CybAIRVision® International Cyber Warfare & Security Conference, 27 November 2014, Ankara Cécilia Aguero.

Slides:



Advertisements
Similar presentations
Marc Grégoire, DRDC Ottawa Luc Beaudoin, Bologik Inc.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Firewalls and Intrusion Detection Systems
Microsoft Ignite /16/2017 4:54 PM
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Applied Cryptography for Network Security
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
(Geneva, Switzerland, September 2014)
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
seminar on Intrusion detection system
Presented to: MPAR Working Group By: William Benner, Weather Processors Team Manager (AJP-1820), FAA Technical Center Date: 19 March 2007 Federal Aviation.
Design and Implementation of SIP-aware DDoS Attack Detection System.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Norman SecureSurf Protect your users when surfing the Internet.
“There is nothing more important than our customers” Network Anomaly Behavioral Detection Dragon Securtiy Command Console – DSCC Zdeněk Pala ECIE certified.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
FIREWALL Mạng máy tính nâng cao-V1.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
1SWIM-SUIT Public Launch – 23 April 2007 System Wide Information Management in OATA Bert Nijhof OATA Technical Manager EUROCONTROL DAS/SAS/OCA.
1 A Local and Remote Radio Frequency Identification Learning Environment Andrew Shields & David Butcher Wireless and Mobility Research Group, Institute.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.
CybAIRVision® Next generation of Cyber-attacks : “Air Operations cyber intrusion detection”
Monitoring for network security and management Cyber Solutions Inc.
Information Assurance Program Manager U.S. Army Europe and Seventh Army Information Assurance in Large-Scale Practice International Scientific NATO PfP/PWP.
24-25 June 2010 SWIM-SUIT Final User Forum, Rome SWIM-SUIT Final User Forum.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Distributed Virtual Environments Introduction. Outline What are they? DVEs vs. Analytic Simulations DIS –Design principles Example.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
APM for Security Forensics ENHANCING IT SECURITY WITH POST-EVENT INTRUSION RESOLUTION Lakshya Labs.
Network security Product Group 2 McAfee Network Security Platform.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Cryptography and Network Security Sixth Edition by William Stallings.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
IS3220 Information Technology Infrastructure Security
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
By: Surapheal Belay ITEC 6322 / Spring ABSTRACT NIST , guide to intrusion detection and prevention systems (IDPS), discusses four types of.
Some Great Open Source Intrusion Detection Systems (IDSs)
Proactive Incident Response
Virtual Integrated Domain Awareness (VIDA) Experiment
Panel Discussion: C4I Solutions for Combating
Cyber Security coordination in Europe CERT-EU’s perspective
Instantiation of the Concept in GAMMA Prototypes
Security Management Platform
Intrusion Detection system
Cybersecurity Simplified: Phishing
Presentation transcript:

CybAIRVision® International Cyber Warfare & Security Conference, 27 November 2014, Ankara Cécilia Aguero

CybersEcuritY? CyberdEfense? DCW? OCW? CybAIRVision® CybersEcuritY? CyberdEfense? DCW? OCW?

Terms & Concepts Cyber-Security: Status expected for an information system allowing it to withstand events from cyberspace that may compromise the availability, integrity or confidentiality of data stored, processed or transmitted and related services that these systems offer or make accessible. Cyber ​​security involves technical security of information systems and is based on the fight against cybercrime and the establishment of a cyber defense. Cyber-defense: All technical and non-technical measures allowing a country to defend cyberspace information systems deemed essential. DCW and OCW: With defensive cyber-war (DCW) and offensive cyber-war (OCW), cyber helps defend and attack computers and networks of computers that control a country. The National Institute of Standards and Technology (NIST): NIST is a US Department of Commerce agency, charged of norms & standards. The NIST « cyber » framework is, since June 2014, the common Thales Group Cyber Security framework.

