Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Both the Service Provider and End User

ADVA
ADVAADVA
Polymorphic Attacks on Data-in-
Motion Require a New Security
Approach From Both the Service
Provider and End User
Bill Balmer, May 11, 2016
© 2016 ADVA Optical Networking. All rights reserved. Confidential.2
Scary Slide - Municipal Attacks
• Industries
• 63% of healthcare companies breached last year (RSA 2016)
• 76% of energy utilities breached in past year (Dark Reading
2016)
• Municipal attacks
• Cyber attack NY Dam
• 2013 Bowman Avenue Dam used for flood control
• Unauthorized access to the city’s computer system
• Smart grids
• 2012 – Televent Canada (Schneider Electric)
• Breached firewall
• San Francisco
• 2015 - 40 fiber breaches
• FBI - attackers posed as service provider employees
• The purpose of the breaches has not been determined
© 2016 ADVA Optical Networking. All rights reserved. Confidential.3
Polymorphic Attacks
• Polymorphism means “change the appearance of”
• Mutation engines are bundled with Trojans and other types of malware
• Usually hidden in encrypted payloads
• Constantly mutates to avoid pattern recognition
• Polymorphic attacks are the new standard with DDoS attacks used to
cover the data breach. (North America and EMEA: The Continual
Threat to Digital Brands for 2015)
• Criminals are learning from government projects
like the Stuxnet worm used in Iran nuclear plant and NSA man-in-the-
middle attacks exposure through Snowden
• Rogue nations are hiring CaaS (Criminals-as-a-Service)
© 2016 ADVA Optical Networking. All rights reserved. Confidential.4
The Key to Getting In
• Stealing credentials is the point of most attacks
• Vendors
• Exploit
• Target through HAVAC
• Employees
• Poor password control
• Bribes
• Exploits in security
• IPSec aggressive mode
• Force changes in passwords make users simplify passwords
• Poorly configured servers
• Physical intrusion – man-in-the-middle
• Fiber bending
• Wiring closets
© 2016 ADVA Optical Networking. All rights reserved. Confidential.5
Basic Cryptographic Goals
Confidentiality (privacy) - "Encryption"
Man-in-the-middle cannot understand message
from Alice.
Diffie-Hellman key agreement/exchange is
arbitrated in the background.
Man-in-the-middle could try to manipulate key
exchange to Bob.
Solution: authenticity - “authentication"
Alice and Bob can be sure that they are really
connected.
© 2016 ADVA Optical Networking. All rights reserved. Confidential.6
Man-in-the-Middle Attacks
© 2016 ADVA Optical Networking. All rights reserved. Confidential.7
• Distributed networks instead of
a single entry point
• Complex setup based on
exception rules
• Susceptible to DDoS attacks
overloading the processor
• Becomes a tool for polymorphic
attacks
• Firewalls are becoming the
police tape around a crime
scene – CISO AT&T*
Firewall Limitations
*Carrier Network Security Strategies – Heavy Reading Dec 2 2015
© 2016 ADVA Optical Networking. All rights reserved. Confidential.8
Next Generation Firewalls Will Be Dynamic
© 2016 ADVA Optical Networking. All rights reserved. Confidential.9
Data Analytics
• Number of days before breach is
recognized: Verizon 288 days and
Microsoft 244 days*
• Data analytics can**
• Shorten discovery period
• Help enforce policies
• Through detection
• Reduce staff
• Through automation
*Carrier Network Security Strategies – Heavy Reading Dec 2, 2015
** TechForum Security Conference March 24, 2016
© 2016 ADVA Optical Networking. All rights reserved. Confidential.10
What To Do?
• Amit Yoran, RSA president, said no fancy, expensive product can
guarantee an organization’s safety: “There are no silver bullets in
security.”
• “The shift from volumetric towards application-layer attacks and
from single vector to polymorphic attacks is bound to accelerate –
and service provider defenses need to evolve in line with that.”
• Each layer of transport for data in motion has its own challenges
© 2016 ADVA Optical Networking. All rights reserved. Confidential.11
Encryption Options
Securing Data in Motion
Physical
PHY
Data link
MAC
Network layer
IP/MPLS
Transport layer
TCP, UDP
Application, presentation,
session layer
Bits
Frames
Packets
Segments
Data
1
2
3
4
7
6
5
OSIlayer
IPSec
TLS, SSH
In-flight Encryption
MACsec
© 2016 ADVA Optical Networking. All rights reserved. Confidential.12
Secure Network Infrastructure Model
Security on Every Network Layer
• FSP 3000 family
• Infrastructure encryption
• Optical point to point
• Cloud computing
• Data center connectivity
• Over 200 networks
IPLayer
Ethernet
Layer
Optical
Layer
Physical connectivity
Virtual connectivity
Virtual connectivity
BSI approval
R&D & NVF activities
Solution available
© 2016 ADVA Optical Networking. All rights reserved. Confidential.13
