Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets, the (3) mark and the Level 3 Communications.

Similar presentations


Presentation on theme: "© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets, the (3) mark and the Level 3 Communications."— Presentation transcript:

1 © 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets, the (3) mark and the Level 3 Communications logo are registered service marks of Level 3 Communications, LLC in the United States and/or other countries. Level 3 services are provided by wholly owned subsidiaries of Level 3 Communications, Inc. Any other service, product or company names recited herein may be trademarks or service marks of their respective owners. FCC Cyber Security Workshop Panel 2: Detect and Respond Dale Drew, Global Security Level 3 Communications, LLC

2 2  2009 Level 3 Communications, LLC. All Rights Reserved. 2 Detection: The Tools Monitoring for trends and techniques  Industry and government forums  Grey and Blackhat forums  Netflow & SFlow– Core and Edge Real time detection of events  Netflow & SFlow – better sampling capability needed  DPI - Swarming  Element log files  Registration data  Physical Security integration  Etc

3 3  2009 Level 3 Communications, LLC. All Rights Reserved. 3 Detection: The Tools People  Skilled and trained personnel are key!  Regular incident testing  Continuous training Attacks are becoming much more social in nature  Go after the infrastructure by attacking the people who operate it

4 4  2009 Level 3 Communications, LLC. All Rights Reserved. 4 Detect and Respond: Commercial Plenty of formal and informal avenues exist to share information  Who to include/exclude often becomes the problem  ISP Threat sharing forums  Vendor coordination – although becoming more difficult On the topic of vendors  Edge vendors are becoming more versatile, more capable in detecting/stoping attacks  Core vendors care about speed

5 5  2009 Level 3 Communications, LLC. All Rights Reserved. 5 Detect and Respond: Government Plenty of formal and informal avenues exist to share information  Circle of trust is easier here  MANY forums to choose from  Information sharing needs to be more bi-directional

6 6  2009 Level 3 Communications, LLC. All Rights Reserved. 6 ISP Needs Vendors to be more accountable for security of their products Better capable DPI systems Better Netflow monitoring capabilities More information sharing between forums and from the Government More focus on the Layer 8 (end user) problem; social networking attacks  Captcha + passwords?

7 7  2009 Level 3 Communications, LLC. All Rights Reserved. 7 THANK YOU!


Download ppt "© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets, the (3) mark and the Level 3 Communications."

Similar presentations


Ads by Google