SlideShare a Scribd company logo
1 of 9
Download to read offline
Moving Security Model
From Content To Context


        Quick Random Thoughts on
 Security Trends and Technologies for 2012

                Paolo Passeri




                                       paulsparrows.wordpress.com
Why Next Generation Technologies Are Needed




         Malware is getting more and more sophisticated and capable to
         circumvent traditional security technologies

                                                                paulsparrows.wordpress.com
APTs Are Changing The Rules Of The Game




  APTs threaten Organizations on different levels (from users to application) and
  heterogeneous time scales, redefining the information security landscape. Firewalls, Next
  Generation Firewalls and Intrusion Prevention Systems are converging to a new breed
  of security devices capable of moving the security enforcement paradigm to context, taking
  over the old model based on “IP Address, Protocol and Access Control” to a new model
  focused on “user, application and anomaly”.
                                                                        paulsparrows.wordpress.com
The Next Level: From Content to Context




  Context-aware security is the use of supplemental information to improve security
  decisions at the time the decision is made. Supplemental Information include: Geo
  Location, Reputation, and the interaction of the user with the environment (applications,
  directory, etc.). This class of devices is called Next Generation IPS:

  http://blogs.gartner.com/neil_macdonald/2011/10/13/next-gen-context-aware-intrusion-
  prevention/

                                                                       paulsparrows.wordpress.com
NG-IPS Vs The Rest Of The World
                       Firewall                        IPS                                   NGF                                       NG-IPS
Works At               Layer 3-4                       Layer 4-7                             Layer 7                                   Layer 4-7
Security Paradigm      • IP Address                    • Protocol                            • User                                    • User
                       • Port                          • Vulnerability                       • Application                             • Application
                       • Protocol                                                                                                      • Vulnerability
Scans                  All Traffic                     All   Traffic                         Classified Applications                   All Traffic including classified Applications
Deployed as            • Layer 3 Gateway               •     Transparent Mode                • Layer 3 Gateway                         • Layer 3 Gateway
                       • Transparent Mode              •     Connected to TAP                • Transparent Mode                        • Transparent Mode
                                                       •     Connected to Span Port
Defends Against        •     Intrusions by             •     Intrusions by everyone          •     Misuse of applications by Users; •        Intrusions by everyone exploiting
                             unauthorized users              exploiting vulnerabilities at   •     Intrusions by unauthorized users          application and server vulnerabilities,
                             exploiting known ports;         Layer 4-7;                            exploiting classified applications; •     Misuse of applications by users

Performs Access        Yes                             No                                    Yes                                       Yes
Control
Access Control By      •     IP Address                -                                     •     User                            • User
                       •     Port                                                            •     Application                     • Application
                       •     Protocol                                                                                              • IP address
                                                                                                                                   • Port
                                                                                                                                   • Protocol
Detection Algorithms   •     Packet Filter             •     Deep Packet Inspection          • Application Classification via      • Stateful Inspection
                       •     Application Proxy         •     Signatures                          proprietary methods               • Deep Packet Inspection
                       •     Stateful Inspection       •     Pattern Matching                                                      • Application Classification
                                                       •     Protocol-Based                                                        • Signatures
                                                       •     Anomaly Detection                                                     • Pattern Matching
                                                       •     Heuristics                                                            • Anomaly Detection (ApplAnd Protocol)
                                                                                                                                   • Heuristics
Use cloud based        No                              Yes for updating signatures           Yes for updating application          Yes for updating signatures and
services                                               from data received from other         fingerprints and dynamically classify application fingerprints
                                                       sensors                               unknown applications
Use reputation and     No                              Partially                             No                                    Yes
Geo-location
Dedicated Device       Yes                             May exist as a dedicated device       Once existed as a dedicated device,       Yes, Will replace traditional Firewalls, NG
                                                       or as a security feature on a         now is a security feature on top of a     Firewalls, IPSs
                                                       UTM                                   “traditional firewall”
Deployed at            Perimeter                       On perimeter firewall or behind       Perimeter, focused to protect             Perimeter
                                                       it and in front of Key Asset s        outbound traffic
May Scan SSL           No                              Yes                                   No                                        Yes




                                                                                                                                           paulsparrows.wordpress.com
Web Application Firewalls
   The growing number of vulnerabilities targeting Web Applications and cyber attacks
   carried on against banks together with the need to be compliant with strict requirements
   and regulations are pushing the adoption of Web Application Firewalls. Although
   Technology tends to consolidate traditional security solutions, WAFs are destined to
   remain standalone dedicated devices in front of key web assets to protect.




