SlideShare a Scribd company logo
• Submitted By:
Uzair Ahmad
• Submitter To:
Sir Muhammad Javed Hussain Khan
• Program:
BSCS
• Semester:
7th
• Topic:
Next generation IPS (NGIPS)
• Subject:
Network Security
WHAT IS NGIPS?
• NGIPS is the short form of Next Generation Intrusion Prevention
System .
• It is an advanced automated network security .
• and threat prevention tool.
• NGIPS monitors network traffic to detect suspicious activity.
• And vulnerabilities like phishing, network intrusions
• Across the network.
WHAT IS NGIPS?
• NGIPS monitors network traffic to detect suspicious activity.
• And vulnerabilities like phishing, network intrusions
• Across the network.
NGIPS DETAILS
• Next Generation Intrusion Prevention System (NGPIS) is
designed to provide wide protection of vulnerabilities.
• Especially at the application layer.
• It controls the behavior of applications.
• It also allows access and provides real-time protection.
NGIPS DETAILS
• A traditional IPS was designed to identify the known attacks.
• Traditional IPSs are black boxes that offer little visibility into
the protection being offered.
• But NGIPS will go way beyond the signature-based protection.
• However, a next-generation IPS includes network security
beyond detection and prevention.
NGIPS DETAILS
• It has the capability of visibility
• Custom rules.
• Vulnerability-based protection.
• And is able to analyze the network attack behavior.
NGIPS DETAILS
• The existing technologies are vulnerable to smart cyber-
attacks.
• and very limited to guarantee growth and safety of networks.
• NGIPS offers comprehensive threat security.
• That blocks intrusions and safeguards valuable assets.
• NGIPS makes use of an innovative multi-layer approach.
• It helps to figure out known, 0-day, and advanced persistent
threats
NGIPS DETAILS
• It also defends network from.
• Worms.
• Spyware.
• Malware.
• Trojan Horse.
• Brute Force Attacks
• Protocol Attacks
• And Web Threats
CHALLENGES OF IPS
• Nowadays, Internet security is a vital issue in the cyber world.
• Intrusion detection and prevention system are playing significant
roles in this field.
• It needs intelligent IPS for better accuracy detection rate and faster
response.
• The NGIPS in order to achieve an accurate detection rate and faster
response.
• Proposes new effective analysis techniques.
• New algorithms are proposed on IPS
• However, the rate of attacks increases every day
• And Web Threats
CHALLENGES OF IPS
• New algorithms are proposed on IPS.
• However, the rate of attacks increases every day.
• Due to the increasing cyber threats.
• And easiness of accessibility of computer devices.
• The Attackers find loopholes to trade off the remote host and
utilize it as an instrument for stealing resources from the
network
CHALLENGES OF IPS
• The false positive alarm rate is one of the biggest problems in IPS.
• In order to monitor and evaluate the alerts, a skilled IPS analyst has
to stay on the top of.
• All new attacks
• Worms.
• Viruses
• Different operating systems
• Network changes to keep the network secure.
COMPARISON BETWEEN TRADITIONAL IPS
AND NGIPS
• There are several common challenges in IPS such as.
• deployment.
• Management
• Technical.
• Detection and response challenges
• Different operating systems
• Network changes to keep the network secure.
COMPARISON BETWEEN TRADITIONAL IPS
AND NGIPS
• A traditional IPS examines the traffic.
• It does not block the traffic beyond signature-based protection.
• While NGIPS goes way beyond signature-based security.
• NGIPS provides wide-range protection against.
• Vulnerabilities.
COMPARISON BETWEEN TRADITIONAL IPS
AND NGIPS
• NGIPS has a huge number of features to tackle continuous
changing pattern of the attacks.
• Deep packet inspection.
• Real-time protection.
• And able to control the behavior of the applications
WORKING PROCESSES OF NGIPS
• NGIPS working process, packet decoder collects packets from
different network interfaces.
• and prepares it for the preprocessor.
• Preprocessors are being used to organize and modify packets.
• Detection engine analyzes all the packets passing through
• It to indicate whether any intrusion occurs by using certain
predefined rules.
WORKING PROCESSES OF NGIPS
• It to indicate whether any intrusion occurs by using certain
predefined rules.
• Alert generation is used for creating the alert.
• The output modules display the results of intrusion detection
examination.
EFFICACY
• Secure IPS receives new policy rules and signatures every two
hours.
• So your security is always up to date.
• Cisco Talos leverages the world's largest threat detection network
to bring security effectiveness to every Cisco security product.
• This industry-leading threat intelligence
• Works as an early-warning system that constantly updates with
new threats.
OPERATIONAL COST
• Use Secure IPS automation to increase operational efficiency.
• And reduce overhead by separating actionable events from noise.
• Prioritize threats for your staff and improve your security through
policy recommendations based on network vulnerabilities.
• Stay informed on what rules to activate and deactivate, and filter
events pertinent for the devices on your network.
FLEXIBILITY
• Secure IPS flexible deployment options meet the needs of the
enterprise.
• It can be deployed at the perimeter, at the data center
distribution/core.
• Or behind the firewall to protect mission-critical assets.
• Guest access, and WAN connections.
• Secure IPS can be deployed for inline inspection or passive
detection
INTEGRATION
• Secure IPS plugs into your network without major hardware
changes or significant time to implement.
• Enable and manage several security applications from a single
pane with Firewall Management Center.
• Seamlessly navigate between Secure IPS.
• Secure Firewall and Secure Endpoint to optimize your security and
ingest third-party data through Cisco Threat Intelligence
Director.
THANKS

