Next-Generation IDS: A CEP Use Case in 10 Minutes 3rd Draft – November 8, 2006 2nd Event Processing Symposium Redwood Shores, California Tim Bass, CISSP.

Slides:



Advertisements
Similar presentations
BalaBit Shell Control Box
Advertisements

Defining a Pragmatic and Practical SOA Focused Enterprise Architecture
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Copyright © 2012, SAS Institute Inc. All rights reserved. Cyber Security threats to Open Government Data Vishal Marria April 2014.
XProtect® Expert 2013 Product presentation
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Data Mining and Intrusion Detection
Oracle Advanced Queuing Features Overview
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
DATA WAREHOUSING.
Dunja Mladenić Marko Grobelnik Jožef Stefan Institute, Slovenia.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
HOL9396: Oracle Event Processing 12c
OEP BOF9272 SOA Event Delivery Network
seminar on Intrusion detection system
Lecture 11 Intrusion Detection (cont)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
® IBM Software Group © IBM Corporation IBM Information Server Service Oriented Architecture WebSphere Information Services Director (WISD)
Governance, Risk, and Compliance Bill Greene Senior Industry Director.
IBM Research – Thomas J Watson Research Center | March 2006 © 2006 IBM Corporation Events and workflow – BPM Systems Event Application symposium Parallel.
Opening Keynote Presentation An Architecture for Intelligent Trading  Alessandro Petroni – Senior Principal Architect, Financial Services, TIBCO Software.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
©2005 Fujitsu Australia Limited Measurement as the key Conformance and Compliance enabler Mike Tsykin Systems Engineering Research Centre Fujitsu Australia.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Supporting Operational Team Filippo Lambiente (Progress Software)
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1April 2002 © 2001, Cisco Systems, Inc. All rights reserved. © 2022, Cisco Systems, Inc. All rights reserved. May 2002 Cisco Networking Services Notification.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Event Processing A Perspective From Oracle Dieter Gawlick, Shailendra Mishra Oracle Corporation March,
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
1 Makes Mobile WiMAX Simple Netspan Overview Andy Hobbs Director, Product Management 5 th October 2007.
Intrusion Detection Cyber Security Spring Reading material Chapter 25 from Computer Security, Matt Bishop Snort –
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
Cryptography and Network Security Sixth Edition by William Stallings.
Artificial Intelligence Center,
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
Comprehensive Flexible Global Storage and Search Responsive Available Secure Manageable Federation Coordination Consolidation Transformation Synchronization.
© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Operator Training – Release Introduction ReliaTel.
IS3220 Information Technology Infrastructure Security
Streaming Analytics with Spark 1 Magnoni Luca IT-CM-MM 09/02/16EBI - CERN meeting.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Slide 1 © 2016, Lera Technologies. All Rights Reserved. SAP BO vs SPLUNK vs OBIEE By Lera Technologies.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
TIFR, Mumbai, India, Feb 13-17, GridView - A Grid Monitoring and Visualization Tool Rajesh Kalmady, Digamber Sonvane, Kislay Bhatt, Phool Chand,
Activiti in an Event- driven architecture Robin Bramley Chief Scientific Officer, Ixxus.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Some Great Open Source Intrusion Detection Systems (IDSs)
Copyright © 2006, Oracle. All rights reserved Oracle Web Services Manager.
11/19/2017 9:41 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
SIEM Rotem Mesika System security engineering
IDS Intrusion Detection Systems
Ch.22 INTRUSION DETECTION
Accenture Proprietary, All Rights Reserved, Not for Distribution
Security Methods and Practice CET4884
Governance, Risk, and Compliance Bill Greene Senior Industry Director
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
Intrusion Detection Systems (IDS)
Carl Data Solutions Collects Utility Sensor and Meter Data to Provide Advanced Reporting, Alarming, and Analytics with Microsoft Azure MICROSOFT AZURE.
DAT381 Team Development with SQL Server 2005
Intrusion Detection Systems
Presentation transcript:

Next-Generation IDS: A CEP Use Case in 10 Minutes 3rd Draft – November 8, nd Event Processing Symposium Redwood Shores, California Tim Bass, CISSP Principal Global Architect, Director TIBCO Software Inc.

