioral analysis capabilities, which are different from the traditional ones, into their products. Therefore, we will have to wait a little bit more before being able to assess the actual limitations or effectiveness of IPS products. Avi Chesla currently serves as Director of Research and Product Management for Vsecure Figure 5: Closed-Feedback System Technologies (US) Inc., a developer of innovative intrusion prevention products. He is a graduate of physics and mathematics in Tel Aviv University and has been focusing on nextgeneration security solutions since Avi can be contacted at avic@v-secure.com.

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

Radware s Behavioral Server Cracking Protection

Radware s Behavioral Server Cracking Protection Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information

More information

Overcoming Five Critical Cybersecurity Gaps

Overcoming Five Critical Cybersecurity Gaps Overcoming Five Critical Cybersecurity Gaps How Active Threat Protection Addresses the Problems that Security Technology Doesn t Solve An esentire White Paper Copyright 2015 esentire, Inc. All rights reserved.

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Passive Logging. Intrusion Detection System (IDS): Software that automates this process Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion

More information

Bridging the gap between COTS tool alerting and raw data analysis

Bridging the gap between COTS tool alerting and raw data analysis Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading

More information

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform) McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Introduction Characteristics of intrusion detection systems Some sample intrusion detection systems Page 1 Page

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

CyberArk Privileged Threat Analytics. Solution Brief

CyberArk Privileged Threat Analytics. Solution Brief CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect

More information

Network Security Management

Network Security Management Network Security Management TWNIC 2003 Objective Have an overview concept on network security management. Learn how to use NIDS and firewall technologies to secure our networks. 1 Outline Network Security

More information

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware.

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware. Radware s Smart IDS Management FireProof and Intrusion Detection Systems Deployment and ROI North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

1. Thwart attacks on your network.

1. Thwart attacks on your network. An IDPS can secure your enterprise, track regulatory compliance, enforce security policies and save money. 10 Reasons to Deploy an Intrusion Detection and Prevention System Intrusion Detection Systems

More information

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC Intrusion Detection and Intrusion Prevention Ed Sale VP of Security Pivot Group, LLC Presentation Goals Describe IDS and IPS Why They Are Important Deployment and Use Major Players The IT Security Camera

More information

How To Manage Log Management

How To Manage Log Management : Leveraging the Best in Database Security, Security Event Management and Change Management to Achieve Transparency LogLogic, Inc 110 Rose Orchard Way, Ste. 200 San Jose, CA 95134 United States US Toll

More information

FIREWALL CLEANUP WHITE PAPER

FIREWALL CLEANUP WHITE PAPER FIREWALL CLEANUP WHITE PAPER Firewall Cleanup Recommendations Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity Table of Contents Executive Summary... 3 The

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges

More information

Introduction to Fuzzy Control

Introduction to Fuzzy Control Introduction to Fuzzy Control Marcelo Godoy Simoes Colorado School of Mines Engineering Division 1610 Illinois Street Golden, Colorado 80401-1887 USA Abstract In the last few years the applications of

More information

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite

More information

Network Security Monitoring: Looking Beyond the Network

Network Security Monitoring: Looking Beyond the Network 1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT iburke@headwallsecurity.com iburke@middlebury.edu February 8, 2011 2 Abstract Network security monitoring

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHAT S INSIDE: 1. GENERAL INFORMATION 1 2. EXECUTIVE SUMMARY 1 3. BACKGROUND 2 4. QUESTIONS FOR CONSIDERATION

More information

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

Non-Geeks Guide to. Network Threat Prevention

Non-Geeks Guide to. Network Threat Prevention Non-Geeks Guide to Network Threat Prevention 1 2 Table of Contents The Evolution of Network Security Network Security: A Constantly-Evolving Threat Why are networks at more risk than ever before? Evaluating

More information

IDS or IPS? Pocket E-Guide

IDS or IPS? Pocket E-Guide Pocket E-Guide IDS or IPS? Differences and benefits of intrusion detection and prevention systems Deciding between intrusion detection systems (IDS) and intrusion prevention systems (IPS) is a particularly

More information

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were

More information

Waves: Recording Sound Waves and Sound Wave Interference (Teacher s Guide)