   These devices are required by PCI-DSS and most of all by the growing attention by
   Cybercrookers for exploiting vulnerabilities in banking web applications. Only this year,
   famous victims included CitiGroup and Samsung Card. In particular attackers were able
   to subtract $2.7 million to Citigroup.

   http://spectrum.ieee.org/riskfactor/telecom/security/citigroup-admits-being-hacked-in-
   may-coy-about-extent-of-impact

   http://www.databreaches.net/?p=20522


                                                                          paulsparrows.wordpress.com
WAFs Against The Rest Of The World




                                     paulsparrows.wordpress.com
So Which Is The Most Revolutionary Technology?




        Avoid to invest in new technologies without first patching the user!

        APT Holds only for 1%, (human) vulnerabilities for the
        remaining 99%
                                                                      paulsparrows.wordpress.com
References


Oct 5, 2011:    Information, The Next Battlefield
                http://paulsparrows.wordpress.com/2011/10/05/information-the-
                next-battlefield/

Oct 7, 2011:    Next Generation Firewalls and Web Applications Firewall Q&A
                http://paulsparrows.wordpress.com/2011/10/07/next-generation-
                firewalls-and-web-applications-firewall-qa/

Oct 13, 2011:   Advanced Persistent Threats and Security Information Management
                http://paulsparrows.wordpress.com/2011/10/13/apts-and-
                security-information-management/

Oct 27, 2011:   Are You Ready For The Next Generation IPS?
                http://paulsparrows.wordpress.com/2011/10/27/are-you-ready-
                for-the-next-generation-ips/

Nov 20, 2011:   Advanced Persistent Threats and Human Errors
                http://paulsparrows.wordpress.com/2011/11/20/advanced-
                persistent-threats-and-human-errors/

More Related Content

What's hot

12213217 pss7
12213217 pss712213217 pss7
12213217 pss7
irenechau
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
Suhas Desai
 
12203718‐pss7
12203718‐pss712203718‐pss7
12203718‐pss7
12203718
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
Cisco Russia
 

What's hot (20)

12213217 pss7
12213217 pss712213217 pss7
12213217 pss7
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
 
12202703 pps7
12202703 pps712202703 pps7
12202703 pps7
 
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmėsRainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės
 
12214116 pp7
12214116 pp712214116 pp7
12214116 pp7
 
Rfid
Rfid Rfid
Rfid
 
12203718‐pss7
12203718‐pss712203718‐pss7
12203718‐pss7
 
12207640 pss7
12207640 pss712207640 pss7
12207640 pss7
 
NFC: Naked Fried Chicken (PHDays VI)
NFC: Naked Fried Chicken (PHDays VI)NFC: Naked Fried Chicken (PHDays VI)
NFC: Naked Fried Chicken (PHDays VI)
 
12206571 pss7
12206571 pss712206571 pss7
12206571 pss7
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
 
12250090 pss7
12250090 pss712250090 pss7
12250090 pss7
 
12250090 pss7
12250090 pss712250090 pss7
12250090 pss7
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
 
12213845 pss7
12213845 pss712213845 pss7
12213845 pss7
 
Global tag portfolio_2015
Global tag portfolio_2015Global tag portfolio_2015
Global tag portfolio_2015
 
12204560 pss7
12204560 pss712204560 pss7
12204560 pss7
 
12206571 pss7
12206571 pss712206571 pss7
12206571 pss7
 
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
It’s in the Air(waves): Deconstructing 2017’s Biggest RF AttacksIt’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
 
Sample PPT
Sample PPTSample PPT
Sample PPT
 

Viewers also liked

Context Aware Reactive Applications
Context Aware Reactive ApplicationsContext Aware Reactive Applications
Context Aware Reactive Applications
ClarkTony
 
Introduction to Selinux
Introduction to SelinuxIntroduction to Selinux
Introduction to Selinux
Atul Jha
 