© 2006 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. 2 Our Agenda  The Problem  The Approach  Conclusions  Appendix: The Format of the Case Study

© 2006 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. 3 The Problem What business problem motivated the development of an event processing solution? Intrusion Detection Systems Agent Based Detection Approach Systems Protected Architecture Data Sources Analysis Timing Detection Actions HIDSNIDSHybrid Audit Logs Net Traffic System Stats Real Time Data Mining Anomaly Detection Signature Detection CentralizedDistributedActivePassive

© 2006 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. 4 Rapidly detect intrusions with a low false alarm rate and a high intrusion detection rate… The Problem What were the overall design goals the approach? (Illustrative Purposes Only)

© 2006 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. 5 The Approach Summarize the overall design of the solution. Source: Bass, T., CACM, 2000

© 2006 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. 6 The Approach Summarize the overall design of the solution. Intrusion Detection Systems Detection Approach Systems Protected Architecture Data Sources Analysis Timing Detection Actions HIDSNIDSHybrid Audit Logs Net Traffic System Stats Real Time Data Mining Anomaly Detection Signature Detection CentralizedDistributedActivePassive Agent Based Next-Generation Fusion of IDS Sensor Functions

© 2006 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. 7 The Approach Summarize the overall design of the solution. 24 EVENT PRE- PROCESSING EVENT SOURCES EXTERNAL... LEVEL ONE EVENT TRACKING Visualization, BAM, User Interaction Event-Decision Architecture DB MANAGEMENT Historical Data Profiles & Patterns DISTRIBUTED LOCAL EVENT SERVICES. EVENT PROFILES. DATA BASES. OTHER DATA LEVEL TWO SITUATION DETECTION LEVEL THREE PREDICTIVE ANALYSIS LEVEL FOUR ADAPTIVE BPM

© 2006 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. 8 The Approach Summarize the overall design of the solution. Flexible SOA and Event-Driven Architecture

© 2006 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. 9 The Approach - Phase I Event Sources and Commercial Products JAVA MESSAGING SERVICE (JMS) DISTRIBUTED QUEUES (TIBCO EMS) HIGH PERFORMANCE RULES-ENGINE (TIBCO BE) HIGH PERFORMANCE RULES-ENGINE (TIBCO BE) HIGH PERFORMANCE RULES-ENGINE (TIBCO BE) HIGH PERFORMANCE RULES-ENGINE (TIBCO BE) SENSOR NETWORK RULES NETWORK NIDSBWJMS LOGFILEJMSBW LOGFILEJMSBW LOGFILEJMSBW IDSJMSBW HIDSJMSBW SQL DBBWJMSADB SQL DBBWJMSADB MESSAGING NETWORK TIBCO PRODUCTS SOURCE

© 2006 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. 10 The Approach Event Sources and Commercial Products  Fusion of IDS information from across client event sources including:  Log files  Existing client IDS (host and network based) devices  Network traffic monitors (as required)  Host statistics (as required)  Secure, standards-based JAVA Messaging Service (JMS) for messaging:  Events parsed into JMS Application Properties  SSL transport for JMS messages  TIBCO technology for next-generation detection, prediction, rule-based intrusion response, and adaptive control  TIBCO Business Works™ as required, to transform, map or cleanse data  TIBCO BusinessEvents™ for rule-based IDS analytics  TIBCO Active Database Adapter as required

© 2006 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. 11 Conclusions & Lesson Learned What Other Features Would Have Helped.  Future Extension of IDS to rules-based access control  Integration of IDS with access control  TIBCO BusinessEvents™ for rule-based access control  Future Extension of IDS and access control to incident response  Event-triggered work flow  TIBCO iProcess™ BPM for incident response  TIBCO iProcess™ BPM security entitlement work flow  TIBCO BusinessEvents™ for rule-based access control  Future Extensions for other risk and compliance requirements  Basel II, SOX, and JSOX - for example  Future Extensions for IT management requirements  Monitoring and fault management, service management, ITIL

Thank You! Tim Bass, CISSP Principal Global Architect, Director Event Processing at TIBCO

© 2006 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. 13 The Case Study Format 1.The Problem  What business problem motivated the development of an event processing solution? (What is the purpose of the application)? 2.The Approach  Summarize the overall design of the solution.  Event sources: What types of events are used (e.g., time-ordered event streams? other?)? How many event types are involved?  What are the sources of the events?  Event processing: What types of filtering, correlation and aggregation are performed? What event processing style, event processing language and types of rules are used?  Responses: How are the results of event processing applied? Is an action or business process triggered? Are people notified? Is a dashboard or other business activity monitoring (BAM) alert distribution channel used?  What commercial software tools were applied to each stage? 3.Results, Costs and Benefits  (this section is optional and may be skipped if there is not enough time) 4.Conclusions  Would different software tools have helped? What other features would have helped?  What were the lessons learned? (What advice would you give to someone undertaking a similar project?)