Automating Security Response based on Internet Reputation

Similar documents
Intelligent and Secure Network

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

Security & Phishing

2018 Cyber Security Predictions

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

Botnet Communication Topologies

Automated Threat Management - in Real Time. Vectra Networks

Synchronized Security

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Use Cases. E-Commerce. Enterprise

Cisco s Appliance-based Content Security: IronPort and Web Security

Threat Landscape vs Threat Management. Thomas Ludvik Næss Country Manager

A Comprehensive CyberSecurity Policy

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Security Automation Connecting Your Silos

Size Matters Measuring a Botnet Operator s Pinkie

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Internet Security Threat Report Volume XIII. Patrick Martin Senior Product Manager Symantec Security Response October, 2008

WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

Service Provider View of Cyber Security. July 2017

1110 Cool Things Your Firewall Should Do. Extend beyond blocking network threats to protect, manage and control application traffic

DNS Firewall with Response Policy Zone. Suman Kumar Saha bdcert Amber IT Limited

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Security Architect Northeast US Enterprise CISSP, GCIA, GCFA Cisco Systems. BRKSEC-2052_c Cisco Systems, Inc. All rights reserved.

Prevent and Detect Malware with Symantec Advanced Threat Protection: Network

Un SOC avanzato per una efficace risposta al cybercrime

McAfee Embedded Control

Comprehensive datacenter protection

IBM Next Generation Intrusion Prevention System

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Symantec Enterprise Solution Product Guide

Top 10 Global Threat Rank by Source

PRODUCT OVERVIEW. Extend your security intelligence from local network to global cyberspace

2 ZyWALL UTM Application Note

Network Security Fundamentals

SOCIAL NETWORKING'S EFFECT ON BUSINESS SECURITY CONTROLS

IBM Security Network Protection Solutions

The Interactive Guide to Protecting Your Election Website

SonicWALL UTM Overview. Jon Piro NA Channel SE

Cisco Systems Korea

Evidence-based protection of web resources a must under the GDPR. How the Akamai Intelligent Platform helps customers to mitigate risks

How to Configure DNS Sinkholing in the Firewall

Tracking Evil with Passive DNS

Improved C&C Traffic Detection Using Multidimensional Model and Network Timeline Analysis

Herd Intelligence: true protection from targeted attacks. Ryan Sherstobitoff, Chief Corporate Evangelist

Changing face of endpoint security

Artificial Intelligence Drives the next Generation of Internet Security

AKAMAI CLOUD SECURITY SOLUTIONS

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

SOLUTION MANAGEMENT GROUP

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

with Advanced Protection

Symantec Endpoint Protection 14

Cisco Cyber Range. Paul Qiu Senior Solutions Architect

New methods to protect the network. Deeper visibility with Cisco NGFW Next Generation Firewall

Future-ready security for small and mid-size enterprises

FIREWALL BEST PRACTICES TO BLOCK

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

A New Security Model for the IoE World. Henry Ong SE Manager - ASEAN Cisco Global Security Sales Organization

NIP6000 Next-Generation Intrusion Prevention System

Application Security. Rafal Chrusciel Senior Security Operations Analyst, F5 Networks

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Fighting the. Botnet Ecosystem. Renaud BIDOU. Page 1

The Challenge of Spam An Internet Society Public Policy Briefing

MESSAGING SECURITY GATEWAY. Solution overview

IBM Security Network Protection Open Mic - Thursday, 31 March 2016

INF3700 Informasjonsteknologi og samfunn. Application Security. Audun Jøsang University of Oslo Spring 2015

ADVANCED, UNKNOWN MALWARE IN THE HEART OF EUROPE

WHITEPAPER. Protecting Against Account Takeover Based Attacks

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

Use Cases for Firepower Threat Defense

CyberArk Privileged Threat Analytics

Symantec Endpoint Protection

Putting security first for critical online brand assets. cscdigitalbrand.services

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Cloudflare for Mobile

Reduce Your Network's Attack Surface

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

Symantec Endpoint Protection 12

Botnets: A Survey. Rangadurai Karthick R [CS10S009] Guide: Dr. B Ravindran

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH

Unit 2 Assignment 2. Software Utilities?

