SlideShare a Scribd company logo
SELF DEFENDING NETWORK 
( The Next Generation Of Network Security ) 
Presented By 
Swarna Bhargava 
( MCA Vsem. ) 
Guided By 
Rashmi Gupta Mam
Agenda 
 Self-Defending Network Concept 
 Why do we need SDN’s? 
 Foundation of the SDN? 
 Endpoint Protection 
 Admission Control 
 Infection Containment 
 Intelligent Correlation and Incident Response 
 Inline IDS and Anomaly Detection 
 Application Security and Anti-X Defense 
Page 2 
 Summary
Self-Defending Network (SDN) Concept 
 It is a systems-based solution that allows entities to use 
their existing infrastructure in new ways to: 
 Reduce windows of valuability 
 Minimize the impact of attacks 
 Improve overall infrastructure availability and reliability 
 SDN also helps create autonomous systems that can 
quickly react on attacks and can make decision to 
security. 
Page 3
Why do we need SDN’s? 
 Evolution of network  Evolution of attacks on networks 
 Traditional approach  Defense-in-depth 
 Proactive defense mechanisms 
Page 4 
 SDN approach 
 Adaptive defense mechanisms 
 Proactive solutions frontload defense mechanisms 
 Key elements of an adaptive solution: 
 Remain active at all times 
 Perform in easy way 
 Minimize propagation of attacks 
 Quickly respond to as-yet unknown attacks
Proactive Defense Example 
Page 5 
Internet 
Outer 
Firewall 
DMZ 
Inner 
Firewall 
Internal 
Corp. 
Network 
Servers (e.g. web, e-mail, proxy) 
Development 
Network
Foundation of a SDN 
 Endpoint Protection 
 Admission Control 
 Infection Containment 
 Intelligent Correlation and Incident 
Response 
 Inline IDS and Anomaly Detection 
 Application Security and Anti-X Defense 
Page 6
Endpoint Protection 
Page 7 
 Cisco Security Agent 
Point of presence on end user systems that enables 
efficient exchange of valuable network threat 
information as it occurs 
Endpoint system virus, worm detection/protection
Admission Control 
 Not only core component of a CSDN, but 
incorporated into other technologies by over 30 
industry-leading vendors 
 Network Admission Control (NAC) assists in 
determining the level of access to grant an end-user 
system in accordance with the security policy when it 
initially joins the network 
 NAC also assists in managing end-user system’s 
compliance with security patches and updates 
Page 8
Infection Containment 
Page 9 
 
The ability to identify non-compliant systems or 
network attacks as they occur and react appropriately, 
minimizing the effect of the breech 
 
Potentially the #1 core component of a secure system 
belonging to a CSDN
Intelligent Correction and Incident Response 
 Services that provide the ability to exchange: 
Page 10 
Event information 
Implications of an event occurring 
Necessary actions to take 
The appropriate nodes or systems to enforce 
actions in real-time 
 These services aide in adapting to changes and 
countering attacks that are occurring in the network 
as they occur rather than after they occur
Application Security and Anti-X Defense 
 A menagerie of application layer security products 
that address the “ever-evolving” classes of threats 
which are not effectively addressed by traditional 
firewall and network IDS products 
Page 11 
 Threat examples: 
E-mail based SPAM and phishing 
Spyware 
Unauthorized peer-to-peer activity
Summary 
Page 12 
 
Encompassing security solution that is proactive 
AND adaptive in nature that envelopes every level of 
network security rather than just specific layers 
 
Key difference in CSDN and traditional security 
solutions…ability of CSDN’s to communicate and 
share information among different security products 
employed within the CSDN
Page 13

More Related Content

What's hot

Fog computing
Fog computingFog computing
Fog computing
Rishabh Kumar ☁️
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
Mahantesh Hiremath
 
Honeypots
HoneypotsHoneypots
Honeypots
SARANYA S
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
Saisharan Amaravadhi
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
Anjana Shivangi
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
Seminar Links
 
Light tree
Light treeLight tree
Light tree
Jitendra31291
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
Mohammed Rizwan S
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
Nikhil Sabu
 
