How to build a Carrier-Grade Defense-Shield. Dr. Antonio Nucci Chief Technology Officer, Narus Inc.
|
|
|
- Kristian Murphy
- 10 years ago
- Views:
Transcription
1 How to build a Carrier-Grade Defense-Shield Dr. Antonio Nucci Chief Technology Officer, Narus Inc.
2 Agenda Security Market Landscape Approach to Efficiently and Shortly Detect DDoS/Worms 2
3 Take a walk on the Security Landscape
4 Backbone Market Evolution P A S T P R E S E N T F U T U R E Carriers treated data as opaque - Bits were bits - they just passed traffic Security was firewall based - Endpoints were under attack, but not the network itself - Fewer IP security risks (mostly viruses) Security based on Firewalls - Enough to protect the networks Traditional carriers evolve - Data outpaces circuit switched - IP/MPLS Super-core emerges - FM Convergence CodeRed worm changed the threat landscape -Security threats became commercially motivated - Threats targeted network rather than endpoints - Networks are larger and more open - Attacks are highly distributed (DDoS) Security based on IDS/IPS - Appliances start to scale at very high-speed line-rate - Enough to protect the network from DoS/DDoS IF close to the victim - The appliance model is TOO expensive Full IP Convergence: any network, any device - IMS Super-access will emerge - Carriers will monetize IP Services New types of potential threats emerge - Threads will target more and more IP services - Attacks will be more and more distributed - Polymorphic worms will emerge Security based on IP Systems - From Appliances to Systems - Ability to collect information from any network element - Ability to have fine-granularity visibility into traffic - Ability to digest large amount 4 of traffic
5 Market Snapshot 2001 A b i l i t y t o E x e c u t e Challengers Leaders Cisco Check Point Microsoft Symantec SonicWall Secure Computing Network-1 NetScreen $2.4B Market Single category Borderware WatchGuard Niche Players Visionaries M a t u r i t y o f V i s i o n Gartner Magic Quadrant for Firewalls update
6 Backbone Market Evolution P A S T P R E S E N T F U T U R E Carriers treated data as opaque - Bits were bits - they just passed traffic Security was firewall based - Endpoints were under attack, but not the network itself - Fewer IP security risks (mostly viruses) Security based on Firewalls - Enough to protect the networks Traditional carriers evolve - Data outpaces circuit switched - IP/MPLS Super-core emerges - FM Convergence CodeRed worm changed the threat landscape -Security threats became commercially motivated - Threats targeted network rather than endpoints - Networks are larger and more open - Attacks are highly distributed (DDoS) Security based on IDS/IPS - Appliances start to scale at very high-speed line-rate - Enough to protect the network from DoS/DDoS IF close to the victim - The appliance model is TOO expensive Full IP Convergence: any network, any device - IMS Super-access will emerge - Carriers will monetize IP Services New types of potential threats emerge - Threads will target more and more IP services - Attacks will be more and more distributed - Polymorphic worms will emerge Security based on IP Systems - From Appliances to Systems - Ability to collect information from any network element - Ability to have fine-granularity visibility into traffic - Ability to digest large amount 6 of traffic
7 Market Snapshot 2004 Challengers Leaders $8B A b i l i t y t o E x e c u t e Cisco Check Point Juniper Microsoft Forntinet Secure Computing NetContinuum WatchGuard F5 StoneSoft ipolicy CyberGuard SonicWall Whale Symantec Teros WatchFire Kavado Much broader category New set of leaders Network Firewall Web Application Firewall Niche Players Visionaries M a t u r i t y o f V i s i o n Gartner Magic Quadrant for Firewalls update
8 Backbone Market Evolution P A S T P R E S E N T F U T U R E Carriers treated data as opaque - Bits were bits - they just passed traffic Security was firewall based - Endpoints were under attack, but not the network itself - Fewer IP security risks (mostly viruses) Security based on Firewalls - Enough to protect the networks Traditional carriers evolve - Data outpaces circuit switched - IP/MPLS Super-core emerges - FM Convergence CodeRed worm changed the threat landscape -Security threats became commercially motivated - Threats targeted network rather than endpoints - Networks are larger and more open - Attacks are highly distributed (DDoS) Security based on IDS/IPS - Appliances start to scale at very high-speed line-rate - Enough to protect the network from DoS/DDoS IF close to the victim - The appliance model is TOO expensive Full IP Convergence: any network, any device - IMS Super-access will emerge - Carriers will monetize IP Services New types of potential threats emerge - Threads will target more and more IP services - Attacks will be more and more distributed - Polymorphic worms will emerge Security based on IP Systems - From Appliances to Systems - Ability to collect information from any network element - Ability to have fine-granularity visibility into traffic - Ability to digest large amount 8 of traffic
