SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Security in Network
CNC LAB
2013/10/04
Security level in network
Host level (Application Hacking)
Network level (VPN, BGP)
Application level (Firewall, IDS/IPS, Anti-virus)
Transmission level (ARP, RIP, OSPF, DNS Hiding, HTTPS, TLS/SSL, IPSec)
ARP – Address Resolution Protocol
Required TCP/IP standard defined in RFC 826
Resolved IP addresses used by TCP/IP-based software to Media
Access Control (MAC) addresses used by LAN hardware.
MAC addresses are obtained by using a network broadcast request
◦ What is the MAC address for a device that is configured with the enclosed IP
address?
When an ARP request is answered, both the sender of ARP reply and
the original ARP requesterrecord each other’s IP address and MAC
as an entry in local table called the ARP cachefor future reference.
ARP
An attacker sends a fake ARP messages onto
aLAN.
Aim is to associate the attacker’s MAC
address with the IP address of another host,
sothat any traffic meant from that IP address
are sent to the attacker instead.
ARP Spoofing allows attacker to intercept
data frames on a LAN.
Can only beused on the local network
segments.
RIP Attack
Forging RIP messages
Spoofing source address and sending invalid routes, altering traffic
flow.
◦ Traffic Hijacking
◦ Traffic Monitoring
◦ Redirecting traffic from trusted to untrusted.
Obtaining Clear text RIPv2 "password" when sent across network.
◦ Using retrieved password to send authenticated updates to RIPv2
routers, altering traffic flow with consequences listed above.
RIP Safeguards
Disabling RIPv1 and using RIPv2 with MD5 authentication.
EnablingMD5 based authentication for RIPv2
Disabling RIP completelyand using OSPF with MD5 authentication as
interior gateway protocol. OSPF is the suggested IGP
OSPF Attacks
Forging OSPF messages
◦ Can be some what difficult but theoreticallypossible if no
authenticationrequired or clear text password obtained.
Identified 4 ospf attacks
◦ Max Age attack
◦ Sequence++attack
◦ Max Sequence attack
◦ Bogus LSA attack
Fig: Sequence number attack
OSPF Safeguards
Do not use Dynamic Routing on hosts wherevernot required
ImplementMD5 authentication
◦ You need to deal with key expiration, changeover and coordination across
routers
DNS Hiding
Hiding DNS does not improvesecurity
 Easy to learn about a network once you’ve penetrated it
 Many other ways for host/address information to leak out
Hiding DNS may be necessaryif you do not havevalid IP addresses
 Or many unreachable nodes/networks
Typical DNS Environment
Hidden DNS Environment
Firewall->Internal Queries
Internal
queries
Firewall
Internal
queries
Firewall->External Queries
Firewall External
queries
External
queries
DNS Infrastructure is Vulnerable Example.com
App Servers
GSLB
LDNS
www.example.com? www.example.com?
123.123.123.123
Hacker
Spoofing with first
response
Cache poisoning
012.012.012.012
Problem
Need to secure DNS infrastructure
• Cache poisoning and spoofing can hijack DNS records
• Need a method for trusted responses
• Need to meet US Government mandate for DNSSEC
compliance
Spoofing and cache poisoning allow hijacking
of domains
Securing the DNS Infrastructure
Dynamic and secure DNS with
Global Traffic Manager
Example.com
App Servers
BIG-IP GTM
LDNS
www.example.com? www.example.com?
123.123.123.123
+ public key
Hacker
123.123.123.123
+ public key
Client gets signed,
trusted response
Solution
Secure and dynamic DNS
• Ensure users get trusted DNS queries with signed
responses
• Reduce management costs – Simple to implement and
maintain
• Meet mandates with DNSSEC compliant solution
BIG-IP Global Traffic
Manager with DNSSEC
TLS/SSL
TransportlayerSecure/SocketSecureLayers
Providecommunication securityovertheInternet
UseX.509certificatesandhenceasymmetric
cryptographytoassurethecounterparty whom
theyaretalkingwith,andexchange a
symmetrickey.
Thesession keyisthenusedtoencryptdata
flowingbetweentheparties.Allowsfor
data/message confidentiality, message
integrity.
TLS/SSLisinitializedatlayer5(sessionlayer)then
worksatlayer6(presentation layer).Itworkson
behalfoftheunderlyingtransportlayer.
HTTPS
Acommunicationprotocolforsecurecommunication
overacomputernetwork.
TheresultofsimplylayeringtheHTTPontopofthe
SSL/TLSprotocol,thusaddingthesecurity capabilities
ofSSL/TLStostandardHTTPcommunications..
Internet Protocol Security (IPsec)
IPsecisaprotocolsuiteforsecuringInternetProtocol(IP)
communicationsbyauthenticatingandencryptingeach
IPpacketsofacommunicationsession.
IPsecusesthefollowingprotocolstoperformvarious
functions:
◦ AuthenticationHeadersprovideconnectionless
integrityanddataoriginauthenticationforIPdatagrams
andprovidesprotectionagainstreplayattacks.
◦ EncapsulationSecurityPayloadsprovideconfidentially,
data-originauthentication,connectionintegrity,andanti-
replayservice,limitedtraffic-flowconfidentially.
◦ SecurityAssociationsprovidethebundleofalgorithms
anddatathatprovidetheparametersnecessarytoAH
and/orESPoperations.
Internet Protocol Security (IPsec)
TherearetwomodesofoperationinIPsec
Transportmode:OnlythepayloadofIPpacketis
