Security Alert Management in E-Business Networks
|
|
|
- Cecil Blair
- 10 years ago
- Views:
Transcription
1 880 The Fourth International Conference on Electronic Business (ICEB2004) / Beijing Security Alert Management in E-Business Networks Allan Lam, Pradeep K. Ray School of Information Systems, Technology and Management, University of New South Wales, Sydney, Australia [email protected] ABSTRACT Security management has become a major concern in today s e-business systems due to ever-increasing attacks on enterprise servers. This has led to the increasing sophistication of network security tools and systems in e-business networks that involve a number of organizational entities cooperating over computer communication networks. Many large organizations are outsourcing the management of e-business networks. This paper examines the problem of security management in the context of an Management Service Provider (an organization that provides remote management of e-business networks). Existing security tools (e.g., Intrusion Detection Systems (IDS)) assist us in detecting attempts by unauthorized users to get access to networked information resources. However, the management of IDSs offers some interesting challenges (e.g., false alerts). This paper presents a policy-based management framework to solve this problem. Keywords: Outsourced IT management, IDS Alerts, Management Service Provider 1. INTRODUCTION E-business systems allow organizations to focus on their core strengths, while outsourcing many aspects of the business to business partners in a value chain. For example, many e-businesses now outsource the management of their IT networks to specialist organizations [7]. The increasing ferocity of cyberattacks is making organizations think seriously of more and more sophisticated security management solutions. Organizations now have firewalls, anti-virus, authentication, and Intrusion Detection Systems (IDS). However, many of these facilities are either unused, or under-utilised due to problems, such as false alarms in IDS [1]. This paper presents a security management strategy for large e-business networks from the perspective of outsourced management. The paper is organized as follows. The Section 2 starts with a background of current intrusion detection systems and the need for frequent management interventions. This is followed in Section 3 by our proposed architecture for Security Alert Management (based on management policies) that helps reduce frequent false alarms. Section 4 presents a case study of the implementation of this architecture in a large organization providing management services to e- business networks in the Asia-pacific region. Finally, Section 5 concludes the paper. 2. BACKGROUND Many network security technologies require regular human intervention in order to receive the best protection. Consider firewalls and intrusion-detection systems (IDSs). Typically, these devices are setup so that they log information to a database. It is then up to the security engineer to analyse these logs and to identify network attacks or suspicious behaviour if, or while, they are occurring. Unfortunately, this can be very time consuming. Logs are generated and typically contain information for the following three events: A packet that is allowed to pass through a firewall. A packet that is blocked (denied access) at a firewall. A packet that satisfies one of the signatures in the IDS database. Thresholding rules are then applied to the above events to generate security alerts. Unfortunately, because they work on data from firewalls and IDSs, they also inherit the major problem with them, e.g., the generation of numerous false positives [2]. This research reported in this paper aims to develop a framework whereby security alerts, in particular false or routine alerts, can be analysed and responded to automatically, saving precious employee time and the employer s money. Routine alerts are those that we wish to appear but which we do not want to analyse. False and routine alerts are composed of many events. Our proposed framework is called Security Alert Management System (SAMS). This is a Policy-based management framework as discussed in [4], [5] and [6]. 3. SECURITY ALERT MANAGEMENT SYSTEM (SAMS) SAMS uses the term policy to refer to a particular rule that defines a false or routine alert. Every policy is instantiated from a policy type. A policy type represents a set of policies that possess a similar underlying idea/pattern. For example, consider the following policy types: If pattern A appears at least Z% of the time in the alert, then acknowledge this If pattern A appears at least Z% of the time in the
