SlideShare a Scribd company logo
1 of 10
Smart Protection Network

                                   Kelvin Liu
                 AVP, Core Tech Development
Evolving Threat Landscape


     Malware is           Malware is                          Malware is
     multiplying         sophisticated                       profit driven
                     Complexity
                                                       Web

                                             Botnets
                                       Spyware
                                Spam

                        Worms




           Malware is getting increasingly dangerous
                     and harder to detect.




                                                                       Copyright 2008 - Trend Micro Inc.
Example : Conficker / Downadup




       User receive
       a spam mail                                      Internet
                                     User open the
                                       mail then
                                     automatically
                                    download a file



                                              Connect to various
                                             websites, download
                                             other malicious files
                The file register
                  itself as a
                system service          Monitor the Internet                              Block access to
                                       browser’s address bar                              certain websites
 Internal -
 Confidential                                         Copyright 2009 - Trend Micro Inc.
Smart Protection Network against Conficker

                        Many clients’ processes are dropping
                        similar filenames in a short time
                                                                                           Community Intelligence
                                          Many clients access or modify the
                                          same system file in a short time

                                                         Many clients accessed similar/same
                                                         registry keys in a short time
                                                                                                                              Customer
                               Incident                                                                                     Feedback Log
                                Trigger                                                                           File
                                                                                                               Reputation


                                                                   Correlation

                                                                                                                 Web
                                                                                                               Reputation
                               Monitor
                                               Smart Protection Network                                                     Immediate
                                                                                                                            Protection
                                                                                                                 Email
                                   File       Score           From                         Connect to
                                                                                                               Reputation
        Correlate to figure    Crypt.NS.Gen    X       129.24.11.3/aexjiire/         Euwl.tsst.com:88/e34jg/
        out where the threat   Dropper.Gen     X      Ndj.sexadult.com/ssr/ee           112.42.5.112:80/
        come from & where        Nqe.exe       V           www.xyz.com                   www.abc.com
        it would connect to    Conflicker_D    X       qd.wqwwor.com/om              nadasm0.info:80/bugsy
                               Conflicker_D    X        Fdjhg.wopqfe.com               7f7fewf.cn:80/sina/


 Internal -
 Confidential       Feb 2009                                      Copyright 2009 - Trend Micro Inc.
Smart Protection Network against Conficker


                                        Threat Intelligence



                             Incident
                              Trigger                                              File
                                                                                Reputation


                                             Correlation

                                                                                  Web
                                                                                Reputation
                             Monitor
                                                                                             Immediate
                                                                                             Protection
                                                                                  Email
                                                                                Reputation
 Domain / Name Server
 / IP / Register’s Email
        Correlation
  to build up a Spider
         Network



                  Feb 2009                  Copyright 2009 - Trend Micro Inc.
Smart Protection Network against Conficker


                                        Threat Intelligence



                             Incident
                              Trigger                                              File
                                                                                Reputation


                                             Correlation

                                                                                  Web
                                                                                Reputation
                             Monitor
                                                                                             Immediate
                                                                                             Protection
                                                                                  Email
                                                                                Reputation
 Domain / Name Server
 / IP / Register’s Email
        Correlation
  to build up a Spider
         Network



                  Feb 2009                  Copyright 2009 - Trend Micro Inc.
What & How Trend Micro use Cloud Computing




                           HTTP                   DNS                                  FTP

                          Monitor         Incident Trigger                      Correlation    Correlation

                    Clustering         Analyzer            Clawer                  MapReduce   Data Processing

                    Tracking System         Hadoop ( HBASE / Meta Data )                       Data Archive

                    Message Routing framework                       Hadoop (HDFS)              Infrastructure

                                          Virtualization
                                                                                               Operating system
                                                  OS


                                          Server Farm

                                    Smart Protection Network
Internal -
Confidential   Feb 2009                                Copyright 2009 - Trend Micro Inc.
Why Smart Protection Network



