SlideShare une entreprise Scribd logo
1  sur  10
Smart Protection Network

                                   Kelvin Liu
                 AVP, Core Tech Development
Evolving Threat Landscape


     Malware is           Malware is                          Malware is
     multiplying         sophisticated                       profit driven
                     Complexity
                                                       Web

                                             Botnets
                                       Spyware
                                Spam

                        Worms




           Malware is getting increasingly dangerous
                     and harder to detect.




                                                                       Copyright 2008 - Trend Micro Inc.
Example : Conficker / Downadup




       User receive
       a spam mail                                      Internet
                                     User open the
                                       mail then
                                     automatically
                                    download a file



                                              Connect to various
                                             websites, download
                                             other malicious files
                The file register
                  itself as a
                system service          Monitor the Internet                              Block access to
                                       browser’s address bar                              certain websites
 Internal -
 Confidential                                         Copyright 2009 - Trend Micro Inc.
Smart Protection Network against Conficker

                        Many clients’ processes are dropping
                        similar filenames in a short time
                                                                                           Community Intelligence
                                          Many clients access or modify the
                                          same system file in a short time

                                                         Many clients accessed similar/same
                                                         registry keys in a short time
                                                                                                                              Customer
                               Incident                                                                                     Feedback Log
                                Trigger                                                                           File
                                                                                                               Reputation


                                                                   Correlation

                                                                                                                 Web
                                                                                                               Reputation
                               Monitor
                                               Smart Protection Network                                                     Immediate
                                                                                                                            Protection
                                                                                                                 Email
                                   File       Score           From                         Connect to
                                                                                                               Reputation
        Correlate to figure    Crypt.NS.Gen    X       129.24.11.3/aexjiire/         Euwl.tsst.com:88/e34jg/
        out where the threat   Dropper.Gen     X      Ndj.sexadult.com/ssr/ee           112.42.5.112:80/
        come from & where        Nqe.exe       V           www.xyz.com                   www.abc.com
        it would connect to    Conflicker_D    X       qd.wqwwor.com/om              nadasm0.info:80/bugsy
                               Conflicker_D    X        Fdjhg.wopqfe.com               7f7fewf.cn:80/sina/


 Internal -
 Confidential       Feb 2009                                      Copyright 2009 - Trend Micro Inc.
Smart Protection Network against Conficker


                                        Threat Intelligence



                             Incident
                              Trigger                                              File
                                                                                Reputation


                                             Correlation

                                                                                  Web
                                                                                Reputation
                             Monitor
                                                                                             Immediate
                                                                                             Protection
                                                                                  Email
                                                                                Reputation
 Domain / Name Server
 / IP / Register’s Email
        Correlation
  to build up a Spider
         Network



                  Feb 2009                  Copyright 2009 - Trend Micro Inc.
Smart Protection Network against Conficker


                                        Threat Intelligence



                             Incident
                              Trigger                                              File
                                                                                Reputation


                                             Correlation

                                                                                  Web
                                                                                Reputation
                             Monitor
                                                                                             Immediate
                                                                                             Protection
                                                                                  Email
                                                                                Reputation
 Domain / Name Server
 / IP / Register’s Email
        Correlation
  to build up a Spider
         Network



                  Feb 2009                  Copyright 2009 - Trend Micro Inc.
What & How Trend Micro use Cloud Computing




                           HTTP                   DNS                                  FTP

                          Monitor         Incident Trigger                      Correlation    Correlation

                    Clustering         Analyzer            Clawer                  MapReduce   Data Processing

                    Tracking System         Hadoop ( HBASE / Meta Data )                       Data Archive

                    Message Routing framework                       Hadoop (HDFS)              Infrastructure

                                          Virtualization
                                                                                               Operating system
                                                  OS


                                          Server Farm

                                    Smart Protection Network
Internal -
Confidential   Feb 2009                                Copyright 2009 - Trend Micro Inc.
Why Smart Protection Network



                 Time to Protect                         Threat Intelligence

                Immediate Protection                               Threat Lifecycle
                   Early Warning                                    Management




                Less Complexity                                   Reduce Cost

                 Lightweight Clients                    Reduce Downtime Costs
                Less Memory Usage                       Reduce Hardware Costs


 Internal -
 Confidential    Feb 2009              Copyright 2009 - Trend Micro Inc.
Copyright 2009 - Trend Micro Inc.
Thank You




業務專線 : (02) 2378-2666

Contenu connexe

Tendances

AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
 
Microsoft Forefront - Secure Messaging Solution Datasheet
Microsoft Forefront - Secure Messaging Solution DatasheetMicrosoft Forefront - Secure Messaging Solution Datasheet
Microsoft Forefront - Secure Messaging Solution Datasheet
Microsoft Private Cloud
 