Examples of Fiber Tapping
Joshe Ruppe Security Researcher
Techtarget: Optical network security: Inside a fiber-optic hack
© 2016 ADVA Optical Networking. All rights reserved. Confidential.14
Secure Data Center Interconnection
Innovation for high-performance cloud data center interconnect
Application
Technology
• Highest performance
• Lowest latency
• Maximum security
Benefits
Solution
FSP 3000
© 2016 ADVA Optical Networking. All rights reserved. Confidential.15
Encryption using G.709 / OTH Link Protocol
1 …….…. 14 15 ….… 16 17 ………………………………. 3824 3825 .… 4080
1
2
3
4
Column number
OTU/ODU
overhead
ROW
OPU
overhead
Encryption
FEC
areaEncrypted Payload
OCH Overhead Och payload FEC data
Optical channel frame structure
5TCE link protocol
• Supports
• OTU-2
• OTU-2e
• OTU-2f
AES 256
encrypted
OPU2 payload
Automatic
key exchange
using DH
Key Exchange
© 2016 ADVA Optical Networking. All rights reserved. Confidential.16
Media Transport Network - Solution
Metro
Core
Event site
Event site
Event site
TV studio A TV studio B
Metro
© 2016 ADVA Optical Networking. All rights reserved. Confidential.17
Optical Security Suite
Encryption
Security-hardened software
Physical layer monitoring
Power tracking and intrusion detection
Time-domain reflectometer (OTDR/cable integrity)
Access line monitoring (ALM)
Continuity check messages (CCM)
RADIUS
Secure shell
SNMPv3
AES-256
Authentication
Diffie-Hellman
A complete and integrated solution leveraging advanced technology
122842636
© 2016 ADVA Optical Networking. All rights reserved. Confidential.18
Secure Network Infrastructure Model
Security on Every Network Layer
• FSP 150 family
• 1.75 million deployed
• Infrastructure encryption
• ProNID™
• ProVM™
• Enterprise encryption
• MacSec Plus
• Certes CryptoFlow™ NFV
• Who?
• Service providers
• Local government
• Branch offices – small count
• Cloud providers
IPlayer
Ethernet
layer
Optical
layer
Physical connectivity
Virtual connectivity
Virtual connectivity
BSI approval
R&D & NFV activities
Solution available
© 2016 ADVA Optical Networking. All rights reserved. Confidential.19
• Highest flexibility
• Minimum overhead
• Maximum security
Secure Access in Virtual Networks
Innovation for flexible cloud access in fixed and mobile applications
Application
Technology
Benefits
Solution
FSP 150
© 2016 ADVA Optical Networking. All rights reserved. Confidential.20
IPsec Challenges – Technical Aspects
• Delay is measured
in msec instead of
µsec
Latency
• Up to 50% addi-
tional bandwidth
overhead
Efficiency
• No wire-speed
performance up to
100Gbit/s
Scalability
• Exposed
sender/reciever
Confidentiality
• Only works for
IP traffic
Compatibility
• Issues scale
linearly with links
and endpoints
Complexity
© 2016 ADVA Optical Networking. All rights reserved. Confidential.21
Flexible MACsec Data Encryption and Integrity
• L2 secure connectivity using standard MACsec format with VLAN bypass
• Works with MEF E-Line (EPL and EVPL)
• Supports point-to-point and hub-and-spoke secure connectivity
• Encryption directly at the Ethernet layer – line rate
• State of the art symmetric encryption algorithms: AES 128, AES 256
• Low latency, bandwidth efficiency
• Dynamic and secure key exchange
• Password-authenticated Diffie-Hellman algorithm
• Intrusion proof key storage
ConnectGuardTM Ethernet – flexibility and data security altogether
© 2016 ADVA Optical Networking. All rights reserved. Confidential.22
MACsec+ No Need for SP Switch Decrypt
Site A
LAN
LAN
Site B
© 2016 ADVA Optical Networking. All rights reserved. Confidential.23
XG210C
XG210C
XG210C
Clinic
Regional hospital
Satellite hospital
Regional hospital
Regional hospital
ProVM-C
ProNID-C
Case Study – WellSpan Healthcare
© 2016 ADVA Optical Networking. All rights reserved. Confidential.24
Secure Network Infrastructure Model
Security on Every Network Layer
• Enterprise encryption
• ProVM™
• FSP 150 vSE
• Certes CryptoFlow™
• Layer 3 and 7
• Cloud applications
• Key management
• Who?
• Big box companies
• Branch offices
• Universities
• Local government
IPlayer
Ethernet
layer
Optical
layer
Physical connectivity
Virtual connectivity
Virtual connectivity
BSI approval
R&D & NFV activities
Solution available
© 2016 ADVA Optical Networking. All rights reserved. Confidential.25
Future Proofing Security through Virtualization
• Firewalls – future
• Interactive updates from security centers
• Matching patterns of attacks
• Updates to combat new threats
• Data analytics
• Remote probes
• Live monitoring
• Filters / traps
• Application security
• Micro-segmentation to limit damage
• Policy management
© 2016 ADVA Optical Networking. All rights reserved. Confidential.26
VNF Versus Assured VNF
Example: Encryption








