© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.

Slides:



Advertisements
Similar presentations
Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Advertisements

FIREWALLS Chapter 11.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
By Hiranmayi Pai Neeraj Jain
4/14/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Microsoft Ignite /16/2017 4:54 PM
Intrusion Detection Systems and Practices
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
IBM Security Network Protection (XGS)
Enterprise Network Security Accessing the WAN Lecture week 4.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Department Of Computer Engineering
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Website Hardening HUIT IT Security | Sep
Norman SecureSurf Protect your users when surfing the Internet.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Integration Framework: QRadar 7.2 MR1.
Enterprise Network Security Accessing the WAN – Chapter 4.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Marin Frankovic Datacenter TSP
Sky Advanced Threat Prevention
Cryptography and Network Security Sixth Edition by William Stallings.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Final Project: Advanced Security Blade IPS and DLP blades.
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
SIEM Rotem Mesika System security engineering
Final Project: Advanced security blade
Exchange Online Advanced Threat Protection
Ilija Jovičić Sophos Consultant.
Enterprise Network Security
Secure Software Confidentiality Integrity Data Security Authentication
Securing the Network Perimeter with ISA 2004
Wireless Network Security
NETWORK SECURITY LAB Lab 9. IDS and IPS.
Cyber Security Why You Should Care.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
ISMS Information Security Management System
Home Internet Vulnerabilities
Enterprise Network Security
Intrusion Prevention Systems
Secure once, run anywhere Simplify your security with Sophos
Chapter 4: Protecting the Organization
Enterprise Network Security
In the attack index…what number is your Company?
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework

© 2014 IBM Corporation IBM Security Systems 2 Advanced Threat Protection (ATP) Overview ATP Integration Framework is generic mechanism for IBM Security Network Protection (ISNP) to receive external alerts and act on these alerts using Quarantine

© 2014 IBM Corporation IBM Security Systems 3 Advanced Threat Protection Policy An alert will be mapped to one of five types Compromise a successful breach of security, currently active within the environment. This could range from subversive human behavior to automated command and control exploits. Reputation describes characteristics tied to an address or web URI and related to geography or observed content behavior. Intrusion an instance of an in progress network attack attempt Malware represents malicious software in flight on the network or at risk on a disk.

© 2014 IBM Corporation IBM Security Systems 4 Advanced Threat Protection Policy (cont.) Exposure/vulnerability represents an identified network weaknesses which, if successfully exploited, could result in compromises The classification of the alert into one of 3 severities – High – Medium – Low

© 2014 IBM Corporation IBM Security Systems 5 Advanced Threat Protection Policy (cont.)

© 2014 IBM Corporation IBM Security Systems 6 Web Security Appliance Uses enterprise based sandboxing to execute and profile files to identify C&C hosts Can monitor traffic and identify internal hosts that are compromised (through calls to known C&C sites) Although Malware Detection systems can raise alerts, they are not enforcement devices ISNP can provide the enforcement for Malware Detection i Sandbox Malware Detection Integration

© 2014 IBM Corporation IBM Security Systems 7 Malware Detection / ISNP Network Topology

© 2014 IBM Corporation IBM Security Systems 8 Typical Use Cases There are three supported Quarantine use cases: Compromise: A machine infected with malware, transmitting data to a Command & Control Server represents a Compromised Host in an enterprise network. Reputation: A Command & Control Server contacted by a Compromised Host or a Web Server Hosting A Web Exploit represents a Malicious Server with a poor reputation. Malware: A Malware Object being transmitted over the network to a Target Host from a Hosting Server represents a Threat-In-Flight.

© 2014 IBM Corporation IBM Security Systems 9 Event Log: Advanced Threat Events

© 2014 IBM Corporation IBM Security Systems 10 Active Quarantines

© 2014 IBM Corporation IBM Security Systems 11 Backup

© 2014 IBM Corporation IBM Security Systems 12 Menu - Advanced Threat Policy

© 2014 IBM Corporation IBM Security Systems 13 Advanced Threat Policy

© 2014 IBM Corporation IBM Security Systems 14 Menu - Advanced Threat Protection Agents

© 2014 IBM Corporation IBM Security Systems 15 Advanced Threat Protection Agents

© 2014 IBM Corporation IBM Security Systems 16 Menu - Active Quarantines

© 2014 IBM Corporation IBM Security Systems 17 Active Quarantines

© 2014 IBM Corporation IBM Security Systems 18 Menu – Event Log

© 2014 IBM Corporation IBM Security Systems 19 Event Log: Advanced Threat Events

© 2012 IBM Corporation IBM Security Systems 20 © 2014 IBM Corporation Qradar 7.2 MR1 IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework QRadar based integration

© 2014 IBM Corporation IBM Security Systems 21 QRadar There are four supported cases: – Compromise: If the source IP is "right clicked" this IP address is sent to the XGS. This might be used in the case when the host has been infected with malware. – Reputation: If the destination IP is “right-clicked” this IP address is sent to the XGS. This represents a malicious server such as a C&C server or one hosting Malware. – Intrusion: If a source port is “right-clicked” this IP address and port combination is sent to the XGS. This can result from that client system attacking a server. – Exposure: If the destination port is "right clicked" this IP address and port combination is sent to the XGS. This might be used in the case where the service has a vulnerability.

© 2014 IBM Corporation IBM Security Systems 22 QRadar “right click” Integration (source address) “on the glass” integration

© 2014 IBM Corporation IBM Security Systems 23 QRadar “right click” Integration (source address)

© 2014 IBM Corporation IBM Security Systems 24 QRadar Advanced Threat Events

© 2014 IBM Corporation IBM Security Systems 25 QRadar 'right click' Integration (destination port) “on the glass” integration

© 2014 IBM Corporation IBM Security Systems 26 QRadar 'right click' Integration (destination port)

© 2014 IBM Corporation IBM Security Systems 27 QRadar Advanced Threat Events

© 2014 IBM Corporation IBM Security Systems 28 ibm.com/security