CyberDEW Een Distributed Early Warning Systeem ten behoeve van Cyber Security
|
|
|
- Shona Cross
- 10 years ago
- Views:
Transcription
1 THALES NEDERLAND B.V. AND/OR ITS SUPPLIERS. THIS INFORMATION CARRIER CONTAINS PROPRIETARY INFORMATION WHICH SHALL NOT BE USED, REPRODUCED OR DISCLOSED TO THIRD PARTIES WITHOUT PRIOR WRITTEN AUTHORIZATION BY THALES NEDERLAND B.V. AND/OR ITS SUPPLIERS, AS APPLICABLE. CyberDEW Een Distributed Early Warning Systeem ten behoeve van Cyber Security NCSRA-II Workshop Critical Infrastructures Frans Jansen
2 2 / Inhoud CyberDEW? Team Ervaringen met SBIR fase1 Intrusion Detection Wat is het, context, het probleem CyberDEW, haalbaarheids studie Onderzoeks vragen Oplossing (Technisch & businesswise) Waarde van de haalbaarheids studie
3 3 / CyberDEW?
4 4 / CyberDEW, a SBIR CyberSecurity project M. Bargh, R. Bakker ICT Security, Information Fusion, Sensors S. Choeni, D. Moolenaar, S. Verwer DataAnalysis, training, testsets THALES Research BL Security S. Iacob, T. Quillinan, P. de Oude InformationSecurity, Fusion, Distributed Datasharing W. Navest, F. Jansen BusinessPlan, System Architecture, Project leading
5 5 / Ervaringen met SBIR, fase1 Consortium tot stand gekomen netwerk Samenwerking 4 partijen, upfront taakverdeling, regelmatige meetings Strak geleid Goed bevallen. Smaakt naar meer Motivatie bedrijfsleven Kleinschalig project.. extern betaald gering risico Relatief gemakkelijk te starten Uitbreiden kennis & netwerk in nieuw domein
6 6 / Intrusion Detection
7 7 / Intrusion Prevention vs. Intrusion Detection Something s wrong Keep em out
8 8 / Intrusion Detection, taxonomy Intrusion Detection Systems, types Network based (NIDS) Based on network traffic promiscuous mode Host based (HIDS) application level Based on logs, O/S audit trails Login attempts, non-normal file access, abnormal sequence of sys calls Detection Methods Signature-based Search for patterns of known attacks. Compare with signatures Few false-positives, not suited for zero-day attacks Anomaly-based Look for out-of-norm behaviour Can detect new types, requires training/yields false positives
9 9 / Intrusion Detection, anomaly based Classical (statistical) Approach 1 st stage: build clean profile 2 nd stage: distinguish normal-anomalous using statistics Artificial Immune System Fingerprints (bit sequences) indicate allowed applications How to (best) represent behaviour in general Data Mining and Machine Learning Other methods Genetic algorithms/particle swarm search Clustering/fuzzy set theory Hierarchical neural networks Signal analysis (wavelet) Hidden Markov Models
10 10 / Intrusion Detection, the current situation Observations Rule based approach leads to False Positives & False Negatives Configuration is complex & environment specific Anomaly based Is hard, much time required to train the system Attacks have become more advanced Carried out in phases: reconnaissance/establishment/exploitation/2 nd spread Distributed out over time & place Attacks remain under the radar Statistical analysis averages out useful information No real false positives/negatives Weak Signals we have a problem
11 11 / CyberDEW, haalbaarheidsstudie
12 12 / CyberDEW, initial principles Mechanism (Clever) Attacks are carried out in phases Reconnaissance, intrusion, exploitation, secondary infection The principle Correlation & Fusion of (in themselves weak) signals can lead to detection Assumptions Causal relation between attack and observable events Change of traffic patterns in themselves too subtle to detect Users detect slowdown/different behaviour CERT alerts in general indicate attacks are going on Attack attempts are correlated in time & place Reconnaissance, carried out in batches temporal relation between scans Attacks simultaneously carried out (hide correlation, increase efficiency)
13 13 / CyberDEW, probleemstelling Causale modellen kunnen worden afgeleid van expert kennis? uitgebreid en getest worden met patronen uit verkeersdata? hoe partiële causale modellen combineren? Informatie van IDS en SIEM Zinvol & hoe efficient verzamelen & delen Wat nodig CyberDEW systeem veilig te maken? Hoe organisaties ertoe bewegen relevante info te delen? Wat is het meest realistische business model? Wat is marktgrootte en ROI? Verantwoordelijkheden van CyberDEW uitgever en gebruiker, hoe handhaven?
