A Study on the Integrated Security System based Real-time Network Packet Deep Inspection
|
|
|
- Clement Simpson
- 10 years ago
- Views:
Transcription
1 , pp A Study on the Integrated Security System based Real-time Network Packet Deep Inspection Chang-Su Moon 1 and Sun-Hyung Kim 1 Dept. of Information & Communication Eng., Graduate Soonchunhyang Univ., Chungnam, Republic of Korea [email protected], [email protected] Abstract With the volume of Internet communication continuing to increase, there are more cases of worm and virus intrusion through the network. The security system against external attacks that use various security vulnerabilities consists of firewall and intrusion detection and prevention subsystem, and its functionality is becoming more advanced. As indicated by the recent security issues and intrusion cases, however, APT attacks and worm and hacking must be dealt with continuously. As such, enterprises are investing in various measures for an integrated security system to identify the threats of network security-based security vulnerabilities and cope with theme effectively. This paper proposes a network packet indepth test-based, integrated security system that analyzes the threat factors through a total study of network packets circulated in realtime and applies various security functions to cope with intelligent security threats in the future. Keywords: Real-time Network Packet, DPI (Deep Packet Inspection), APT(Advanced Persistent Threat), IDS, IPS 1. Introduction Intrusion by worms or viruses through the network is continuously increasing and evolving. Moreover, incidents such as leak of high volume of personal information and large-scale system faults caused by external hacking often occur. Although firewalls block attempts at unauthorized intrusion, they only inspect the headers of the packets; thus, they are still vulnerable to attacks through the authenticated IP and open ports. Intrusion detection on the network layer involves monitoring various network services and finding abnormal service or behaviors by monitoring the IP packets of the service or sessions as the connections between the terminals. In the former, the system can monitor and analyze a packet to determine which malicious contents it has and which known attack patterns it contains, since communication is established through packet exchanges between an origin and a destination. Such monitoring of packets is widely applied in traditional security systems and network analysis system such as IDS(Intrusion Detection System) and IPS(Intrusion Prevention System). Since it must inspect all packets in the network, however, it generates high overhead in the analysis system and has difficulties in detecting unknown attack patterns. To address such problem, the system applies deep packet inspection (DPI) technology to inspect the packet in depth in terms of contents<?>. The task that takes the most time in a network-based security system -- such as firewall or IPS -- is pattern matching inspection, which compares the packets with a set of pattern rules. 1 Corresponding author: Tel.: ; Fax: ISSN: IJSIA Copyright c 2014 SERSC
2 Pattern matching inspection is multi-pattern matching that matches multiple patterns simultaneously. The method of comparing the port, IP address, and type of pattern used only in the existing security system to evaluate harmfulness is not suitable under the large-capacity, intelligent, and advanced persistent threat (APT) environment. In particular, since even organizations with highly advanced security systems have been vulnerable to attacks such as APT, which continuously targets a specific subject, many enterprises and organizations struggle to find countermeasures. Therefore, this paper seeks to discuss the concept and functions of an integrated security system based on real-time network packet deep inspection to cope with possible hacking and security threats in cyber space. 2. Related Research and Technology Trends 2.1. Intelligent Security Intelligent security refers to the next-generation security information analysis technology that improves security intelligence by analyzing the correlation between the data and security events generated by the network, system, and application system of the main IT systems to cope with unknown fatal attacks such as APT. Existing security methods have shown limitations against the subtler, more precise cyberattacks under the rapidly changing IT environment; hence the importance of detecting subtle attacks by understanding the correlations instead of simply blocking a threat factor. Intelligent security as defined by the Gartner Group is the concept and methodology enabling the interaction of various security technologies. It pertains to the context-based analysis technology that integrates data from various sources and has interrelationship. From the short-term perspective, it is expressed in the form of context-aware security and is considered the leading security technology for the next 5 ~10 years. Therefore, it is expected to overcome the limitations of the pattern-based attack control technique utilized by existing security systems and evolve into a technology that detects new unknown attacks by analyzing the correlation of various elements (system process, activity level, network transaction, etc.,). Studies are actively being conducted on the integrated security system -- an intelligent security technology utilizing security event information management technology integrating the network and system security products group to defend against targeted attacks -- and big data processing technology Network Packet Structure and Type of Test Network packets and IP (Internet Protocol) network, which is the smallest unit, are transferred or routed. A network packet is mainly divided into header and payload. A header can be further divided into IP header and protocol header (Figure 1). 114 Copyright c 2014 SERSC