2 The Fourth International Conference on Electronic Business (ICEB2004) / Beijing 881 alert, AND if a pattern B appears at least Y% of the time in the alert, then acknowledge this triangle: A) Intercept an event/trigger. This event/trigger can be a mouse click or a timed event and invokes the PES process. B) When the PES is invoked, alerts are read from whatever format that they are stored as. C) Each alert, based on its domain is then compared to its corresponding policies found in the policy database. If a policy is found that matches the alert then the action for that alert is automatically carried out. Figure 1: SAMS framework The above policy types can be used to instantiate the following policies: If the source IP address appears 90% of the time in the alert, then acknowledge this If the source IP address appears 40% of the time in the alert, AND the destination IP address , then acknowledge this The policy types then really have no constraints, other than their realisation into code, which will be discussed later. 3.1 SAMS Framework The framework presented in Figure 3 provides a design for the development of a system that analyses security alerts. It is called the Security Alert Management System (SAMS) framework. At a high level of detail, SAMS will wait for an event or trigger to start the alert analysis process. Once this event has been received, the alerts are retrieved from an alerts store. Each alert is then analysed with its corresponding policy, which is determined by the domain that the alert belongs to. Each policy will determine whether or not the alert is a false alert or a routine alert. The policy will also determine what action to carry out based on that analysis. The simple framework of SAMS reflects the nature of the problem, which is to analyse and respond to security alerts. However, its simplicity hides the powerful inner workings of the policies. The more verbose or complex your false or routine alerts, the more complicated your policies become. As shown in Figure 1, the framework is made up of three main components, the Policy Enforcement System (PES), the Policy Database and the Security Policy Manager (SPM). These will be described in the following three sections. 3.2 Policy Enforcement System (PES) The PES does three things, as shown in Figure 2 with a Figure 2: PES process The PES waits for the event/trigger to start the process. Upon receiving this, it will fetch alerts from the alerts store. Finally, it will get the policies for this alert from the policy database. The policies that it retrieves are based on the alert domain. The policies are compared to the alerts and if one is found to match, then the appropriate actions are carried out. The last step is actually a little more involved, which will now be discussed. Recall from the beginning of section 3 that we wish to define different policy types. Each policy type will define a false or routine alert. The PES will actually store the policy type definition, represented as Policy Type A and Policy Type B in the above diagram. The policy database will then store the particulars for the policy type definitions. For example, the PES may have the following as Policy Type A : If pattern A appears at least Z% of the time in the alert, then acknowledge this The policy database may then have a table such as the following: alert_dom pattern_a percentage_z ain 1 Shellcode.* 90 So if an alert that belongs to the alert_domain 1 is encountered, then the corresponding pattern (Shellcode.*) and percentage (90) will be replaced in the policy type. Encountering such an alert will apply this policy to it: If pattern Shellcode.* appears at least 90% of the time in the alert, then acknowledge this If the alert satisfies this policy, then it will be
3 882 The Fourth International Conference on Electronic Business (ICEB2004) / Beijing acknowledged. Note that the pattern supports regular expressions. By separating the policy type and its specific details, we allow a policy to be applied to various domains and alerts, without producing repetitive policies. As the policy types need to be coded, this also reduces code redundancy. In summary, the PES has been designed so that it stores the programming logic to analyse alerts. It in fact contains the skeleton of the logic. The remainder of the programming logic is obtained from the policy database. The reason for this separation is that many alerts have similar analysis. For example, many alerts are analysed based on what event occurs the most often. So, instead of replicating the code for this analysis across all domains, we can save disk space and redundancy by storing only the skeleton of the code and storing the finer details in the database. Creating new policy types therefore involve coding them into the PES. PES is the only component that integrates with a current thresholding system. 3.3 Policy Database This represents the database of policies. As described in the previous section, it will store the details of the policies in a policy table. Each domain is also represented in the Policy Database. This only makes sense since it is natural and easy to link domains with their particular policies via table joins. A schema such as the following can be employed for security alert management systems developed from SAMS (Figure 3). Figure 3: Policy Database schema The table Domain will contain information about that particular domain. Policy_Details will contain information about all policies that have been created for the system and Domain_Policies is a lookup table matching the policies to the particular domains. So to retrieve the details for a particular policy the following query might be performed: select p.detail1, p.detail2 from domain_policies d, policy_details p where d.domain_id=1 and d.policy_id=p.policy_id. The attributes returned from the above query can then be substituted into the policy type definition defined in the PES. The Policy_Types table helps with this task by