Encryption as VNF
OVS
Storage NetworkCompute
IPsec
Encryption as an assured VNF
OVS
Storage NetworkCompute
Latency
Cost @ 1Gbit/s
Cost @ 10Mbit/s
Resource consumption
© 2016 ADVA Optical Networking. All rights reserved. Confidential.27
A1
A2
Physical test, monitoring, enforcement
L2/L3 low latency, sync, MACSEC
Hardware data plane
The Assured Model
Multicore x86 server
Flexible
L3/4/7
service
creation
Network interface
Compute host
infrastructure
VM-1 VM-2
VNF VNF
VM-2 VM-2
VNF VNF
N1
Hardware
equivalent
OVS
ovs
© 2016 ADVA Optical Networking. All rights reserved. Confidential.28
IP Layer ProVM/Security NFV
© 2016 ADVA Optical Networking. All rights reserved. Confidential.29
IP Layer ProVM/Security NFV
© 2016 ADVA Optical Networking. All rights reserved. Confidential.30
• How we travel
• Get ticket online or at the airport
• Prove who you are
• Go through security checkpoint
• Get into terminal
• Boarding checks
• Do you belong on the flight?
Security Is a Fact of Life
How data should travel
Thank You
IMPORTANT NOTICE
The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this
presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited.
The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or
implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental,
consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation.
Copyright © for the entire content of this presentation: ADVA Optical Networking.
1 of 31

Recommended

Pure-Play Virtualization for Rural Broadband by
Pure-Play Virtualization for Rural BroadbandPure-Play Virtualization for Rural Broadband
Pure-Play Virtualization for Rural BroadbandADVA
1.1K views30 slides
Leveraging NFV Infrastructure to Drive Revenue by
Leveraging NFV Infrastructure to Drive RevenueLeveraging NFV Infrastructure to Drive Revenue
Leveraging NFV Infrastructure to Drive RevenueADVA
555 views17 slides
Deploying Virtualized Services Over Legacy Networks by
Deploying Virtualized Services Over Legacy NetworksDeploying Virtualized Services Over Legacy Networks
Deploying Virtualized Services Over Legacy NetworksDaniel Sproats
86 views15 slides
Packet Optical SDN Field Trial for Multi-Layer Network Optimization by
Packet Optical SDN Field Trial for Multi-Layer Network OptimizationPacket Optical SDN Field Trial for Multi-Layer Network Optimization
Packet Optical SDN Field Trial for Multi-Layer Network OptimizationADVA
657 views8 slides
Introducing the ADVA MicroMux™ by
Introducing the ADVA MicroMux™Introducing the ADVA MicroMux™
Introducing the ADVA MicroMux™ADVA
5.7K views8 slides
Revolutionary Approach to Cell Site Activation by
Revolutionary Approach to Cell Site ActivationRevolutionary Approach to Cell Site Activation
Revolutionary Approach to Cell Site ActivationADVA
562 views16 slides