9 A New Category Emerges Technology inflection Rapidly expanding protocols and services (VOIP, Mobile-IP, IMS) Inflections demand next generation performance Today s architectures provide limited scaling Services require capture layer 3,4&7 data at OC48 and OC192 speeds Increasing Demand over time Few entrants, very little competition Technology inflection + market acceptance + little competition = a new category 9
10 Security Defense-Shield: Requirements Full Control of the Network requires a Unified Vision of the Network Point Solutions can be ineffective for distributed attacks IP Traffic Granularity Centralized Normalization and Correlation of multiple source of data Cutting-edge Algorithms Adaptive Efficient Scalable High-performance 10
11 Let s take a snapshot at the market Network Visibility Traffic Elements Others IDS/IPS Firewall Switch Router Layer 7 Layer 4 Layer 3 No Full No Full No Partial Full Enterprise Carrier Edge Carrier Core (FM) (FM) Correlation Narus CloudShield Q1 Labs/ArcSight Arbor Peakflow Juniper Netscreen Cisco (5600,NIDS,PCube)
12 Bounce the Attacks at the Edge: Defense-Shield Attackers Example: DDoS and Worms Attackers Attackers ISP #2 dd e e nn ISP #1 lleeaa CC rree o o CC Attackers Attackers Attackers
13 Attacking a System is equivalent to Perturbing its Equilibrium-Point Each Element in the Universe obeys to Physical Laws Any perturbation applied to any stable system breaks the system s equilibrium Internet is a Physical System that obeys to Physical Laws Internet Traffic is structured in some ways (invariant component) and very random in others (variant component) Users are methodic and unpredictable at the same time Threads represents a deterministic actions that affect the equilibrium of the system: Strong Temporal Coordination across Attackers (DDoS) Abnormal large host-population contacted by Infected Host (Worm) 13
14 Detect a perturbation of equilibrium-point Information Entropy: DDoS, Worms, etc, disrupt over time the structure and randomness of key traffic features Information Entropy is a powerful operator to detect a change in traffic distribution on-fly: Skew-distribution: low-entropy / Flat-distribution: high-entropy Information Entropy can be well approximated by well-known data mining algorithms Requires a few CPU cycles X H i = p log2 X p P i Requires bounded memory DDoS & Worms disrupt the key-feature distributions p 14
15 Change of distributions when under attack, example Worm Key Traffic Features: <SrcIP>, <srcport>, <dstip>, <dstport>, <FlowSize>: A few srcip -> many dstip Specific Application Vulnerability -> ONE dstport (it can be different) Small flows become dominant srcip dstip srcip dstip dstport FlowSize dstport FlowSize 15
16 High-Level Sketch of the Algorithm: example, Worms Step #1: Based on Layer-4 information Extract the marginal distributions of five key features: o <SrcIP>, <DstIP>, <SrcPort>, <DstPort>, <FlowSize> Compute Entropy for the above marginal distributions Mark malicious flows as suspicious Hosts for which a deviation of the GlobalMetric is observed Generate a flow-filter mask using key features for which a drop in the entropy is observed Example, <SrcIP,DstPort,FlowSize> Step #2: Based on Layer-7 information Apply flow-filter mask to isolate and deeply-analyze ONLY suspicious flows Extract Worm-Signatures ONLY for suspicious hosts Rabin, Longest-Common-SubString, Longest-SubSequenceString, etc 16
17 Algorithm in action: Tier-1 Wireless Network Anomalies 17
18 Results from Tier-1 Network (Sasser): TCP Port 445 The 1 st Hour The first uptick in TCP Port 445 traffic happened on 8/31/05 between 9:00 to 10:00 AM This NarusView drilldown on the first hour revealed that TCP Port 445 traffic was generated almost totally by one Subscriber Client X During the first hour, a distinctly deterministic number of sessions (e.g., 4) were set up by subscriber X to numerous IP servers, symptomatic of worm propagation 18
