Gregory Morton COSC380 February 16, 2011

Slides:



Advertisements
Similar presentations
CONTEXT-BASED INTRUSION DETECTION USING SNORT, NESSUS AND BUGTRAQ DATABASES Presented by Frédéric Massicotte Communications Research Centre Canada Department.
Advertisements

Is There a Security Problem in Computing? Network Security / G. Steffen1.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Intrusion Prevention System Group 6 Mu-Hsin Wei Renaud Moussounda Group 6 Mu-Hsin Wei Renaud Moussounda.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
DEEDS Meeting Oct., 26th 2006 Dependable, Embedded Systems and Software Group Department of Computer Science Darmstadt University of Technology Summary.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Computer & Network Security
Attacking Applications: SQL Injection & Buffer Overflows.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
Operating system Security By Murtaza K. Madraswala.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
CAPTURE THE FLAG Introductions beer brew man dutchrowboat.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
Android Mobile Security Krystal Salerno. Introductions.
Cosc 513Presentation, Fall Network Security Student: Jianping He Student ID: Instructor: ProfessorAnvari Fall 2000.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Database as a networked server DB at the centre of the network Network Access Map for DB environment Tracking of tools and apps Remove unnecessary network.
Scott Charney Cybercrime and Risk Management PwC.
Unix Security Assessing vulnerabilities. Classifying vulnerability types Several models have been proposed to classify vulnerabilities in UNIX-type Oses.
Shellcode Development -Femi Oloyede -Pallavi Murudkar.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Firewall – Survey  Purpose of a Firewall  To allow ‘proper’ traffic and discard all other traffic  Characteristic of a firewall  All traffic must go.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
CISC 849 : Applications in Fintech Vaishnavi Gandra Dept of Computer & Information Sciences University of Delaware Extracting Cybersecurity Related Linked.
NETWORK INTRUSION SECURITY BREACHES, THAT MAKE NETWORKS VULNERABLE TO UNAUTHORIZED ATTACKS.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
 Abstract  Introduction  Literature Survey  Conclusion on Literature Survey  Threat model and system architecture  Proposed Work  Attack Scenarios.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Prof. I. J. Chung Dept. of Computer & Information Science, Korea Univ. 컴퓨터와 인터넷 윤리 Professor I. J. Chung.
SIEM Rotem Mesika System security engineering
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 7: Identifying Advanced Attacks
(A CORPORATE NETWORK APPROACH)
High Performance Computing Lab.
Secure Software Confidentiality Integrity Data Security Authentication
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Operating system Security
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
Security in Networking
NETWORK SECURITY LAB Lab 9. IDS and IPS.
Information Systems Security Winter
Intrusion Detection & Prevention
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
ISMS Information Security Management System
Four Generations of Security Devices Putting IDS in Context
Identity & Access Management
The Next Generation Cyber Security in the 4th Industrial Revolution
Energy-Efficient Storage Systems
Networking for Home and Small Businesses – Chapter 8
Information Assurance & Network Security Certificate
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Engine Part ID Part 1.
Engine Part ID Part 2.
Engine Part ID Part 2.
Improving Data Security & Protection Using Data Provenance Figure 1
Protection Mechanisms in Security Management
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Gregory Morton COSC380 February 16, 2011 Firewall Devolvement Gregory Morton COSC380 February 16, 2011

Road Map Introduction Intrusion detection tools Intrusion prevention tools Problems Next-Generation firewalls Conclusion

Introduction Importance of proper security Who is it important to

IDS vs. IPS What do they do? How effective are they?

Problems Control the attack surface Prevent all types of threats Prevent the application-enabled threat Focus on enablement

Next Generation Firewalls Control Protection Performance

Control App-ID technology User-ID technology

Protection Validated 93.4% effective in IPS test Vulnerability exploits Buffer overflows DoS attacks

Performance Single Pass parallel processing architecture

Conclusion What does the next generation firewall provide?

References http://sectools.org/ids.html Paulauskas, N., & Skudutis, J. (2008). Investigation of the Intrusion Detection System "Snort" Performance. Electronics & Electrical Engineering, (87), 15-18. Retrieved from Computers & Applied Sciences Complete database. www.paloaltonetworks.com http://www.gartner.com/technology/about.jsp