More Related Content

What's hot

From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B... by
From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...
From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...ADVA
1.2K views32 slides
Oscilloquartz's Acquisition of Time4 Systems by
Oscilloquartz's Acquisition of Time4 SystemsOscilloquartz's Acquisition of Time4 Systems
Oscilloquartz's Acquisition of Time4 SystemsADVA
1.9K views11 slides
Scalable and Secure Connectivity for Seamless Cloud Evolution by
Scalable and Secure Connectivity for Seamless Cloud EvolutionScalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud EvolutionADVA
1.2K views16 slides
Mitigating Security Risk in Practical vCPE Solutions by
Mitigating Security Risk in Practical vCPE SolutionsMitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsADVA
969 views13 slides
How to Quantum-Secure Optical Networks by
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical NetworksADVA
2.6K views31 slides
Drawing Customers North - September, 2016 by
Drawing Customers North - September, 2016Drawing Customers North - September, 2016
Drawing Customers North - September, 2016ADVA
427 views15 slides

What's hot(20)

From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B... by ADVA
From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...
From Waterfall to Agile - Managing Disruptive Change Without Disrupting the B...
ADVA1.2K views
Oscilloquartz's Acquisition of Time4 Systems by ADVA
Oscilloquartz's Acquisition of Time4 SystemsOscilloquartz's Acquisition of Time4 Systems
Oscilloquartz's Acquisition of Time4 Systems
ADVA1.9K views
Scalable and Secure Connectivity for Seamless Cloud Evolution by ADVA
Scalable and Secure Connectivity for Seamless Cloud EvolutionScalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud Evolution
ADVA1.2K views
Mitigating Security Risk in Practical vCPE Solutions by ADVA
Mitigating Security Risk in Practical vCPE SolutionsMitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE Solutions
ADVA969 views
How to Quantum-Secure Optical Networks by ADVA
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
ADVA2.6K views
Drawing Customers North - September, 2016 by ADVA
Drawing Customers North - September, 2016Drawing Customers North - September, 2016
Drawing Customers North - September, 2016
ADVA427 views
DCI: It's a Brave New World by ADVA
DCI: It's a Brave New WorldDCI: It's a Brave New World
DCI: It's a Brave New World
ADVA985 views
Building a Sustainable Future by ADVA
Building a Sustainable FutureBuilding a Sustainable Future
Building a Sustainable Future
ADVA1.6K views
Introducing the ADVA FSP 150-GE110 Pro Series by ADVA
Introducing the ADVA FSP 150-GE110 Pro SeriesIntroducing the ADVA FSP 150-GE110 Pro Series
Introducing the ADVA FSP 150-GE110 Pro Series
ADVA4.7K views
Forget the Layers: NFV Is About Dynamism by ADVA
Forget the Layers: NFV Is About DynamismForget the Layers: NFV Is About Dynamism
Forget the Layers: NFV Is About Dynamism
ADVA1.1K views
ADVA Optical Networking and Arista Networks Joint OOLS Demo by ADVA
ADVA Optical Networking and Arista Networks Joint OOLS DemoADVA Optical Networking and Arista Networks Joint OOLS Demo
ADVA Optical Networking and Arista Networks Joint OOLS Demo
ADVA2.1K views
The Poacher and the Gamekeeper: Synchronization Delivery and Assurance by ADVA
The Poacher and the Gamekeeper: Synchronization Delivery and AssuranceThe Poacher and the Gamekeeper: Synchronization Delivery and Assurance
The Poacher and the Gamekeeper: Synchronization Delivery and Assurance
ADVA475 views
SDN and Photonics for Dynamic Cloud Connectivity by ADVA
SDN and Photonics for Dynamic Cloud Connectivity SDN and Photonics for Dynamic Cloud Connectivity
SDN and Photonics for Dynamic Cloud Connectivity
ADVA1.7K views
Assuring Superior VNF Performance at the Network Edge by ADVA
Assuring Superior VNF Performance at the Network EdgeAssuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network Edge
ADVA1.5K views
Making NFV-Based Business Services Secure by ADVA
Making NFV-Based Business Services SecureMaking NFV-Based Business Services Secure
Making NFV-Based Business Services Secure
ADVA1.2K views
Transforming Packet Networks With Open Optical Transport by ADVA
Transforming Packet Networks With Open Optical TransportTransforming Packet Networks With Open Optical Transport
Transforming Packet Networks With Open Optical Transport
ADVA2.6K views
Verizon Selects Ensemble Connector to Deliver VNS uCPE by ADVA
Verizon Selects Ensemble Connector to Deliver VNS uCPEVerizon Selects Ensemble Connector to Deliver VNS uCPE
Verizon Selects Ensemble Connector to Deliver VNS uCPE
ADVA2.5K views
Secure Connectivity on Every Network Layer by ADVA
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
ADVA1K views
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the... by ADVA
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
ADVA3.8K views
5G: Why Wait? - 5G Observatory 2016 by Daniel Sproats
5G: Why Wait? - 5G Observatory 20165G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016
Daniel Sproats263 views

