SlideShare une entreprise Scribd logo
1  sur  32
Security in Network
CNC LAB
2013/10/04
Security level in network
Host level (Application Hacking)
Network level (VPN, BGP)
Application level (Firewall, IDS/IPS, Anti-virus)
Transmission level (ARP, RIP, OSPF, DNS Hiding, HTTPS, TLS/SSL, IPSec)
ARP – Address Resolution Protocol
Required TCP/IP standard defined in RFC 826
Resolved IP addresses used by TCP/IP-based software to Media
Access Control (MAC) addresses used by LAN hardware.
MAC addresses are obtained by using a network broadcast request
◦ What is the MAC address for a device that is configured with the enclosed IP
address?
When an ARP request is answered, both the sender of ARP reply and
the original ARP requesterrecord each other’s IP address and MAC
as an entry in local table called the ARP cachefor future reference.
ARP
An attacker sends a fake ARP messages onto
aLAN.
Aim is to associate the attacker’s MAC
address with the IP address of another host,
sothat any traffic meant from that IP address
are sent to the attacker instead.
ARP Spoofing allows attacker to intercept
data frames on a LAN.
Can only beused on the local network
segments.
RIP Attack
Forging RIP messages
Spoofing source address and sending invalid routes, altering traffic
flow.
◦ Traffic Hijacking
◦ Traffic Monitoring
◦ Redirecting traffic from trusted to untrusted.
Obtaining Clear text RIPv2 "password" when sent across network.
◦ Using retrieved password to send authenticated updates to RIPv2
routers, altering traffic flow with consequences listed above.
RIP Safeguards
Disabling RIPv1 and using RIPv2 with MD5 authentication.
EnablingMD5 based authentication for RIPv2
Disabling RIP completelyand using OSPF with MD5 authentication as
interior gateway protocol. OSPF is the suggested IGP
OSPF Attacks
Forging OSPF messages
◦ Can be some what difficult but theoreticallypossible if no
authenticationrequired or clear text password obtained.
Identified 4 ospf attacks
◦ Max Age attack
◦ Sequence++attack
◦ Max Sequence attack
◦ Bogus LSA attack
Fig: Sequence number attack
OSPF Safeguards
Do not use Dynamic Routing on hosts wherevernot required
ImplementMD5 authentication
◦ You need to deal with key expiration, changeover and coordination across
routers
DNS Hiding
Hiding DNS does not improvesecurity
 Easy to learn about a network once you’ve penetrated it
 Many other ways for host/address information to leak out
Hiding DNS may be necessaryif you do not havevalid IP addresses
 Or many unreachable nodes/networks
Typical DNS Environment
Hidden DNS Environment
Firewall->Internal Queries
Internal
queries
Firewall
Internal
queries
Firewall->External Queries
Firewall External
queries
External
queries
DNS Infrastructure is Vulnerable Example.com
App Servers
GSLB
LDNS
www.example.com? www.example.com?
123.123.123.123
Hacker
Spoofing with first
response
Cache poisoning
012.012.012.012
Problem
Need to secure DNS infrastructure
• Cache poisoning and spoofing can hijack DNS records
• Need a method for trusted responses
• Need to meet US Government mandate for DNSSEC
compliance
Spoofing and cache poisoning allow hijacking
of domains
Securing the DNS Infrastructure
Dynamic and secure DNS with
Global Traffic Manager
Example.com
App Servers
BIG-IP GTM
LDNS
www.example.com? www.example.com?
123.123.123.123
+ public key
Hacker
123.123.123.123
+ public key
Client gets signed,
trusted response
Solution
Secure and dynamic DNS
• Ensure users get trusted DNS queries with signed
responses
• Reduce management costs – Simple to implement and
maintain
• Meet mandates with DNSSEC compliant solution
BIG-IP Global Traffic
Manager with DNSSEC
TLS/SSL
TransportlayerSecure/SocketSecureLayers
Providecommunication securityovertheInternet
UseX.509certificatesandhenceasymmetric
cryptographytoassurethecounterparty whom
theyaretalkingwith,andexchange a
symmetrickey.
Thesession keyisthenusedtoencryptdata
flowingbetweentheparties.Allowsfor
data/message confidentiality, message
integrity.
TLS/SSLisinitializedatlayer5(sessionlayer)then
worksatlayer6(presentation layer).Itworkson
behalfoftheunderlyingtransportlayer.
HTTPS
Acommunicationprotocolforsecurecommunication
overacomputernetwork.
TheresultofsimplylayeringtheHTTPontopofthe
SSL/TLSprotocol,thusaddingthesecurity capabilities
ofSSL/TLStostandardHTTPcommunications..
Internet Protocol Security (IPsec)
IPsecisaprotocolsuiteforsecuringInternetProtocol(IP)
communicationsbyauthenticatingandencryptingeach
IPpacketsofacommunicationsession.
IPsecusesthefollowingprotocolstoperformvarious
functions:
◦ AuthenticationHeadersprovideconnectionless
integrityanddataoriginauthenticationforIPdatagrams
andprovidesprotectionagainstreplayattacks.
◦ EncapsulationSecurityPayloadsprovideconfidentially,
data-originauthentication,connectionintegrity,andanti-
replayservice,limitedtraffic-flowconfidentially.
◦ SecurityAssociationsprovidethebundleofalgorithms
anddatathatprovidetheparametersnecessarytoAH
and/orESPoperations.
Internet Protocol Security (IPsec)
TherearetwomodesofoperationinIPsec
Transportmode:OnlythepayloadofIPpacketis
