Information about Self-Defending-Network(original)

Published on August 2, 2014

Author: rijylorance



SELF DEFENDING NETWORK: SELF DEFENDING NETWORK Presented by : NIVYA JOJEN CSE B MTAKECS081 INTRODUCTION: INTRODUCTION THE CHANGING LANDSCAPE OF SECURITY : The secure network perimeter Wireless and mobility E-commerce, extranet, and conducting web-based business Virus, worms, and the rate of propagation Regulatory compliance THE NECESSITY OF SELF-DEFENDING NETWORK :: THE NECESSITY OF SELF-DEFENDING NETWORK : Type of vulnerabilities and attacks have accompanied our ever-changing networks. There is a need for adaptive and proactive defenses. Key abilities of adaptive defenses are : Remain active all time Perform unobtrusively Minimize propagation of attacks Quickly respond to as-yet unknown attacks Characteristics of a Self Defending Networks: Characteristics of a Self Defending Networks Endpoint Enforcement. Network Device Protection . Dynamic/Secure Connectivity. Dynamic Communication Between Elements. Automated Threat Response SELF DEFENDING NETWORK PowerPoint Presentation: F OUNDATION E LEMENTS : Presence it is the concept of control points. a network relies on the availability of certain capabilities within discrete nodes on the network. These capabilities include classic identity, access control, data inspection, and communication security technologies, newer application-aware capabilities that deal with the growth in the exchange of peer-to-peer content, Web services, etc. PowerPoint Presentation: Fig 3. Presence in the Self Defending Network (Contd.) PowerPoint Presentation: Context When a user signs on to the network, the network requests and gains access to a set of credentials for both the user and the host that constitute an endpoint entity . These credentials may change over time in response to the host’s actions while connected to the network. This information represents context . (Contd.) PowerPoint Presentation: Linkages Linkages between discrete entities is what allows for sharing of context and is what creates a “system”. Trust A secure system is only as good as the information that is put into it. It functions much more effectively when accompanied by comprehensive trust relationships. (Contd.) Fig 4. Credentials are Fundamental to Network Security: Fig 4. Credentials are Fundamental to Network Security (Contd.) Phases of self - defending network: Phases of self - defending network Integrated Security incorporates security elements in network elements such as switches and routers. Collaborative Security involves building linkages between network security elements and extending the network presence out onto endpoints that connect into a network. PowerPoint Presentation: Adaptive Threat Defense (ATD) introduces capabilities which enhance the ability of a network to respond to threats based on a new set of Anti-X technologies. PowerPoint Presentation: 1.Endpoint Protection viruses and worms frequently create network congestion as a byproduct of rapid propagation as well as infection of endpoints. It uses novel forms of behavioral security to detect and prevent viruses and worms from gaining a foothold on an endpoint system. prevents these viruses and worms from propagating across a network. Building blocks of S elf- D efending N etwork PowerPoint Presentation: 2.Admission Control Network Admission Control (NAC) It allows customers to determine what level of network access to grant to an endpoint based on its security posture, which is based on the security state of the operating system and associated applications. In addition to controlling access, NAC gives IT administrators a way to automatically quarantine and remediate noncompliant endpoints. (Contd.) PowerPoint Presentation: Fig 5. Controlling Admission into the Network (Contd.) PowerPoint Presentation: 3.Infection Containment Strong network admission policies are not a cure . There is a need to continue monitoring devices once they enter a network. Determined attackers can evade just about any admission check, and the network cannot always rely on, or trust , an infected element to turn itself in. The Self-Defending Network can rely on other network elements , including other endpoints, to detect when another endpoint(s) is no longer trustworthy. (Contd.) PowerPoint Presentation: 4.Intelligent Correlation and Incident Response The Self-Defending Network needs to provide services such as : real-time correlation of events, quick assessment of the security impact of an event, the ability to decide what action to take, the ability to identify the closest control point to implement a response, and more. (Contd.) PowerPoint Presentation: 5.Inline IDS and Anomaly Detection To integrate network intrusion detection systems (NIDS) into its router and switching platforms. In order for NIDS to fully deliver on its capabilities it needs to transform into an intrusion prevention system (IPS) with inline filtering capabilities . This provides a mechanism to remove unwanted traffic . (Contd.) PowerPoint Presentation: 6.Application Security and Anti-X Defense Over the past several years, a number of new application-layer network products have emerged to help address new classes of threats that were not adequately addressed by classic firewall and NIDS products, including: viruses and worms e-mail based SPAM phishing, spy-ware Web services abuse P Telephony abuse unauthorized peer-to-peer activity (Figure 5). (Contd.) Next steps of self-defending network: N ext steps of s elf- d efending n etwork building Self-Defending Networks that create linkages between POPs across networks up to and including endpoint systems helping organizations to obtain greater visibility and control of devices, users, and applications that communicate across their infrastructures. Demerits: Demerits As for today, there are a lot of good reasons not to rely on self defending networks: Expensive Incompatible Complex No mature technology Conclusion : Conclusion Networks have grown too complex for a single mechanism to reliably keep them secure. The rapidly changing landscape of security increased the necessity of SDN. Self – defending networks provide adaptive , integrated , proactive , end to end security to the network. SDN is an integration of three phase which include IPS security agent,NAC,ATD. Thank You …: Thank You …

Related presentations