Silverlight
SilverlightSilverlight
Silverlight
BiTWiSE
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
Khyravdhy Tannaya
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
Ram Inamdar
 
free space laser communication
free space laser communicationfree space laser communication
free space laser communication
BHari5
 
seminar on invisible eye
seminar on invisible eyeseminar on invisible eye
seminar on invisible eye
Vashishth Narayan Kumar
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
Siya Agarwal
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
S.Mostafa Sayyedi
 
Sandbox
SandboxSandbox
Sandbox
ayush_nitt
 
Fog computing
Fog computing Fog computing
Fog computing
Pachipulusu Giridhar
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
Akmal Hussain
 
Rain technology
Rain technologyRain technology
Rain technology
Yamuna Devi
 

What's hot (20)

Fog computing
Fog computingFog computing
Fog computing
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Honeypots
HoneypotsHoneypots
Honeypots
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Light tree
Light treeLight tree
Light tree
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Silverlight
SilverlightSilverlight
Silverlight
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
free space laser communication
free space laser communicationfree space laser communication
free space laser communication
 
seminar on invisible eye
seminar on invisible eyeseminar on invisible eye
seminar on invisible eye
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Sandbox
SandboxSandbox
Sandbox
 
Fog computing
Fog computing Fog computing
Fog computing
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Rain technology
Rain technologyRain technology
Rain technology
 

Viewers also liked

Self Defending Applications
Self Defending ApplicationsSelf Defending Applications
Self Defending Applications
Michael Coates
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
Bernard Marr
 
Snake Robot
Snake RobotSnake Robot
Snake Robot
Bhaskar Jha
 
Electronic Ink
Electronic InkElectronic Ink
Electronic Ink
dwicz
 
E ink
E inkE ink
Object Detection & Tracking
Object Detection & TrackingObject Detection & Tracking
Object Detection & Tracking
Akshay Gujarathi
 
Animatronics PPT
Animatronics PPTAnimatronics PPT
Animatronics PPT
Abishek Sam
 
Object Recognition
Object RecognitionObject Recognition
Object Recognition
Eman Abed AlWahhab
 
Fractal robots.ppt
Fractal robots.pptFractal robots.ppt
Fractal robots.ppt
chinkyshruz
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
Mohammad Azhar
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
Manav Mittal
 
Animatronics
AnimatronicsAnimatronics
Animatronics
Vidyulekhe Harshajite
 
Touchless Touchscreen Technology
Touchless Touchscreen TechnologyTouchless Touchscreen Technology
Touchless Touchscreen Technology
Akshay Vasava
 
ARM Processor
ARM ProcessorARM Processor
ARM Processor
Aniket Thakur
 
Touchless Touchscreen
Touchless TouchscreenTouchless Touchscreen
Touchless Touchscreen
Saptarshi Dey
 
My seminar ppt SPACE MOUSE
My seminar ppt  SPACE MOUSEMy seminar ppt  SPACE MOUSE
My seminar ppt SPACE MOUSE
Sudeep Kumar
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
Divya Mohan
 
Honeypots
HoneypotsHoneypots
Honeypots
Jayant Gandhi
 
Space mouse
Space mouseSpace mouse
Space mouse
SunkaraHariNarayana
 

Viewers also liked (20)

Self Defending Applications
Self Defending ApplicationsSelf Defending Applications
Self Defending Applications
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
 
Snake Robot
Snake RobotSnake Robot
Snake Robot
 
Electronic Ink
Electronic InkElectronic Ink
Electronic Ink
 
E ink
E inkE ink
E ink
 
Object Detection & Tracking
Object Detection & TrackingObject Detection & Tracking
Object Detection & Tracking
 
Animatronics PPT
Animatronics PPTAnimatronics PPT
Animatronics PPT
 
Object Recognition
Object RecognitionObject Recognition
Object Recognition
 
Fractal robots.ppt
Fractal robots.pptFractal robots.ppt
Fractal robots.ppt
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
 
Animatronics
AnimatronicsAnimatronics
Animatronics
 
Touchless Touchscreen Technology
Touchless Touchscreen TechnologyTouchless Touchscreen Technology
Touchless Touchscreen Technology
 
ARM Processor
ARM ProcessorARM Processor
ARM Processor
 
Touchless Touchscreen
Touchless TouchscreenTouchless Touchscreen
Touchless Touchscreen
 
