Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.

Slides:



Advertisements
Similar presentations
REFLEX INTRUSION PREVENTION SYSTEM.. OVERVIEW The Reflex Interceptor appliance is an enterprise- level Network Intrusion Prevention System. It is designed.
Advertisements

Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Security+ Guide to Network Security Fundamentals
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
Developing Network Security Strategies Network Security D ESIGN Network Security M ECHANISMS.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
University of Maryland I.T. Security Gerry Sneeringer IT Security Officer
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
SAFE AND SOUND. INTRODUCTION Elements of Security Auditing Elements of Security Auditing Applications to Customers Network Applications to Customers Network.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Current Network Schema Router Internet Switch PC.
What is FORENSICS? Why do we need Network Forensics?
Jamel Callands Austin Chaet Carson Gallimore. Downloading
Vantage Report 3.0 Product Sales Guide
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.
Module 7: Advanced Application and Web Filtering.
Module 11: Designing Security for Network Perimeters.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Computer Security By Duncan Hall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Volunteer-based Monitoring System Min Gyung Kang KAIST.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
By: Surapheal Belay ITEC 6322 / Spring ABSTRACT NIST , guide to intrusion detection and prevention systems (IDPS), discusses four types of.
Some Great Open Source Intrusion Detection Systems (IDSs)
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
Network System Security - Task 2. Russell Johnston.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
E Safety & Security Tools 13 th March 2009 Martin Quinn - The Westfield Centre.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
(A CORPORATE NETWORK APPROACH)
High Performance Computing Lab.
6.6 Firewalls Packet Filter (=filtering router)
Lab for Internet and Security Technology Yan Chen
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Intrusion Detection & Prevention
ISMS Information Security Management System
Intrusion detection systems?
الانترنت والبريد الإلكتروني
Unit 36: Internet Server Management
Networking for Home and Small Businesses – Chapter 8
Denial-of-Service Jammer Detector Training Course Worldsensing
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Networking for Home and Small Businesses – Chapter 8
Applying Policy-Based Intrusion Detection to SCADA Networks
Networking for Home and Small Businesses – Chapter 8
Improving Data Security & Protection Using Data Provenance Figure 1
INTERNET SECURITY.
Presentation transcript:

Venus Project Brief Description

What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web servers Separate Security Servers

“At Once” structure

Architecture Sensors for gathering data Agents for traffic control (narrowing or blocking) Core Server (Venus Server) (Analysis, Log Storing, Report Builder, Control Modules, AI)

Example 1. Spam narrowing

Functions Distributed Intrusion Detection System (dIDP) Distributed Intrusion Prevention System Distributed User Network Activity Monitor Distributed Traffic Control Distributed Firewall

What we will use ? We plan to use open source software

What we want to achieve Most comprehensive threat detection by using distributed system Super speed enquiry and response. (We want to identify and lock attacker, before it harm and that should be done really fast) Clever Approach to detection Broaden detection approach and include piracy, illegal matter, piracy, etc.