DDoS Open Threat Signaling (DOTS) Working Group. draft-ietf-dots-use-cases-00
|
|
|
- Homer Owens
- 10 years ago
- Views:
Transcription
1 DDoS Open Threat Signaling (DOTS) Working Group draft-ietf-dots-use-cases-00 Roland Dobbins Arbor Networks Stefan Fouant Corero Network Security Daniel Migault Ericsson Robert Moskowitz HTT ConsulAng Nik Teague Verisign Liang Frank Xia Huawei
2 IntroducAon & Context 2
3 draft-ietf-dots-use-cases-00 Summary Provides example use-cases for DOTS (actually, categories). All examples can be CE/PE or PE/PE. Room for wide variation within each category (see 4.1.1). All DOTS communications in each example can be directly between DOTS servers and DOTS clients, or mediated by DOTS relays. DOTS relays can forward messages between DOTS clients and servers using either stateless transport, stateful transport, or a combination of the two. DOTS relays can aggregate service requests, status messages, and responses. DOTS relays can filter service requests, status messages, and responses 3
4 draft-ietf-dots-use-cases-00 Summary (cont.) Use-cases in -00 are not exhaustive, are illustrative. Use-cases in -00 focus on DDoS mitigation using dedicated mitigation devices. S/RTBH, flowspec, OpenFlow, etc. can also be used to leverage network infrastructure for DDoS mitigation use-case in this presentation illustrates full DOTS communications cycle, variants. Other use-cases in this presentation are summarized diffs illustrating DOTS communications model in widely varying circumstances. Use-cases in this presentation focus on protecting servers under DDoS attack on destination networks. DOTS can also be used to suppress attack traffic on origin networks or as it traverses intermediary networks. 4
5 4.1 - Primary Use Cases 5
6 ReflecAon/AmplificaAon CPE or PE MiAgators Request Upstream DDoS MiAgaAon DDoS AYacks 6
7 7
8 8
9 9
10 10
11 DDoS a&ack ini+ated. 11
12 A&ack mi+gated on- prem. 12
13 On- prem mi+ga+on capacity exceeded. 13
14 On- prem mi+ga+on capacity exceeded. 14
15 DOTS client signals for upstream mi+ga+on. 15
16 DOTS server acknowledges mi+ga+on request, mi+ga+on ini+ated. 16
17 Mi+ga+on in progress. 17
18 Status messages exhanged during mi+ga+on efficacy, mi+ga+on status, etc. 18
19 A&ack terminated. 19
20 Mi+ga+on status change message transmi&ed. 20
21 Mi+ga+on termina+on service request. 21
22 Mi+ga+on termina+on service acknowledgement. 22
23 Mi+ga+on terminated, return to status quo ante. 23
24 DOTS communica+on rela+onships. 24
25 ReflecAon/AmplificaAon VariaAon with DOTS Relay MediaAng CommunicaAons DDoS AYacks 25
26 26
27 27
28 Mi+ga+on in progress. 28
29 Mi+ga+on in progress. 29
30 DOTS communica+on rela+onships. 30
31 ReflecAon/AmplificaAon VariaAon with Overlay DDoS MiAgaAon Service Provider DDoS AYacks 31
32 32
33 Mi+ga+on in progress. 33
34 DOTS communica+on rela+onships. 34
35 ReflecAon/AmplificaAon VariaAon with MulAple Upstream DDoS MiAgaAon Providers DDoS AYacks 35
36 36
37 Mi+ga+on in progress. 37
38 Mi+ga+on status messaging between providers. 38
39 DOTS communica+on rela+onships. 39
40 4.1.2 Network Infrastructure ReflecAon/AmplificaAon Device Requests Upstream DDoS DDoS AYacks MiAgaAon 40
41 41
42 Mi+ga+on in progress. 42
43 DOTS communica+on rela+onships. 43
44 ReflecAon/AmplificaAon AYack Telemetry DetecAon/ ClassificaAon System Requests Upstream DDoS AYacks DDoS MiAgaAon 44
45 45
46 Mi+ga+on in progress. 46
47 DOTS communica+on rela+onships. 47
48 ReflecAon/AmplificaAon Targeted Service/ApplicaAon DDoS AYacks Requests Upstream DDoS MiAgaAon 48
49 49
50 Mi+ga+on in progress. 50
51 DOTS communica+on rela+onships. 51
52 ReflecAon/AmplificaAon Manual Web Portal Request to Upstream MiAgator DDoS AYacks 52
53 53
54 Mi+ga+on in progress. HTTP/S between Web browser & DOTS client on Web portal. 54
55 Mi+ga+on in progress. HTTP/S between Web browser & DOTS client on Web portal. 55
56 Communica+on rela+onships. DOTS on upstream mi+ga+on network only. 56
57 ReflecAon/AmplificaAon Manual Mobile Device ApplicaAon Request to Upstream DDoS AYacks MiAgator 57
