Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass



Similar documents
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

PART D NETWORK SERVICES

Security Information Management (SIM)

Network Instruments white paper

Attacks from the Inside

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Promoting Network Security (A Service Provider Perspective)

Network Monitoring Tool to Identify Malware Infected Computers

PacketTrap One Resource for Managed Services

inet Enterprise Features Fact Sheet

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Perspective on secure network for control systems in SPring-8

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

Building A Secure Microsoft Exchange Continuity Appliance

INTRUSION DETECTION SYSTEMS and Network Security

How To Understand What A Virus Is And How To Protect Yourself From A Virus

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Firewall and UTM Solutions Guide

SonicWALL Unified Threat Management. Alvin Mann April 2009

Innovative Defense Strategies for Securing SCADA & Control Systems

Edge Configuration Series Reporting Overview

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Security and Access Control Lists (ACLs)

Symantec AntiVirus Enterprise Edition

Network Service, Systems and Data Communications Monitoring Policy

Section 12 MUST BE COMPLETED BY: 4/22

Training Course on Network Administration

CTS2134 Introduction to Networking. Module Network Security

Observation and Findings

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Clavister InSight TM. Protecting Values

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

HoneyBOT User Guide A Windows based honeypot solution

1 Introduction. Agenda Item: Work Item:

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

CONFIGURING TCP/IP ADDRESSING AND SECURITY

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Ten Tips to Avoid Viruses and Spyware

Top tips for improved network security

Network Security in Vietnam and VNCERT. Network Security in Vietnam and VNCERT

Automate your IT Security Services

Intro to Firewalls. Summary

Chapter 9 Firewalls and Intrusion Prevention Systems

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Banking Security using Honeypot

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Integrated Protection for Systems. João Batista Territory Manager

Net Protector Admin Console

High Availability and Clustering

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli

Observer Analysis Advantages

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Computer Networks & Computer Security

CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY?

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

ANTIVIRUS BEST PRACTICES

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

isheriff CLOUD SECURITY

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

McAfee Total Protection Reduce the Complexity of Managing Security

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

ITU WSIS Thematic Meeting on Countering Spam: The Scope of the problem. Mark Sunner, Chief Technical Officer MessageLabs

Tk20 Network Infrastructure

Managed Security Services

Network Security and the Small Business

WORMS HALMSTAD UNIVERSITY. Network Security. Network Design and Computer Management. Project Title:

Secure Cloud-Ready Data Centers Juniper Networks

How To Protect A Network From Attack From A Hacker (Hbss)

End-user Security Analytics Strengthens Protection with ArcSight

Symantec Security Information Manager 4.8 Release Notes

Sophos Endpoint Security and Control Help. Product version: 11

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats

Network Management and Monitoring Software

Configuring Allied Telesyn Equipment to Counter Nimda Attacks

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

Transcription:

Real-time Network Monitoring and Security Platform for Securing Next-Generation Network Assoc. Prof. Dr. Sureswaran Ramadass

The platform Definition A description of a software framework that makes services available to other applications through set of API s. Objectives To provide an extendable Features through the pluggable interfaces. To ease the software development process. The platform can be considered as a core component for enabling network applications. (network monitoring, network security, real-time applications, etc.)

The platform The platform The platform

Features and Benefits Provide a cross platform environment Provide a an open architecture applications. Provide a standard packet capture engine Provide advanced protocol decoder Provide a high performance circular buffer support. Provide API for network monitoring application customization API for network worm detection. API for intelligent network monitoring. API for grid monitoring. API for advanced network statistics. API for Network Security Applications. API for Buffering and Archiving.

Monitoring and Security solutions

Application Application: Network security solution.

Security solution. - Networks are suffering from viruses, worms, Trojans, spy-wares, adwares, hijackers, pop generators, spam, intrusion and many more. - If you have an internet connection (home, corporate) then, your machine is exposed to the Internet world. And hence you are vulnerable against Worms and Viruses. -Virus and Worm are the biggest contributors to today s network problems. -With these modern threats, firewall and antivirus alone are not enough To protect your organization from the blended threats.