3 Figure 1. Structure of Network Packet Located at the outer edge of a packet, an IP header contains data such as the source IP address, destination IP address, and length of packet in bytes. It is similar to the address in a mail, and it may also contain other data such as transmission priority. Next to the IP header is a transmission layer header called TCP, which has the function of identifying the address of the end terminal and providing the error data when the packet is lost. A TCP header consists of the source and destination port, sequence number, etc. Data are partitioned, encrypted, compressed, and packed before they are transmitted and subsequently unpacked, decrypted, and reassembled following their transmission. Such process is deployed by a reference model generally called OSI (Open System Interconnection) layer. In the OSI layer and packet architecture, headers occupy 1 ~ 4 layers, but the payload occupies layer 5 or higher. The network equipment generally includes the switch hub, firewall, router, and server. The functions of each network device are performed in OSI layers 1 ~7. As shown in Figure 2, a switch hub processes the MAC header, whereas the firewall decomposes and processes 4 layers including the IP header. Figure 2. Packet Utilization Range of Network Equipment Copyright c 2014 SERSC 115
4 The network packet inspection type is generally categorized by how many network layers are inspected. Although there is no definite category, Parsons (2008) categorized them in 3 levels, whereas Cooper(2010) categorized them in 2 levels. This study adopted the categorization by Parsons (2008)[10]. Figure 3. OSI 7 Layers and Packet Inspection Level 3-level packet inspection is divided into shallow packet inspection (orstatefulpacket inspection, SPI), medium packet inspection (MPI), and deep packet inspection (DPI). Figure 3 shows the levels of SPI, MPI, and DPI in the OSI architecture described above. It inspects the header data and drops the packet if the data are included in the blacklist. In other words, SPI cannot read the session, presentation, and application layers; consequently, it cannot inspect the payload part of the packet. Since it evaluates the packet using only the header data, SPI cannot thoroughly analyze (especially inference of the application) the traffic but can process high-volume traffic very fast compared to DPI. MPI means the application proxies because it does not retrieve the data directly from the PC but passes it through a temporary storage unit called proxy. When a packet is inputted into a proxy system, the proxy system checks the packet header in accordance with the parse list. An application proxy is aligned with the network routing devices so that network administrators can apply the predefined rule across-the-board by having all traffic pass through the proxy system. To decide whether a packet will be transmitted, the blacklist of SPI only considers the IP address, whereas the parse list of MPI decides based on the data format type and Internet address. For example, an administrator can use the MPI system to make sure that a flash file or an image file in a website of SNS will not be opened in a PC. On the other hand, an MPI system lacks scalability and consequently requires a separate application gateway for each application if there are diverse applications, but such can delay the transmission. Therefore, it may not be useful to Internet providers operating a large-scale network supporting various applications. The concept of DPI first appeared around Its exact meaning is somewhat vague since it is not a standardized technology. Although generally known as the technology for inspecting not only the packet header but also the payload part with contents, how it is deployed is not usually disclosed since it is considered the proprietary information of each DPI vendor. Unlike SPI or MPI, DPI can be used in a large-scale network environment since 116 Copyright c 2014 SERSC
5 it is designed to process hundreds of thousands of packets and determine which program generates which packets in a second. A DPI system stores hundreds of thousands of packets in the memory until there is sufficient information to match the already identified packet type. When a new packet is matched to the identified packet list, the system recognizes which application created the packet and applies the rule to decide whether the packet will be transmitted [10]. If the DPI system cannot identify the application even after inspecting the packet header and payload parts, it checks the pattern to find out how the packet is exchanged between the computers. Figure 4. Inspection of Real-time Packet Based Layer 7 Real-time DPI -- wherein security devices such as router and switch read and analyze in realtime not only the packet header but also the payload part containing the data contents of the OSI 7 layer-based packet as shown in Figure 4 -- indicates two attributes. First, the DPI technology has evolved to analyze Internet traffic in realtime and process them differentially. Second, many different functions can be supported by a system. As such, it can be used for various purposes such as security, traffic management, blocking of malicious contents, and customized advertising. Therefore, real-time total inspection of network packets must use DPI to inspect even the payload part in the 7-layer architecture. DPI-based network