SlideShare ist ein Scribd-Unternehmen logo
1 von 2
INTRODUCTION

As the nature of threats to organizations continues to evolve, so must the defense
posture of the organizations. In the past, threats from both internal and external
sources were relatively slow-moving and easy to defend against. In today's
environment, where Internet worms spread across the world in a matter of minutes,
security systems - and the network itself - must react instantaneously.

The foundation for a self-defending network is integrated security - security that is
native to all aspects of an organization. Every device in the network - from
desktops through the LAN and across the WAN - plays a part in securing the
networked environment through a globally distributed defense. Such systems help
to ensure the privacy of information transmitted and to protect against internal and
external threats, while providing corporate administrators with control over access
to corporate resources. SDN shows that the approach to security has evolved from
a point product approach to this integrated security approach


These self-defending networks will identify threats, react appropriately to the
severity level, isolate infected servers and desktops, and reconfigure the network
resources in response to an attack. The vision of the Self-Defending Network
brings together Secure Connectivity, Threat Defense and Trust and Identity
Management System with the capability of infection containment and rouge device
isolation in a single solution.

SELF DEFENDING NETWORKS

To defend their networks, IT professionals need to be aware of the new nature of
security threats, which includes the following:

Shift from internal to external attacks Before 1999, when key applications ran on
minicomputers and mainframes, threats typically were perpetrated by internal users
with privileges. Between 1999 and 2002, reports of external events rose 250
percent, according to CERT.

Shorter windows to react. When attacks homed in on individual computers or
networks, companies had more time to understand the threat. Now that viruses can
propagate worldwide in 10 minutes, that "luxury" is largely gone. Antivirus
solutions are still essential but are not enough: by the time the signature has been
identified, it is too late. With self-propagation, companies need network
technology that can autonomously take action against threats.
More difficult threat detection. Attackers are getting smarter. They used to attack
the network, and now they attack the application or embed the attack in the data
itself, which makes detection more difficult.An attack at the network layer, for
example, can be detected by looking at the header information. But an attack
embedded in a text file or attachment can only be detected by looking at the actual
payload of the packet--something a typical firewall doesn't do.The burden of threat
detection is shifting from the firewall to the access control server and intrusion
detection system.Rather than single-point solutions, companies need holistic
solutions.

A lowered bar for hackers. Finally, a proliferation of easy-to-use hackers' tools and
scripts has made hacking available to the less technically-literate. The advent of
'point-and-click' hacking means the attacker doesn't have to know what's going on
under the hood in order to do damage.

These trends in security are what have lead to the advent of SDNs or Self
Defending Networks as the latest version in security control.

Weitere ähnliche Inhalte

Was ist angesagt?

Fog computing
Fog computingFog computing
Fog computing
Mahantesh Hiremath
 
Principles of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine LearningPrinciples of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine Learning
Jerry Lu
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
Inder NeGi
 

Was ist angesagt? (20)

Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar report
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Artificial intelligence
Artificial intelligence Artificial intelligence
Artificial intelligence
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Industrial Internet of Things (IIOT)
Industrial Internet of Things (IIOT)Industrial Internet of Things (IIOT)
Industrial Internet of Things (IIOT)
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Lamp technology
Lamp technologyLamp technology
Lamp technology
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Fog computing
Fog computingFog computing
Fog computing
 
Technologies Demystified: Artificial Intelligence
Technologies Demystified: Artificial IntelligenceTechnologies Demystified: Artificial Intelligence
Technologies Demystified: Artificial Intelligence
 
Ai presentation
Ai presentationAi presentation
Ai presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Introduction to Artificial Intelligence and few examples
Introduction to Artificial Intelligence and few examplesIntroduction to Artificial Intelligence and few examples
Introduction to Artificial Intelligence and few examples
 
Principles of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine LearningPrinciples of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine Learning
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
oneM2M – Open standard enables interoperability for IoT
oneM2M  – Open standard enables interoperability for IoToneM2M  – Open standard enables interoperability for IoT
oneM2M – Open standard enables interoperability for IoT
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
 

Ähnlich wie Self defending networks

Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune System
Austin Eppstein
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
forladies
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
Saikat Chaudhuri
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
Jennifer Letterman
 

Ähnlich wie Self defending networks (20)

Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune System
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technology
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 

Self defending networks

  • 1. INTRODUCTION As the nature of threats to organizations continues to evolve, so must the defense posture of the organizations. In the past, threats from both internal and external sources were relatively slow-moving and easy to defend against. In today's environment, where Internet worms spread across the world in a matter of minutes, security systems - and the network itself - must react instantaneously. The foundation for a self-defending network is integrated security - security that is native to all aspects of an organization. Every device in the network - from desktops through the LAN and across the WAN - plays a part in securing the networked environment through a globally distributed defense. Such systems help to ensure the privacy of information transmitted and to protect against internal and external threats, while providing corporate administrators with control over access to corporate resources. SDN shows that the approach to security has evolved from a point product approach to this integrated security approach These self-defending networks will identify threats, react appropriately to the severity level, isolate infected servers and desktops, and reconfigure the network resources in response to an attack. The vision of the Self-Defending Network brings together Secure Connectivity, Threat Defense and Trust and Identity Management System with the capability of infection containment and rouge device isolation in a single solution. SELF DEFENDING NETWORKS To defend their networks, IT professionals need to be aware of the new nature of security threats, which includes the following: Shift from internal to external attacks Before 1999, when key applications ran on minicomputers and mainframes, threats typically were perpetrated by internal users with privileges. Between 1999 and 2002, reports of external events rose 250 percent, according to CERT. Shorter windows to react. When attacks homed in on individual computers or networks, companies had more time to understand the threat. Now that viruses can propagate worldwide in 10 minutes, that "luxury" is largely gone. Antivirus solutions are still essential but are not enough: by the time the signature has been identified, it is too late. With self-propagation, companies need network technology that can autonomously take action against threats.
  • 2. More difficult threat detection. Attackers are getting smarter. They used to attack the network, and now they attack the application or embed the attack in the data itself, which makes detection more difficult.An attack at the network layer, for example, can be detected by looking at the header information. But an attack embedded in a text file or attachment can only be detected by looking at the actual payload of the packet--something a typical firewall doesn't do.The burden of threat detection is shifting from the firewall to the access control server and intrusion detection system.Rather than single-point solutions, companies need holistic solutions. A lowered bar for hackers. Finally, a proliferation of easy-to-use hackers' tools and scripts has made hacking available to the less technically-literate. The advent of 'point-and-click' hacking means the attacker doesn't have to know what's going on under the hood in order to do damage. These trends in security are what have lead to the advent of SDNs or Self Defending Networks as the latest version in security control.