Your SlideShare is downloading. ×
Next-Generation IDS: A CEP Use Case in 10 Minutes
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Next-Generation IDS: A CEP Use Case in 10 Minutes

3,141
views

Published on

Next-Generation IDS: A CEP Use Case in 10 Minutes, 3rd Draft – November 8, 2006, 2nd Event Processing Symposium, Redwood Shores, California, Tim Bass, CISSP, Principal Global Architect, Director, …

Next-Generation IDS: A CEP Use Case in 10 Minutes, 3rd Draft – November 8, 2006, 2nd Event Processing Symposium, Redwood Shores, California, Tim Bass, CISSP, Principal Global Architect, Director, TIBCO Software Inc

Published in: Technology

1 Comment
8 Likes
Statistics
Notes
  • how can download this ppt please some body help me
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
3,141
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
1
Likes
8
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Next-Generation IDS: A CEP Use Case in 10 Minutes 3rd Draft – November 8, 2006 2nd Event Processing Symposium Redwood Shores, California Tim Bass, CISSP Principal Global Architect, Director TIBCO Software Inc.
  • 2. Our Agenda
    • The Problem
    • The Approach
    • Conclusions
    • Appendix: The Format of the Case Study
  • 3. The Problem What business problem motivated the development of an event processing solution? Intrusion Detection Systems Agent Based Detection Approach Systems Protected Architecture Data Sources Analysis Timing Detection Actions HIDS NIDS Hybrid Audit Logs Net Traffic System Stats Real Time Data Mining Anomaly Detection Signature Detection Centralized Distributed Active Passive
  • 4.
    • Rapidly detect intrusions with a low false alarm rate and a high intrusion detection rate…
    The Problem What were the overall design goals the approach? (Illustrative Purposes Only)
  • 5. The Approach Summarize the overall design of the solution. Source: Bass, T., CACM, 2000
  • 6. The Approach Summarize the overall design of the solution . Intrusion Detection Systems Detection Approach Systems Protected Architecture Data Sources Analysis Timing Detection Actions HIDS NIDS Hybrid Audit Logs Net Traffic System Stats Real Time Data Mining Anomaly Detection Signature Detection Centralized Distributed Active Passive Agent Based Next-Generation Fusion of IDS Sensor Functions
  • 7. The Approach Summarize the overall design of the solution . 24 EVENT PRE-PROCESSING EVENT SOURCES EXTERNAL . . . LEVEL ONE EVENT TRACKING Visualization, BAM, User Interaction Event-Decision Architecture DB MANAGEMENT Historical Data Profiles & Patterns DISTRIBUTED LOCAL EVENT SERVICES . . EVENT PROFILES . . DATA BASES . . OTHER DATA LEVEL TWO SITUATION DETECTION LEVEL THREE PREDICTIVE ANALYSIS LEVEL FOUR ADAPTIVE BPM
  • 8. The Approach Summarize the overall design of the solution . Flexible SOA and Event-Driven Architecture
  • 9. The Approach - Phase I Event Sources and Commercial Products JAVA MESSAGING SERVICE (JMS) DISTRIBUTED QUEUES (TIBCO EMS) HIGH PERFORMANCE RULES-ENGINE (TIBCO BE) HIGH PERFORMANCE RULES-ENGINE (TIBCO BE) HIGH PERFORMANCE RULES-ENGINE (TIBCO BE) HIGH PERFORMANCE RULES-ENGINE (TIBCO BE ) SENSOR NETWORK RULES NETWORK NIDS BW JMS LOGFILE JMS BW LOGFILE JMS BW LOGFILE JMS BW IDS JMS BW HIDS JMS BW SQL DB BW JMS ADB SQL DB BW JMS ADB MESSAGING NETWORK TIBCO PRODUCTS SOURCE SOURCE SOURCE SOURCE SOURCE SOURCE SOURCE SOURCE
  • 10. The Approach Event Sources and Commercial Products
    • Fusion of IDS information from across client event sources including:
      • Log files
      • Existing client IDS (host and network based) devices
      • Network traffic monitors (as required)
      • Host statistics (as required)
    • Secure, standards-based JAVA Messaging Service (JMS) for messaging:
      • Events parsed into JMS Application Properties
      • SSL transport for JMS messages
    • TIBCO technology for next-generation detection, prediction, rule-based intrusion response, and adaptive control
      • TIBCO Business Works™ as required, to transform, map or cleanse data
      • TIBCO BusinessEvents™ for rule-based IDS analytics
      • TIBCO Active Database Adapter as required
  • 11. Conclusions & Lesson Learned What Other Features Would Have Helped.
    • Future Extension of IDS to rules-based access control
      • Integration of IDS with access control
      • TIBCO BusinessEvents™ for rule-based access control
    • Future Extension of IDS and access control to incident response
      • Event-triggered work flow
      • TIBCO iProcess™ BPM for incident response
      • TIBCO iProcess™ BPM security entitlement work flow
      • TIBCO BusinessEvents™ for rule-based access control
    • Future Extensions for other risk and compliance requirements
      • Basel II, SOX, and JSOX - for example
    • Future Extensions for IT management requirements
      • Monitoring and fault management, service management, ITIL
  • 12. Thank You! Tim Bass, CISSP Principal Global Architect, Director [email_address] Event Processing at TIBCO
  • 13. The Case Study Format
    • The Problem
      • What business problem motivated the development of an event processing solution? (What is the purpose of the application)?
    • The Approach
      • Summarize the overall design of the solution.
      • Event sources: What types of events are used (e.g., time-ordered event streams? other?)? How many event types are involved?
      • What are the sources of the events?
      • Event processing: What types of filtering, correlation and aggregation are performed? What event processing style, event processing language and types of rules are used?
      • Responses: How are the results of event processing applied? Is an action or business process triggered? Are people notified? Is a dashboard or other business activity monitoring (BAM) alert distribution channel used?
      • What commercial software tools were applied to each stage?
    • Results, Costs and Benefits
      • (this section is optional and may be skipped if there is not enough time)
    • Conclusions
      • Would different software tools have helped? What other features would have helped?
      • What were the lessons learned? (What advice would you give to someone undertaking a similar project?)