19 Results from Tier-1 Network (Sasser): TCP Port 445 The 13 th Hour The second significant uptick in TCP Port 445 traffic happened 12 hours later, from 9:00 to 10:00 PM on 8/31/05 This NarusView drilldown on the 13th hour revealed that the number of Subscriber Clients generating TCP Port 445 traffic had grown to 6 On the 13th hour, distinctly deterministic number of sessions (e.g., 4, 14) were set up to numerous IP and Subscriber servers, again symptomatic of worm propagation 19
20 Results from Tier-1 Network (Sasser): TCP Port 445 The 21 st and 22 nd Hours The third significant uptick in TCP Port 445 traffic happened 7 hours later, from 5:00 to 7:00 AM on 9/1/05 This NarusView drilldown on the 21 st and 22 nd hours revealed that the list of Subscriber Clients generating TCP Port 445 traffic had grown further to 12 During the 21 st and 22nd hours, distinctly deterministic number of sessions continued to be set up to numerous IP and Subscriber servers, symptomatic of worm propagation 20
21 Thanks Thanks QUESTIONS? Thanks Thanks Thanks Thanks 21
Firewall Market Trends
Markets, R. Stiennon Research Note 19 June 2003 Magic Quadrant for Enterprise Firewalls, 1H03 Deep packet inspection technology is driving the firewall market to an inflection point that is characterized
CIO Update: The Gartner Firewall Magic Quadrant for 2H02
IGG-09252002-03 R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
CISCO IOS NETFLOW AND SECURITY
CISCO IOS NETFLOW AND SECURITY INTERNET TECHNOLOGIES DIVISION FEBRUARY 2005 1 Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
Glasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Protecting against DoS Attacks
Protecting against DoS Attacks Glen Salomon Regional Account Manager 1 The need for DoS Protection 2 DDoS Attacks DDoS attacks were the second-most expensive cyber crime in 03/ 04 (CSI/FBI 2004 Computer
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Hillstone Intelligent Next Generation Firewall
Hillstone Intelligent Next Generation Firewall Kris Nawani Solution Manager (Thailand) 12 th March 2015 1 About Hillstone Networks Founded 2006 by Netscreen visionaries World class team with security,
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
Internet Content Provider Safeguards Customer Networks and Services
Internet Content Provider Safeguards Customer Networks and Services Synacor used Cisco network infrastructure and security solutions to enhance network protection and streamline compliance. NAME Synacor
聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問
聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 主 講 人 : 廖 國 宏 Jerry Liao 職 稱 : 技 術 顧 問 Each attack instance can be slightly different 攻 擊 模 式 有 些 微 的 不 同 Domains are rotated in days, even hours 攻 擊 主 機 位 置
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
Integrated Protection for Systems. João Batista [email protected] Territory Manager
Integrated Protection for Systems João Batista [email protected] Territory Manager 2 McAfee Overview Proven Expertise And what it means to you Proof of Expertise Impact of Expertise 1 17 100 300
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2009-2010 Projecto de Rede / Sistema - Network / System Design 1 Hierarchical Network Design 2 Hierarchical
Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help
Plugging Network Security Holes using NetFlow Loopholes in todays network security solutions and how NetFlow can help About ManageEngine Network Servers & Applications Desktop ServiceDesk Windows Infrastructure
Security and Access Control Lists (ACLs)
Security and Access Control Lists (ACLs) Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Security Threats Access Control List Fundamentals Access
Benefits. Product Overview. There is nothing more important than our customers. DATASHEET
DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate
Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1
C b Th Cyber Threatt Defense D f S Solution l ti Moritz Wenz, Lancope 1 The Threat Landscape is evolving Enterprise Response Antivirus (Host-Based) IDS/IPS (Network Perimeter) Reputation (Global) and Sandboxing
CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006
CSE331: Introduction to Networks and Security Lecture 18 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Attacker
Braindumps.700-295.50.QA
Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me
Der Weg, wie die Verantwortung getragen werden kann!
Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Benefits. Product Overview. There is nothing more important than our customers. DATASHEET
DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate
DEPLOYING VoIP SECURELY
DEPLOYING VoIP SECURELY Everyone knows that Voice-over-IP (VoIP) has been experiencing rapid growth. Even still, you might be surprised to learn that: 10% of all voice traffic is now transmitted with VoIP
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu Dept. of Information Engineering Chinese University of Hong Kong Email: [email protected] D. M. Chiu
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014 [email protected]
How Lastline Has Better Breach Detection Capabilities By David Strom December 2014 [email protected] The Internet is a nasty place, and getting nastier. Current breach detection products using traditional
Cloud Based Secure Web Gateway
Cloud Based Secure Web Gateway DR160203 March 2016 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Product Tested... 4 Test Focus... 4 How We Did It... 5 Test Bed Setup... 5 Test
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
DDoS Threat Report. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends
Report of Independent Auditors
Ernst & Young LLP Suite 3300 370 17th Street Denver, Colorado 80202-5663 Tel: +1 720 931 4000 Fax: +1 720 931 4444 www.ey.com Report of Independent Auditors To the Management of NTT America, Inc.: We have
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Symantec Security Information Manager Version 4.7
Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION Stephen Gates Chief Security Evangelist Corero Network Security Session ID: SEC-W04 Session Classification: Intermediate Recent Headlines Are Denial of
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
Network Immunity Solution. Technical White paper. ProCurve Networking
ProCurve Networking Network Immunity Solution Technical White paper Introduction... 2 Current Security Threats... 2 Solutions for Internal Threat Protection... 2 Network Immunity Solution: What It Is and
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview October 2010 Matias Cuba - Regional Sales Manager Northern Europe About Palo Alto Networks Palo Alto Networks is the Network
Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop
White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization
PART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats
Solution Overview Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats What You Will Learn The network security threat landscape is ever-evolving. But always
Security Information & Event Manager (SIEM)
DATA SHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Benefits Enables NOC and SOC staff to
JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM
JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM May 2015 Nguyễn Tiến Đức ASEAN Security Specialist Agenda Modern Malware: State of the Industry Dynamic Threat Intelligence on the Firewall
The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System
The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System Top Layer Networks, Inc. Enterprises without a sound intrusion prevention strategy across the three threat
Securing and Monitoring BYOD Networks using NetFlow
Securing and Monitoring BYOD Networks using NetFlow How NetFlow can help with Security Analysis, Application Detection and Traffic Monitoring Don Thomas Jacob Technical Marketing Engineer ManageEngine
AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Exemplos de Projecto - Network Design Examples 1 Hierarchical Network Design 2 Hierarchical
Innovations in Network Security
Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.
Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
Network Performance Monitoring at Minimal Capex
Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic
A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic John Week University of Nevada, Reno United States Email:[email protected] Phone: (775) 741-1555 Polina Ivanova University of Nevada,
Cheap and efficient anti-ddos solution
Cheap and efficient anti-ddos solution Who am I? Alexei Cioban Experience in IT 13 years CEO & Founder IT-LAB 7 years IT trainings 5 years 2 About company Year of foundation - 2007 12 employees www.it-lab.md
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance
WatchGuard Gateway AntiVirus
Gateway AntiVirus WatchGuard Gateway AntiVirus Technical Brief WatchGuard Technologies, Inc. Published: March 2011 Malware Continues to Grow New and ever-changing threats appear with alarming regularity,
The changing face of global data network traffic
The changing face of global data network traffic Around the turn of the 21st century, MPLS very rapidly became the networking protocol of choice for large national and international institutions. This
FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem
FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