My seminar ppt SPACE MOUSE
My seminar ppt  SPACE MOUSEMy seminar ppt  SPACE MOUSE
My seminar ppt SPACE MOUSE
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Space mouse
Space mouseSpace mouse
Space mouse
 

Similar to Self Defending Network

information security technology
information security technologyinformation security technology
information security technology
garimasagar
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
xsy
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
Saikat Chaudhuri
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
Priyanka Aash
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
Metaorange
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
Metaorange
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
Dell EMC World
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
MdZabedHossain2
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
Pankaj Jha
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
George Wainblat
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
Jennifer Wood
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Shakeel Ali
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
Webtrills1
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
IJNSA Journal
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
IJNSA Journal
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
Cisco Russia
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network Security
Darwish Ahmad
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
Anthony Daniel
 
IBM Immune System
IBM Immune SystemIBM Immune System
IBM Immune System
Luke Kenny
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
Manasa Deshaboina
 

Similar to Self Defending Network (20)

information security technology
information security technologyinformation security technology
information security technology
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network Security
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
IBM Immune System
IBM Immune SystemIBM Immune System
IBM Immune System
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 

Recently uploaded

Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 

Recently uploaded (20)

Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 

Self Defending Network

  • 1. SELF DEFENDING NETWORK ( The Next Generation Of Network Security ) Presented By Swarna Bhargava ( MCA Vsem. ) Guided By Rashmi Gupta Mam
  • 2. Agenda  Self-Defending Network Concept  Why do we need SDN’s?  Foundation of the SDN?  Endpoint Protection  Admission Control  Infection Containment  Intelligent Correlation and Incident Response  Inline IDS and Anomaly Detection  Application Security and Anti-X Defense Page 2  Summary
  • 3. Self-Defending Network (SDN) Concept  It is a systems-based solution that allows entities to use their existing infrastructure in new ways to:  Reduce windows of valuability  Minimize the impact of attacks  Improve overall infrastructure availability and reliability  SDN also helps create autonomous systems that can quickly react on attacks and can make decision to security. Page 3
  • 4. Why do we need SDN’s?  Evolution of network  Evolution of attacks on networks  Traditional approach  Defense-in-depth  Proactive defense mechanisms Page 4  SDN approach  Adaptive defense mechanisms  Proactive solutions frontload defense mechanisms  Key elements of an adaptive solution:  Remain active at all times  Perform in easy way  Minimize propagation of attacks  Quickly respond to as-yet unknown attacks
  • 5. Proactive Defense Example Page 5 Internet Outer Firewall DMZ Inner Firewall Internal Corp. Network Servers (e.g. web, e-mail, proxy) Development Network
  • 6. Foundation of a SDN  Endpoint Protection  Admission Control  Infection Containment  Intelligent Correlation and Incident Response  Inline IDS and Anomaly Detection  Application Security and Anti-X Defense Page 6
  • 7. Endpoint Protection Page 7  Cisco Security Agent Point of presence on end user systems that enables efficient exchange of valuable network threat information as it occurs Endpoint system virus, worm detection/protection
  • 8. Admission Control  Not only core component of a CSDN, but incorporated into other technologies by over 30 industry-leading vendors  Network Admission Control (NAC) assists in determining the level of access to grant an end-user system in accordance with the security policy when it initially joins the network  NAC also assists in managing end-user system’s compliance with security patches and updates Page 8
  • 9. Infection Containment Page 9  The ability to identify non-compliant systems or network attacks as they occur and react appropriately, minimizing the effect of the breech  Potentially the #1 core component of a secure system belonging to a CSDN
  • 10. Intelligent Correction and Incident Response  Services that provide the ability to exchange: Page 10 Event information Implications of an event occurring Necessary actions to take The appropriate nodes or systems to enforce actions in real-time  These services aide in adapting to changes and countering attacks that are occurring in the network as they occur rather than after they occur
  • 11. Application Security and Anti-X Defense  A menagerie of application layer security products that address the “ever-evolving” classes of threats which are not effectively addressed by traditional firewall and network IDS products Page 11  Threat examples: E-mail based SPAM and phishing Spyware Unauthorized peer-to-peer activity
  • 12. Summary Page 12  Encompassing security solution that is proactive AND adaptive in nature that envelopes every level of network security rather than just specific layers  Key difference in CSDN and traditional security solutions…ability of CSDN’s to communicate and share information among different security products employed within the CSDN