More Related Content

What's hot

HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
MohamedJafar5
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
Rob Dunn
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
sharetech
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
Nour Eldeen Mahmoud Khalifa
 
Cisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW ClusteringCisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW Clustering
ib_cims
 
Cloud Computing Principles and Paradigms: 2 migration into a cloud
Cloud Computing Principles and Paradigms: 2 migration into a cloudCloud Computing Principles and Paradigms: 2 migration into a cloud
Cloud Computing Principles and Paradigms: 2 migration into a cloud
Majid Hajibaba
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
NCS Computech Ltd.
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
Narudom Roongsiriwong, CISSP
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)
Milson Munakami
 
Network monitoring system
Network monitoring systemNetwork monitoring system
Network monitoring system
MyPresentations Services
 
Cloud security and compliance ppt
Cloud security and compliance pptCloud security and compliance ppt
Cloud security and compliance ppt
Krupa Rajani
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Canada
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
4 palo alto licenses
4 palo alto licenses4 palo alto licenses
4 palo alto licenses
Mostafa El Lathy
 
pfSense firewall workshop guide
pfSense firewall workshop guidepfSense firewall workshop guide
pfSense firewall workshop guide
Sopon Tumchota
 
Cisco DNA
Cisco DNACisco DNA
Wp ipam infoblox
Wp ipam infobloxWp ipam infoblox
Wp ipam infoblox
islamet
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
Abdullaziz Tagawy
 
pfSense presentation
pfSense presentationpfSense presentation
pfSense presentation
Simon Vass
 

What's hot (20)

HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
 
Cisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW ClusteringCisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW Clustering
 
Cloud Computing Principles and Paradigms: 2 migration into a cloud
Cloud Computing Principles and Paradigms: 2 migration into a cloudCloud Computing Principles and Paradigms: 2 migration into a cloud
Cloud Computing Principles and Paradigms: 2 migration into a cloud
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)
 
Network monitoring system
Network monitoring systemNetwork monitoring system
Network monitoring system
 
Cloud security and compliance ppt
Cloud security and compliance pptCloud security and compliance ppt
Cloud security and compliance ppt
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network Intuitive
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
4 palo alto licenses
4 palo alto licenses4 palo alto licenses
4 palo alto licenses
 
pfSense firewall workshop guide
pfSense firewall workshop guidepfSense firewall workshop guide
pfSense firewall workshop guide
 
Cisco DNA
Cisco DNACisco DNA
Cisco DNA
 
Wp ipam infoblox
Wp ipam infobloxWp ipam infoblox
Wp ipam infoblox
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
pfSense presentation
pfSense presentationpfSense presentation
pfSense presentation
 

Similar to NGIPS(Next Generation Intrusion Prevention System) in Network security presentation

Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 
Ingenieria de Software Real Academia Española
Ingenieria de Software Real Academia EspañolaIngenieria de Software Real Academia Española
Ingenieria de Software Real Academia Española
pkalckbh
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Security
 
Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011
Atlantic Security Conference
 
Cours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptxCours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptx
ssuserc517ee1
 
INTRUSION_DETECTION_SYSTEM_PBL.pptx
INTRUSION_DETECTION_SYSTEM_PBL.pptxINTRUSION_DETECTION_SYSTEM_PBL.pptx
INTRUSION_DETECTION_SYSTEM_PBL.pptx
Prasad92810
 
Network security
Network securityNetwork security
Network security
Raaz Karkee
 
Why ips slide share
Why ips slide shareWhy ips slide share
Why ips slide share
Travis Abrams
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Greater Noida Institute Of Technology
 
Security-Centric Networking
Security-Centric NetworkingSecurity-Centric Networking
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
Savvius, Inc
 
Aensis idps 1000 v ext_eng
Aensis idps 1000  v ext_engAensis idps 1000  v ext_eng
Aensis idps 1000 v ext_eng
Jose Luis Garcia Rodriguez
 
INSECS: Intelligent networks security system
INSECS: Intelligent networks security systemINSECS: Intelligent networks security system
INSECS: Intelligent networks security system
Nadun Rajasinghe
 
Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015
Michael Jones, CCIE, CISSP, PMP
 
Network security
Network securityNetwork security
How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?
IT AMC Support Dubai - Techno Edge Systems LLC
 
Secure IT 2014
Secure IT 2014Secure IT 2014

Similar to NGIPS(Next Generation Intrusion Prevention System) in Network security presentation (20)

Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Ingenieria de Software Real Academia Española
Ingenieria de Software Real Academia EspañolaIngenieria de Software Real Academia Española
Ingenieria de Software Real Academia Española
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011
 
Cours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptxCours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptx
 
INTRUSION_DETECTION_SYSTEM_PBL.pptx
INTRUSION_DETECTION_SYSTEM_PBL.pptxINTRUSION_DETECTION_SYSTEM_PBL.pptx
INTRUSION_DETECTION_SYSTEM_PBL.pptx
 
Network security
Network securityNetwork security
Network security
 
Why ips slide share
Why ips slide shareWhy ips slide share
Why ips slide share
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Security-Centric Networking
Security-Centric NetworkingSecurity-Centric Networking
Security-Centric Networking
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Aensis idps 1000 v ext_eng
Aensis idps 1000  v ext_engAensis idps 1000  v ext_eng
Aensis idps 1000 v ext_eng
 
INSECS: Intelligent networks security system
INSECS: Intelligent networks security systemINSECS: Intelligent networks security system
INSECS: Intelligent networks security system
 
Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015
 
Network security
Network securityNetwork security
Network security
 
How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

NGIPS(Next Generation Intrusion Prevention System) in Network security presentation