Waves: Recording Sound Waves and Sound Wave Interference (Teacher s Guide) Waves: Recording Sound Waves and Sound Wave Interference (Teacher s Guide) OVERVIEW Students will measure a sound wave by placing the Ward s DataHub microphone near one tuning fork A440 (f=440hz). Then

More information

POLIWALL: AHEAD OF THE FIREWALL

POLIWALL: AHEAD OF THE FIREWALL POLIWALL: AHEAD OF THE FIREWALL FIREWALL HISTORY Since the earliest days of the Internet, when hackers sat in their darkened basements dialing into networks with dial-up modems, both network threats and

More information

Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events

Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events Abstract Effective Security Operations throughout both DoD and industry are requiring and consuming unprecedented

More information

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

Cisco Security Intelligence Operations

Cisco Security Intelligence Operations Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,

More information

POLIWALL: AHEAD OF THE FIREWALL

POLIWALL: AHEAD OF THE FIREWALL POLIWALL: AHEAD OF THE FIREWALL FIREWALL HISTORY Since the earliest days of the Internet, when hackers sat in their darkened basements dialing into networks with dial-up modems, both network threats and

More information

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations

More information

The Real State of WiFi Security in the Connected Home August 25, 2015

The Real State of WiFi Security in the Connected Home August 25, 2015 The Real State of WiFi Security in the Connected Home August 25, 2015 1 Abstract Analyzing real-world data can teach us about the state of security in the connected home. RouterCheck, a tool for testing

More information

Observation and Findings

Observation and Findings Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network

More information

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats

More information

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were

More information

Database Security in Virtualization and Cloud Computing Environments

Database Security in Virtualization and Cloud Computing Environments White Paper Database Security in Virtualization and Cloud Computing Environments Three key technology challenges in protecting sensitive data Table of Contents Securing Information in Virtualization and

More information

Cisco IPS Tuning Overview

Cisco IPS Tuning Overview Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.

More information

POWER. Your Partners in Availability POWER

POWER. Your Partners in Availability POWER Your Partners in Availability The Service Arm for All Liebert Products We have the industry-leading technical expertise, top onsite response times and the most sophisticated parts logistics in the industry.

More information

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society

More information

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security

More information

Effective Intrusion Detection

Effective Intrusion Detection Effective Intrusion Detection A white paper by With careful configuration and management, intrusion detection systems can make a valuable contribution to IT infrastructure security s Global network of

More information

A Layperson s Guide To DoS Attacks

A Layperson s Guide To DoS Attacks A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4

More information

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965

More information

Intrusion Detection System using Log Files and Reinforcement Learning

Intrusion Detection System using Log Files and Reinforcement Learning Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT

More information

Fight the Noise with SIEM

Fight the Noise with SIEM Fight the Noise with SIEM An Incident Response System Classified: Public An Indiana Bankers Association Preferred Service Provider! elmdemo.infotex.com Managed Security Services by infotex! Page 2 Incident

More information

White Paper February 2005. McAfee Network Protection Solutions. IntruShield Virtualization Delivering Real Benefits. www.mcafee.

White Paper February 2005. McAfee Network Protection Solutions. IntruShield Virtualization Delivering Real Benefits. www.mcafee. White Paper February 2005 McAfee Network Protection Solutions IntruShield Virtualization Delivering Real Benefits Delivering Real Benefits 2 Introduction Virtualization The IntruShield Approach 3 4 Virtualization

More information

Blacklist Example Configuration for StoneGate

Blacklist Example Configuration for StoneGate Blacklist Example Configuration for StoneGate 4.1 1 (8) Blacklist Example Configuration for StoneGate StoneGate versions: SMC 4.1.2, IPS 4.1.2, FW 3.0.8 Blacklist Example Configuration for StoneGate 4.1

More information

Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08

Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08 Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08 What is a firewall? Firewalls are programs that were designed to protect computers from unwanted attacks and intrusions. Wikipedia

More information

ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013

ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013 ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION, Fuel Consulting, LLC May 2013 DATA AND ANALYSIS INTERACTION Understanding the content, accuracy, source, and completeness of data is critical to the

More information

On-Premises DDoS Mitigation for the Enterprise

On-Premises DDoS Mitigation for the Enterprise On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has

More information

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Efficient Network Monitoring Access

Efficient Network Monitoring Access Abstract Organizations that rely on the reliability, security, and performance of their networks can no longer afford to wait for outages or security breaches to occur before installing test access points.

