CyberWarfare Defense against Penetration T esting and distributed - - PowerPoint PPT Presentation

cyberwarfare defense against penetration t esting and
SMART_READER_LITE
LIVE PREVIEW

CyberWarfare Defense against Penetration T esting and distributed - - PowerPoint PPT Presentation

CyberWarfare Defense against Penetration T esting and distributed Denial-of-Service Attacks The Foundation of Network Security Stand-alone (ISP/Carrier Server Farm) modular TIPS for Perimeter Defense We brought a prototype for you!


slide-1
SLIDE 1

CyberWarfare Defense against Penetration T esting and distributed Denial-of-Service Attacks

The Foundation of Network Security

slide-2
SLIDE 2

Stand-alone (ISP/Carrier – Server Farm) modular “TIPS” for Perimeter Defense We brought a prototype for you!

slide-3
SLIDE 3

Presentation Overview

  • 1. Penetration Testing & dDoS Attacks
  • a quick overview
  • 2. iSecure Technology – Overview of Core System
  • 3. iSecure applied: Penetration Testing Defense
  • 4. iSecure applied: dDoS Defense
  • 5. iSecure Development: anti-Virus, anti-SPAM
  • 6. Practical Applications in current production
  • 7. More Information, White Paper, Demonstrations
slide-4
SLIDE 4

The Threat

Penetration Testing & dDoS Attacks

  • Ongoing IP Scans to determine & exploit

vulnerabilities

  • Penetration Testing provides the “road

map” for subsequent attacks

  • dDoS attack take advantage of

vulnerabilities

  • dDoS cause wide-spread outages and

damages (economically, politically, etc).

slide-5
SLIDE 5

Defense against Penetration Testing?

  • None geared towards this purpose
  • Firewalls limit TCP/UDP ports, but leave

those open which need to pass trafc (Web, E-Mail, FTP, SSH, …)

  • Scanning Tools (NMAP, Nessus, etc.) can

map routers, frewalls, and all systems behind a frewall through open ports, determine Hardware, OSs, Confguration

slide-6
SLIDE 6

Existing Defense Approaches?

  • ALL existing solutions are re-active:
  • Signature-based trafc

comparison/matching – fnds only known attacks

  • Bandwidth Averaging: requires “learning”,

applies QoS methods, which cut of valid trafc spikes and aid dDoS attacks by “drowning out” the good trafc

slide-7
SLIDE 7

Existing Defenses? (Cont’d)

  • Router ACL modifcation works only

against defnable trafc, very slow, may require manual SysAdmin interaction – dDoS damage is done within seconds

  • ICMP port blocking defends against

some attacks, but application-level attacks share bandwidth with valid trafc, so port blocking does not help

slide-8
SLIDE 8

The iSecure CORE Technology

  • Real-time Performance (6ns to 6ms)
  • Signature-free
  • No Confguration, defends instantly
  • Stateless (!) – no attackable tables
  • Undetectable
  • Cannot be compromised
  • No MAC address / No IP Number
slide-9
SLIDE 9

Defending at Layer 2

slide-10
SLIDE 10

Works as In-Line-Scanner

slide-11
SLIDE 11

Real-Time Decisions

Bit-Stream Engine “prepares” and slices Data for parallel Processing. Decision Engine applies the iSecure algorithm

slide-12
SLIDE 12

Prepared Data “Slices” are fed to the Decision Engine

slide-13
SLIDE 13

iSecure Decision Engine applies algorithm

slide-14
SLIDE 14

iSecure Algorithm “tags” data slices based on 3-dimensional model

Slice of the decision matrix 2-dimensional model

slide-15
SLIDE 15

Re-Assembly of Data Slices

slide-16
SLIDE 16

Parallel Processing of Streams

slide-17
SLIDE 17

iSecure Technology Applied:

  • Penetration Testing Defense

(“Infrastructure Cloaking”)

  • Distributed Denial-of-Service Defense

In Development:

  • iSecure Anti-Virus
  • iSecure Anti-SPAM (UCE) E-Mail
slide-18
SLIDE 18

Penetration Testing Defense

  • Recognizes & Intercepts Penetration Testing

probes

  • Reports all ports as “open”
  • Provides no Hardware/OS/Confguration
  • “Mirrors” the Attacker’s own confguration back
  • NMAP OS Guessing Score always the highest:

9,999,999

  • Attacker does not know what the infrastructure

looks like, and cannot target an attack or explore specifc vulnerabilities

slide-19
SLIDE 19

Denial-of-Service Defense

  • iSecure recognizes “good” from “bad”

trafc, discards the bad, and allows the good trafc to go through

  • Defends against all three types of dDoS

attacks: bandwidth fooding, TCP/IP stack attacks, application-level attacks

  • Defends against KNOWN and UNKNOWN

dDoS attacks, incl. Synk4, etc.

slide-20
SLIDE 20

iSecure “TIPS”

True Intrusion Prevention System

slide-21
SLIDE 21

Current Production Example: eCommerce

  • eCommerce Hosting Provider

– Under constant dDoS attacks, web sites unavailable for days – iSecure deployment instantly defended against the dDoS attacks; web sites have been always available since

slide-22
SLIDE 22

Current Production Example Keeping E-Mail Flowing

  • SPAM Blacklist Provider OsiruSoft

permanently shut down, resulting in e- mail outages for FTC and many other users

  • All other blacklist providers under dDoS

attacks (SORBS, EazyNet, DSBL)

  • SoBig.F linked to Spam Blacklist attacks,

exploiting the network of compromised machines

slide-23
SLIDE 23

Attacks on BlackList ISPs

  • iSecure systems are being deployed at

SORBS in Brisbane, Australia, and Connecticut

  • Defending against dDoS attacks, keeping

anti-SPAM blacklist providers on the net

  • Allowing Government and Corporate E-

Mail systems to check against Blacklists to eliminate Spam

slide-24
SLIDE 24

More Information & Demo

Melior F.I.R.E CD

For live comparison and product testing

WHITE PAPER

per request

Demonstration s

Live on the Internet Or On-Site

www.dDoS.com Demo-Video

Live on the Internet At www.dDoS.com Or as DVD per request