associating a policy instance in the table Policy_Details to the policy type definition in the PES. 3.4 Security Policy Manager The SPM is the GUI management tool that will allow you to manage the Policy Database. It will allow you to enable, disable or edit policies for your defined domains. The SPM will present the information from the database in an easy to read format allowing rapid creation of the policies. As discussed in the beginning of section, policies are instantiated from policy types. Hence, when we enable a policy, we are actually creating an instance of a policy type. Every instance is created by inserting the details for the policy into the policy database, discussed in the previous section. The policy created is then applied to a selected domain. When we disable a policy, we are actually removing an instance of the policy from the policy database. This involves removing various rows from the policy database to remove both the policy instance and its association with a particular domain. Note that when we disable a policy, we do not actually remove the policy type definition from the PES. We are only removing an instance of it, which is defined in the policy database. Editing a policy allows us to edit the details of a policy instance. For example, consider the following policy: If pattern Shellcode.* appears at least 90% of the time in the alert, then acknowledge this The user could modify this policy by changing the pattern or changing the percentage value. Note also that editing a policy does not edit the policy type definition. Editing a policy only edits a policy instance. Editing a policy will perform a database update query on the policy_details table. Note that whenever a new policy type is created in the PES, the SPM must also be updated so that it recognises it. The SPM must be updated so that one can enable, disable and edit policies based on the new policy type. 4. CASE STUDY This section will use the SAMS framework to develop a working system. The system will be used on a thresholding system already in place at a company X. The company has asked its name to be withheld. The company is a leading IP networking and communications solutions provider in the Asia-Pacific region. Of interest to this paper is the orginsation s security division. The security engineers, among other tasks,
4 The Fourth International Conference on Electronic Business (ICEB2004) / Beijing 883 monitor the alerts from various firewalls and IDSs for various customers. The security division has implemented a thresholding system, which analyses events from firewalls and IDSs and based on predefined thresholding levels will generate alerts. These alerts are displayed to security engineers via an internal intranet web page. The SAMS framework helps design a system that automatically acknowledges false and routine alerts produced from the thresholding system. According to the engineer, on average it takes one minute to analyse one security alert. On an average day for the organisation s security division, they receive 300 alerts. This means that every day, 300 minutes is used to analyse false alerts. If there are 230 working days per year, that equates to 1150 hours or 143 working days that are spent on analysing alerts. Figure 4: Current security architecture of company X 4.1 Current Security Architecture Before we design a SAMS system, we must first analyse the current architecture to see where it fits in. The following diagram shows the current data flow of the organisation s security division: The data sources log their events to a PostgreSQL database. The thresholding system rule base then generates the alerts. Security engineers will analyse these alerts and perform the required actions. As indicated Figure 4, the security engineers are actually using policies when they are analysing the alerts. That is, the security engineers are applying certain rules for the analysis that they carry out. 4.2 Design This Section presents the design of the proposed system based on SAMS (Figure 5). However, we first need to identify how our alerts are being stored. Figure 5: Proposed SAMS Architecture The PES will therefore perform a similar task. It will read in the alerts from a HTML file and In the case of the organization s thresholding system, the alerts are stored as HTML files. Security engineers analyze alerts by entering an intranet web site. This web site provides the alerts and the events that make up in the alerts in a tabular format. It is then up to the security engineer to analyze these and acknowledge that they have been analysed. PES will only acknowledge the alerts if the policies in its database match the alerts. The next step is to identify the domains. In the case of thresholding system, these will be the customers. Since the organisation manages customer networks, it is only logical that we distribute policies according to this domain. The existing database already has this information in a table called customers. The schema for this table is as follows: customers(id, name, fullname, heat_id, gnc_name, speech_name) Hence for our SAMS system we will need to create these tables: policy_details(policy_id, description, ) cust_policies(cust_id, policy_id) policy_types(type_id, description) The full schema of policy_details will be worked out later. Our final step is to develop the SPM. Because the existing thresholding system is web-based, the SPM designed here will also be web-based. Similarly, because the existing thresholding system is developed in Perl, our SAMS system will also be developed in Perl. 4.3 Implementation After discussion with the organisation s security staff, it was determined that the main policy type that should be created first, was one that specified a pattern that was most prevalent. That is, in the analysis of every alert, false and routine alerts tended to have a pattern whereby certain elements would be repeated. As an example of such an alert, refer to the following that has been used throughout this report: If pattern Shellcode.* appears at least 90% of the
