Celtic-Plus Proposers Day 22 September 2016, Istanbul

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP Servers SIP Servers: A Buyers Guide Jonathan Rosenberg Chief Scientist.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Chapter 12 Network Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Data Communications and Networks
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 6: Packet Filtering
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
1 Version 3.0 Module 11 TCP Application and Transport.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Data Communications and Networks
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Defining Network Infrastructure and Network Security Lesson 8.
Lab #2 NET332 By Asma AlOsaimi.
BUILD SECURE PRODUCTS AND SERVICES
The OSI Model & TCP/IP model
Deployment Planning Services
CompTIA Security+ Study Guide (SY0-401)
UTM Content Security Gateway
Cybersecurity - What’s Next? June 2017
Working at a Small-to-Medium Business or ISP – Chapter 8
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
High Performance Computing Lab.
Domain 4 – Communication and Network Security
Securing the Network Perimeter with ISA 2004
Celtic-Plus Proposers Day 22 September 2016, İstanbul
How data travels through a network The Internet
Working at a Small-to-Medium Business or ISP – Chapter 7
Celtic-Plus Event 22 September 2016, Istanbul
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 7
Prevent Costly Data Leaks from Microsoft Office 365
Chapter 4 Core TCP/IP Protocols
Celtic-Plus Proposers Day 20th June 2017, Helsinki
Working at a Small-to-Medium Business or ISP – Chapter 7
Check Point Connectra NGX R60
File Transfer Issues with TCP Acceleration with FileCatalyst
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Chapter 4: Protecting the Organization
دیواره ی آتش.
Firewalls.
Protocol Application TCP/IP Layer Model
Computer Networks Protocols
Ingate & Dialogic Technical Presentation
Presentation transcript:

Celtic-Plus Proposers Day 22 September 2016, Istanbul New Generation Network Security System (ENTRUST) Dr. Barış Bulut, Enforma Bilişim A.Ş. baris@enforma-tr.com

What we do Our ongoing work is based around ICT, telecommunications, data processing, telecoms regulations, product management & go-to-market, research and development consultancy, state funding and academia. We perform data analysis in various areas such as telecommunications, opinion polling and vehicle tracking, all of which lead to better business intelligence, higher customer retention, lower customer churn. We develop telecommunications systems software used within a number of nodes of such as RADIUS, telecommunications billing, SIP proxy, WebRTC server, telecomunications middleware software. We have been successfully receiving R&D grants at national level. We are in the look-out for partners we can work with in a cooperative and conducive successful collaboration. Dr. Barış Bulut, Enforma, baris@enforma-tr.com

New generation network security system Network security evolved from access lists to firewalls to intrusion detection systems (IDS) Disadvantages: Threat assumed to be from outside, rather than inside. Ineffective against a Trojan horse or an infected user from inside SSL-encrypted malicious activity raises no direct alarm in IDS Also, known backdoors in leading non-EU manufacturers Need to: Establish baseline for traffic flow (both the load and to/from) Central or distributed probes Expert knowledge also accommodated Handle traffic in SSL-encrypted tunnel Detect anomaly in the pattern in real time Conform with EU information security standards Dr. Barış Bulut, Enforma, baris@enforma-tr.com

Basic schematics Enterprise Network Elements UDP, TCP, TLS, WebSocket Universal Protocol Interpreter (TELNET, FTP, TFTP, SMTP, POP, IMAP, LDAP RADIUS, SIP, RTP, ICE, STUN, UPnP, SNMP, SMPP, DNS, ENUM, DHCP, HTTP…) UDP, TCP, TLS, WebSocket Scenario Engine Enterprise Network Elements Behavioural / User Defined Patterns Monitoring API Network Activity Abstraction Active Policy Enforcer (NACAPE) Functional Blocks Dr. Barış Bulut, Enforma, baris@enforma-tr.com

Evolution Source considered Stateless firewall: Packet Filters Stateful firewall Application Layer Firewall Application Layer Firewall with DPI Next Gen firewall, IDS Layer 7: The application layer   + Layer 4: The transport layer Layer 3: The network layer Packet content Layer 3, 4, 7 Logs, incl. syslogs, event logs Dr. Barış Bulut, Enforma, baris@enforma-tr.com

Standardisation Data Sources Incident Management Store and Process Applications Users Network Equipment Event logs Email Application activity DB activity User activity Behaviour Transactions Social activity Security devices Logs, Syslog Network activity Config data Server&Host logs Threat info Store and Process Hot, warm, cold data Distributed infrastructure Large scale machine learning Big data capability Detection based on analysis of log and traffic data. No common log format across the industry Analysis Predictive & decison modelling Transaction analysis Incident Management Dr. Barış Bulut, Enforma, baris@enforma-tr.com

Key selling points Proposed solution provides: An evolved security system that can address ‘evolved risks’ currently undetectable by the IDS systems Machine learning ideas incorporated Kills threats from outside and inside Detects extended list of network activities such as an abnormally high number of MX lookup local email addresses, or DDOS A common log format for use in network equipment A European security system with zero backdoors Higher security of systems and personal information Worldwide network security and information security markets nearing $10b and $100b in size, respectively With 2-digit year-on-year growth Governments, datacentres, corporates, SMEs Dr. Barış Bulut, Enforma, baris@enforma-tr.com

Partners & expertise Partners involved Missing partners / expertise Enforma Missing partners / expertise A study of an exhaustive list of use cases and implementation of learning patterns need the following: Analysis of security threats Development Testing Therefore; Vendors, Partners with network traffic analysis experience, Partners with testing capability or a friendly customer status are welcome. Dr. Barış Bulut, Enforma, baris@enforma-tr.com

Contact Info For more information and for interest to participate please contact: Dr. Barış Bulut, Enforma Bilişim A.Ş. baris@enforma-tr.com +90 212 932 7950 www.enforma-tr.com Your Photo Dr. Barış Bulut, Enforma, baris@enforma-tr.com