Similar to Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Both the Service Provider and End User

Scalable, Secure, Programmable – Cloud Connectivity for the Future by
Scalable, Secure, Programmable – Cloud Connectivity for the FutureScalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureADVA
1.4K views24 slides
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw... by
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
2.7K views50 slides
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат... by
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Cisco Russia
565 views10 slides
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr... by
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...Sandia National Laboratories: Energy & Climate: Renewables
744 views21 slides
Transformation From Today To Tomorrow - Market and Product Strategy 2018 by
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Jiunn-Jer Sun
116 views29 slides
DNA Intelligent WAN Campus Day by
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayCisco Canada
932 views58 slides

Similar to Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Both the Service Provider and End User(20)

Scalable, Secure, Programmable – Cloud Connectivity for the Future by ADVA
Scalable, Secure, Programmable – Cloud Connectivity for the FutureScalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the Future
ADVA1.4K views
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw... by Amazon Web Services
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
Amazon Web Services2.7K views
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат... by Cisco Russia
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Cisco Russia 565 views
Transformation From Today To Tomorrow - Market and Product Strategy 2018 by Jiunn-Jer Sun
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Jiunn-Jer Sun116 views
DNA Intelligent WAN Campus Day by Cisco Canada
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
Cisco Canada932 views
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco by ThousandEyes
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
ThousandEyes505 views
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall by Cisco Canada
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Canada1.7K views
Introducing ConnectGuard™ Cloud by ADVA
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud
ADVA16.7K views
Virtualized Firewall: Is it the panacea to secure distributed enterprises? by Zscaler
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Zscaler463 views
A rede como um sensor de segurança by Cisco do Brasil
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
Cisco do Brasil673 views
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01 by Sergiy Pitel
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
Sergiy Pitel147 views
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury by PROIDEA
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
PROIDEA19 views

More from ADVA

Industrial optically pumped cesium beam clock by
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockADVA
77 views17 slides
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN... by
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...ADVA
87 views14 slides
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock by
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clockADVA
266 views12 slides
Addressing PNT threats in critical defense infrastructure by
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureADVA
93 views27 slides
Precise and assured timing for enterprise networks by
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networksADVA
116 views11 slides
Introducing Ensemble Cloudlet for on-premises cloud demand by
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandADVA
105 views6 slides

More from ADVA(20)

Industrial optically pumped cesium beam clock by ADVA
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clock
ADVA77 views
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN... by ADVA
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
ADVA87 views
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock by ADVA
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
ADVA266 views
Addressing PNT threats in critical defense infrastructure by ADVA
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructure
ADVA93 views
Precise and assured timing for enterprise networks by ADVA
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networks
ADVA116 views
Introducing Ensemble Cloudlet for on-premises cloud demand by ADVA
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demand
ADVA105 views
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS) by ADVA
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ADVA74 views
Sync on TAP - Syncing infrastructure with software by ADVA
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with software
ADVA85 views
Meet stringent latency demands with time-sensitive networking by ADVA
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networking
ADVA201 views
Making networks secure with multi-layer encryption by ADVA
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
ADVA96 views
Quantum threat: How to protect your optical network by ADVA
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical network
ADVA61 views
Optical networks and the ecodesign tradeoff between climate change mitigation... by ADVA
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...
ADVA63 views
Trends in next-generation data center interconnects (DCI) by ADVA
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)
ADVA281 views
Open optical edge connecting mobile access networks by ADVA
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networks
ADVA130 views
Introducing Adva Network Security – a trusted German anchor by ADVA
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchor
ADVA214 views
Meet the industry's first pluggable 10G demarcation device by ADVA
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation device
ADVA170 views
Introducing ADVA AccessWave25™ by ADVA
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™
ADVA130 views
10G edge technology for outdoor environments by ADVA
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environments
ADVA109 views
The quantum age - secure transport networks by ADVA
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networks
ADVA234 views
From leased lines to optical spectrum services by ADVA
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum services
ADVA65 views