14 14 / An innovative solution. CyberDEW Value is found in the combination A solution based on Correlation & fusion using Dynamic Bayesian Networks Framework supports adding/adjusting parallel types of correlators Secure & Scalable Information sharing between nodes Combining information beyond the own domain Usage of heterogeneous information sources Attractive value-proposition for participants
15 15 / CyberDEW, Complex event detection... Alert CyberDEW Node Fuser Temporal correlator... Alert CyberDEW Node Fuser Temporal correlator Alert CyberDEW Node Alert CyberDEW Node Fuser Temporal correlator... Fuser Temporal correlator IDS IDS... IDS IDS IDS... IDS Correlator finds temporal and spatial correlations Fuser uses knowledge of local domain (probability thresholds) to decide if an alert needs to be fired
16 16 / Innovation, worked out further Informatie fusion collecting and combining of weak signals yields more than the sum of all parts IDS alerts Expert reports Intelligence reports (national entities NCSC/GOVCERT) User reports (social media, other organisations) Scalability and ease of configuration Data driven architecture (publish / subscribe) Modular fusion (partial fusion, hierarchically) Secure collaboration in information sharing Already proven in other projects (Martello) Contributor: has a say over contributed information System resilience (detect and counter sabotage)
17 17 / CyberDEW, Architecture ProcessingNode LeafNode
18 18 / CyberDEW, Expert & Analysis Process Integration Weak signals originate from physically distributed sources, e.g. IDS s running on different servers Information sources of physically distributed correlated events must be first collected in order to fuse them Dynamic Process Integration Framework (DPIF) supports integration of heterogeneous information sources and analysis processes (fusion algorithms) DPIF supports easy integration with 3 rd party tools Domain specific algorithms can be created with 3 rd party domain experts and could enrich the solution
19 19 / Example: Banking Domain
20 20 / Business perspectief Markt, daar naar toe & risico s Markt Dreigingen nemen toe 100% bescherming is niet mogelijk Behoefte aan monitoring & vroegtijdige alarmering stijgend Centrale overheid Go-to-market Initiële verkoop aan CyberDEW partners voor verdere ontwikkeling Thales verkooporganisatie (60 landen) + lokaal aanwezig (NL) Schaalbare & flexibele oplossing, competitief met IDS/IPS SOC Continue doorontwikkeling Risico s Ontwikkeling IDS/IPS, SOC
21 21 / Waarde Intrusion detectie door geavanceerde fusie Op basis van informatie sharing & processing framework Early warning met hogere betrouwbaarheid mogelijk Sterk afhankelijk van nauwkeurigheid van modellen Ontwikkelingstijd, 3 rd parties? Fuseert informatie uit veel/diverse bronnen Schaalbaar & toepasbaar op bestaande systemen Sterker naarmate breder
Requirements Lifecycle Management succes in de breedte. Plenaire sessie SPIder 25 april 2006 Tinus Vellekoop
Requirements Lifecycle Management succes in de breedte Plenaire sessie SPIder 25 april 2006 Tinus Vellekoop Focus op de breedte Samenwerking business en IT Deelnemers development RLcM en het voortbrengingsproces
Citrix Access Gateway: Implementing Enterprise Edition Feature 9.0
coursemonstercom/uk Citrix Access Gateway: Implementing Enterprise Edition Feature 90 View training dates» Overview Nederlands Deze cursus behandelt informatie die beheerders en andere IT-professionals