usuallyencryptedand/orauthenticated.
Usingauthenticationheader,IPheadercannotbe
translated,asthiswillinvalidatethehashvalue.The
transportandapplicationlayersarealwayssecuredby
hash,sotheycannotbemodifiedinanyway.
Tunnelmode:EntireIPpacketisencryptedand/or
authenticated.Itis thenencapsulatedintoanewIP
packetwithanewIPheader.
Tunnelmodeisusedtocreatevirtualprivatenetworkfor
network-to-networkcommunications,host-to-network
communications,andhost-to-hostcommunications
Firewall
AFirewall is ahardware or software device which is configured to permit, deny or
proxy data through a computer network which has difference levels of trust.
Hardware firewall is a device located between Internet and end-terminals
Apply some “ruleset” filters in Control Plane, and Data Planeto prevent from
some attacks that enter an or some interfaces
Firewall types
Intrusion Detection System (IDS/IPS)
IDS is a device or software application thatmonitors network or system activities
for malicious activities or policy violations and procedures reports to a
management station.
Focus on identifying possible incidents, logging information about them, and
reporting attempts.
Intrusion Detection System (IDS/IPS)
Different from a firewall that a firewall looks outwardly for intrusions in order to stop
themfrom happening.
IDS evaluated a suspected intrusion once it has taken place and signals an alarm.
Usestatistical anomaly-based IDS to detect anomalous traffic and signature-based
IDS to monitor packets in the network, compare them with pre-configured and pre-
determined attack patterns.
Anti-virus protection
Therearetwotypesoftheanti-virusprotection:Host-basedantivirus(HAV)andNetwork-
basedantivirus(NAV)
Host-basedantivirussolutions
Bedeployedintheformofsoftwareprogramsthatrunonstandardhostcomputer
platforms.Beusedtoprovideprotectionsolelyforthehostonwhichitisinstalled
HAVarefile-based,theyalwaysworkinconjunctionwiththefilesysteminstalledonthehost.
HAVproductsoperateinanuncontrolledenvironment,requiresignificantadministration,only
operateonfilesthathavebeenwrittentothehost’sdiskfilesystem
HAVproductstypicallyreducestheoverallperformanceofthehostonwhichitruns,are
rarelyusedtoscanreal-timeapplications
Anti-virus protection
Network-basedAVsolutionsareinstalledona
networkgatewaybetweentwonetworks.
NAVsystemstypicallyemploydedicatedplatforms.
NAVsystemsprovideasinglebarrierbehindwhich
allhostsareprotected.
NAVsystemsstopvirusesatthenetworkedge.
NAVsystemsreducetheloadonserversby
eliminatinginfecteddatabeforetheyreachthe
servers.
NAVsystemsarewellpositionedinthenetworkto
scanWebandothertrafficthattendstobypass
conventionalHAVsystems.
Virtual Private Network (VPN)
Avirtualprivatenetworkallowstheprovisioningofprivatenetworkservicesforan
organizationororganizationsoverapublicorsharedinfrastructuresuchastheInternetor
serviceproviderbackbonenetwork.
AVPNisacombinationofsoftwareandhardwarethatallowsemployees,telecommuters,
businesspartners,andremotesitestouseapublicor“unsecured”mediumsuchastheInternet
toestablishasecure,privateconnectionwithahostnetwork
AVPNconnectionisapoint-to-pointconnectionbetweentheuser’scomputerandthe
company’sserver
Virtual Private Network (VPN)
AkeycomponentofaVPNsolutionisprovidingdataprivacy,userauthenticationandaccesscontrol.
Protocolsandtechnologiesusedtoenablesite-to-siteVPNsincludeIPsecurity(IPsec),Genericroutingencapsulation
(GRE),thelayer2tunnelingprotocol,IEEE802.1Q, MPLS.
ProtocolsusedtoenableremoteaccessVPNsincludedtheLayer2forwardingprotocol,Point-to-pointtunneling
protocol,thelayer2tunnelingprotocol,IPsecurity,theSecuresocketslayer
BGP Hijacking
 AS100 is advertising their owned route(10.0.0.0/8) : Victim AS
 AS400 is advertising invalid route(10.0.0.0/8) : Hijacking AS
 AS300 is infected by Hijacking : Infected AS
 AS200 is Influenced but not infected by Hijacking : Influenced AS
AS 200 AS 300
AS 400AS 100
10.0.0.0/8 10.0.0.0/8
10.0.0.0/8
10.0.0.0/8
> 10.0.0.0/8 100
10.0.0.0/8 300 400
10.0.0.0/8 200 100
> 10.0.0.0/8 400
Securing the Border Gateway Protocol
Fig: S-BGP Element Interactions
 S-BGPisanarchitecturalsolution
totheBGPsecurityproblems.
 DevelopedbyCisco
 S-BGPmakesuseof:
IPsec
PublicKeyInfrastructure
Attestations
BGP Threat Mitigations
MD5 carried in TCP
header
Fig: BGP MD5 Neighbor Authentication
Application Hacking
Security flaws in
application level
Un-validated Input
Broken Access Control
Broken authentication
and Session
management
Cross site scripting
Buffer overflows
Injection flaws
Improper error handling
Insecure storage
Denial of Service
Insecure configuration
Management
Application Hacking
Application shield: is referred to as an application-level firewall. In ensures that
incoming and outgoing requests are permissible for the given application. It is
common installed on Web servers, email servers, database servers, and similar
machines. It is transparent to the user but highly integrated with the device on the
backend.
Access control/authentication, only authorized users are able to access the
application.
Input validation verify that application input travelling across your network is safeto
process.

