RETHINK SECURITY FOR UNKNOWN ATTACKS



Similar documents
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS. Junos WebApp Secure Junos Spotlight Secure

INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI

IT SECURITY SEMINAR "STALLION " Security, NGFW fallacy & going Beyond IP? Juniper Networks - Jaro Pietikäinen

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

SECURE THE DATACENTER. Dennis de Leest Sr. Systems Engineer

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

The Global Attacker Security Intelligence Service Explained

Junos WebApp Secure (formerly Mykonos)

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

AGENDA. 資 訊 網 路 發 展 趨 勢 Juniper Cloud Solution Cloud Security 解 決 方 案 共 同 供 應 契 約 採 購 建 議 為 何 選 擇 Juniper

The Hillstone and Trend Micro Joint Solution

FIREWALL INTELLIGENCE. 1 Copyright 2014 Juniper Networks, Inc.

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

McAfee Network Security Platform

How to Grow and Transform your Security Program into the Cloud

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Secure Cloud-Ready Data Centers Juniper Networks

Advanced Threats: The New World Order

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Networking for Caribbean Development

Pravail 2.0 Technical Overview. Exclusive Networks

Unified Security, ATP and more

On-Premises DDoS Mitigation for the Enterprise

Next Generation Enterprise Network Security Platform

APPLICATION PROGRAMMING INTERFACE

Vulnerability Management

Analyzing HTTP/HTTPS Traffic Logs

Cutting the Cost of Application Security

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Enterprise Buyer Guide

Agenda , Palo Alto Networks. Confidential and Proprietary.

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Security strategies to stay off the Børsen front page

Bridging the gap between COTS tool alerting and raw data analysis

Radware s Behavioral Server Cracking Protection

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Concierge SIEM Reporting Overview

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

POLIWALL: AHEAD OF THE FIREWALL

Cisco Security Intelligence Operations

The Cloud App Visibility Blindspot

The webinar will begin shortly

IBM Security IBM Corporation IBM Corporation

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

24/7 Visibility into Advanced Malware on Networks and Endpoints

IBM Advanced Threat Protection Solution

POLIWALL: AHEAD OF THE FIREWALL

Swordfish

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Advantages of Managed Security Services

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Clavister InSight TM. Protecting Values

Arbor s Solution for ISP

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Defending Against Cyber Attacks with SessionLevel Network Security

Meeting PCI Data Security Standards with

DDoS Overview and Incident Response Guide. July 2014

Breach Found. Did It Hurt?

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM)

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Customer Service Description Next Generation Network Firewall

How To Buy Nitro Security

A New Era of Cybersecurity Neil Mohammed, Sales Engineer

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Sell Security Products To A Network Security Company

CyberArk Privileged Threat Analytics. Solution Brief

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

RETHINKING CYBER SECURITY Changing the Business Conversation

External Supplier Control Requirements

McAfee Next Generation Firewall (NGFW) Administration Course

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

End-user Security Analytics Strengthens Protection with ArcSight

Breaking the Cyber Attack Lifecycle

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Transcription:

1 Copyright 2012 Juniper Networks, Inc. www.juniper.net RETHINK SECURITY FOR UNKNOWN ATTACKS John McCreary Security Specialist, Juniper Networks

AGENDA 1 2 3 Introduction 5 minutes Security Trends 5 minutes NGFW What is it? What is it not? 10 minutes 4 Counter Security Taking Care of the Ingress 25 minutes 5 Q & A remainder 2 Copyright 2012 Juniper Networks, Inc. www.juniper.net

SECURITY TRENDS

SECURITY TRENDS 2012 VERIZON REPORT 96% of attacks were not highly difficult 97% 97% of attacks were avoidable through simple or intermediate controls. of data breaches were not discovered until well after the fact, many not until a third party audit was conducted. Attack was cloaked or staff was so busy they missed the alerts 70% discovered via audit/fraud; 13% employee discovered; 11% performance 75% Attacks are targeting application layer 4 Copyright 2012 Juniper Networks, Inc. www.juniper.net