usuallyencryptedand/orauthenticated.
Usingauthenticationheader,IPheadercannotbe
translated,asthiswillinvalidatethehashvalue.The
transportandapplicationlayersarealwayssecuredby
hash,sotheycannotbemodifiedinanyway.
Tunnelmode:EntireIPpacketisencryptedand/or
authenticated.Itis thenencapsulatedintoanewIP
packetwithanewIPheader.
Tunnelmodeisusedtocreatevirtualprivatenetworkfor
network-to-networkcommunications,host-to-network
communications,andhost-to-hostcommunications
Firewall
AFirewall is ahardware or software device which is configured to permit, deny or
proxy data through a computer network which has difference levels of trust.
Hardware firewall is a device located between Internet and end-terminals
Apply some “ruleset” filters in Control Plane, and Data Planeto prevent from
some attacks that enter an or some interfaces
Firewall types
Intrusion Detection System (IDS/IPS)
IDS is a device or software application thatmonitors network or system activities
for malicious activities or policy violations and procedures reports to a
management station.
Focus on identifying possible incidents, logging information about them, and
reporting attempts.
Intrusion Detection System (IDS/IPS)
Different from a firewall that a firewall looks outwardly for intrusions in order to stop
themfrom happening.
IDS evaluated a suspected intrusion once it has taken place and signals an alarm.
Usestatistical anomaly-based IDS to detect anomalous traffic and signature-based
IDS to monitor packets in the network, compare them with pre-configured and pre-
determined attack patterns.
Anti-virus protection
Therearetwotypesoftheanti-virusprotection:Host-basedantivirus(HAV)andNetwork-
basedantivirus(NAV)
Host-basedantivirussolutions
Bedeployedintheformofsoftwareprogramsthatrunonstandardhostcomputer
platforms.Beusedtoprovideprotectionsolelyforthehostonwhichitisinstalled
HAVarefile-based,theyalwaysworkinconjunctionwiththefilesysteminstalledonthehost.
HAVproductsoperateinanuncontrolledenvironment,requiresignificantadministration,only
operateonfilesthathavebeenwrittentothehost’sdiskfilesystem
HAVproductstypicallyreducestheoverallperformanceofthehostonwhichitruns,are
rarelyusedtoscanreal-timeapplications
Anti-virus protection
Network-basedAVsolutionsareinstalledona
networkgatewaybetweentwonetworks.
NAVsystemstypicallyemploydedicatedplatforms.
NAVsystemsprovideasinglebarrierbehindwhich
allhostsareprotected.
NAVsystemsstopvirusesatthenetworkedge.
NAVsystemsreducetheloadonserversby
eliminatinginfecteddatabeforetheyreachthe
servers.
NAVsystemsarewellpositionedinthenetworkto
scanWebandothertrafficthattendstobypass
conventionalHAVsystems.
Virtual Private Network (VPN)
Avirtualprivatenetworkallowstheprovisioningofprivatenetworkservicesforan
organizationororganizationsoverapublicorsharedinfrastructuresuchastheInternetor
serviceproviderbackbonenetwork.
AVPNisacombinationofsoftwareandhardwarethatallowsemployees,telecommuters,
businesspartners,andremotesitestouseapublicor“unsecured”mediumsuchastheInternet
toestablishasecure,privateconnectionwithahostnetwork
AVPNconnectionisapoint-to-pointconnectionbetweentheuser’scomputerandthe
company’sserver
Virtual Private Network (VPN)
AkeycomponentofaVPNsolutionisprovidingdataprivacy,userauthenticationandaccesscontrol.
Protocolsandtechnologiesusedtoenablesite-to-siteVPNsincludeIPsecurity(IPsec),Genericroutingencapsulation
(GRE),thelayer2tunnelingprotocol,IEEE802.1Q, MPLS.
ProtocolsusedtoenableremoteaccessVPNsincludedtheLayer2forwardingprotocol,Point-to-pointtunneling
protocol,thelayer2tunnelingprotocol,IPsecurity,theSecuresocketslayer
BGP Hijacking
 AS100 is advertising their owned route(10.0.0.0/8) : Victim AS
 AS400 is advertising invalid route(10.0.0.0/8) : Hijacking AS
 AS300 is infected by Hijacking : Infected AS
 AS200 is Influenced but not infected by Hijacking : Influenced AS
AS 200 AS 300
AS 400AS 100
10.0.0.0/8 10.0.0.0/8
10.0.0.0/8
10.0.0.0/8
> 10.0.0.0/8 100
10.0.0.0/8 300 400
10.0.0.0/8 200 100
> 10.0.0.0/8 400
Securing the Border Gateway Protocol
Fig: S-BGP Element Interactions
 S-BGPisanarchitecturalsolution
totheBGPsecurityproblems.
 DevelopedbyCisco
 S-BGPmakesuseof:
IPsec
PublicKeyInfrastructure
Attestations
BGP Threat Mitigations
MD5 carried in TCP
header
Fig: BGP MD5 Neighbor Authentication
Application Hacking
Security flaws in
application level
Un-validated Input
Broken Access Control
Broken authentication
and Session
management
Cross site scripting
Buffer overflows
Injection flaws
Improper error handling
Insecure storage
Denial of Service
Insecure configuration
Management
Application Hacking
Application shield: is referred to as an application-level firewall. In ensures that
incoming and outgoing requests are permissible for the given application. It is
common installed on Web servers, email servers, database servers, and similar
machines. It is transparent to the user but highly integrated with the device on the
backend.
Access control/authentication, only authorized users are able to access the
application.
Input validation verify that application input travelling across your network is safeto
process.