traffic analysis enables checking of vulnerabilities, risk factors, and possibility of intrusion such as hacking by collecting network traffic pattern data and performing total inspection and analysis of the packets. Moreover, an appliance integrating HW and operating SW is needed to predict service change according to the analysis result and enable service optimization and service personalization Concept of Integrated Security Systems An integrated security system is an information system that integrates the functions of individual security systems to enable real-time network packet inspection, analysis, vulnerability prevention, service optimization, network control, and network log recording. As shown in Figure 5, a commercial security system consists of the network, device, contents, and platform to perform various functions. Network security solutions include IPS, IDSS, firewall, network access control system, integrated risk management system, and VPN. An integrated security system is a security system integrating the security systems performing the above functions. Copyright c 2014 SERSC 117
6 Figure 5. Features of Integrated Security System 3. Integrated Security System Utilization 3.1. Architecture of Integrated Security System An integrated security system consists of packet signature definition, categorization, control, and authentication steps. It supports the service of each of the assorted application programs as well as the user/group, bandwidth guarantee, and authentication in realtime using the packet inspection policy, visualizes the policy, and monitors it (Figure 6). Figure 6. The Operational Architecture of Integrated Security System Therefore, an integrated security system is not just a conventional UTM (Unified Threat Management) system that simply combines the security systems; it is a system connected to the network and application server to monitor and control security threats in realtime and support PKI-based authentication at the application level (Figure 7). 118 Copyright c 2014 SERSC
7 Figure 7. Suggested Integrated Security System 3.2. Key Requirements of Integrated Security System Conventional security systems are operated mostly to prevent the intrusion of malicious codes and virus using the firewall, IDS, and IPS subsystems. As shown by the 3.20 IT Crisis, which occurred on March 20, 2013, and caused the shutdown of networks of major press and enterprises and infection of many computers by malicious codes in Korea, however, it can neither block the attacks unless they are known malware nor quarantine the network and prevent the proliferation of damage since the network cannot be operated normally once saturated. Tracking the cause is also difficult. Moreover, since most applications communicate through dynamic ports/ip addresses, the existing security system that performs control using the port and IP address cannot handle hacking and APT attacks. As such, the real-time, network packet deep inspection-based, integrated security system requires more precise, real-time management of traffic and control of all applications and users beyond simple control using the port and IP address of the network packet. The real-time, network packet deep inspection-based, integrated security system must inspect all network packets and their payloads without delay and in realtime and analyze and subsequently process the signature-based services quickly. It must also manage the traffic of all application program sessions passing through the system and save the traffic logs. The main functions of an integrated system are listed in Table 1. Table 1. Main Functions of the Integrated Security System Requirement Storage/Integrated Analysis App Detection Integrated Authentication Access Control Log Management Policy Control Monitoring Scope APP-ID, UserID, etc. Signature-based detection Transmitted/Received packets and contents Network and contents control Event and log collection and utilization User/Access policy Real-time event Copyright c 2014 SERSC 119
8 3.3. Applications of Integrated Security System The real-time, network packet deep inspection-based, integrated security system can be applied in various areas in addition to security system function, personal information protection, and security control. It can manage network traffic, and it can be utilized in system tracking tasks such as packet-based billing solution and network load measurement and management by analyzing the log (Figure 8). Figure 8. Various Areas Where the Integrated Security System can be Utilized 4. Operational Cases and Performance Evaluation To evaluate objectively the performance of the integrated security system, the instrument conforming to the network performance test standard RFC2544(Methodology for Network Interconnect Devices) and SmartFlow software were used. Figure 9. Integrated Security System Operation Screen (example) 120 Copyright c 2014 SERSC
