ANTIgEN DATA an AMAGINO Technology company

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

Defending Against Pathogens. First Line of Defence Once a pathogen enters body it can make you ill.... First line of Defence: a barrier to stop entrance.
Practical and Theoretical Issues on Adaptive Security Alexander Shnitko Novosibirsk State Technical University.
Chapter 4 Quality Assurance in Context
Cognitive Engine Development for IEEE Lizdabel Morales April 16 th, 2007
Connect! Did you get a swine flu vaccination? What is a vaccination?
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
System and Network Security Practices COEN 351 E-Commerce Security.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
1 Principles of a Computer Immune System Anil Somayaji, Steven Hofmeyr, & Stephanie Forrest Presented by: Jesus Morales.
SEC835 Database and Web application security Information Security Architecture.
Intranet, Extranet, Firewall. Intranet and Extranet.
Testing Basics of Testing Presented by: Vijay.C.G – Glister Tech.
ACT: Attachment Chain Tracing Scheme for Virus Detection and Control Jintao Xiong Proceedings of the 2004 ACM workshop on Rapid malcode Presented.
Software Project Documentation. Types of Project Documents  Project Charter  Requirements  Mockups and Prototypes  Test Cases  Architecture / Design.
FLOOR CANDY.
Earth is full of microscopic invaders that can wage war in your body. Infectious diseases are caused by microorganisms; viruses, bacteria, fungi, protists,
Security (Keep your site secure at extension level) Sergey Gorstka Fastw3b.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
Module 11: Designing Security for Network Perimeters.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Virtual Application Profiler (VAPP) Problem – Increasing hardware complexity – Programmers need to understand interactions between architecture and their.
Privacy and Data Mining What Do “They” Know About You?
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
© Monica Farrow & Andrew Ireland Software Design F28SD2 Future Horizons Monica Farrow & Andrew Ireland School of Mathematical & Computer Sciences Heriot-Watt.
ISECON Columbus, Ohio - October 7, 2005 Whither IS? Issues and Problems in Classifying CC2005 Programs Using CIP Codes Paul Leidig, George Nezlek,
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Introduction to computer networking Objective: To be acquainted with: The definitions of networking Network topology Network peripherals, hardware and.
Cloud Computing By Reedy McGeady. What is Cloud Computing? Cloud Computing is using another organisations computer, which are known as hosts.
V-Shaped Software Development Life Cycle Model. Introduction: Variation of water fall model. Same sequence structure as water fall model. Strong emphasis.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
1 Development with Agile methodology Scrum Lifecycle DEVELOPMENT PROCESS IN DROISYS INC.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Surface Defect Inspection: an Artificial Immune Approach Dr. Hong Zheng and Dr. Saeid Nahavandi School of Engineering and Technology.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Some Great Open Source Intrusion Detection Systems (IDSs)
Unit 3 Virtualization.
PREPARED BY G.VIJAYA KUMAR ASST.PROFESSOR
Integrated Management System
What is a Firewall?.
Technologies: for Enhancing Broadcast Programmes with Bridgets
Chapter 7: Identifying Advanced Attacks
Chapter 5 : Designing Windows Server-Level Security Processes
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Verification and Testing
SENIOR MANAGER - SOFTWARE TESTING PRACTICE
I have many checklists: how do I get started with cyber security?
What causes us to be sick/what makes us sick?
Firewalls Routers, Switches, Hubs VPNs
Immune Response.
السلوك التنظيمى المعاصر
Analysis models and design models
Practical Software Engineering
How to Mitigate the Consequences What are the Countermeasures?
Smart Learning concepts to enhance SMART Universities in Africa
Defense Against Infectious Diseases
LitwareHR v2: an S+S reference application
Operating System Concepts
Cloud Security AWS as an example.
Revision PowerPoint By Nicole Davidson.
Yining ZHAO Computer Network Information Center,
Defense Against Infectious Diseases
06 | SQL Server and the Cloud
Presentation transcript:

ANTIgEN DATA an AMAGINO Technology company Immunity for Network AND COMPUTERS

Technology R&D Principles : From Human’s immunology to computer science Computational approach of anti-bodies Mathematics and Algorithms concepts

ANTIgEN DATA Approach vs Existing Traditional approach Good in theory, not in practice Computer systems are dynamic system state continuously changed Formal verification of a dynamic system is impractical Security policies flaws implementation flaws configuration flaws imperfect security Biological approach Dealing with an imperfect, uncontrolled and open environment. Similar to the environment the human body has to deal with Look at the human immune system as a model

ANTIgEN DATA : Possible architecture of computational immunity Protecting static data Self uncorrupted data Nonself any change in self Change detection algorithms Protecting active processes on a single host Self normal behavior Nonself abnormal behavior View each active process as a cell Passwords, group/file permissions as skin If anomaly is detected slow, suspend, or kill process Protecting a network of mutually trusting computers Process is a cell. Computer is an organ. Individual is a network Host-based and network security mechanisms

Core Technology Core Algorithms (Python– 3R methodology Honey-Comb Data Analysis K-means, A-priori… Singular statistical method Spiral of Archimede

Main Process Meta-Searching on External DataBases for viral definitions (Internet, Private Database) All data processed through the Honey-Comb Data analysis Process 1st Step of Core Algorithm Analysis – 3R methods for refining Data re-organization Process (algorithms K-means….) to create classification and Matrix of relevant Indexes 2nd Step of Core Algorithm Analysis. Reduction Spirale or Archimede to define relative the positions of other relevant information 3rd Step of Core Algorithm Analysis Singular Statistical Methodology before final Extraction

ANTIgEN DATA Adaptive Immunity Recognize non self Respond to a foreign invader Distinguish between invaders( potential pathogen)

R&D and Development Status Core Algorithms : Status Scripting : Status Debugging : Status Phase : Alpha-0 and 1 version : Status

Simulations and Misc Tests Based cloud simulation Standalone simulation Forensic and Pentesting simulation Stress tests (DDOS, MiM, SQL injection….) Benchmarking and charts of comparaison.

Development phases : Timeline Agile and Scrum methodology Wiki and Bugzilla (tracking bug system) Alpha-0/1 : timeline Beta-1/2/3 and RC-1 : timeline Integration to Existing products (Hardware and software)

Hardware and Software Integration Firewalls and Routers running genuine ANTIgEN DATA technology. Software for Cloud based system and end-user computers. Mobile and multi connected devices