5 884 The Fourth International Conference on Electronic Business (ICEB2004) / Beijing time in the alert, then acknowledge this This is the first policy type that was coded into PES and which the SPM will recognise. Hence, after this decision was made, the schema for the table policy_details is as follows: policy_details(policy_id, devicetype_id, type_id, details) The important attributes are described here: type_id: this is a foreign key to the policy_types table and associates a policy with its policy type. details: this will be a string that contains the details for a policy. Since we are implementing the above policy type, this string will contain the pattern to look out for and the percentage that this pattern appears in the alert. More precisely, it will contain what specific details of an alert contain the pattern, what the pattern is and the percentage value. When the user is creating a policy, they must first select which components of an alert make up the key. The key is a combination of the attributes in the above table that the policy type definition will concentrate on when it is analysing it. The SPM was then designed so that it could properly manipulate the policy database. As mentioned, all development work for this system was done in Perl. The existing thresholding system was developed in Perl, so for compatibility issues, it was logical to select this as the development technology. 4.4 Results A successful SAMS system was developed on the development network. The following table shows how many alerts could have been automatically acknowledged if the SAMS system was put into production. Time (for 26 November 2003) 00:00 to 01: :00 to 02: :00 to 03: :00 to 04:00 3 Number of alerts that could have been automatically acknowledged This is but a four-hour sample of the number of alerts that could have been automatically acknowledged. It would equate to 15 minutes of saved alert analysis time. For another random sample: Time Number of alerts that could (for 27 November have been automatically 2003) acknowledged 13:00 to 14: :00 to 15: :00 to 16: :00 to 17:00 6 The above would have saved 27 minutes of alert time. These alerts are all based on the same policy type specified in the previous section. Due to the nature of networks it is hard to predict how many alerts on average could be automatically acknowledged with this policy type. But it is clear from the above samples that significant time can in fact be saved. Future work will involve the creation of policy chains, introduction of policy priorities and the development of a policy type creator, since with the current framework, it is quite cumbersome to add other policy types. Also it is necessary to integrate the SAMS framework with the network and systems management framework [3]. 5. CONCLUSION In this paper, we have proposed a new framework, called SAMS, for the analysis of security alerts in e- business networks. This framework incorporates foundational concepts in policy-based management to solve the problem of false alerts that threatens to render many security tools (e.g., intrusion detection systems) useless. The framework that is proposed in this paper is free from many constraints on the policy definitions, unlike in the case of existing management policy frameworks. In fact, policies defined in this framework are constrained by the author s ability to code them. This is hopefully a first step towards a framework that may become universally used in any system that generates alerts. The time and money wasted in analysing false and routine alerts is great as sproven by our case study figures. A system developed from SAMS can also be viewed as an engineer-in-a-box. Because the security engineer is telling the SAMS system what constitutes false/routine alerts, the system is really acting like a security engineer. As a consequence, if the security engineer decides to leave the organization for which he/she works, then the knowledge base of the engineer will be retained. Such policy-based management frameworks are likely to be used more increasingly for security management in future. ACKNOWLEDGEMENT This work was partially supported by the Australian