REPORTED ATTACKS 55% of Telco's 53% of stock exchanges 32% of financial services firms 32% of travel companies 30% of IT Vendors 16% of retailers Most Major universities 5 Copyright 2012 Juniper Networks, Inc. www.juniper.net

PRIMARY CONCERNS Availability of information and systems to users and customers Compliance The disclosure process Theft of intellectual property Financial theft Effect on customer experience Brand damage and revenue loss 6 Copyright 2012 Juniper Networks, Inc. www.juniper.net

ADDITIONAL TRENDS 49% 80% 90% Rise From of internet traffic is human of automated traffic are botnets of botnets are malicious of APT - Advanced Persistent Threats DoS to DDoS Offline to distraction (Bank of the West) 7 Copyright 2012 Juniper Networks, Inc. www.juniper.net

TRENDS SHIFT IN HACKING Cyber Criminals estimated to be a $2B industry Nation-State: hatred and damage to American companies Anonymous China: not your ordinary hacker (Mandiant APT report) Fully institutionalized: Some Hacking Groups report to the Chinese Government (sanctioned) Evidence that Unit 61398 aggressively recruits new talent from the Science and Engineering Universities and recruits must be fluent in English Isn t just for military secrets! Largest US Bond Holder.is China APT s have been directly linked to Chinese Hacking Groups 8 Copyright 2012 Juniper Networks, Inc. www.juniper.net

INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two years through insecure Web apps. Ponemon Institute 9 Copyright 2012 Juniper Networks, Inc. www.juniper.net

NGFW WHAT IS IT? WHAT IS IT NOT?

NGFW: WHAT IS IT? WHAT IS IT NOT? Gartner s definition.. 1. Standard first-generation 5-tuple capabilities. Port-based FW, VPN, NAT, ALG, full feature routing, etc. 2. Integrated, rather than merely collocated, network IPS. 3. Application visibility and control 4. Extra firewall intelligence (basically, AD integration) 5. Support upgrade paths for integration of new information feeds and new techniques to address future threats. 11 Copyright 2012 Juniper Networks, Inc. www.juniper.net

COUNTER SECURITY TAKING CARE OF THE INGRESS

JUNIPER ANNOUNCES: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure DDoS Secure Spotlight Attacker Database What it is Aggregates hacker profile information from global sources in a cloud-based database Distributes aggregated hacker profile information to global subscribers Why it s different High accuracy zero day attacker detection and threat mitigation Only vendor to offer device-level hacker profiling service Can block a single device/attacker Spotlight Attacker Database WebApp Secure SRX Secure SRX Secure DDoS Secure 13 Copyright 2012 Juniper Networks, Inc. www.juniper.net

JUNIPER ANNOUNCES: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure DDoS Secure Spotlight Attacker Database WebApp Secure Spotlight Attacker Database What it is Continuously monitors web apps to stop hackers and botnets Collects forensic data on hacker device, location, and methods Continuously updates on-board hacker profile information Why it s different Accurate threat mitigation with near-zero false positives Hacker profile sharing for global protection surface Flexible deployment (i.e., appliance, VM, AWS) SRX Secure SRX Secure DDoS Secure 14 Copyright 2012 Juniper Networks, Inc. www.juniper.net

JUNIPER ANNOUNCES: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure DDoS Secure Spotlight Attacker Database WebApp Secure SRX Secure SRX Secure Spotlight Attacker Database What it is WebApp Secure communicates attacker information to SRX upon detection of attempted breach SRX uses WebApp Secure intelligence about ongoing attack to temporarily block offending IP(s) Why it s different Only security provider to leverage hacker profile intelligence in network firewalling Provides large-scale web attack mitigation and web DDoS prevention Extends existing SRX capabilities with web DDoS mitigation DDoS Secure 15 Copyright 2012 Juniper Networks, Inc. www.juniper.net