9 For the performance evaluation, the throughput, latency, number of flows simultaneously processed, and new flows per second were measured. A separate tool was used to obtain the detailed status data (actual cache access rate and error generation frequency) of the kernel and processor. Table 2. Result of Integrated Security System Evaluation Tested Item RFC 2544Test Test Result 128 Byte: 99.7% 256 Byte: 99.4% 512 Byte: 99.3% 1024 Byte: 99.4% 1280 Byte: 99.2% 1518 Byte: 99.1% Service Recognition Test Service recognition rate of actual traffic: Around 87% No. of Flows Processed Simultaneously New Flows per Second 30 million flows 1.5 million flows/sec. Latency FPGA processing: 3 μs Host processing: 160 ~ 180 μs The performance evaluation indicates that the system can process at least 99% without delay using the existing network equipment. Neither were there performance degradation ordelay, new flows/sec., etc., in the high-volume network environment. 5. Conclusions This paper uses an example to confirm that the network packet deep inspection-based, integrated security system, which can effectively cope with various security threats by identifying and authenticating 7 layers of Internet traffic, can be applied without overloading the network traffic. As indicated by the recent security issues and intrusion cases, APT attacks and worm and hacking must be dealt with continuously. The real-time, network packet deep inspection-based, integrated security system proposed in this paper can be used as an effective security measure based on the policy of the enterprise operating the information system and understanding of the administrator. It can also be regarded as the optimum solution to cope with unknown network-based threats in the future. For future studies, intelligent security analysis using big data -- in addition to network packet storage, management, and restoration -- is recommended. Copyright c 2014 SERSC 121
10 References [1] M. Nicolett and K. M. Kavanagh, Magic Quadrant for Security Information and Event Management, Gartner Group, (2012) May. [2] Allot Communications (2007). Digging Deeper Into Deep Packet Inspection(DPI). H. Asghari, M. van Eeten and M. Mueller, Unraveling the Economic and Political Drivers of Deep Packet Inspection, GigaNet 7th Annual Symposium, (2012) Novmber 5. [3] BEREC, BEREC response to EC questionnaire on specific aspects of transparency, traffic management and switching in an Open Internet, (2012). [4] BoR(12)145 rev Broadband Traffic Management ( ). [Transparency Market Research]: DPI Market to Reach $3.8B by [5] R. Bendrath, Global technology trends and national regulation: Explaining Variation in the Governance of Deep Packet Inspection, International Studies Annual Convention, New York City, (2009) February [6] C. R. Clark and D. E. Schimmel, Scalable pattern matching for high speed networks, Field-Programmable Custom Computing Machines, FCCM th Annual IEEE Symposium on, (2004). [7] A. Cooper and E. Llans, Adoption of Traffic Sniffing Standard Fans WCIT Flames, Center for Democracy & Technology, (2012) November 28. [8] A. Cooper, Doing the DPI Dance, (2011) April 11. [9] A. Cooper, The Singular Challenges of ISP Use of Deep Packet Inspection, Deep Packet Insepction.ca, (2010). [10] C. Parsons, DPI in perspective: tracing its lineage and surveillance potential. the new transparency surveillance and social sorting. Working paper, (2008). [11] Telecompaper, Opta rejects request for info on DPI investigation. (2011) August 29. Authors Chang-Su Moon, received B.S. degrees degrees in Electronic Engineering from the Dongkook University, Seoul, Korea, in 1982 and M.S. degree from the Soonchunhyang University in March the present: Department of Information and Communication Engineering, Soonchunhyang University, Ph.D From 2012 to the Present, he was a chairman of Information and Communication Financial Cooperative His research interests include Network, CCTVandInformation and Communication Corporation Act. Sun-Hyung Kim, received his B.S., M.S. and Ph.D. degrees in Electronic Engineering from Sungkyunkwan University, Korea, in 1979, 1981 and 1988, respectively. Since 1989, He has been a professor in Department of Information and Communication Engineering, Soonchunhyang University. From 2005 to the Present, he was a vice-chairman of Korea University Invention Association. From 2013 to the Present, he was a vice-chairman of Korea Institute of Information Technology. His research interests include Data Communication, Embedded system, Network, etc. 122 Copyright c 2014 SERSC
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis
, pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Are Second Generation Firewalls Good for Industrial Control Systems?
Are Second Generation Firewalls Good for Industrial Control Systems? Bernie Pella, CISSP Schneider Electric Cyber Security Services [email protected] Firewall Overview Firewalls provide
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
TEPZZ 96 A_T EP 2 961 111 A1 (19) (11) EP 2 961 111 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.
(19) TEPZZ 96 A_T (11) EP 2 961 111 A1 (12) EUROPEAN PATENT APPLICATION published in accordance with Art. 13(4) EPC (43) Date of publication:.12.1 Bulletin 1/3 (21) Application number: 147426.7 (22) Date
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Firewall Testing Methodology W H I T E P A P E R
Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness
Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking
ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware.
Radware s Smart IDS Management FireProof and Intrusion Detection Systems Deployment and ROI North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware
P2P Traffic Manager. L7 Internet Security. IP Appliance Products
IP Appliance Products P2P Traffic Manager L7 Internet Security Headquarter 13 Fl., Eunsung Bldg., 53-8 Cheongdamdong Kangnamgu Seoul, Korea 135-763 Tel +822-3446-6070 Fax +822-3445-9099 R&D Center 34 Gajeongdong,
Achieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
First Line of Defense to Protect Critical Infrastructure
RFI SUBMISSION First Line of Defense to Protect Critical Infrastructure Developing a Framework to Improve Critical Infrastructure Cybersecurity Response to NIST Docket # 130208119-3119-01 Document # 2013-044B
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
Applications erode the secure network How can malware be stopped?
Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval
, pp.175-186 http://dx.doi.org/10.14257/ijsh.2014.8.1.19 A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval Kil-sung Park and Sun-Hyung Kim Department of Information & Communication
Application Intelligence, Control and Visualization
Application Intelligence, Control and Visualization Marco Ginocchio Director of Systems Engineering Europe, Middle East, and Africa [email protected] SonicWALL Over 1.7 million security appliances
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
A Study on the Big Data Log Analysis for Security
Vol. 10, No. 1 (2016), pp.13-20 http://dx.doi.org/10.14257/ijsia.2016.10.1.02 A Study on the Big Data Log Analysis for Security Kyung-Sik Jeon 1, Se-Jeong Park 2, Sam-Hyun Chun 3 and Jong-Bae Kim 4* 1
NetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
, pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
SonicWALL Unified Threat Management. Alvin Mann April 2009
SonicWALL Unified Threat Management Alvin Mann April 2009 Agenda Who is SonicWALL? Networking Drivers & Trends SonicWALL Unified Threat Management (UTM) Next Generation Protection SonicWALL CONFIDENTIAL
How to Build a Massively Scalable Next-Generation Firewall
How to Build a Massively Scalable Next-Generation Firewall Seven measures of scalability, and how to use them to evaluate NGFWs Scalable is not just big or fast. When it comes to advanced technologies
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
Using Palo Alto Networks to Protect the Datacenter
Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular
Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott
Symantec Enterprise Firewalls From the Internet Thomas Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are
How To Build A Network Security Firewall
Ethical Hacking and Countermeasures Version 6 Module LX Firewall Technologies News Source: http://www.internetnews.com/ Module Objective This module will familiarize i you with: Firewalls Hardware Firewalls
Providing Secure IT Management & Partnering Solution for Bendigo South East College
Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,
Firewalls CSCI 454/554
Firewalls CSCI 454/554 Why Firewall? 1 Why Firewall (cont d) w now everyone want to be on the Internet w and to interconnect networks w has persistent security concerns n can t easily secure every system
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Security Design. [email protected] http://wwwiuk.informatik.uni-rostock.de/
Security Design [email protected] http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin
A Prevention & Notification System By Using Firewall Log Data By Pilan Lin 1 Table Of Content ABSTRACT... 3 1 INTRODUCTION... 4 2. Firewall Log data... 6 2.1 How to collect log data... 6 3. Prevention
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device
Ch.9 Firewalls and Intrusion Prevention Systems Firewalls: effective means of protecting LANs Internet connectivity is essential for every organization and individuals introduces threats from the Internet
Firewall Architecture
NEXTEP Broadband White Paper Firewall Architecture Understanding the purpose of a firewall when connecting to ADSL network services. A Nextep Broadband White Paper June 2001 Firewall Architecture WHAT
Firewall Evolution - Deep Packet Inspection by Ido Dubrawsky last updated July 29, 2003
Seite 1 von 5 Firewall Evolution - Deep Packet Inspection by Ido Dubrawsky last updated July 29, 2003 Firewalls provide a variety of services to networks in terms of security. They provide for network
Dell SonicWALL Portfolio
Dell SonicWALL Portfolio Jiří Svatuška Presales Consultant Transform Connect Inform Protect Dell SonicWALL network security portfolio Network security Secure mobile access Email security Policy and management
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
McAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Wherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here.
Procurement of Services to Design, Develop, Implement and Maintain Centralized e-governance Application for Urban Local Bodies in Tamil Nadu Explanatory Notes 2 / Dated 17-December--2013 Explanatory Notes
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
Huawei Network Edge Security Solution
Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD. Huawei Network Edge Security Solution Huawei Network Edge Security 1 Overview
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
Der Weg, wie die Verantwortung getragen werden kann!
Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise
How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Load Balancing Security Gateways WHITE PAPER
Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...
Securing EtherNet/IP Using DPI Firewall Technology
Securing EtherNet/IP Using DPI Firewall Technology www.odva.org Technical Track About Us Erik Schweigert Leads device firmware development at Tofino Security BSc in Computer Science from VIU Michael Thomas
Unified Threat Management Throughput Performance
Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager
Why it's time to upgrade to a Next Generation Firewall Dickens Lee Technical Manager Dell History 2 Confidential Dell s legacy Became leading provider of subscription services on optimized appliances Shipped
NetDefend Firewall UTM Services
Product Highlights Intrusion Prevention System Dectects and prevents known and unknown attacks/ exploits/vulnerabilities, preventing outbreaks and keeping your network safe. Gateway Anti Virus Protection
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
