Soumettre la recherche
Mettre en ligne
SoleraNetworks
•
Télécharger en tant que PPT, PDF
•
0 j'aime
•
573 vues
Joe Levy
Suivre
Solera Networks Negative Day Threat Detection
Lire moins
Lire la suite
Signaler
Partager
Signaler
Partager
1 sur 23
Télécharger maintenant
Recommandé
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
Prime Infoserv
RSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
Symantec
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
Vallie Joseph
Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction
Dragos, Inc.
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Chris Ross
Security assessment for financial institutions
Security assessment for financial institutions
Zsolt Nemeth
Moving target-defense
Moving target-defense
Zsolt Nemeth
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
Zsolt Nemeth
Recommandé
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
Prime Infoserv
RSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
Symantec
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
Vallie Joseph
Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction
Dragos, Inc.
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Chris Ross
Security assessment for financial institutions
Security assessment for financial institutions
Zsolt Nemeth
Moving target-defense
Moving target-defense
Zsolt Nemeth
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
Zsolt Nemeth
Network intrusi detection system
Network intrusi detection system
Duwinowo NT
Dressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
Dragos, Inc.
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
Huntsman Security
Threat intelligence platform explained
Threat intelligence platform explained
Mindy Kam
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Dragos, Inc.
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
Fidelis Cybersecurity
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn
Hakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
Zsolt Nemeth
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Global Business Events
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
Michele Chubirka
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
EMC
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
Fidelis Cybersecurity
DamballaOverview
DamballaOverview
David C. Petty
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Security B-Sides
The State of Threat Detection 2019
The State of Threat Detection 2019
Fidelis Cybersecurity
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
Dragos, Inc.
Security in the cloud planning guide
Security in the cloud planning guide
Yury Chemerkin
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2016
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
Blue Coat
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
Eryk Budi Pratama
Contenu connexe
Tendances
Network intrusi detection system
Network intrusi detection system
Duwinowo NT
Dressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
Dragos, Inc.
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
Huntsman Security
Threat intelligence platform explained
Threat intelligence platform explained
Mindy Kam
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Dragos, Inc.
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
Fidelis Cybersecurity
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn
Hakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
Zsolt Nemeth
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Global Business Events
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
Michele Chubirka
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
EMC
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
Fidelis Cybersecurity
DamballaOverview
DamballaOverview
David C. Petty
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Security B-Sides
The State of Threat Detection 2019
The State of Threat Detection 2019
Fidelis Cybersecurity
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
Dragos, Inc.
Security in the cloud planning guide
Security in the cloud planning guide
Yury Chemerkin
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2016
Tendances
(20)
Network intrusi detection system
Network intrusi detection system
Dressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
Threat intelligence platform explained
Threat intelligence platform explained
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Hakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
DamballaOverview
DamballaOverview
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
The State of Threat Detection 2019
The State of Threat Detection 2019
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
Security in the cloud planning guide
Security in the cloud planning guide
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
Similaire à SoleraNetworks
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
Blue Coat
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
Eryk Budi Pratama
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
Big security for big data
Big security for big data
Giuliano Tavaroli
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
Stonesoft
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
Frederic Roy-Gobeil, CPA, CGA, M.Tax.
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
Iftikhar Ali Iqbal
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
Phil Huggins FBCS CITP
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
Cloudera, Inc.
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
David Sweigert
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Collin Miles
Mike Miller Resume 2016 - Ver 2
Mike Miller Resume 2016 - Ver 2
Mike Miller
Esteban Próspero
Esteban Próspero
ClusterCba
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
Rodrigo Piovesana
Final_year_project_documentation
Final_year_project_documentation
Ushnish Chowdhury
Security and-visibility
Security and-visibility
edwardstudyemai
SHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptx
officelifehq
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
Savvius, Inc
Splunk for Security Breakout Session
Splunk for Security Breakout Session
Splunk
Similaire à SoleraNetworks
(20)
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
Big security for big data
Big security for big data
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Mike Miller Resume 2016 - Ver 2
Mike Miller Resume 2016 - Ver 2
Esteban Próspero
Esteban Próspero
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
Final_year_project_documentation
Final_year_project_documentation
Security and-visibility
Security and-visibility
SHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptx
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
Splunk for Security Breakout Session
Splunk for Security Breakout Session
SoleraNetworks
1.
Negative Day Threat
Detection 2009-02-05 Joe Levy – CTO, Solera Networks
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Storage trends enable
total fidelity Sources: http://commons.wikimedia.org/wiki/Image:Hard_drive_capacity_over_time.png http://w ww.alts.net/ns1625/winchest.html
13.
14.
15.
Functional Deployment
16.
17.
18.
19.
20.
21.
Thank you Joe
Levy jlevy@ soleranetworks.com Solera Networks See everything. Know everything.
22.
Ethernet Ethernet Constants
- IEEE 802.3 10Mbps 100Mbps 1Gbps 10Gbps Bit/time .1µs .01µs (10ns) 1ns .01ns Byte/time .8µs .08µs (80ns) 8ns .8ns Inter-Pkt Gap 9.6µs .96µs 96ns 9.6ns IPG = 96 bits / 12 bytes Preamble 6.4µs .64µs 64ns 6.4ns Preamble = 64 bits / 8 bytes Max Pkt per second = #bps / (pkt size + IPG + Preamble) * 8 Max Throughput (bits) = Max pkts/sec * pkt size * 8 10Mbps 100Mbps 1Gbps 10Gbps 10Mbps 100Mbps 1Gbps 10Gbps 64 14,881 148,810 1,488,095 14,880,952 7,619,048 76,190,476 761,904,762 7,619,047,619 128 8,446 84,459 844,595 8,445,946 8,648,649 86,486,486 864,864,865 8,648,648,649 256 4,529 45,290 452,899 4,528,986 9,275,362 92,753,623 927,536,232 9,275,362,319 512 2,350 23,496 234,962 2,349,624 9,624,060 96,240,602 962,406,015 9,624,060,150 768 1,586 15,863 158,629 1,586,294 9,746,193 97,461,929 974,619,289 9,746,192,893 1024 1,197 11,973 119,732 1,197,318 9,808,429 98,084,291 980,842,912 9,808,429,119 1518 813 8,127 81,274 812,744 9,869,961 98,699,610 986,996,099 9,869,960,988
23.
Télécharger maintenant