  • 1.
  • 2. • Submitted By: Uzair Ahmad • Submitter To: Sir Muhammad Javed Hussain Khan • Program: BSCS • Semester: 7th • Topic: Next generation IPS (NGIPS) • Subject: Network Security
  • 3. WHAT IS NGIPS? • NGIPS is the short form of Next Generation Intrusion Prevention System . • It is an advanced automated network security . • and threat prevention tool. • NGIPS monitors network traffic to detect suspicious activity. • And vulnerabilities like phishing, network intrusions • Across the network.
  • 4. WHAT IS NGIPS? • NGIPS monitors network traffic to detect suspicious activity. • And vulnerabilities like phishing, network intrusions • Across the network.
  • 5. NGIPS DETAILS • Next Generation Intrusion Prevention System (NGPIS) is designed to provide wide protection of vulnerabilities. • Especially at the application layer. • It controls the behavior of applications. • It also allows access and provides real-time protection.
  • 6. NGIPS DETAILS • A traditional IPS was designed to identify the known attacks. • Traditional IPSs are black boxes that offer little visibility into the protection being offered. • But NGIPS will go way beyond the signature-based protection. • However, a next-generation IPS includes network security beyond detection and prevention.
  • 7. NGIPS DETAILS • It has the capability of visibility • Custom rules. • Vulnerability-based protection. • And is able to analyze the network attack behavior.
  • 8. NGIPS DETAILS • The existing technologies are vulnerable to smart cyber- attacks. • and very limited to guarantee growth and safety of networks. • NGIPS offers comprehensive threat security. • That blocks intrusions and safeguards valuable assets. • NGIPS makes use of an innovative multi-layer approach. • It helps to figure out known, 0-day, and advanced persistent threats
  • 9. NGIPS DETAILS • It also defends network from. • Worms. • Spyware. • Malware. • Trojan Horse. • Brute Force Attacks • Protocol Attacks • And Web Threats
  • 10. CHALLENGES OF IPS • Nowadays, Internet security is a vital issue in the cyber world. • Intrusion detection and prevention system are playing significant roles in this field. • It needs intelligent IPS for better accuracy detection rate and faster response. • The NGIPS in order to achieve an accurate detection rate and faster response. • Proposes new effective analysis techniques. • New algorithms are proposed on IPS • However, the rate of attacks increases every day • And Web Threats
  • 11. CHALLENGES OF IPS • New algorithms are proposed on IPS. • However, the rate of attacks increases every day. • Due to the increasing cyber threats. • And easiness of accessibility of computer devices. • The Attackers find loopholes to trade off the remote host and utilize it as an instrument for stealing resources from the network
  • 12. CHALLENGES OF IPS • The false positive alarm rate is one of the biggest problems in IPS. • In order to monitor and evaluate the alerts, a skilled IPS analyst has to stay on the top of. • All new attacks • Worms. • Viruses • Different operating systems • Network changes to keep the network secure.
  • 13. COMPARISON BETWEEN TRADITIONAL IPS AND NGIPS • There are several common challenges in IPS such as. • deployment. • Management • Technical. • Detection and response challenges • Different operating systems • Network changes to keep the network secure.
  • 14. COMPARISON BETWEEN TRADITIONAL IPS AND NGIPS • A traditional IPS examines the traffic. • It does not block the traffic beyond signature-based protection. • While NGIPS goes way beyond signature-based security. • NGIPS provides wide-range protection against. • Vulnerabilities.
  • 15. COMPARISON BETWEEN TRADITIONAL IPS AND NGIPS • NGIPS has a huge number of features to tackle continuous changing pattern of the attacks. • Deep packet inspection. • Real-time protection. • And able to control the behavior of the applications
  • 16. WORKING PROCESSES OF NGIPS • NGIPS working process, packet decoder collects packets from different network interfaces. • and prepares it for the preprocessor. • Preprocessors are being used to organize and modify packets. • Detection engine analyzes all the packets passing through • It to indicate whether any intrusion occurs by using certain predefined rules.
  • 17. WORKING PROCESSES OF NGIPS • It to indicate whether any intrusion occurs by using certain predefined rules. • Alert generation is used for creating the alert. • The output modules display the results of intrusion detection examination.
  • 18. EFFICACY • Secure IPS receives new policy rules and signatures every two hours. • So your security is always up to date. • Cisco Talos leverages the world's largest threat detection network to bring security effectiveness to every Cisco security product. • This industry-leading threat intelligence • Works as an early-warning system that constantly updates with new threats.
  • 19. OPERATIONAL COST • Use Secure IPS automation to increase operational efficiency. • And reduce overhead by separating actionable events from noise. • Prioritize threats for your staff and improve your security through policy recommendations based on network vulnerabilities. • Stay informed on what rules to activate and deactivate, and filter events pertinent for the devices on your network.
  • 20. FLEXIBILITY • Secure IPS flexible deployment options meet the needs of the enterprise. • It can be deployed at the perimeter, at the data center distribution/core. • Or behind the firewall to protect mission-critical assets. • Guest access, and WAN connections. • Secure IPS can be deployed for inline inspection or passive detection
  • 21. INTEGRATION • Secure IPS plugs into your network without major hardware changes or significant time to implement. • Enable and manage several security applications from a single pane with Firewall Management Center. • Seamlessly navigate between Secure IPS. • Secure Firewall and Secure Endpoint to optimize your security and ingest third-party data through Cisco Threat Intelligence Director.