Recently uploaded

Report 2030 Digital Decade by
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital DecadeMassimo Talia
15 views41 slides
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院IttrainingIttraining
41 views8 slides
Uni Systems for Power Platform.pptx by
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
55 views21 slides
ChatGPT and AI for Web Developers by
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web DevelopersMaximiliano Firtman
187 views82 slides
virtual reality.pptx by
virtual reality.pptxvirtual reality.pptx
virtual reality.pptxG036GaikwadSnehal
11 views15 slides
Voice Logger - Telephony Integration Solution at Aegis by
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at AegisNirmal Sharma
31 views1 slide

Recently uploaded(20)

【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma31 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views
Transcript: The Details of Description Techniques tips and tangents on altern... by BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada135 views
Web Dev - 1 PPT.pdf by gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet60 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb13 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada126 views
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn21 views
Perth MeetUp November 2023 by Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price19 views
Lilypad @ Labweek, Istanbul, 2023.pdf by Ally339821
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdf
Ally3398219 views
Spesifikasi Lengkap ASUS Vivobook Go 14 by Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang37 views
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst476 views

Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Both the Service Provider and End User

  • 1. Polymorphic Attacks on Data-in- Motion Require a New Security Approach From Both the Service Provider and End User Bill Balmer, May 11, 2016
  • 2. © 2016 ADVA Optical Networking. All rights reserved. Confidential.2 Scary Slide - Municipal Attacks • Industries • 63% of healthcare companies breached last year (RSA 2016) • 76% of energy utilities breached in past year (Dark Reading 2016) • Municipal attacks • Cyber attack NY Dam • 2013 Bowman Avenue Dam used for flood control • Unauthorized access to the city’s computer system • Smart grids • 2012 – Televent Canada (Schneider Electric) • Breached firewall • San Francisco • 2015 - 40 fiber breaches • FBI - attackers posed as service provider employees • The purpose of the breaches has not been determined
  • 3. © 2016 ADVA Optical Networking. All rights reserved. Confidential.3 Polymorphic Attacks • Polymorphism means “change the appearance of” • Mutation engines are bundled with Trojans and other types of malware • Usually hidden in encrypted payloads • Constantly mutates to avoid pattern recognition • Polymorphic attacks are the new standard with DDoS attacks used to cover the data breach. (North America and EMEA: The Continual Threat to Digital Brands for 2015) • Criminals are learning from government projects like the Stuxnet worm used in Iran nuclear plant and NSA man-in-the- middle attacks exposure through Snowden • Rogue nations are hiring CaaS (Criminals-as-a-Service)
  • 4. © 2016 ADVA Optical Networking. All rights reserved. Confidential.4 The Key to Getting In • Stealing credentials is the point of most attacks • Vendors • Exploit • Target through HAVAC • Employees • Poor password control • Bribes • Exploits in security • IPSec aggressive mode • Force changes in passwords make users simplify passwords • Poorly configured servers • Physical intrusion – man-in-the-middle • Fiber bending • Wiring closets
  • 5. © 2016 ADVA Optical Networking. All rights reserved. Confidential.5 Basic Cryptographic Goals Confidentiality (privacy) - "Encryption" Man-in-the-middle cannot understand message from Alice. Diffie-Hellman key agreement/exchange is arbitrated in the background. Man-in-the-middle could try to manipulate key exchange to Bob. Solution: authenticity - “authentication" Alice and Bob can be sure that they are really connected.
  • 6. © 2016 ADVA Optical Networking. All rights reserved. Confidential.6 Man-in-the-Middle Attacks
  • 7. © 2016 ADVA Optical Networking. All rights reserved. Confidential.7 • Distributed networks instead of a single entry point • Complex setup based on exception rules • Susceptible to DDoS attacks overloading the processor • Becomes a tool for polymorphic attacks • Firewalls are becoming the police tape around a crime scene – CISO AT&T* Firewall Limitations *Carrier Network Security Strategies – Heavy Reading Dec 2 2015
  • 8. © 2016 ADVA Optical Networking. All rights reserved. Confidential.8 Next Generation Firewalls Will Be Dynamic
  • 9. © 2016 ADVA Optical Networking. All rights reserved. Confidential.9 Data Analytics • Number of days before breach is recognized: Verizon 288 days and Microsoft 244 days* • Data analytics can** • Shorten discovery period • Help enforce policies • Through detection • Reduce staff • Through automation *Carrier Network Security Strategies – Heavy Reading Dec 2, 2015 ** TechForum Security Conference March 24, 2016
  • 10. © 2016 ADVA Optical Networking. All rights reserved. Confidential.10 What To Do? • Amit Yoran, RSA president, said no fancy, expensive product can guarantee an organization’s safety: “There are no silver bullets in security.” • “The shift from volumetric towards application-layer attacks and from single vector to polymorphic attacks is bound to accelerate – and service provider defenses need to evolve in line with that.” • Each layer of transport for data in motion has its own challenges
  • 11. © 2016 ADVA Optical Networking. All rights reserved. Confidential.11 Encryption Options Securing Data in Motion Physical PHY Data link MAC Network layer IP/MPLS Transport layer TCP, UDP Application, presentation, session layer Bits Frames Packets Segments Data 1 2 3 4 7 6 5 OSIlayer IPSec TLS, SSH In-flight Encryption MACsec
