80 likes | 155 Views
Security Technology Correlation. Proneet Biswas Sr. Security Architect iPolicy Networks pbiswas@ipolicynetworks.com 510-687-3152. Ray West Director Network Services John Brown University rtwest@jbu.edu 479-524-7188. Agenda. iPolicy Networks Decoding of blended Threats
E N D
Security Technology Correlation Proneet Biswas Sr. Security Architect iPolicy Networks pbiswas@ipolicynetworks.com 510-687-3152 Ray West Director Network Services John Brown University rtwest@jbu.edu 479-524-7188
Agenda • iPolicy Networks • Decoding of blended Threats • Challenges of Point Solutions • Role of Integrated Security • Single Pass Architecture – Developing the correlation • John Brown University • Overview of Network Infrastructure • Security Upgrade Initiative • Key criteria in evaluation of solutions • Glimpse of network after deployment
Blended Threats Communicate with Controlling Servers Exploit Multiple Vulnerabilities Upgrade through rogue sites Separate propagation and attack vectors
Example • Lupii Worm • An infected system would communicate with its attacker over UDP port 7222. This communication could be used to launch a DoS attack or generate new update commands. • Exploit Web vulnerabilities on a set of systems it plans to infect and spread. • Attempt to connect to a rogue site like [http://62.101.193.244/xxxx/lupii] to upgrade itself and avoid detection attempts by IDS systems.
Challenges for Point Solutions • Takes care of the threat in its current form, not future variants
Role of Integrated Security - I • Sandbox the threat Attack Blended Threat Communicate Upgrade + = + • Firewall Rule: Block all communication UDP port 7222 • IDS Rule: Block all Web exploit patterns • URL Filtering Rule: Block all access to rogue site - http://62.101.193.244/xxxx/lupii X Integrated Security IDS/IPS Block Attack Firewall Block Communication URL Filtering Block Upgrade = + + X X
Role of Integrated Security - II • Define policies which span across multiple technologies • Performance Impact of sequential processing – throughput and latency. • Introduce new Security technologies with negligible impact • Ease of Management
Packets In Packets Out Single Pass Architecture