5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)
randhirlpu
 
Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & future
Alex Matrosov
 
Structured system analysis
Structured system analysisStructured system analysis
Structured system analysis
learnt
 
Addie instructinal design model
Addie instructinal design modelAddie instructinal design model
Addie instructinal design model
Bee Ho
 

Viewers also liked (20)

Mobile Security Business-e
Mobile Security Business-eMobile Security Business-e
Mobile Security Business-e
 
Relazione tavola rotonda 14 marzo final
Relazione tavola rotonda 14 marzo finalRelazione tavola rotonda 14 marzo final
Relazione tavola rotonda 14 marzo final
 
Cyberwar22092011
Cyberwar22092011Cyberwar22092011
Cyberwar22092011
 
Hackmageddon stats: 4 Year of Cyber Attacks
Hackmageddon stats: 4 Year of Cyber AttacksHackmageddon stats: 4 Year of Cyber Attacks
Hackmageddon stats: 4 Year of Cyber Attacks
 
Context Aware Reactive Applications
Context Aware Reactive ApplicationsContext Aware Reactive Applications
Context Aware Reactive Applications
 
NTU_Portfolio
NTU_PortfolioNTU_Portfolio
NTU_Portfolio
 
1 system security
1 system security1 system security
1 system security
 
2 erd
2 erd2 erd
2 erd
 
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
 
Rbac
RbacRbac
Rbac
 
Ais Romney 2006 Slides 20 System Design
Ais Romney 2006 Slides 20 System DesignAis Romney 2006 Slides 20 System Design
Ais Romney 2006 Slides 20 System Design
 
Introduction to Selinux
Introduction to SelinuxIntroduction to Selinux
Introduction to Selinux
 
Context model
Context modelContext model
Context model
 
5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)
 
Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & future
 
Security models
Security models Security models
Security models
 
Open Context Model of Learning & Craft of Teaching
Open Context Model of Learning & Craft of TeachingOpen Context Model of Learning & Craft of Teaching
Open Context Model of Learning & Craft of Teaching
 
Structured system analysis
Structured system analysisStructured system analysis
Structured system analysis
 
Addie instructinal design model
Addie instructinal design modelAddie instructinal design model
Addie instructinal design model
 
Resilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security modelsResilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security models
 

Similar to Moving Security Model From Content to Context

Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablement
responsedatacomms
 
12207128 pss7
12207128 pss712207128 pss7
12207128 pss7
wongfai10
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
vfmindia
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
David Barker
 

Similar to Moving Security Model From Content to Context (20)

Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablement
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 
Pci Req
Pci ReqPci Req
Pci Req
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentation
 
Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout Presentation
 
Clavister security for virtualized environment
Clavister security for virtualized environmentClavister security for virtualized environment
Clavister security for virtualized environment
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber Security
 
Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP Ireland
 
12207128 pss7
12207128 pss712207128 pss7
12207128 pss7
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Network Security Tools
Network Security ToolsNetwork Security Tools
Network Security Tools
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
Firewalls
FirewallsFirewalls
Firewalls
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Moving Security Model From Content to Context