Contenu connexe

Tendances

Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingVi Tính Hoàng Nam
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 BackupJai4uk
 
Paper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesPaper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesYOU SHENG CHEN
 
CEHv7 Question Collection
CEHv7 Question CollectionCEHv7 Question Collection
CEHv7 Question CollectionManish Luintel
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Communityamiable_indian
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logicAlberto Rivai
 
Future Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudFuture Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudSedthakit Prasanphanich
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffersleminhvuong
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation TechniquesIntruGuard
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingVi Tính Hoàng Nam
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotVi Tính Hoàng Nam
 

Tendances (20)

Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
 
Day3
Day3Day3
Day3
 
Paper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesPaper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devices
 
Firewall
FirewallFirewall
Firewall
 
CEHv7 Question Collection
CEHv7 Question CollectionCEHv7 Question Collection
CEHv7 Question Collection
 
Day4
Day4Day4
Day4
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
 
Ceh v5 module 03 scanning
Ceh v5 module 03 scanningCeh v5 module 03 scanning
Ceh v5 module 03 scanning
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
Future Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudFuture Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloud
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 
Network security
Network securityNetwork security
Network security
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 

Similaire à Secure your network with IPS, firewalls and VPNs

Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksIOSR Journals
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contestnkrafacyberclub
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegidoCisco do Brasil
 
From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...Jisc
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANsronrulzzz
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System AdminMD SAHABUDDIN
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issuesbathinin1
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer AttacksArun Modi
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksInformation Technology
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devicesphanleson
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection toolsvishalgohel12195
 

Similaire à Secure your network with IPS, firewalls and VPNs (20)

D017131318
D017131318D017131318
D017131318
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 
DDOS (1).ppt
DDOS (1).pptDDOS (1).ppt
DDOS (1).ppt
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegido
 
From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANs
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Describe firewalls
Describe firewallsDescribe firewalls
Describe firewalls
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Dns protection
Dns protectionDns protection
Dns protection
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devices
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 

Dernier

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Dernier (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Secure your network with IPS, firewalls and VPNs

Notes de l'éditeur

  1. Global Server Load Balancing (GSLB)Local Domain Name Server (LDNS)Domain name server security(DNSSEC)
  2. Global Server Load Balancing (GSLB)Local Domain Name Server (LDNS)Domain name server security(DNSSEC)BIG-IP Global Traffic Manager product
  3. Invalid BGP route announcementTraffic diverting by BGP route hijacking, unreachable…Detection is not so easy…Recovery is very hard…Not frequently, but it occursEasy outbreak, but big impactNot only global, but localized outbreak
  4. http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-3/securing_bgp_s-bgp.htmlIPsec to secure point-to-point communication of BGP control trafficPublic Key Infrastructure to provide an authorization framework representing prefix holders and owners of AS #’s Attestations (digitally-signed data) to represent authorization informationS-BGP is an architectural solution to the BGP security problems described earlier by CiscoS-BGP represents an extension of BGPIt uses a standard BGP facility to carry additional data about paths in UPDATE messagesIt adds an additional set of checks to the BGP route selection algorithmS-BGP avoids the pitfalls of transitive trust that are common in today’s routing infrastructureS-BGP mechanisms exhibit the same dynamics as BGP, and they scale commensurately with BGP