More information

Fail-Safe IPS Integration with Bypass Technology

Fail-Safe IPS Integration with Bypass Technology Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

How To Manage Sourcefire From A Command Console

How To Manage Sourcefire From A Command Console Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security

More information

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation

Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation Agenda Problem Description Issues for Consideration Mitigation of the Issues Options

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT

TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT Would you rather know the presumed status of the henhouse or have in-the-moment snapshots of the fox? If you prefer to use a traditional

More information

MACHINE LEARNING & INTRUSION DETECTION: HYPE OR REALITY?

MACHINE LEARNING & INTRUSION DETECTION: HYPE OR REALITY? MACHINE LEARNING & INTRUSION DETECTION: 1 SUMMARY The potential use of machine learning techniques for intrusion detection is widely discussed amongst security experts. At Kudelski Security, we looked

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

Network Security, Guidelines to Build a Security Perimeter for SMEs

Network Security, Guidelines to Build a Security Perimeter for SMEs Advances in Networks, Computing and Communications 6 Abstract Network Security, Guidelines to Build a Security Perimeter for SMEs S.Godon and P.S.Dowland Centre for Information Security and Network Research,

More information

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc. TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...

More information

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS? 18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM May 2015 Nguyễn Tiến Đức ASEAN Security Specialist Agenda Modern Malware: State of the Industry Dynamic Threat Intelligence on the Firewall

More information

Intrusion Detection Systems. Darren R. Davis Student Computing Labs

Intrusion Detection Systems. Darren R. Davis Student Computing Labs Intrusion Detection Systems Darren R. Davis Student Computing Labs Overview Intrusion Detection What is it? Why do I need it? How do I do it? Intrusion Detection Software Network based Host based Intrusion

More information

Performance Evaluation of Intrusion Detection Systems

Performance Evaluation of Intrusion Detection Systems Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection

More information

Network Security Options

Network Security Options White Paper Network Security Options Trends in protection against network intrusion, attack, and resource hijacking SecureWorks Third Quarter, 2000 INTRODUCTION Economics had at one time reserved high-speed,

More information

Bio-inspired cyber security for your enterprise

Bio-inspired cyber security for your enterprise Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t

More information

The Advantages of Enterprise Historians vs. Relational Databases

The Advantages of Enterprise Historians vs. Relational Databases GE Intelligent Platforms The Advantages of Enterprise Historians vs. Relational Databases Comparing Two Approaches for Data Collection and Optimized Process Operations The Advantages of Enterprise Historians

More information

Network Security: A Critical Component to Any Business IT Plan. www.cognoscape.com

Network Security: A Critical Component to Any Business IT Plan. www.cognoscape.com Network Security: A Critical Component to Any Business IT Plan www.cognoscape.com Network Security: A Critical Component to Any Business IT Plan In this day and age, every business, no matter its size

More information

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20

More information

Cognitive and Organizational Challenges of Big Data in Cyber Defense

Cognitive and Organizational Challenges of Big Data in Cyber Defense Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory nathan.bos@jhuapl.edu, john.gersh@jhuapl.edu The cognitive and organizational

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents

More information

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone. IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

Advanced Honeypot System for Analysing Network Security

Advanced Honeypot System for Analysing Network Security ISSN: 2347-3215 Volume 2 Number 4 (April-2014) pp. 65-70 www.ijcrar.com Advanced Honeypot System for Analysing Network Security Suruchi Narote 1* and Sandeep Khanna 2 1 Department of Computer Engineering.

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

The Need for Intelligent Network Security: Adapting IPS for today s Threats

The Need for Intelligent Network Security: Adapting IPS for today s Threats The Need for Intelligent Network Security: Adapting IPS for today s Threats James Tucker Security Engineer Sourcefire Nordics A Bit of History It started with passive IDS. Burglar alarm for the network

More information

Intrusion Detection for Mobile Ad Hoc Networks

Intrusion Detection for Mobile Ad Hoc Networks Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering tchen@engr.smu.edu http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion

More information

Network Monitoring with Xian Network Manager

Network Monitoring with Xian Network Manager Network Monitoring with Xian Network Manager Did you ever got caught by surprise because of a network problem and had downtime as a result? What about monitoring your network? Network downtime or network

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's: Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services

More information