  • 12. © 2016 ADVA Optical Networking. All rights reserved. Confidential.12 Secure Network Infrastructure Model Security on Every Network Layer • FSP 3000 family • Infrastructure encryption • Optical point to point • Cloud computing • Data center connectivity • Over 200 networks IPLayer Ethernet Layer Optical Layer Physical connectivity Virtual connectivity Virtual connectivity BSI approval R&D & NVF activities Solution available
  • 13. © 2016 ADVA Optical Networking. All rights reserved. Confidential.13 Examples of Fiber Tapping Joshe Ruppe Security Researcher Techtarget: Optical network security: Inside a fiber-optic hack
  • 14. © 2016 ADVA Optical Networking. All rights reserved. Confidential.14 Secure Data Center Interconnection Innovation for high-performance cloud data center interconnect Application Technology • Highest performance • Lowest latency • Maximum security Benefits Solution FSP 3000
  • 15. © 2016 ADVA Optical Networking. All rights reserved. Confidential.15 Encryption using G.709 / OTH Link Protocol 1 …….…. 14 15 ….… 16 17 ………………………………. 3824 3825 .… 4080 1 2 3 4 Column number OTU/ODU overhead ROW OPU overhead Encryption FEC areaEncrypted Payload OCH Overhead Och payload FEC data Optical channel frame structure 5TCE link protocol • Supports • OTU-2 • OTU-2e • OTU-2f AES 256 encrypted OPU2 payload Automatic key exchange using DH Key Exchange
  • 16. © 2016 ADVA Optical Networking. All rights reserved. Confidential.16 Media Transport Network - Solution Metro Core Event site Event site Event site TV studio A TV studio B Metro
  • 17. © 2016 ADVA Optical Networking. All rights reserved. Confidential.17 Optical Security Suite Encryption Security-hardened software Physical layer monitoring Power tracking and intrusion detection Time-domain reflectometer (OTDR/cable integrity) Access line monitoring (ALM) Continuity check messages (CCM) RADIUS Secure shell SNMPv3 AES-256 Authentication Diffie-Hellman A complete and integrated solution leveraging advanced technology 122842636
  • 18. © 2016 ADVA Optical Networking. All rights reserved. Confidential.18 Secure Network Infrastructure Model Security on Every Network Layer • FSP 150 family • 1.75 million deployed • Infrastructure encryption • ProNID™ • ProVM™ • Enterprise encryption • MacSec Plus • Certes CryptoFlow™ NFV • Who? • Service providers • Local government • Branch offices – small count • Cloud providers IPlayer Ethernet layer Optical layer Physical connectivity Virtual connectivity Virtual connectivity BSI approval R&D & NFV activities Solution available
  • 19. © 2016 ADVA Optical Networking. All rights reserved. Confidential.19 • Highest flexibility • Minimum overhead • Maximum security Secure Access in Virtual Networks Innovation for flexible cloud access in fixed and mobile applications Application Technology Benefits Solution FSP 150
  • 20. © 2016 ADVA Optical Networking. All rights reserved. Confidential.20 IPsec Challenges – Technical Aspects • Delay is measured in msec instead of µsec Latency • Up to 50% addi- tional bandwidth overhead Efficiency • No wire-speed performance up to 100Gbit/s Scalability • Exposed sender/reciever Confidentiality • Only works for IP traffic Compatibility • Issues scale linearly with links and endpoints Complexity
  • 21. © 2016 ADVA Optical Networking. All rights reserved. Confidential.21 Flexible MACsec Data Encryption and Integrity • L2 secure connectivity using standard MACsec format with VLAN bypass • Works with MEF E-Line (EPL and EVPL) • Supports point-to-point and hub-and-spoke secure connectivity • Encryption directly at the Ethernet layer – line rate • State of the art symmetric encryption algorithms: AES 128, AES 256 • Low latency, bandwidth efficiency • Dynamic and secure key exchange • Password-authenticated Diffie-Hellman algorithm • Intrusion proof key storage ConnectGuardTM Ethernet – flexibility and data security altogether
  • 22. © 2016 ADVA Optical Networking. All rights reserved. Confidential.22 MACsec+ No Need for SP Switch Decrypt Site A LAN LAN Site B
  • 23. © 2016 ADVA Optical Networking. All rights reserved. Confidential.23 XG210C XG210C XG210C Clinic Regional hospital Satellite hospital Regional hospital Regional hospital ProVM-C ProNID-C Case Study – WellSpan Healthcare
  • 24. © 2016 ADVA Optical Networking. All rights reserved. Confidential.24 Secure Network Infrastructure Model Security on Every Network Layer • Enterprise encryption • ProVM™ • FSP 150 vSE • Certes CryptoFlow™ • Layer 3 and 7 • Cloud applications • Key management • Who? • Big box companies • Branch offices • Universities • Local government IPlayer Ethernet layer Optical layer Physical connectivity Virtual connectivity Virtual connectivity BSI approval R&D & NFV activities Solution available
  • 25. © 2016 ADVA Optical Networking. All rights reserved. Confidential.25 Future Proofing Security through Virtualization • Firewalls – future • Interactive updates from security centers • Matching patterns of attacks • Updates to combat new threats • Data analytics • Remote probes • Live monitoring • Filters / traps • Application security • Micro-segmentation to limit damage • Policy management
  • 26. © 2016 ADVA Optical Networking. All rights reserved. Confidential.26 VNF Versus Assured VNF Example: Encryption         Encryption as VNF OVS Storage NetworkCompute IPsec Encryption as an assured VNF OVS Storage NetworkCompute Latency Cost @ 1Gbit/s Cost @ 10Mbit/s Resource consumption
  • 27. © 2016 ADVA Optical Networking. All rights reserved. Confidential.27 A1 A2 Physical test, monitoring, enforcement L2/L3 low latency, sync, MACSEC Hardware data plane The Assured Model Multicore x86 server Flexible L3/4/7 service creation Network interface Compute host infrastructure VM-1 VM-2 VNF VNF VM-2 VM-2 VNF VNF N1 Hardware equivalent OVS ovs
  • 28. © 2016 ADVA Optical Networking. All rights reserved. Confidential.28 IP Layer ProVM/Security NFV
  • 29. © 2016 ADVA Optical Networking. All rights reserved. Confidential.29 IP Layer ProVM/Security NFV
  • 30. © 2016 ADVA Optical Networking. All rights reserved. Confidential.30 • How we travel • Get ticket online or at the airport • Prove who you are • Go through security checkpoint • Get into terminal • Boarding checks • Do you belong on the flight? Security Is a Fact of Life How data should travel
  • 31. Thank You IMPORTANT NOTICE The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA Optical Networking.