Cyber & CybAIR® : 2 complementary approaches The CYBER expert checks information FLOW (ipSec policies, interruption, leaks,…) The CYBAIR® expert analyzes information consistency (multi source comparison) The CYBER expert are IT Centric e.g. checks known malware The CYBAIR® expert checks abnormal system behaviour “Antivirus is dead” said Brian DYE, Symantec SVP, the 6th of May 2014 IT- Centric AND Domain-Specific/Behavior analysis provides additional protection It allows also the detection of dysfonctions .

Model-based anomaly detection for integrity monitoring Models capture information related to what is possible / not possible, what is normal / abnormal regarding objects involved in air operations TRS has deep knowledge about typical behavior of the following objects: Terrain, Sea, Sun environment Effects on detection Aircraft Performance Airspace and traffic Structure Aircraft presence/areas, traffic flows ATC data links Weather environment Timely evolution, Effects on detection Radars Coverage Data flow EW (jamming, spoofing) Communications Bandwith, latency Topology Operations Mission plan, progress Computing Operational processes, data flows Loads Human activities Roles, working hours, activities Data production cycle Voice communication calls Voice communication VoIP protocols

CybAIRVision® BUSINESS AltErations ?

Business Alterations Examples (1/2) Alterations by buffer cloning Remanence effect: copying all blocks of a radar detection to the following The radar tracker will create new "ghost" tracks depending on the type of cloned plots Camera effect: replace the actual flow by an older one, previously recorded DoS (denial of service): 500 cloned plots

Business Alterations Examples (2/2) Alterations by message generation Claim / Signature: 2D plot line => message in 3D Zone transposition : real "Red" area, destination "green" area

CybAIRVision® OFFER OVERVIEW

CybAIRVision® Suite

CybAIR Radbox : the radar security solution Real-time sensor that analyzes the information provided by radars to detect possible intrusions affecting the detection Alerts the user upon occurrence of an abnormal behavior and their operational consequences and provide decision aids Includes forensics and post-analysis features Designed and prototyped HMI with the users 40-year of Air Defense experience embedded in the CybAIR Radbox

CybAIR® Radbox : Use cases 5 4 1 2 3 Secure the radar side interfaces : New radars 1 Secure the radar side interfaces : Legacy radars 2 6 7 Secure the radar side interfaces : Tactical radars 3 Connect a military radar to a civilian ATM center 4 Connect a radar with multiple clients 5 Add an operational supervision feature 6 Add CybAIR detection with CybAIR agents 7

CybAIR® Multilink : Principles Military Radars C-Box CybAIR Com Services Military C² CybAIR Common Services ATC CybAIR Analyze CybAIR Flow Box optimized for center specificities : communication services : idem R-Box common services : idem R-Box technical & operational supervision : box HW & SW status, multi-radars data flow quality, center coverage, record & replay CybAIR detection : “AIR Operation” specific business probes real time events correlation engine

CybAIR® Multi-Link : Use cases 5 1 2 3 4 Secure the center side interfaces : Legacy radars 1 Secure the center side interfaces : New radars 2 6 7 Secure center to center interfaces 3 Connect a military center to a civilian ATM center 4 Connect a center with multiple clients 5 Add an operational supervision feature 6 Add CybAIR detection with CybAIR agents 7

CybAIR® Picture : Principles Army Navy HMI NVG Flow AIR / IAMD National or NATO COP Space Cyber National Centre or NATO P-Box CybAIR Picture Analyzer optimized for National specificities : communication services : Spying HMI inputs NVG standard / Web portal CybAIR Picture : Up to 6D Awareness (5 battlefields + temporal dimension) Real time data confidence analysis Real time data inconsistencies analysis

CybAIR® Picture : Use cases 2 4 JRE 5 SWIM 1 3 Situation & threats awareness from NATO ACCS Web Portal Interface 1 Army Navy AIR / IAMD Space Cyber Situation & threats awareness from NATO ACCS (Awcies) Interface 2 Situation & threats awareness from NATO NCOP (NVG) Interface 3 Situation & threats awareness from JRE Interface 4 Situation & threats awareness from SESAR SWIM Interface 5

CybAIR® Picture : HMI Overview

CybAIR® Picture : Focus on SupAIRVision

Thank You for your attention cecilia.aguero@thalesraytheon-fr.com