James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.

Slides:



Advertisements
Similar presentations
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring.
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Monitoring Your Network Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop discussion.
Vulnerability Analysis Borrowed from the CLICS group.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Network Security Testing Techniques Presented By:- Sachin Vador.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Lesson 19: Configuring Windows Firewall
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
OSP214. SECURITY PRIVACY RELIABILITY & SERVICE CONTINUITY COMPLIANCE.
Automating Endpoint Security Policy Enforcement Computing and Networking Services University of Toronto.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Module 16: Software Maintenance Using Windows Server Update Services.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Using a Cisco Router as a DHCP Server.
Virtual IP Network Windows Server 2012 Windows 08 Dual Subnets.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
LinuxUNIX Red HatSUSECentOSUbuntuDebianOracleAIXHP-UXSolaris Configuration Manager * * * * * * Endpoint Protection No Plans.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Federal Cyber Policy and Assurance Issues Dwayne Ramsey Computer Protection Program Manager Berkeley Lab Cyber Security Summit September 27, 2004.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
CIS 450 – Network Security Chapter 3 – Information Gathering.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
INTERNATIONAL NETWORKS At Indiana University Hans Addleman TransPAC Engineer, International Networks University Information Technology Services Indiana.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
DIYTP Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.
Monitoring Your Network A College Approach Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop.
1 Action Automated Security Breach Reporting and Corrections.
ISS SiteProtector and Internet Scanner LanAdmin Group Meeting 12/8/2005.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
3 June, 2016 Toorcon Security Expo Hydra Intelligent Agent: Instrument for Security One Size Fits All Distributed Scanning Distributed IDS Distributed.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Copyright Justin C. Klein Security Intelligence From What and Why to How.
Lawrence Berkeley National Laboratory 1 James Rothfuss Computer Protection Program Manager Lawrence Berkeley National Lab Internet2 Security at Line Speed.
Network Security Major Problems Network Security Major Problems Why Firewall? Why Firewall? Problems with Firewalls Problems with Firewalls What is.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
Hardened IDS using IXP Didier Contis, Dr. Wenke Lee, Dr. David Schimmel Chris Clark, Jun Li, Chengai Lu, Weidong Shi, Ashley Thomas, Yi Zhang  Current.
1 Chapter 8: DHCP in IP Configuration Designs Designs That Include DHCP Essential DHCP Design Concepts Configuration Protection in DHCP Designs DHCP Design.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Windows Vista Configuration MCTS : Network Security.
Open source IP Address Management Software Review
SCALABILITY AND SECURITY Presentation. 01 Scalability.
Secure High Performance Networking at BNL Winter 2013 ESCC Meeting John Bigrow Honolulu Hawaii.
Outline Securing your system before the IDS and some tools to help you
CompTIA Security+ Study Guide (SY0-401)
Critical Security Controls
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
CompTIA Security+ Study Guide (SY0-401)
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Lesson 8: Configuring IP Settings MOAC : Configuring Windows Devices.
OpenSec:Policy-Based Security Using Software-Defined Networking
Presentation transcript:

James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System

COMPUTING SCIENCES Network Equipment Tracking System NETS Presentation Protection Concepts NETS Vision Current Implementation Future Development and Integration

COMPUTING SCIENCES Current Methods of Vulnerability Based Protection Patching Vulnerabilities Scan for Vulnerability Notify System Admin Wait Scan for Vulnerability Block Calendar Time Effort 1/2 day 5 days 1/2 day 7 days 4 hours 17 hours Totals 1 hours

COMPUTING SCIENCES NETS Vision Fully automated vulnerability discovery and elimination Network information continuously collected System connections are detected New systems scanned Network vulnerabilities evaluated as they appear Vulnerabilities blocked System admins automatically alerted Automatic block removal as vulnerabilities are fixed Safe systems given full access Internet access is maximized

COMPUTING SCIENCES Adaptive Network Protection Protection Policy Report and Notification Generation Decision Engine Network Sensors/ Parameters Scan Dispatcher Access Control Local Area Network

COMPUTING SCIENCES Sensors/Parameters DNS DHCP ARP data Router data NIS service Microsoft domain User input (registration) Network traffic Intrusion detection (Bro) Network Sensors/ Parameters Local Area Network

COMPUTING SCIENCES Probe Dispatcher Scanners –Nmap –Nessus –ISS network scanner –Custom scanners Scan Dispatcher Local Area Network

COMPUTING SCIENCES Access Control Router access controls Dynamic firewall rules Blocks at localized router switches Domain controllers / NIS DHCP RST (reset) and other network commands Network throttling Access Control Local Area Network

COMPUTING SCIENCES LBNL Network Equipment Tracking System (NETS) √ Network information collected √ System connections are detected √ Systems are probed º Vulnerabilities blocked º Automatic block removal as vulnerabilities are fixed

COMPUTING SCIENCES NETS Prototype Oracle Database DNS forward Port Locator ARPwatch DNS reverse DHCP Server Logs Policies & Business Rules Reports Scan Dispatcher Targeted Systems LBLnet Control

COMPUTING SCIENCES The Scan Dispatcher Nessus Server Nessus Server Nessus Server Host Browser-based real-time viewing of scan status and reports NETS Database Scan Dispatcher Policies, Scan Requests LBLnet Backbone & Subnets Scans are defined by policy, not discreet rules Distributed scans for faster scans Priority setting Scans initiated by NETS (automatic)

COMPUTING SCIENCES Future Advances Gathering Information –Continuous load balanced scanning –Incorporate more sensors information Access Control –Active blocking at DMZ router –Firewall for better access control –Active blocking on internal routers Host Inventory –Network history –Mandatory registration –Host and owner certification –Deploy host agent software