                 Time to Protect                         Threat Intelligence

                Immediate Protection                               Threat Lifecycle
                   Early Warning                                    Management




                Less Complexity                                   Reduce Cost

                 Lightweight Clients                    Reduce Downtime Costs
                Less Memory Usage                       Reduce Hardware Costs


 Internal -
 Confidential    Feb 2009              Copyright 2009 - Trend Micro Inc.
Copyright 2009 - Trend Micro Inc.
Thank You




業務專線 : (02) 2378-2666

More Related Content

Recently uploaded

Recently uploaded (20)

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Cloud Computing,雲端運算防毒運用-Smart Protection Network 趨勢科技劉琴堂

  • 1. Smart Protection Network Kelvin Liu AVP, Core Tech Development
  • 2. Evolving Threat Landscape Malware is Malware is Malware is multiplying sophisticated profit driven Complexity Web Botnets Spyware Spam Worms Malware is getting increasingly dangerous and harder to detect. Copyright 2008 - Trend Micro Inc.
  • 3. Example : Conficker / Downadup User receive a spam mail Internet User open the mail then automatically download a file Connect to various websites, download other malicious files The file register itself as a system service Monitor the Internet Block access to browser’s address bar certain websites Internal - Confidential Copyright 2009 - Trend Micro Inc.
  • 4. Smart Protection Network against Conficker Many clients’ processes are dropping similar filenames in a short time Community Intelligence Many clients access or modify the same system file in a short time Many clients accessed similar/same registry keys in a short time Customer Incident Feedback Log Trigger File Reputation Correlation Web Reputation Monitor Smart Protection Network Immediate Protection Email File Score From Connect to Reputation Correlate to figure Crypt.NS.Gen X 129.24.11.3/aexjiire/ Euwl.tsst.com:88/e34jg/ out where the threat Dropper.Gen X Ndj.sexadult.com/ssr/ee 112.42.5.112:80/ come from & where Nqe.exe V www.xyz.com www.abc.com it would connect to Conflicker_D X qd.wqwwor.com/om nadasm0.info:80/bugsy Conflicker_D X Fdjhg.wopqfe.com 7f7fewf.cn:80/sina/ Internal - Confidential Feb 2009 Copyright 2009 - Trend Micro Inc.
  • 5. Smart Protection Network against Conficker Threat Intelligence Incident Trigger File Reputation Correlation Web Reputation Monitor Immediate Protection Email Reputation Domain / Name Server / IP / Register’s Email Correlation to build up a Spider Network Feb 2009 Copyright 2009 - Trend Micro Inc.
  • 6. Smart Protection Network against Conficker Threat Intelligence Incident Trigger File Reputation Correlation Web Reputation Monitor Immediate Protection Email Reputation Domain / Name Server / IP / Register’s Email Correlation to build up a Spider Network Feb 2009 Copyright 2009 - Trend Micro Inc.
  • 7. What & How Trend Micro use Cloud Computing HTTP DNS FTP Monitor Incident Trigger Correlation Correlation Clustering Analyzer Clawer MapReduce Data Processing Tracking System Hadoop ( HBASE / Meta Data ) Data Archive Message Routing framework Hadoop (HDFS) Infrastructure Virtualization Operating system OS Server Farm Smart Protection Network Internal - Confidential Feb 2009 Copyright 2009 - Trend Micro Inc.
  • 8. Why Smart Protection Network Time to Protect Threat Intelligence Immediate Protection Threat Lifecycle Early Warning Management Less Complexity Reduce Cost Lightweight Clients Reduce Downtime Costs Less Memory Usage Reduce Hardware Costs Internal - Confidential Feb 2009 Copyright 2009 - Trend Micro Inc.
  • 9. Copyright 2009 - Trend Micro Inc.
  • 10. Thank You 業務專線 : (02) 2378-2666

Editor's Notes

  1. During today’s presentation we will cover a variety of topics. We’ll start with an overview of the changing threat landscape, explain what Smart Protection Network is and does and then wrap it up with any questions you may have.