Threat Control and Containment in Intelligent Networks. Philippe Roggeband - Product Manager, Security, Emerging Markets

CS Paul Krzyzanowski

UTM 5000 WannaCry Technote

BOTNET-GENERATED SPAM

Norse IPViking Technical Overview

Lecture 12. Application Layer. Application Layer 1

Moshe Elias, Product Marketing, Allot. Network Intelligence to See, Control & Secure IT

War Stories from the Cloud: Rise of the Machines. Matt Mosher Director Security Sales Strategy

Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

Transcription:

Add Your Logo here Do not use master Automating Security Response based on Internet Reputation IP and DNS Reputation for the IPS Platform Anthony Supinski Senior Systems Engineer www.h3cnetworks.com www.3com.com www.tippingpoint.com

Agenda - Reputation Services A Valuable Component in Network Protection The 3Com Introduction to Reputation concept Real world threats that could be controlled by Reputation Building a Reputation Service Collecting Reputation data Automating the delivery of Reputation data Benefits of a Reputation Service

The New 3Com: An Enterprise Networking Powerhouse Laser Focus on Enterprise Networking Financially Strong One Company, Three Brands #2 in global enterprise switches (ports) and routers (units) market share #1 market share in China Securing over 30% of the Fortune 1000 Profitable Generating cash from operations $666 Million in cash as of Q1 FY10 Large enterprise Mid-market and small enterprises Best of breed security

Focusing Your Security Resources with IP and DNS Reputation Services Known Good Traffic Unknown Traffic (security focus should be here) Inspect Trust Trust Block Known Bad Traffic (based on reputation)

Real World Threats - Botnet Command and Control Command and control (CnC) server used by Botnet master for Botnet remote control Normal traffic for communication IRC, P2P, HTTP (IM, Twitter) Dynamic selection of CnC servers Constantly moving Use both DNS and IP addresses for CnC locations Botnet Master Bots CnC Servers DNS Server April 1, 2010 5

Real World Threats - Malware Depot Malware Depots attempt to infect visiting clients Huge number of sites Two types of malware depots Used as drop sites for botnets, and hosting malware updates Botnet drop sites can also be very dynamic in nature Key lookup is often the DNS name April 1, 2010 6

Real World Threats - Phishing Sites Phishing sites attempt to gather personal or proprietary data for malicious use Large number of sites hosting phishing scams Two types of phishing sites Often redirects from compromised sites Dynamic IP addressing requires support for DNS 341 Hijacked Brands Anti-Phishing Working Group, Phishing Activity Trends Report, 3rd Quarter / 2009

Building a Strong Reputation Service 1. Worldwide Community of Sensors Collect real-time attack events Detailed attack data for analysis / correlation 2. Web Traffic Analysis and Crawling Inspection of Web traffic to detect sites of interest Conduct Web crawling and analysis 3. Careful Malware Analysis Identify Botnet CnC sites Identify Malware drop sites April 1, 2010 4. Attack / Scam Analysis Collect attacks/ scams over various apps Analysis to yield participating hosts Security Research Collect large dataset Correlate datasets Validate results Provide frequent updates Prioritize entries - reputation score Reputation Database IPv4 Addresses IPv6 Addresses DNS Names Reputation metadata

Reputation Services Automated Delivery and Enforcement Reputation Database IPv4 & IPv6 Address DNS Name Rep info / metadata tags Malicious Web Servers Access Switch Enforcement Point Internet Set Policy Based Upon Rep Score Country Type - Botnet CnC, etc. Data source Infected hosts Botnet CnC Requests Requests to to Bad Bad DNS DNS Domains Domains Blocked Blocked Traffic Traffic from from Bad Bad IP IP Addresses Addresses Blocked Blocked

Reputation Services A Smart Way to Focus Your Security Resources First line perimeter protection by blocking known bad traffic. Botnets, Botnet Comand and Control Malware, spyware, worms Spam, phishing emails DDoS Web application attacks Preserves limited security resources BENEFITS By easily blocking difficult to detect bad traffic (those blackhats are sneaky!) By lowering the overhead on other security devices (firewalls, NIPS, etc.)

Come see us at Booth # 209.

Thank You Anthony Supinski Senior Systems Engineer www.h3cnetworks.com www.3com.com www.tippingpoint.com