58 58
59 Mi+ga+on in progress. 59
60 DOTS communica+on rela+onships. 60
61 s Unsuccessful CPE or PE ReflecAon/AmplificaAon MiAgator Request for Upstream DDoS AYacks DDoS MiAgaAon 61
62 62
63 Mi+ga+on in progress. 63
64 Another a&ack ini+ated, different target. 64
65 Mi+ga+on service request refused due to mi+ga+on capacity constraints. 65
66 DOTS communica+on rela+onships. 66
67 4.2 - Ancillary Use Cases 67
68 4.2.1 Auto-Registration Beyond attack mitigation requests, responses, and status messages, DOTS can also be useful for administrative tasks. Administrative tasks are a significant barrier to effective DDoS mitigation. DOTS clients with appropriate credentials can auto-register with DOTS servers on upstream mitigation networks. This helps with DDoS mitigation service on-boarding, moves/adds/changes. 68
69 4.2.2 Automatic Provisioning of DDoS Countermeasures DDoS countermeasure provisioning today is a largely manual process, errors and inefficiency can be problematic. This can lead to inadequately-provisioned DDoS mitigation services which often are not optimized for the assets under DDoS protection. Mitigation rapidity, efficacy suffers. On-boarding organizations during an attack an all-toocommon situation can be very challenging. The self-descriptive nature of DOTS registration and mitigation status requests can be leveraged to automate the countermeasure selection, provisioning, and tuning process. Mitigation efficacy feedback from DOTS clients to DOTS servers during an attack can be leveraged for real-time mitigation tuning and optimization. 69
70 4.2.3 Informational DDoS Attack Notification to Third Parties In addition to service requests from organizations under attack to upstream mitigators, DOTS can be used to send DDoS attack notification and status messages to interested and authorized third parties. It may be beneficial in some circumstances to automatically provide attack notifications and status messages econdary or tertiary backup mitigation providers, security researchers, vendors, law enforcement agencies, regulatory agencies, etc. Any such sharing of information with third parties should only take place in accordance with all relevant laws, regulations, contractual obligations, privacy and confidentiality agreements. 70
71 s Next ReflecAon/AmplificaAon Steps for Use- Cases DDoS Drac AYacks 71
72 To-Do List for draft-dots-ietf-use-cases-01 Fix typos (doh!). Remove duplicative verbiage. Wordsmith phrasing for clarity. Present use-cases via diffs i.e., refer to commonalities with other use-cases, emphasize specific factors unique to each use-case. Reconcile definitions of terminology with dots-ietfrequirements draft. Add use-cases illustrating suppression of DDoS attack traffic on origin networks, filtering on intermediate networks. Add use-cases illustrating specific PE-PE scenarios (e.g., overflow requests for additional DDoS mitigation capacity, etc.). 72
73 Request for Feedback from WG Participants What should we add? What should we remove? What should we change? Should we include variations (via diffs ) on each use-case similar to what was done with in this presentation? Other input? 73
74 This Presentation
75 DDoS Open Threat Signaling (DOTS) Working Group Thank you! Roland Dobbins Arbor Networks Stefan Fouant Corero Network Security Daniel Migault Ericsson Robert Moskowitz HTT ConsulAng Nik Teague Verisign Liang Frank Xia Huawei
DDoS Open Threat Signaling (DOTS) Working Group. Operational Requirements. Chris Morrow <morrowc@ops- netman.net> Network Security Engineer, Google
DDoS Open Threat Signaling (DOTS) Working Group Operational Requirements Chris Morrow Network Security Engineer, Google Roland Dobbins Principal Engineer,
How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address
Inter-provider Coordination for Real-Time Tracebacks Kathleen M. Moriarty 2 June 2003 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations, conclusions, and
RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.