JUNIPER ANNOUNCES: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure DDoS Secure Spotlight Attacker Database WebApp Secure SRX Secure DDoS Secure SRX Secure Spotlight Attacker Database What it is Large-scale DDoS attack mitigation Slow and low DDoS attack mitigation Zero-day protection via combination of behavioral and rules-based detection Why it s different Broadest protection with best-in-class deployment ease Industry leading performance 40Gb throughput Ease of use through automated updating Flexible deployment (i.e., 1U appliance, VM) 16 Copyright 2012 Juniper Networks, Inc. www.juniper.net

Junos DDoS Secure

JUNOS DDOS SECURE CHARM Algorithm Packet validated against pre-defined RFC filters Malformed and missequenced packets dropped Individual IP addresses assigned CHARM value Value assigned based on IP behaviours Mechanistic Traffic First Time Traffic Low CHARM Value Medium CHARM Value Humanistic, Trusted Traffic High CHARM Value 19 Copyright 2012 Juniper Networks, Inc. www.juniper.net

JUNOS DDOS SECURE - HEURISTIC MITIGATION Normal Internet Traffic Normal Internet Traffic DDoS Attack Traffic Resources Normal Internet Traffic Junos DDoS Secure Heuristic Analysis DROP DDoS Attack Traffic Management PC Normal Internet traffic flows through the Junos DDoS Secure Appliance, while the software analyses the type, origin, flow, data rate, sequencing, style and protocol being utilized by all inbound and outbound traffic. The analysis is heuristic in nature and adjusts over time but is applied in real time, with minimal (store and forward) latency. 20 Copyright 2012 Juniper Networks, Inc. www.juniper.net

Junos WebApp Secure

THE ANATOMY OF A WEB ATTACK Phase 1 Reconnaissance Phase 2 Attack Vector Establishment Phase 3 Implementation Phase 4 Automation Days or weeks Weeks or months Weeks or months Months or years Years Phase 5 Maintenance Web App Firewall 22 Copyright 2012 Juniper Networks, Inc. www.juniper.net

JUNOS WEBAPP SECURE - DETECTION BY DECEPTION Tar Traps Query String Parameters Network Perimeter Hidden Input Fields Client Firewall App Server Database Server Configuration 23 Copyright 2012 Juniper Networks, Inc. www.juniper.net

TRACK ATTACKERS BEYOND THE IP Track IP Address Track Browser Attacks Persistent Token Capacity to persist in all browsers including various privacy control features. Track Software and Script Attacks Fingerprinting HTTP communications. 24 Copyright 2012 Juniper Networks, Inc. www.juniper.net

THE CERTAINTY & SPECIFICITY YOU NEED! TAR TRAPS DECEPTION QATAR UNIVERSITIES BEYOND IP 25 Copyright 2012 Juniper Networks, Inc. www.juniper.net

FINGERPRINT OF AN ATTACKER Timezone Browser version Fonts Browser add-ons 200+ attributes used to create the fingerprint. ~ Real Time availability of fingerprints IP Address False Positives nearly zero 26 Copyright 2012 Juniper Networks, Inc. www.juniper.net

JUNOS SPOTLIGHT SECURE Junos Spotlight Secure Global Attacker Intelligence Service Attacker from San Francisco Junos WebApp Secure protected site in UK Attacker fingerprint uploaded Attacker fingerprint available for all sites protected by Junos WebApp Secure Detect Anywhere, Stop Everywhere 27 Copyright 2012 Juniper Networks, Inc. www.juniper.net

JUNOS WEBAPP SECURE - SMART PROFILE OF ATTACKER Every attacker assigned a name Incident history Attacker threat level 28 Copyright 2012 Juniper Networks, Inc. www.juniper.net

JUNOS WEBAPP SECURE - SECURITY ADMINISTRATION Web-based console Real-time On-demand threat information SMTP alerting Reporting (Pdf, HTML) CLI for exporting data into SIEM tool 29 Copyright 2012 Juniper Networks, Inc. www.juniper.net