6 The Fourth International Conference on Electronic Business (ICEB2004) / Beijing 885 Research Council (ARC) SPIRT Grant #C REFERENCES 1. Axelsson, S., Intrusion Detection Systems: A Survey and Taxonomy, Technical Report of the Department of Computer Engineering, Chalmers University of Technology, Sweden, March Blackman,D., Intrusion Detection is failing: Enter Intrusion Management, July 2002, 3. Distributed Management Task Force, Inc. (DMTF), Common Information Model (CIM) Specification, version 2.2, June 14, 1999, 4. N. Dulay et al. A Policy Deployment Model for the Ponder Language (2001) 5. B. Moore, J. Strassner, E. Elleson, Policy Core Information Model -- Version 1 Specification, Feb 2001, ftp://ftp.rfc-editor.org/in-notes/rfc3060.txt 6. Proctor,P., The Practical Intrusion Detection Handbook, Prentice Hall, Ray, P., Integrated Management from e-business Perspective: Concepts, Architectures and Methodologies, Kluwer Academic/ Plenum Publishers, Januray P. Yarng, P.Ray and D. Maher, Profiling Cyber Attacks using Alert Regression Profiles, IEEE Globecom2003 Symposium on Network Security, San Francisco, Nov 2003
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin
A Prevention & Notification System By Using Firewall Log Data By Pilan Lin 1 Table Of Content ABSTRACT... 3 1 INTRODUCTION... 4 2. Firewall Log data... 6 2.1 How to collect log data... 6 3. Prevention
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
INTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla [email protected] Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Log Management for the University of California: Issues and Recommendations
Log Management for the University of California: Issues and Recommendations Table of Contents 1 Introduction...2 2 Candidate Sources of Logged Information...3 3 Recommended Log Management Practices...4
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System
A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System Mohammad Ghulam Ali Academic Post Graduate Studies and Research Indian Institute of Technology, Kharagpur Kharagpur,
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
CHAPTER - 3 WEB APPLICATION AND SECURITY
CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical
irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire [email protected] 25th
irods and Metadata survey Version 0.1 Date 25th March Purpose Survey of Status Complete Author Abhijeet Kodgire [email protected] Table of Contents 1 Abstract... 3 2 Categories and Subject Descriptors...
Intelligent Log Analyzer. André Restivo <[email protected]>
Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
Concepts of Database Management Seventh Edition. Chapter 7 DBMS Functions
Concepts of Database Management Seventh Edition Chapter 7 DBMS Functions Objectives Introduce the functions, or services, provided by a DBMS Describe how a DBMS handles updating and retrieving data Examine
Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks
Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks *Abhishek Vora B. Lakshmi C.V. Srinivas National Remote Sensing Center (NRSC), Indian Space Research Organization (ISRO),
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
Deployment of Snort IDS in SIP based VoIP environments
Deployment of Snort IDS in SIP based VoIP environments Jiří Markl, Jaroslav Dočkal [email protected] K-209 Univerzita obrany Kounicova 65, 612 00 Brno Czech Republic Abstract This paper describes
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
SQL Databases Course. by Applied Technology Research Center. This course provides training for MySQL, Oracle, SQL Server and PostgreSQL databases.
SQL Databases Course by Applied Technology Research Center. 23 September 2015 This course provides training for MySQL, Oracle, SQL Server and PostgreSQL databases. Oracle Topics This Oracle Database: SQL
Request for Information (RFI) for Managed Hosting Service
FOOD AND AGRICULTURE ORGANIZATION OF THE UNITED NATIONS ORGANISATION DES NATIONS UNIES POUR L ALIMENTATION ET L AGRICULTURE ORGANIZACION DE LAS NACIONES UNIDAS PARA LA AGRICULTURA Y LA ALIMENTACION Viale
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview
MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide
Network Security Management
Network Security Management TWNIC 2003 Objective Have an overview concept on network security management. Learn how to use NIDS and firewall technologies to secure our networks. 1 Outline Network Security
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
3. Firewall Evaluation Criteria
Firewall Management Prep. drd. Radu Constantinescu Academy of Economics Studies, Bucharest ABSTRACT Network connectivity can be both a blessing and a curse. On the one hand, network connectivity can enable
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
Endpoint Security Console. Version 3.0 User Guide
Version 3.0 Table of Contents Summary... 2 System Requirements... 3 Installation... 4 Configuring Endpoint Security Console as a Networked Service...5 Adding Computers, Groups, and Users...7 Using Endpoint
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes
PCI v2.0 Compliance for Wireless LAN
PCI v2.0 Compliance for Wireless LAN November 2011 This white paper describes how to build PCI v2.0 compliant wireless LAN using Meraki. Copyright 2011 Meraki, Inc. All rights reserved. Trademarks Meraki
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
White Paper. PCI Guidance: Microsoft Windows Logging
PCI Guidance: Microsoft Windows Logging Table of Contents Introduction...3 This white paper was written by: Cayce Beames, CISSP, QSA, Technical Practice Director, Strategic Services, Intel Security Preparation
1 File Processing Systems
COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.