Weitere ähnliche Inhalte

Was ist angesagt?

Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingVi Tính Hoàng Nam
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 BackupJai4uk
 
Paper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesPaper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesYOU SHENG CHEN
 
CEHv7 Question Collection
CEHv7 Question CollectionCEHv7 Question Collection
CEHv7 Question CollectionManish Luintel
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Communityamiable_indian
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logicAlberto Rivai
 
Future Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudFuture Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudSedthakit Prasanphanich
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffersleminhvuong
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation TechniquesIntruGuard
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingVi Tính Hoàng Nam
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotVi Tính Hoàng Nam
 

Was ist angesagt? (20)

Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
 
Day3
Day3Day3
Day3
 
Paper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesPaper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devices
 
Firewall
FirewallFirewall
Firewall
 
CEHv7 Question Collection
CEHv7 Question CollectionCEHv7 Question Collection
CEHv7 Question Collection
 
Day4
Day4Day4
Day4
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
 
Ceh v5 module 03 scanning
Ceh v5 module 03 scanningCeh v5 module 03 scanning
Ceh v5 module 03 scanning
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
Future Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudFuture Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloud
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 
Network security
Network securityNetwork security
Network security
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 

Ähnlich wie Secure your network with IPS, firewalls and VPNs

Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksIOSR Journals
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contestnkrafacyberclub
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegidoCisco do Brasil
 
From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...Jisc
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANsronrulzzz
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System AdminMD SAHABUDDIN
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issuesbathinin1
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer AttacksArun Modi
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksInformation Technology
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devicesphanleson
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection toolsvishalgohel12195
 

Ähnlich wie Secure your network with IPS, firewalls and VPNs (20)

D017131318
D017131318D017131318
D017131318
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 
DDOS (1).ppt
DDOS (1).pptDDOS (1).ppt
DDOS (1).ppt
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegido
 
From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANs
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Describe firewalls
Describe firewallsDescribe firewalls
Describe firewalls
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Dns protection
Dns protectionDns protection
Dns protection
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devices
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 

Kürzlich hochgeladen

EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 

Kürzlich hochgeladen (20)

EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 

Secure your network with IPS, firewalls and VPNs

Hinweis der Redaktion

  1. Global Server Load Balancing (GSLB)Local Domain Name Server (LDNS)Domain name server security(DNSSEC)
  2. Global Server Load Balancing (GSLB)Local Domain Name Server (LDNS)Domain name server security(DNSSEC)BIG-IP Global Traffic Manager product
  3. Invalid BGP route announcementTraffic diverting by BGP route hijacking, unreachable…Detection is not so easy…Recovery is very hard…Not frequently, but it occursEasy outbreak, but big impactNot only global, but localized outbreak
  4. http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-3/securing_bgp_s-bgp.htmlIPsec to secure point-to-point communication of BGP control trafficPublic Key Infrastructure to provide an authorization framework representing prefix holders and owners of AS #’s Attestations (digitally-signed data) to represent authorization informationS-BGP is an architectural solution to the BGP security problems described earlier by CiscoS-BGP represents an extension of BGPIt uses a standard BGP facility to carry additional data about paths in UPDATE messagesIt adds an additional set of checks to the BGP route selection algorithmS-BGP avoids the pitfalls of transitive trust that are common in today’s routing infrastructureS-BGP mechanisms exhibit the same dynamics as BGP, and they scale commensurately with BGP