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
Market Intelligence & Research Services. CRM Trends Overview. MarketCap International BV Januari 2011
Market Intelligence & Research Services CRM Trends Overview MarketCap International BV Januari 2011 Index 1. CRM Trends generiek 2. CRM & IT 3. CRM in Nederland 2011 2 Index 1. CRM Trends generiek 2. CRM
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis
Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Maximizer Synergy. [email protected] BE 0415.642.030. Houwaartstraat 200/1 BE 3270 Scherpenheuvel. Tel: +32 495 300612 Fax: +32 13 777372
Maximizer Synergy Adafi Software is een samenwerking gestart met Advoco Solutions, een Maximizer Business Partner uit Groot Brittannië. Advoco Solutions heeft een technologie ontwikkeld, genaamd Synergy,
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Passive Logging. Intrusion Detection System (IDS): Software that automates this process
Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion
APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Data Driven Assessment of Cyber Risk:
Data Driven Assessment of Cyber Risk: Challenges in Assessing and Mitigating Cyber Risk Mustaque Ahamad, Saby Mitra and Paul Royal Georgia Tech InformationSecurity Center Georgia Tech Research Institute
OGH: : 11g in de praktijk
OGH: : 11g in de praktijk Real Application Testing SPREKER : E-MAIL : PATRICK MUNNE [email protected] DATUM : 14-09-2010 WWW.TRANSFER-SOLUTIONS.COM Real Application Testing Uitleg Real Application
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
+ Even voorstellen Barry Derksen, Directeur BITTI B.V., Bedrijf met 10 toppers op : benchmark, advies, audit en interim/ project management
Business & IT alignment ABC...van WORST practices! Barry Derksen + Even voorstellen Barry Derksen, Directeur BITTI B.V., Bedrijf met 10 toppers op : benchmark, advies, audit en interim/ project management
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
IC Rating NPSP Composieten BV. 9 juni 2010 Variopool
IC Rating NPSP Composieten BV 9 juni 2010 Variopool AGENDA: The future of NPSP Future IC Rating TM NPSP Composieten BV 2 Bottom line 3 Bottom line 4 Definition of Intangibles The factors not shown in the
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Is het nodig risico s te beheersen op basis van een aanname..
Is het nodig risico s te beheersen op basis van een aanname.. De mens en IT in de Zorg Ngi 19 april 2011 René van Koppen Agenda Er zijn geen feiten, slechts interpretaties. Nietzsche Geen enkele interpretatie
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
Assuring the Cloud. Hans Bootsma Deloitte Risk Services [email protected] +31 (0)6 1098 0182
Assuring the Cloud Hans Bootsma Deloitte Risk Services [email protected] +31 (0)6 1098 0182 Need for Assurance in Cloud Computing Demand Fast go to market Support innovation Lower costs Access everywhere
Asset Management in praktijk AMC Seminar 8 november Bertrand van Leersum, ATO
Asset Management in praktijk AMC Seminar 8 november Bertrand van Leersum, ATO Europa investeert in uw toekomst uit het Europese fonds voor regionale ontwikkeling Over ATO Wind Energy Link B.V. Project
TIA Portal Innovations 2015. Remote access
TIA Portal Innovations 2015 Remote access Wat is het verschil tussen telecontrol en teleservice? Page 2 Remote Access Telecontrol Proces variabelen centraal verzamelen Permanente verbinding of event driven
Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?