MarkLogic Server. Reference Application Architecture Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved.
Reference Application Architecture Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents
Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008
Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:
DNS Pinning and Web Proxies
DNS Pinning and Web Proxies An NGSSoftware Insight Security Research (NISR) Publication 2007 Next Generation Security Software Ltd Abstract DNS-based attacks can be used to perform a partial breach of
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management
Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management This guide will show you how a properly implemented and managed SIEM solution can solve
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, [email protected] Steve Davis, Clemson University, [email protected] ABSTRACT People considering improvements in database
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Intrusion Detections Systems
Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...
SIGNATURE BASED INTRUSION DETECTION IN CLOUD BASED MULTI-TENANT SYSTEM USING MTM ALGORITHM
SIGNATURE BASED INTRUSION DETECTION IN CLOUD BASED MULTI-TENANT SYSTEM USING MTM ALGORITHM N.Thirumoorthy 1, M.Aramudhan 2 and M.S.Saravanan 3 1 Department of Computer Science, Jayalakshmi Institute of
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
Configuring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
SERVICE DESCRIPTION Web Proxy
SERVICE DESCRIPTION Web Proxy Date: 14.12.2015 Document: Service description: Web Proxy TABLE OF CONTENTS Page 1 INTRODUCTION 3 2 SERVICE DESCRIPTION 4 2.1 Basic service 4 2.2 Options 6 2.2.1 Web Filter
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security
Chapter 12 Network Security Security Policy Life Cycle A method for the development of a comprehensive network security policy is known as the security policy development life cycle (SPDLC). Network Security
An Inspection on Intrusion Detection and Prevention Mechanisms
An Inspection on Intrusion Detection and Prevention Mechanisms Kanagadurga Natarajan 1, Aarthi Sadagopan 2 1, 2 Computer Science and Engineering, A.V.C.College of Engineering, Mannampandal, TamilNadu,
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved
Borderware Firewall Server Version 7.1 VPN Authentication Configuration Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com Overview The BorderWare Firewall Server
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
TS-301 Case Project Shaun DeRosa
TS-301 Case Project Shaun DeRosa Case Project 1-1: Defining and Designing a etwork Inventory: 6-24 port 10/100 es 3 - Firewalls to protect Accounting and Payroll/Order Proc., Research and Development and
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
Compliance Guide: PCI DSS
Compliance Guide: PCI DSS PCI DSS Compliance Compliance mapping using Huntsman INTRODUCTION The Payment Card Industry Data Security Standard (PCI DSS) was developed with industry support by the PCI Security
HP Insight Management Agents architecture for Windows servers
HP Insight Management Agents architecture for Windows servers Technology brief, 2 nd edition Introduction... 3 A first look at the Insight Management Agents architecture... 3 HP Insight Management agents...
Papermule Workflow. Workflow and Asset Management Software. Papermule Ltd
Papermule Workflow Papermule Workflow - the power to specify adaptive and responsive workflows that let the business manage production problems in a resilient way. Workflow and Asset Management Software
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
NERC CIP Version 5 and the PI System
Industry: Transmission/Distribution/Smarts Presented by NERC CIP Version 5 and the PI System Bryan Owen PE OSisoft Cyber Security Manager Agenda Update on OSIsoft Cyber Initiatives War Story CIP Version
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
