130 likes | 157 Views
Explore the state of Internet security, technology challenges for high-speed networks, and future research directions to defend against evolving cyber threats like viruses, worms, spam, and DoS attacks. Learn about improving network performance, enhancing protection mechanisms, and leveraging real-time analysis for better security practices. Discover the importance of accurate network protection mechanisms, data mining techniques, and security policy management for large-scale networks. Stay informed on the latest trends to safeguard against cyber threats and ensure network security at line speed.
E N D
Security at Line Speed - Securing Internet2 Networks Erik Wu, Network Associates Laboratories
Outline • Current State of Internet Security • Technology Challenges for Security at Line Speed • Research Directions in High-Performance Assurance and Forensics
Increased Attacks Virus Intrusion Worm SPAM DoS Attack Inside Threat Intrusion
Network Incident Reports are Increasing Source: CMU Computer Emergency Response Team
Rate of Application Vulnerability Identification is Increasing Source: CMU Computer Emergency Response Team
Rate of Infection Spread is Increasing 100,000 80,000 I D n 60,000 e f v 40,000 i c e 20,000 s 0 e c t e d Code Red Nimda Goner Slammer 2,777 6,250 12,500 100,000 Machines Infected per Hour at Peak Source: McAfee AVERT
The Speed Of Attack Accelerates:Slammer Goes Global In 3 Minutes
WebShield VirusScan State of the Security Practice Sniffer SpamKiller
Technology Challenges • Improve performance of network mechanisms • Must match network performance • Packet arrival interval at 10G • 50ns for 64-byte packets • 100ns for 126-byte packets • 200ns for 256-byte packets • Millions of simultaneous traffic flows • Detect attacks • Real-time protocol analysis to understand the context of network traffic • Detect attacks carried in different protocol streams • Response to identified attacks
Technology Challenges • Improve accuracy of network protection mechanisms • Classic issues • Capture traffic at higher line rates • Identify significant patterns in traffic through aggregation & correlation of network events • Extract critical application-level information from network traffic • Present network health, forensics, security information to end-users • Leverage off-line (postmortem) analysis results to improve on-line, real-time analysis processes
Research Directions • Improve both performance and accuracy of network protection mechanisms to secure high-speed networks • Use increasing processor capabilities to • capture packets • handle millions of traffic flows • Develop real-time data mining techniques to identify traffic patterns • High-level protocol analysis and content inspection
Research Directions • Develop effective security policy management for large-scale network security • Abstraction: roles, attributes • Aggregation: treat large sets of network entities identically • Automation: configuration, policy updates • Convert performance cycles to enhance security and availability of applications • Software Virtual Machines • Trusted hardware platforms