Security Intelligenece: tracking obfuscated and unrecognized attacks. 2014 Check Point Software Technologies Ltd.



Similar documents
Check Point DDoS Protector

Cloud Services Prevent Zero-day and Targeted Attacks

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

McAfee Network Security Platform

The Hillstone and Trend Micro Joint Solution

How To Block A Ddos Attack On A Network With A Firewall

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

SecurityDAM On-demand, Cloud-based DDoS Mitigation

FortiDDos Size isn t everything

Networking for Caribbean Development

Introducing IBM s Advanced Threat Protection Platform

WhitePaper. Mitigation and Detection with FortiDDoS Fortinet. Introduction

Where every interaction matters.

DDoS Attacks & Mitigation

AppGuard. Defeats Malware

Secret Server Qualys Integration Guide

Radware s Attack Mitigation Solution On-line Business Protection

A Layperson s Guide To DoS Attacks

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Uncover security risks on your enterprise network

WildFire. Preparing for Modern Network Attacks

Intro to Firewalls. Summary

On-Premises DDoS Mitigation for the Enterprise

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Arbor s Solution for ISP

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

IndusGuard Web Application Firewall Test Drive User Registration

Pravail 2.0 Technical Overview. Exclusive Networks

Check Point: Sandblast Zero-Day protection

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Barracuda Intrusion Detection and Prevention System

Complete Protection against Evolving DDoS Threats

Applications erode the secure network How can malware be stopped?

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

IBM Advanced Threat Protection Solution

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

DDoS Protection on the Security Gateway

REVOLUTIONIZING ADVANCED THREAT PROTECTION

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

SHARE THIS WHITEPAPER

Palo Alto Networks. October 6

Agenda , Palo Alto Networks. Confidential and Proprietary.

Introducing FortiDDoS. Mar, 2013

NSFOCUS Web Application Firewall White Paper

Acquia Cloud Edge Protect Powered by CloudFlare

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Network Performance + Security Monitoring

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

IBM Security IBM Corporation IBM Corporation

Putting Web Threat Protection and Content Filtering in the Cloud

End-to-End Application Security from the Cloud

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

FISMA / NIST REVISION 3 COMPLIANCE

Protecting the Infrastructure: Symantec Web Gateway

10 Things Every Web Application Firewall Should Provide Share this ebook

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

2013 MONITORAPP Co., Ltd.

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

Modular Network Security. Tyler Carter, McAfee Network Security

The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System

PROFESSIONAL SECURITY SYSTEMS

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Radware s Behavioral Server Cracking Protection

FortiWeb for ISP. Web Application Firewall. Copyright Fortinet Inc. All rights reserved.

Fighting Advanced Threats

Content-ID. Content-ID URLS THREATS DATA

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Cisco Security Intelligence Operations

CloudFlare advanced DDoS protection

Gateway Security at Stateful Inspection/Application Proxy

Transcription:

Security Intelligenece: tracking obfuscated and unrecognized attacks 2014 Check Point Software Technologies Ltd.

Security Policy Rule Types: 1 Access People, Applications, Services, Servers, Data 2 Threat Prevention Cleanup actions for malware and attacks 2014 Check Point Software Technologies Ltd. 2

Prevent downloading Credit Cards from corporate web server Standard services: HTTP and HTTPs Additional protection layer vs. injection attacks or server mis-configurations Full data log, including: URL HTTP resources accessed Methods File type File size Data types matched Control Network, Application & Data As well as User Check & Log level 2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 3

Cleanup actions for protected networks 2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 4

Areas of ambiguity in defining and enforcing security policies: DoS / DDoS attacks Bots communicating with external Command&Control centers Industrial networks security policy (SCADA / Critical Infrastructure) Zero-day attacks and obfuscated (masked) malware 2014 Check Point Software Technologies Ltd. 5

DDoS: Experiences collected during PoC installations: where to protect Scenarios: 1 2 3 On-Premise Deployment DDoS Protector Appliance + Off-Site Deployment DDoS Protector Appliance 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 6

DDoS: How to protect (* Traffic used in DDoS attacks is accepted by standard security policy *) Network Flood Server Flood Application Low & Slow Attacks Behavioral High volume of network packets analysis Automatic and High rate of pre-defined new sessions signatures Web Behavioral / DNS connectionbased DNS HTTP and attacks Advanced Granular attack custom filters techniques Stateless and behavioral engines Protections against misuse of resources Challenge / response mitigation methods Create filters that block attacks and allow users (* Traffic models, anomaly detection, filtering. Or: correlation of attack data based on logs *) 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 7

Analysis of data collected by DDoS protection appliance Data collected and correlated in SmartEvent system in May - July 2013

(...)

DDoS Protector deployed to identify problems related to DNS servers (August / September 2014)

(...)

Zero-day attacks and targeted attacks New vulnerabilities Variants of old exploits nearly 200,000 new malware samples appear around the world each day - net-security.org, June 2013 2013 Check Point Software Technologies Ltd. 12

INSPECT INSPECT FILE EMULATE SHARE PREVENT Stop undiscovered attacks with Check Point Threat Emulation 2013 Check Point Software Technologies Ltd. 13

System otwarty i udostępniony w Internecie Wyślij plik otrzymasz raport Threat Emulation: threats@checkpoint.com threatemulation.checkpoint.com 2013 Check Point Software Technologies Ltd. 14

Data collected in search of obfuscated and/or zero-day attacks and high-risk applications (sandboxing in public cloud) (May 2014)

(...)

Security best practices built right into your workflow Policy Apps Trusted Automation Orchestration 2015 Check Point Software Technologies Ltd. [Protected] Non-confidential content 17

POLICY APPS SNAPSHOT LOGGING View logs for specific rules right in policy 2015 Check Point Software Technologies Ltd. 18

POLICY APPS RULE S HISTORY Track historic changes of rules and objects 2015 Check Point Software Technologies Ltd. 19

Items to consider before changing a rule When was it created? By who? Why? Is this rule being hit and how much? What sources / users / destinations / applications are using it? How this change is going to affect traffic going though lower rules? 2015 Check Point Software Technologies Ltd. [Protected] Non-confidential content 20

Thank you! 2014 Check Point Software Technologies Ltd. 21