Contents Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Motivation and basics (Why and what?) IDS types and principles Key Data Problems with
INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH
INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH INTRODUCTION: WHO S IN YOUR NETWORK? The days when cyber security could focus on protecting your organisation s perimeter
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
Realization of Security Events Management System via OPENSTF
Realization of Security Events Management System via OPENSTF Lance Yoo www.antpower.org Requirements Analysis of Security Event Management Background of Security Event Management Requirement We could not
HR Transformation and Future of HR Brussel, 25 april 2013 Material part 1/2
HR Transformation and Future of HR Brussel, 25 april 2013 Material part 1/2 Doelstellingen Ideeën uitwisselen over hoe een HR transformatie te starten Ervaringen delen over hoe HR toegevoegde waarde kan
Uniface 9.7.01 en PostgreSQL, de eerste ervaringen
Uniface 9.7.01 en PostgreSQL, de eerste ervaringen Arjen van Vliet Solution Consultant donderdag 26 november 2015 Agenda 1. Wat gebeurt er in de database markt? 2. Kenmerken van PostgreSQL 3. Stappenplan
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
Intrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
NL VMUG UserCon March 19 2015
NL VMUG UserCon March 19 2015 VMware Microsoft Let's look beyond the war on checkbox compliancy. Introductie Insight24 Technologie is een middel, geen doel 3x M (Mensen, Methoden, Middelen) & Organisatie
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
A Novel Solution on Alert Conflict Resolution Model in Network Management
A Novel Solution on Alert Conflict Resolution Model in Network Management Yi-Tung F. Chan University of Wales United Kingdom [email protected] Ramaswamy D.Thiyagu University of East London United
Ecom Infotech. Page 1 of 6
Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance
12/17/2012. Business Information Systems. Portbase. Critical Factors for ICT Success. Master Business Information Systems (BIS)
Master (BIS) Remco Dijkman Joris Penders 1 Portbase Information Office Rotterdam Harbor Passes on all information Additional services: brokering advanced planning macro-economic prediction 2 Copyright
Journal of Internet Banking and Commerce
Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, December 2009, vol. 14, no.3 (http://www.arraydev.com/commerce/jibc/)
Online Network Traffic Security Inspection Using MMT Tool
Online Network Traffic Security Inspection Using MMT Tool Wissam Mallouli, Bachar Wehbi, Edgardo Montes de Oca Michel Bourdellès, Denis Rocher and Arnaud Baloche Montimage EURL, 39 rue Bobillot, 75013
GE Measurement & Control. Cyber Security for NERC CIP Compliance
GE Measurement & Control Cyber Security for NERC CIP Compliance GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used for purposes
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges [email protected] Rayford B. Vaughn [email protected] 23 rd National Information Systems Security Conference
Network Assessment Client Risk Report Demo
Network Assessment Client Risk Report Demo Prepared by: Henry Knoop Opmerking: Alle informatie in dit rapport is uitsluitend bestemd voor gebruik bij bovenvermelde client. Het kan vertrouwelijke en persoonlijke
SIEM is only as good as the data it consumes
SIEM is only as good as the data it consumes Key Themes The traditional Kill Chain model needs to be updated due to the new cyber landscape A new Kill Chain for detection of The Insider Threat needs to
The Base Rate Fallacy and its Implications for the Difficulty of Intrusion Detection
The Base Rate Fallacy and its Implications for the Difficulty of Intrusion Detection Stefan Axelsson Presented by Kiran Kashalkar Agenda 1. 1. General Overview of of IDS 2. 2. Bayes Theorem and Base-Rate
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats
How to manage Business Apps - Case for a Mobile Access Strategy -
How to manage Business Apps - Case for a Mobile Access Strategy - Hans Heising, Product Manager Gábor Vida, Manager Software Development RAM Mobile Data 2011 Content Introduction 2 Bring your own device
Getting the Most Out of SIEM. Presentation Title. Data in Big Data. Presented By: Dr. Char Sample, CERT
Getting the Most Out of SIEM Presentation Title Data in Big Data Presented By: Dr. Char Sample, CERT Acknowledgements Dr. Ben Shniederman, UMD Big Data Big Insights George Jones, John Stogoski, CERT Alternatives
tablet technologie in het onderwijs
tablet technologie in het onderwijs prof. dr. marcus specht Centre for Learning Sciences and Technologies Open Universiteit Nederland [email protected] twitter, flickr, facebook: marcuspecht 1 OUNL and
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
How to Detect and Prevent Cyber Attacks
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
Big Data-ready, Secure & Sovereign Cloud
Copernicus Big Data Workshop Big Data-ready, Secure & Sovereign Cloud A Technology Enabler for Copernicus Data Innovation March 14 th, 2014 Brussels F. BOUJEMAA R&D Manager E. MICONNET - Head of Cyber
COUNTERSNIPE WWW.COUNTERSNIPE.COM
COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0 CounterSnipe s version 7.0 is their next major release and includes a completely new IDS/IPS leveraging high performance scalability
Situational Awareness Through Network Visualization
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Situational Awareness Through Network Visualization Pacific Northwest National Laboratory Daniel M. Best Bryan Olsen 11/25/2014 Introduction
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
The Business case for monitoring points... PCM architecture...
