1 / 22

Self-Defending Networks

Self-Defending Networks. By- Aseem Khan Adeeb Akhil Shahi Mohammed Sohail Saiprasad H Bevinakatti. Cisco Self-Defending Network (CSDN) Concept. A systems-based solution that allows entities to use their existing infrastructure in new ways to: Reduce windows of vulnerability

ava-wynn
Download Presentation

Self-Defending Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Self-Defending Networks By- • Aseem Khan • Adeeb Akhil Shahi • Mohammed Sohail • Saiprasad H Bevinakatti

  2. Cisco Self-Defending Network (CSDN) Concept A systems-based solution that allows entities to use their existing infrastructure in new ways to: Reduce windows of vulnerability Minimize the impact of attacks Improve overall infrastructure availability and reliability

  3. Today’s Organizational Challenges Due to continued economic challenges organizations and employees need to be more productive. More and more employees need to work and communicate while mobile and not infect the company with viruses. (counter productive) Organizations need to better defend against threats, vulnerabilities, events and adopt a defense-in-depth strategy. Organizations need to maximize return on investment of their limited IT budgets to improve productivity, mobility, and secure the assets of the business.

  4. A Systems Approach to Streamline IT Risk Management for Security and Compliance The Growing Need for Security Solutions RegulatoryCompliance Data Loss Malware

  5. New Internet Worms Technical Knowledge Required Threat Capabilities Packet Forging/ Spoofing High Stealth Diagnostics DDOS Sweepers Back Doors Sophistication of Hacker Tools Sniffers Exploiting Known Vulnerabilities HijackingSessions Disabling Audits Self Replicating Code Password Cracking Password Guessing Low 1990 2000 1980

  6. The Self Defending Network

  7. Improve the network’s ability to identify, prevent, and adapt to threats An initiative to dramatically improve the network’s ability to identify, prevent, and adapt to threats SECURITY TECHNOLOGY INNOVATION INTEGRATED SECURITY • Secure Connectivity • Threat Defense • Trust & Identity • Endpoint Security • Application Firewall • SSL VPN • Network Anomaly Self Defending Network Strategy SYSTEM LEVEL SOLUTIONS • Endpoints • Network • Services

  8. Cisco’s Integrated Network Security Systems Defend the Edge: • Integrated Network FW+IDS Detects and Prevents External Attacks Intranet Internet Protect the Interior: • Catalyst Integrated Security Protects Against Internal Attacks Guard the Endpoints: • Cisco Security Agent (CSA) Protects Hosts Against Infection Verify the User and Device: • Identity-Based Networking/NAC Control Who/What Has Access Secure the Transport: • IPSec VPN • SSL VPN • MPLS Protects Data/Voice Confidentiality Threat Defense Trust and Identity Secure Comm.

  9. CSDN Concept (cont.) CSDN also helps create autonomous systems that can quickly react to an outbreak with little to no human intervention

  10. Why do we need CSDN’s? Evolution of networkEvolution of attacks on networks Traditional approachDefense-in-depth Proactive defense mechanisms CSDN approach Adaptive defense mechanisms

  11. Why do we need CSDN’s? (cont.) Proactive defense mechanisms…not obsolete, simply inefficient in responding to breeches in network security Proactive solutions frontload defense mechanisms

  12. Proactive Defense Example Servers (e.g. web, e-mail, proxy) Internal Corp. Network Development Network DMZ Internet Outer Firewall Inner Firewall

  13. Why do we need CSDN’s? (cont.) Adaptive Solutions…focus isn’t solely on preventing network attacks Attempt to effectively: Detect Respond Recover Little to no adverse effect on the network and its users

  14. Why do we need CSDN’s? (cont.) Key elements of an adaptive solution: Remain active at all times Perform unobtrusively Minimize propagation of attacks Quickly respond to as-yet unknown attacks

  15. Foundation of a CSDN Endpoint Protection Admission Control Infection Containment Intelligent Correlation and Incident Response Inline IDS and Anomaly Detection Application Security and Anti-X Defense

  16. Endpoint Protection You are only as strong as your weakest link One non-sanitized end-user system connected behind a robust, efficient defense can spell D-O-O-M for a network Cisco Security Agent Point of presence on end user systems that enables efficient exchange of valuable network threat information as it occurs Endpoint system virus, worm detection/protection

  17. Admission Control Not only core component of a CSDN, but incorporated into other technologies by over 30 industry-leading vendors Network Admission Control (NAC) assists in determining the level of access to grant an end-user system in accordance with the security policy when it initially joins the network NAC also assists in managing end-user system’s compliance with security patches and updates

  18. Infection Containment The ability to identify non-compliant systems or network attacks as they occur and react appropriately, minimizing the effect of the breech Potentially the #1 core component of a secure system belonging to a CSDN

  19. Intelligent Correlation and Incident Response Services that provide the ability to exchange: Event information Implications of an event occurring Necessary actions to take The appropriate nodes or systems to enforce actions in real-time These services aide in adapting to changes and countering attacks that are occurring in the network as they occur rather than after they occur

  20. Application Security and Anti-X Defense A menagerie of application layer security products that address the “ever-evolving” classes of threats which are not effectively addressed by traditional firewall and network IDS products Threat examples: E-mail based SPAM and phishing Spyware Unauthorized peer-to-peer activity

  21. Summary New phraseology NOT a new technology Encompassing security solution that is proactive AND adaptive in nature that envelopes every level of network security rather than just specific layers Key difference in CSDN and traditional security solutions…ability of CSDN’s to communicate and share information among different security products employed within the CSDN

  22. Questions

More Related