: Real-time Inter-network Defense Against Denial of Service Attacks Kathleen M. Moriarty 22 October 2002 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations,
IPFIX IE Extensions for DDoS Attack Detection draft-fu-dots-ipfix-extension-01
IPFIX IE Extensions for DDoS Attack Detection draft-fu-dots-ipfix-extension-01 Tianfu Fu [email protected] Dacheng Zhang [email protected] Liang Xia (Frank) [email protected] Min Li
DDOS Mi'ga'on in RedIRIS. SIG- ISM. Vienna
DDOS Mi'ga'on in RedIRIS SIG- ISM. Vienna Index Evolu'on of DDOS a:acks in RedIRIS Mi'ga'on Tools Current DDOS strategy About RedIRIS Spanish Academic & research network. Universi'es, research centers,.
Security Intelligenece: tracking obfuscated and unrecognized attacks. 2014 Check Point Software Technologies Ltd.
Security Intelligenece: tracking obfuscated and unrecognized attacks 2014 Check Point Software Technologies Ltd. Security Policy Rule Types: 1 Access People, Applications, Services, Servers, Data 2 Threat
Scalable DDoS mitigation using BGP Flowspec
Scalable DDoS mitigation using BGP Flowspec Wei Yin TAY Consulting Systems Engineer Cisco Systems 2010 Cisco and/or its affiliates. All rights reserved. Goals of DDoS Mi,ga,on Problem descrip,on Tradi,onal
Distributed Denial of Service Attacks & Defenses
Distributed Denial of Service Attacks & Defenses Guest Lecture by: Vamsi Kambhampati Fall 2011 Distributed Denial of Service (DDoS) Exhaust resources of a target, or the resources it depends on Resources:
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio [email protected] May 2013
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio [email protected] May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes
Introduction to DDoS Attacks. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
Introduction to DDoS Attacks Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News Q1 2014 DDoS Attack Trends DDoS Attack Trends Q4 2013 Mobile devices
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
White Paper: Librestream Security Overview
White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing
IS-IS Extensions for Flow Specification
IS-IS Extensions for Flow Specification draft-you-isis-flowspec-extensions-01 Jianjie You ([email protected]) Qiandeng Liang ([email protected]) Keyur Patel ([email protected]) Peng Fan ([email protected])
Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.
Distributed Denial of Service (DDoS) attacks Imminent danger for financial systems Presented by Tata Communications Arbor Networks 1 Agenda Importance of DDoS for BFSI DDoS Industry Trends DDoS Technology
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
How To Block A Ddos Attack On A Network With A Firewall
A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
IndusGuard Web Application Firewall Test Drive User Registration
IndusGuard Web Application Firewall Test Drive User Registration Document Version 1.0 24/06/2015 Confidentiality INDUSFACE HAS PREPARED THIS DOCUMENT FOR INTERNAL PURPOSE. NEITHER THIS DOCUMENT NOR ITS
State of Danger: Eliminating Excessive State in Network, Application, & Services Architectures as a DDoS Defense Strategy
State of Danger: Eliminating Excessive State in Network, Application, & Services Architectures as a DDoS Defense Strategy Roland Dobbins Solutions Architect +66-83-266-6344 BKK mobile
Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).
