Network Immunization Real-Time Network Security Raymond R. Hoare, Assistant Professor Department of Electrical Engineering University of Pittsburgh

Slides:



Advertisements
Similar presentations
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Overview Stewart Varney Bridge IT – Wednesday April 6, 2011.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Profile-Based Web Intrusion Prevention System by Donovan Thorpe CS526 Fall 2002.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
Network security Process in which digital information are protected.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Module 1 – MIS Careers & Intro to Systems Architecture MIS5122: Enterprise Architecture for IT Auditors.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Network Security in a Business Setting By: Brian Haumschild.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
BUSINESS B1 Information Security.
CPMT 1451 IT Essentials: PC Hardware and Software ITCC 1301 Cisco Exploration 1: Network Fundamentals ITCC 1304 Cisco Exploration 2: Routing Protocols.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
To be smart or not to be? Siva Subramanian Polaris R&D Lab, RTP Tal Lavian OPENET Lab, Santa Clara.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Sean Nagelski, Kristina Klima, and Kelly Sipko.
An Analysis of 3G Phone Security Emily Maples & Evan Nakano CMPE 209.
history, hardware, software, safety, and computer ethics
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency.
Cyber Security, Internet, and Wireless Networks Shigang Chen, Associate Professor Dept of Computer & Information Science & Engineering University of Florida.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Real-Time Intelligence That Matters. © 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business The Last G-20 Country To Embrace The.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Presenter : Weerawardhana J.L.M.N. Department of Computer Engineering, University of Peradeniya.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Security Issues & Ethics in Education By Maud Mushayamunda.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
COMPUTER CRIMES Presented by THABO.
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Instructor Materials Chapter 7 Network Security
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Answer the questions to reveal the blocks and guess the picture.
Protect Your Computer Against Harmful Attacks!
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Information Security CIS 9002 Kannan Mohan Department of CIS
CompTIA Security+ Study Guide (SY0-501)
Chapter 6 Networks Communicating and Sharing Resources
ISMS Information Security Management System
Intrusion detection systems?
Communication and Electronic Engineering Department
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
CS 286 Computer Architecture & Organization
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Networking for Home and Small Businesses – Chapter 8
Technology Mrs. Huddleston
Networking for Home and Small Businesses – Chapter 8
Firewall Maxwell, Rajiv, Alex.
Presentation transcript:

Network Immunization Real-Time Network Security Raymond R. Hoare, Assistant Professor Department of Electrical Engineering University of Pittsburgh (412)

Cyber Damage: $55 Billion in % of Damage Occurs within 6 Hours Half the Damage is Done Software Updates are to Slow

Viruses Compromise Our Computers $55 Billion in Damage in 2003

Network Immunization adds Protection Real-Time Protection and Detection

Searching using a Pentium / ARM Processor Searching using a Content Addressable Memory ns for 10k words 20, ,000 ns for 10k words Key Technology: HW Search Memory Network Immunization  Real Time Performance Existing Solutions are Softwre Based  Poor Peformance

IDS Performance Declines as the Number of Rules Increases Existing Solutions Peak Rate over 100Mb/s Ethernet Gb/s Expected Performance for Network Immunization

Network Immunization Dr. Raymond R. Hoare, EE Dept., U. Pittsburgh, Cost of Computer Crimes > $400 Billion/yr 50% of damage in first 6hrs Infected computers infect the entire network Firewalls are insufficient Network Immunization augments switches and routers Network Immunization augments switches and routers Adds intrusion detection and prevention hardware Adds intrusion detection and prevention hardware Infections are stopped Infections are stopped