Editor's Notes

  1. The following OTU/ODU overhead bytes are used for the dynamic key exchange in our ADVA AES256 encryption solution: 10TCE-PCN-16GU+AES100G: GCC2 5TCE-PC(T)N-10G+AES10G: GCC1/2
  2. Security-Hardened Software: RADIUS support for secure and centralized user access management Secure Shell protocol (SSH) for encrypted network management communication SNMPv3 as latest available SNMP version providing inherent security mechanisms for network management communication Cable Diagnostics or Cable Integrity Check on RJ-45 Copper Ports of the FSP 150 product family
  3. MACsec+ extends MACsec to support end-to-end secure connectivity in a MACsec unaware network. Secure the EVC payload while leaving the transport VLANs in the clear
  4. OVOpen vSwitch (OVS) Addresses one of the big questions of decentralized platforms: IS-IOR – Is similar to the OVS, but operates in hardware, requiring no hypervisor involvement since the intel technology takes advantage of the PCI-e data plane and can recognize the Data Packet and place it directly into the appropriate VM’s memory. DMA – Direct Memory Access. ProVM will allow the Service Provider to not only test the network but also test between the VNFs. This will great aid in trouble shooting problems with service chaining. Over the next several years NFV deployments are going to be new to the Service Providers. Detailed analysis well help not only save cost but build better operation procedures for deployment and troubleshooting. A single truck roll for an unidentified fault will cost more than the difference between a ProVM and a COTS platform.