  • 1. Moving Security Model From Content To Context Quick Random Thoughts on Security Trends and Technologies for 2012 Paolo Passeri paulsparrows.wordpress.com
  • 2. Why Next Generation Technologies Are Needed Malware is getting more and more sophisticated and capable to circumvent traditional security technologies paulsparrows.wordpress.com
  • 3. APTs Are Changing The Rules Of The Game APTs threaten Organizations on different levels (from users to application) and heterogeneous time scales, redefining the information security landscape. Firewalls, Next Generation Firewalls and Intrusion Prevention Systems are converging to a new breed of security devices capable of moving the security enforcement paradigm to context, taking over the old model based on “IP Address, Protocol and Access Control” to a new model focused on “user, application and anomaly”. paulsparrows.wordpress.com
  • 4. The Next Level: From Content to Context Context-aware security is the use of supplemental information to improve security decisions at the time the decision is made. Supplemental Information include: Geo Location, Reputation, and the interaction of the user with the environment (applications, directory, etc.). This class of devices is called Next Generation IPS: http://blogs.gartner.com/neil_macdonald/2011/10/13/next-gen-context-aware-intrusion- prevention/ paulsparrows.wordpress.com
  • 5. NG-IPS Vs The Rest Of The World Firewall IPS NGF NG-IPS Works At Layer 3-4 Layer 4-7 Layer 7 Layer 4-7 Security Paradigm • IP Address • Protocol • User • User • Port • Vulnerability • Application • Application • Protocol • Vulnerability Scans All Traffic All Traffic Classified Applications All Traffic including classified Applications Deployed as • Layer 3 Gateway • Transparent Mode • Layer 3 Gateway • Layer 3 Gateway • Transparent Mode • Connected to TAP • Transparent Mode • Transparent Mode • Connected to Span Port Defends Against • Intrusions by • Intrusions by everyone • Misuse of applications by Users; • Intrusions by everyone exploiting unauthorized users exploiting vulnerabilities at • Intrusions by unauthorized users application and server vulnerabilities, exploiting known ports; Layer 4-7; exploiting classified applications; • Misuse of applications by users Performs Access Yes No Yes Yes Control Access Control By • IP Address - • User • User • Port • Application • Application • Protocol • IP address • Port • Protocol Detection Algorithms • Packet Filter • Deep Packet Inspection • Application Classification via • Stateful Inspection • Application Proxy • Signatures proprietary methods • Deep Packet Inspection • Stateful Inspection • Pattern Matching • Application Classification • Protocol-Based • Signatures • Anomaly Detection • Pattern Matching • Heuristics • Anomaly Detection (ApplAnd Protocol) • Heuristics Use cloud based No Yes for updating signatures Yes for updating application Yes for updating signatures and services from data received from other fingerprints and dynamically classify application fingerprints sensors unknown applications Use reputation and No Partially No Yes Geo-location Dedicated Device Yes May exist as a dedicated device Once existed as a dedicated device, Yes, Will replace traditional Firewalls, NG or as a security feature on a now is a security feature on top of a Firewalls, IPSs UTM “traditional firewall” Deployed at Perimeter On perimeter firewall or behind Perimeter, focused to protect Perimeter it and in front of Key Asset s outbound traffic May Scan SSL No Yes No Yes paulsparrows.wordpress.com
  • 6. Web Application Firewalls The growing number of vulnerabilities targeting Web Applications and cyber attacks carried on against banks together with the need to be compliant with strict requirements and regulations are pushing the adoption of Web Application Firewalls. Although Technology tends to consolidate traditional security solutions, WAFs are destined to remain standalone dedicated devices in front of key web assets to protect. These devices are required by PCI-DSS and most of all by the growing attention by Cybercrookers for exploiting vulnerabilities in banking web applications. Only this year, famous victims included CitiGroup and Samsung Card. In particular attackers were able to subtract $2.7 million to Citigroup. http://spectrum.ieee.org/riskfactor/telecom/security/citigroup-admits-being-hacked-in- may-coy-about-extent-of-impact http://www.databreaches.net/?p=20522 paulsparrows.wordpress.com
  • 7. WAFs Against The Rest Of The World paulsparrows.wordpress.com
  • 8. So Which Is The Most Revolutionary Technology? Avoid to invest in new technologies without first patching the user! APT Holds only for 1%, (human) vulnerabilities for the remaining 99% paulsparrows.wordpress.com
  • 9. References Oct 5, 2011: Information, The Next Battlefield http://paulsparrows.wordpress.com/2011/10/05/information-the- next-battlefield/ Oct 7, 2011: Next Generation Firewalls and Web Applications Firewall Q&A http://paulsparrows.wordpress.com/2011/10/07/next-generation- firewalls-and-web-applications-firewall-qa/ Oct 13, 2011: Advanced Persistent Threats and Security Information Management http://paulsparrows.wordpress.com/2011/10/13/apts-and- security-information-management/ Oct 27, 2011: Are You Ready For The Next Generation IPS? http://paulsparrows.wordpress.com/2011/10/27/are-you-ready- for-the-next-generation-ips/ Nov 20, 2011: Advanced Persistent Threats and Human Errors http://paulsparrows.wordpress.com/2011/11/20/advanced- persistent-threats-and-human-errors/