The Business case for monitoring points... Points Condition Monitoring (PCM) measures key parameters related to the performance of switch machines and turnouts in real time at every movement. Intelligent
SureSense Software Suite Overview
SureSense Software Overview Eliminate Failures, Increase Reliability and Safety, Reduce Costs and Predict Remaining Useful Life for Critical Assets Using SureSense and Health Monitoring Software What SureSense
Network Security Monitoring
CEENET/GEANT Security Workshop Sofia, 2014 Network Security Monitoring An Introduction to the world of Intrusion Detection Systems Irvin Homem [email protected] Stockholm University Who am I? Of Indian and
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Risk-Based Monitoring
Risk-Based Monitoring Evolutions in monitoring approaches Voorkomen is beter dan genezen! Roelf Zondag 1 wat is Risk-Based Monitoring? en waarom doen we het? en doen we het al? en wat is lastig hieraan?
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Bio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES
CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something
Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined
Niara Security Intelligence Threat Discovery and Incident Investigation Reimagined Niara enables Compromised user discovery Malicious insider discovery Threat hunting Incident investigation Overview In
Intrusion Detection from Simple to Cloud
Intrusion Detection from Simple to Cloud ICTN 6865 601 December 7, 2015 Abstract Intrusion detection was used to detect security vulnerabilities for a long time. The methods used in intrusion detection
Segurança Redes e Dados
Segurança Redes e Dados I N T R U S Õ E S 2 0 1 2 / 2 0 1 2 M A N U E L E D U A R D O C O R R E I A P E D R O B R A N D Ã O Slides are based on slides by Dr Lawrie Brown (UNSW@ADFA) for Computer Security:
Instructies Tester Update DEHNrecord DRC LC M3
NL GB Instructies Tester Update DEHNrecord DRC LC M3 M3+ Bliksembeveiliging Overspanningsbeveiliging Veiligheidsmateriaal Vertegenwoordigd door: Conduct Nederland Stockholm 31 2993 LM Barendrecht Tel.
The new release of Oracle BI 11g R1
The new release of Oracle BI 11g R1 Daan Bakboord Oracle BI Consultant Scamander Solutions OGH 15 September 2010 Informatie als strategisch wapen Even voorstellen (1) Scamander Ik beschik niet snel en
BSNL IDC Hosted Firewall Service. Total Network Security
Total Network Security Advantage BSNL IDC India s first Uptime Institute Certified Tier-III data centres with combined connectivity and IT services availability from BSNL Low latency Internet Data Centres
Security strategies to stay off the Børsen front page
Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the
you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services
MSSP you us are a Managed Security Service Provider looking to offer Advanced Malware Protection Services Lastline is the only company with 10+ years of academic research focused on detecting advanced
Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc
Tunisia s experience in building an ISAC Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc 1 Agenda Introduction ISAC objectives and benefits Tunisian approach SAHER system
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Active Response: Automated Risk Reduction or Manual Action?
SESSION ID: CRWD-01 Active Response: Automated Risk Reduction or Manual Action? sec ops dream Monzy Merza Chief Security Evangelist Splunk @monzymerza Agenda Active Response Drivers Facets of Active Response
SURFnet Dashboard. Concept, Impressions and ideas. [email protected]. High quality internet for higher Education and Research
1 SURFnet Concept, Impressions and ideas [email protected] High quality internet for higher Education and Research 2 SURFnet Value Added Services Definition VAS is a collection of tools, knowledge