Overview Certified in Data Protection (CDP) is a comprehensive global training and certification program which leverages international security standards and privacy laws to teach candidates on how to
The Pension Portal. Helping you take your pension business into the paperless age
The Pension Portal Helping you take your pension business into the paperless age When you ve been helping pension professionals implement client portals for as long as we have, you understand that the
Working Group 5: Remediation of Server-Based DDoS Attacks. Status Update
Working Group 5: Remediation of Server-Based DDoS Attacks Status Update June 18, 2014 Peter Fonash (DHS), Co-Chair Michael Glenn (CenturyLink), Co-Chair WG5 Objectives Description: Critical infrastructure
Analysis of a DDoS Attack
Analysis of a DDoS Attack December 2014 CONFIDENTIAL CORERO INTERNAL USE ONLY Methodology around DDoS Detection & Mitigation Corero methodology for DDoS protection Initial Configuration Monitoring and
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Gain comprehensive visibility into DDoS attacks and cyber-threats with easily accessible
BGP DDoS Mitigation. Gunter Van de Velde. Sr Technical Leader NOSTG, Cisco Systems. May 2013. 2012 Cisco and/or its affiliates. All rights reserved.
BGP DDoS Mitigation Gunter Van de Velde Sr Technical Leader NOSTG, Cisco Systems May 2013 2012 Cisco and/or its affiliates. All rights reserved. 1 A simple DDoS mitigation mechanism explained Bertrand
Cloudy with Showers of Business Opportunities and a Good Chance of. Security. Transforming the government IT landscape through cloud technology
Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing Co-Chair, Cloud Security WG Co-Chair, Cloud Forensics Science WG Cloudy with Showers of Business Opportunities and a Good Chance of
Security & Cloud Services IAN KAYNE
Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?
Datasheet: Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-ofbreed
VODAFONE G-CLOUD SMS-SERVICE
VODAFONE G-CLOUD SMS-SERVICE Version Content Owner Date 1.1 Robert Hotchkiss 27 August 2013 Page 1 of 13 TABLE OF CONTENTS 1. The G-Cloud SMS-Service... 3 1.1 Overview of the G-Cloud SMS-Service... 3 1.2
Pravail 2.0 Technical Overview. Exclusive Networks
Pravail 2.0 Technical Overview Exclusive Networks Pravail Features and Benefits Arbor Pravail APS is the a CPE-based security appliance focused on stopping availability threats Arbor Pravail APS Arbor
Cloud computing: benefits, risks and recommendations for information security
Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation
SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation
A BasisOnDemand.com White Paper SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation by Prakash Palani Table of Contents 1. Purpose... 3 2. What is Web Dispatcher?... 3 3. Can
W204 - LMS Consolidation, Underlying Design More Important Than Platform
W204 - LMS Consolidation, Underlying Design More Important Than Platform Assess the scalability of your organization s LMS platform Evaluate an LMS based upon the size and character of different learner
New Systems and Services Security Guidance
New Systems and Services Security Guidance Version Version Number Date Author Type of modification / Notes 0.1 29/05/2012 Donna Waymouth First draft 0.2 21/06/2012 Donna Waymouth Update re certificates
Quattra s Cloud Vision & Framework Value
Quattra s Cloud Vision & Framework Value Data centers provide the foundation for the applications and services that organizations deliver, and companies need their IT facilities to be reliable, compliant
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples
Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples June 3, 2015 Cliff Stephens, CISA Agenda Introductions Technological Advances in Analytics Capitalizing on Analytics
OpenDaylight Project Proposal Dynamic Flow Management
OpenDaylight Project Proposal Dynamic Flow Management Ram (Ramki) Krishnan, Varma Bhupatiraju et al. (Brocade Communications) Sriganesh Kini et al. (Ericsson) Debo~ Dutta, Yathiraj Udupi (Cisco) 1 Table
Cisco Network Foundation Protection Overview
Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and
NFV ISG PoC Proposal VNF Router Performance with DDoS Functionality
NFV ISG PoC Proposal VNF Router Performance with DDoS Functionality 1. NFV ISG PoC Proposal 1.1 PoC Team Members Include additional manufacturers, operators or labs should additional roles apply. PoC Project
How To Create Situational Awareness
SIEM: The Integralis Difference January, 2013 Avoid the SIEM Pitfalls Get it right the first time Common SIEM challenges Maintaining staffing levels 24/7 Blended skills set, continuous building of rules
Fortigate Features & Demo
& Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
SDN. Roadmap to Operating SDN-based Networks Workshop July 15, 2015. Kireeti Kompella CTO, JDI. Copyright 2014 Juniper Networks, Inc.
