The Need for Intelligent Network Security: Adapting IPS for today s Threats



Similar documents
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

McAfee Network Security Platform

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

SourceFireNext-Generation IPS

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Breaking the Cyber Attack Lifecycle

The Hillstone and Trend Micro Joint Solution

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

ENABLING FAST RESPONSES THREAT MONITORING

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

QRadar SIEM and FireEye MPS Integration

Braindumps QA

How To Protect Your Network From A Threat From A Rogue Host Or A Rogue Server From A Hacker (For A Fee)

FROM PRODUCT TO PLATFORM

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Content Security: Protect Your Network with Five Must-Haves

Cisco Advanced Malware Protection

RAVEN, Network Security and Health for the Enterprise

I D C A N A L Y S T C O N N E C T I O N

Cisco Cloud Web Security

Introducing IBM s Advanced Threat Protection Platform

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

REVOLUTIONIZING ADVANCED THREAT PROTECTION

How To Buy Nitro Security

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

How To Manage Security On A Networked Computer System

Cisco Web Security: Protection, Control, and Value

Palo Alto Networks. October 6

Cisco IPS Tuning Overview

How To Manage Sourcefire From A Command Console

Agenda , Palo Alto Networks. Confidential and Proprietary.

Comprehensive Advanced Threat Defense

Requirements When Considering a Next- Generation Firewall

Taxonomy of Intrusion Detection System

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

Overcoming PCI Compliance Challenges

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Modular Network Security. Tyler Carter, McAfee Network Security

Securing Your Business with DNS Servers That Protect Themselves

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Fighting Advanced Threats

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Security Services. 30 years of experience in IT business

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Protection Against Advanced Persistent Threats

Security Intelligence Services.

Advanced Threats: The New World Order

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

IBM Security IBM Corporation IBM Corporation

Defending Against Cyber Attacks with SessionLevel Network Security

Cisco Advanced Malware Protection for Endpoints

POLIWALL: AHEAD OF THE FIREWALL

Sourcefire Next-Generation IPS

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

Market Guide for Network Sandboxing

Cisco Cyber Threat Defense - Visibility and Network Prevention

BeyondInsight Version 5.6 New and Updated Features

Discover Security That s Highly Intelligent.

The Custom Defense Against Targeted Attacks. A Trend Micro White Paper

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

End-user Security Analytics Strengthens Protection with ArcSight

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Reduce Your Network's Attack Surface

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

White Paper - Crypto Virus. A guide to protecting your IT

IDS or IPS? Pocket E-Guide

Network Security Solution. Arktos Lam

Cyber Situational Awareness for Enterprise Security

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

Blind as a Bat? Supporting Packet Decryption for Security Scanning

Решения HP по информационной безопасности

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Cisco Advanced Malware Protection for Endpoints

Intrusion Detection from Simple to Cloud

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Network Security Redefined. Vectra s cybersecurity thinking machine detects and anticipates attacks in real time

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Transcription:

The Need for Intelligent Network Security: Adapting IPS for today s Threats James Tucker Security Engineer Sourcefire Nordics

A Bit of History It started with passive IDS. Burglar alarm for the network Classic IDS Has some key weaknesses Too Many Alerts False Positives! Alert only Can Create More work than problems it solves. Hard Sell to Upper Management 3

IDS Is Dead! Gartner Article in 2003 Pointed out some symptoms Pushed companies and vendors toward IPS Did not address the underlying problems with IPS With out good D it is impossible to have good Prevention. 4

Odds are Against the Defenders! Global Economy for Cybercrime 80 Billion USD Malware created daily 20,000 units Average number of 0-Days 1 per month Average number of threats 300 per month New Types of Targeted attacks 5

It s not just the bad guys making it hard Mobile data Consumerisation of business IT http://www.schneier.com/, 7 th September Cloud Services Technology Overload Employees are trying to do their jobs, Businesses are trying to do much more with far less 6

The new threat of 2010 Advanced Persistent Threat: Advanced: One Off, 0-day and custom attacks Persistent: Attackers are mission orientated and not opportunistic. Unlike typical hackers, they have specific, often political goals. Threat: A person, not a auto-rooter bot/software. COLD. HARD. REALITY. 7

So what else has changed The attacker APT The victim They ve been given the tools of their own destruction. The attack vectors Not only direct network-based attacks It s in the content 8

Addressing Todays Problems Event Analysis Takes Time and Skill Tuning Takes Time and Skill The Right Strategy is based on *your* network. It s all about context 9

The Sourcefire Way Sourcefire 3D Components Component Based on Function IPS Snort Intrusion detection and prevention Real-time Network Awareness Real-time User Awareness Sourcefire SSL Appliance Defense Center Master Defense Center Passive network discovery Wire-level UID capture and directory lookup Dedicated appliance Sourcefire analytical engine Defense Center Network discovery, vulnerability mapping User name resolution to a security event SSL inbound and outbound decryption for inline and passive deployments Event correlation Compliance monitoring and enforcement. Correlate from multiple Defense Centers (Only needed if your customer is LARGE) 9

Event contextualization Threat Intelligence (IPS) Target Relevance Network Intelligence (NBA/RNA) Endpoint Intelligence (RNA)

Intelligence Threat Intelligence (IPS) Target Relevance Automated impact analysis Network Intelligence (NBA/RNA) + + Endpoint Intelligence (RNA) Adaptive IPS (R3)

Putting it all together Target Reaction Threat Intelligence (IPS) Target Relevance + Automated Tuning Network Intelligence (NBA/RNA) Endpoint Intelligence (RNA) Compliance

Time is valuable Use context to Automate event analysis Automatically tune Automatically defend Eliminate false positives Match policy with reality So what do we do with all this extra time? Flow Analysis Business integration of Security Team 13

The Most Important Part The People in Your team A tool is just a tool Must want to protect the network Balanced Business, Technical, and evil. The People You re defending Establish understanding Avoiding the US VS THEM mentality. 14

Steps to Security. Step 1: IPS Must be part of a strategy Step 2: Find the right people This is the most important success factor Step 3: Events must be analyzed Step 4: System must be tuned, regularly You must know the network you are defending! 15

Then - See The Bigger Security Picture Flow analysis The only way to detect many threats Encrypted C&C networks Misuse of resources Bandwidth hogs Data leakage Find the root cause of the problem Provides value to management 16

Business Integration Security needs to get out of the server room and into the meeting room. Integrating security from the start of projects Not be the guys who are tasked with stopping packets Assisting with Risk analysis Key to a good security strategy. 17

Crystal ball gazing Automated IPS is a great tool. But It s not everything What About PDFs Flash ActiveX A million unknown vectors? Near real time detection has to be next... 18

Tying it all together Use IPS when possible Automation will set you free Automated rule tuning Automated impact assessment Flow Data is the next logical frontier There are no Magic Boxes available Build a good team Near real time content inspection 19

Questions? jtucker@sourcefire.com http://www.sourcefire.com http://vrt-sourcefire.blogspot.com/ http://labs.snort.org/razorback/