Anomaly Detection and Internal Network Security Jose Nazario, Ph.D. Arbor Networks.

Slides:



Advertisements
Similar presentations
Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Advertisements

Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory,Berkeley, CA A stand-alone system for detecting.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
FIREWALLS Chapter 11.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Security Firewall Firewall design principle. Firewall Characteristics.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Raw Sockets CS-480b Dick Steflik Raw Sockets Raw Sockets let you program at just above the network (IP) layer You could program at the IP level using.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewalls and Intrusion Detection Systems
Chapter 12 Network Security.
Common IS Threat Mitigation Strategies An overview of common detection and protection technologies Max Caceres CORE Security Technologies
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Host Intrusion Prevention Systems & Beyond
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
FIREWALL Mạng máy tính nâng cao-V1.
Chapter 6: Packet Filtering
Internet Security facilities for secure communication.
The Security Aspect of Social Engineering Justin Steele.
Chapter 11 Firewalls.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Firewall End-to-End Network Access Protection for IBM i.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls First notions. Breno de MedeirosFlorida State University Fall 2005 Types of outsider attacks Intrusions –Data compromise confidentiality, integrity.
Firewall End-to-End Network Access Protection for IBM i.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Security fundamentals Topic 10 Securing the network perimeter.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Role Of Network IDS in Network Perimeter Defense.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Security fundamentals
Final Project: Advanced security blade
* Essential Network Security Book Slides.
POOJA Programmer, CSE Department
Firewalls.
Introduction to Network Security
By Seferash B Asfa Wossen Strayer University 3rd December 2003
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Anomaly Detection and Internal Network Security Jose Nazario, Ph.D. Arbor Networks

Proprietary and Company Confidential Information Your role is to protect the network

Proprietary and Company Confidential Information External barriers aren’t enough

Proprietary and Company Confidential Information Your perimeter is porous to threats

Proprietary and Company Confidential Information Discover the wolf in sheep’s clothing

Proprietary and Company Confidential Information Anomaly Detection helps you find the things that don’t belong

Proprietary and Company Confidential Information GOOD BAD

Proprietary and Company Confidential Information Characterize the offending source

Proprietary and Company Confidential Information Statistical Protocol Relational

Proprietary and Company Confidential Information Statistical Anomaly Detection  Based on traffic rates  Endpoints are network blocks  Traffic by time and service  Useful for DDoS attack detection  Statistical expectations and confidence

Proprietary and Company Confidential Information Expected = Recent past + Average distant past  Statistical variance Allows for smooth changes Disallows abrupt changes

Proprietary and Company Confidential Information BPS Time

Proprietary and Company Confidential Information An example of “abrupt change”

Proprietary and Company Confidential Information Another “abrupt change”

Proprietary and Company Confidential Information Protocol-Based Detection  Based on protocol behaviors  Very generic, requires a well understood protocol  Compare protocol observations with expectations  Useful for very well controlled protocols  Works for various layers: network, applications, etc

Proprietary and Company Confidential Information From To Subject Length-based overflow against client header attack

Proprietary and Company Confidential Information Relational-Based Detection  Uses inter-host relationships  Roles (server, client, services) are usually static  Examine network traffic and peers  Changes in roles indicate odd events

Proprietary and Company Confidential Information Catalog Relationships Record every packet, flow, connection, and transaction between every host on the network. Group Automatically By observing incoming and outgoing links, similar protocols spoken, and proximity to other hosts, generate groupings. Generalize Behavior Discover which behaviors are common to the entire group, and apply to every member of the group.

Proprietary and Company Confidential Information FTP SMTP HTTP LDAP Service based relationships

Proprietary and Company Confidential Information Mail-based viruses Rogue AP Unauthorized connections

Proprietary and Company Confidential Information Inside, they don’t use exploits

Proprietary and Company Confidential Information Health Care Student Records Web Gateway Not all traffic is authorized

Proprietary and Company Confidential Information Catalog service usage over time

Proprietary and Company Confidential Information

Detect the threat inside the chaos

Proprietary and Company Confidential Information HTTP MS SQL Selectively isolate the threat

Proprietary and Company Confidential Information  Anomaly detection helps you identify real threats  You can quickly react to specific threats  Minimize the disruption and response time  Protect core assets while offering service

Proprietary and Company Confidential Information Thank you