Application: Application: Security solution i.e. i.e. worms/viruses. Because of the Speed of there infection / spread. Cost for cleanup of worms worldwide. - Sobig: USD 37.1 billion - MyDoom: USD 22.6 billion - Klez: USD 19.8 billion - Nachi: USD 13 billion - Mimail: USD 11.5 billion - Swen: USD 10.4 billion - Love Bug: USD 8.8 billion - Bugbear: USD 3.9 billion Cost for cleanup of worms in Malaysia. Code Red: RM 22 million Nimda: RM 22 million Blaster: RM 31 million Nachi: RM 31 million Source: NISER study

What Worms / Viruses Can do to you? Once the host is infected, it can: Steal YOUR private info and distribute it to all the users in your email database. Send dummy traffic to paralyze your network. Destroy key system files that would damage and crash your computer. Destroy database system within your server.

Worm Attack Scenarios Network Parallelized Patched Patched infected Infected Network Alert Busy Network Patched Patched Warning

How to Get Protected? You Need: To cover the loopholes left by other security products for an all round protection. To Be able to detect internal worm attack as well as external. To be updated against recent worm. To be Alerted or warned for threats attempts by. Locating the source of the problem. Providing possible solutions.

Efficiency and Speed The platform Provides a Set of APIs to interact with the Buffering API in order to: Adopt the Current Networks Speeds. Operate at wire speed. Archive / store critical information. Also the platform Provides a Set of APIs to interact with the Worm Engine in order to : Parse Network traffic Packets by Packets. Compare against the updated Signature DB. Detect worm existence and alerting. Extract Useful and relevant information for further action.

Worm Attack Detection Propagation Source IP Propagation Destination IP

Application: Application: Network Monitoring solution.

Network Monitoring Characteristics

What do we Need? We Need: - Bandwidth Monitoring Capability. - Application Monitoring Capability. - Websites Monitoring Capability. - Network Utilization Capability. - Critical Node monitoring Capability. - Anomaly Detection and identification Capability. - Packet Capturing, Filtering and Buffering Capability. - Switching Environment Monitoring Capability (MPLS) - VLAN Monitoring Capability. - Protocol Dissecting Capability. - Top User Tracking capability - General Statistics. - On trunk VLAN Decoding Capability. - Remote Network Monitoring Capability. - Clustering and network Behavior Modeling capability. The Platform Provides the necessary set of API to support Network and Distributed Network Monitoring Applications.

Packet Capturing and Dissection

Distributed Network Traffic Buffering

The Platform Pluggable Interfaces

R.T Distributed Network Monitoring 3-Tier Architecture for a Real time Distributed Network Monitoring inet Enterprise.

inet Enterprise: Enterprise: How to monitoring Distributed Networks.

inet Enterprise: Enterprise: The Architecture.

inet Enterprise: Enterprise: Functional Solution

inet Enterprise: Enterprise: Control Sequence

inet Enterprise: Enterprise: Remote Traffic Capturing Interface.

inet Enterprise: inet inet Console

inet Enterprise: inet inet Console Statistics

inet Enterprise: inet inet Console Console-Critical Critical Elements monitoring

inet Enterprise: the Whole 1 2

inet Enterprise: Features Passive Monitoring Technique Not like any other active network monitoring tools that tend to be intrusive Critical Node Monitoring Netrace Observe communication among devices and stations MPLS Distribution Statistic Able to detect MPLS packets and show its packet size and protocol distribution Application Monitoring List down the applications that being used and their bandwidth usage Web Monitoring Monitor users and the websites they visited Network Address Book Detect devices detailed information such as the MAC Address and Workgroup on a network Network Reporting Toolkit Generate report of compiled information from various monitoring modules Network Packet Analyzer Capture and decode any packets within the network

inet Enterprise: Features Distribution Statistic Show the packets distribution according to the size, application protocol, network protocol, etc General Statistic Show the statistic of the number of packet per second, bits per second and the network utilization Critical Elements Monitoring (Server..etc) Monitor the status of the servers and send alerts whenever a server (and/or its service) is down Top Bandwidth Usage Keep track of the users who use the bandwidth the most VLAN Distribution Statistic Show the packets distribution according to the size, application protocol, network protocol on the VLAN VLAN General Statistic Show the statistic of the number of packet per second, bits per second and the network utilization On Trunk VLAN Packet Analyzer Able to detect VLAN packets

The Platform Applications.

Thank You