SDN Roadmap to Operating SDN-based Networks Workshop July 15, 2015 Kireeti Kompella CTO, JDI 1 Agenda Three aspects of SDN SDN @ Juniper OpenContrail NorthStar 2 Three aspects of SDN Programmability Automation
Overview of the Transportation Secure Data Center (www.nrel.gov/tsdc)
Overview of the Transportation Secure Data Center (www.nrel.gov/tsdc) November 2015 Jeff Gonder Senior Engineer/Supervisor and TSDC Project Leader National Renewable Energy Laboratory (NREL) Transportation
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
Working Group 5: Remediation of Server Based DDoS Attacks. Status Update
Working Group 5: Remediation of Server Based DDoS Attacks Status Update September 12, 2013 Peter Fonash (DHS), Co Chair Michael Glenn (CenturyLink), Co Chair WG5 Objectives Description: Critical infrastructure
Symantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
VERISIGN OPENHYBRID CLOUD SIGNALLING API SPECIFICATION
TECHNICAL PAPER VERISIGN OPENHYBRID CLOUD SIGNALLING API SPECIFICATION Version 1.0 January 2015 VerisignInc.com LEGAL DISCLAIMER COPYRIGHT NOTIFICATION Copyright 2015 VeriSign, Inc. All rights reserved
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Powerful web-based security analytics portal with easy-to-read security dashboards Proactive
State of Danger: Eliminating Excessive State in Network, Application, & Services Architectures as a DDoS Defense Strategy
State of Danger: Eliminating Excessive State in Network, Application, & Services Architectures as a DDoS Defense Strategy Roland Dobbins Solutions Architect +66-83-266-6344 BKK mobile
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 Revision History Update this table every time a new edition of the document is published Date Authored
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Use cases and Gap Analysis Hares (editor) draft-hares-i2nsf-use-gap-analysis- 00.txt Sue Hares
Use cases and Gap Analysis Hares (editor) draft-hares-i2nsf-use-gap-analysis- 00.txt Sue Hares Use Cases and Requirements for an Interface to Network Security Functions (draft-pastor-i2nsf-merged-use-cases-00)
SECURE THE DATACENTER. Dennis de Leest Sr. Systems Engineer
SECURE THE DATACENTER Dennis de Leest Sr. Systems Engineer PURE PLAY IN HIGH-PERFORMANCE NETWORKING Breadth First 10 Years of Today s Of Juniper: Portfolio 1996-2006 Core Edge Access & Data Center WAN
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
End-to-End Application Security from the Cloud
Datasheet Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed
MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION
AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION Overview Distributed Denial of Service (DDoS) attacks saturate target networks with service requests that consume the capacity
Session Border Controller
Session Border Controller SBC OVERVIEW: Media Routes SBC is an advanced, comprehensive Policy enforcement point, Session Management and Service Orchestration engine deployed as a network border element
Practical Advice for Small and Medium Environment DDoS Survival
Practical Advice for Small and Medium Environment DDoS Survival Chris "Mac" McEniry Sony Network Entertainment @macmceniry November 8 13, 2015 Washington, D.C. www.usenix.org/lisa15 #lisa15 1 Practical
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Application Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
Mobile Security and Management Opportunities for Telcos and Service Providers
Mobile Security and Management Opportunities for Telcos and Service Providers Lionel Gonzalez Symantec EMEA Solution architect Mike Gibson Protirus Brice Renaud Orange Business Services ST B03 - Mobile
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
RETHINK SECURITY FOR UNKNOWN ATTACKS
1 Copyright 2012 Juniper Networks, Inc. www.juniper.net RETHINK SECURITY FOR UNKNOWN ATTACKS John McCreary Security Specialist, Juniper Networks AGENDA 1 2 3 Introduction 5 minutes Security Trends 5 minutes
Syslog Analyzer ABOUT US. Member of the TeleManagement Forum. [email protected] +1-916-290-9300 http://www.ossera.com
Syslog Analyzer ABOUT US OSSera, Inc. is a global provider of Operational Support System (OSS) solutions for IT organizations, service planning, service operations, and network operations. OSSera's multithreaded
The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation
The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation Copyright, AlgoSec Inc. All rights reserved The Need to Ensure Continuous Compliance Regulations