Ancaman & kelemahan server
Ancaman & kelemahan serverAncaman & kelemahan server
Ancaman & kelemahan server
Dedi Dwianto
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Private Cloud
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013
STO STRATEGY
 
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
IBMSSA
 

Tendances (20)

AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
Microsoft Forefront - Secure Messaging Solution Datasheet
Microsoft Forefront - Secure Messaging Solution DatasheetMicrosoft Forefront - Secure Messaging Solution Datasheet
Microsoft Forefront - Secure Messaging Solution Datasheet
 
Ancaman & kelemahan server
Ancaman & kelemahan serverAncaman & kelemahan server
Ancaman & kelemahan server
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
Why Mx Logic
Why Mx LogicWhy Mx Logic
Why Mx Logic
 
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
521 524
521 524521 524
521 524
 
Rm
RmRm
Rm
 
eForensics_17_2013_KMOKER
eForensics_17_2013_KMOKEReForensics_17_2013_KMOKER
eForensics_17_2013_KMOKER
 

Similaire à Smart Protection Network

Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
Webroot
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
Symantec
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927
Todd Deshane
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Microsoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server DatasheetMicrosoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server Datasheet
Microsoft Private Cloud
 

Similaire à Smart Protection Network (20)

Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBMUndgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
LogMeIn Security White Paper
LogMeIn Security White PaperLogMeIn Security White Paper
LogMeIn Security White Paper
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 
Microsoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server DatasheetMicrosoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server Datasheet
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
Security presentation
Security presentationSecurity presentation
Security presentation
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
Infromation Security as an Institutional Priority
Infromation Security as an Institutional PriorityInfromation Security as an Institutional Priority
Infromation Security as an Institutional Priority
 

Plus de kevin liao (8)

琵琶贈心心_趨勢教育基金會
琵琶贈心心_趨勢教育基金會琵琶贈心心_趨勢教育基金會
琵琶贈心心_趨勢教育基金會
 
2010 programming contest preliminary feedback
2010 programming contest preliminary feedback2010 programming contest preliminary feedback
2010 programming contest preliminary feedback
 
2009 騰雲駕霧程式競賽Opening Slide
2009 騰雲駕霧程式競賽Opening Slide2009 騰雲駕霧程式競賽Opening Slide
2009 騰雲駕霧程式競賽Opening Slide
 
Zh Tw Introduction To H Base
Zh Tw Introduction To H BaseZh Tw Introduction To H Base
Zh Tw Introduction To H Base
 
Zh Tw Introduction To Map Reduce
Zh Tw Introduction To Map ReduceZh Tw Introduction To Map Reduce
Zh Tw Introduction To Map Reduce
 
Zh Tw Introduction To Hadoop And Hdfs
Zh Tw Introduction To Hadoop And HdfsZh Tw Introduction To Hadoop And Hdfs
Zh Tw Introduction To Hadoop And Hdfs
 
Zh Tw Introduction To Cloud Computing
Zh Tw Introduction To Cloud ComputingZh Tw Introduction To Cloud Computing
Zh Tw Introduction To Cloud Computing
 
坐看雲起時_談雲端技術運用
坐看雲起時_談雲端技術運用坐看雲起時_談雲端技術運用
坐看雲起時_談雲端技術運用
 

Dernier

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Dernier (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Smart Protection Network

  • 1. Smart Protection Network Kelvin Liu AVP, Core Tech Development
  • 2. Evolving Threat Landscape Malware is Malware is Malware is multiplying sophisticated profit driven Complexity Web Botnets Spyware Spam Worms Malware is getting increasingly dangerous and harder to detect. Copyright 2008 - Trend Micro Inc.
  • 3. Example : Conficker / Downadup User receive a spam mail Internet User open the mail then automatically download a file Connect to various websites, download other malicious files The file register itself as a system service Monitor the Internet Block access to browser’s address bar certain websites Internal - Confidential Copyright 2009 - Trend Micro Inc.
  • 4. Smart Protection Network against Conficker Many clients’ processes are dropping similar filenames in a short time Community Intelligence Many clients access or modify the same system file in a short time Many clients accessed similar/same registry keys in a short time Customer Incident Feedback Log Trigger File Reputation Correlation Web Reputation Monitor Smart Protection Network Immediate Protection Email File Score From Connect to Reputation Correlate to figure Crypt.NS.Gen X 129.24.11.3/aexjiire/ Euwl.tsst.com:88/e34jg/ out where the threat Dropper.Gen X Ndj.sexadult.com/ssr/ee 112.42.5.112:80/ come from & where Nqe.exe V www.xyz.com www.abc.com it would connect to Conflicker_D X qd.wqwwor.com/om nadasm0.info:80/bugsy Conflicker_D X Fdjhg.wopqfe.com 7f7fewf.cn:80/sina/ Internal - Confidential Feb 2009 Copyright 2009 - Trend Micro Inc.
  • 5. Smart Protection Network against Conficker Threat Intelligence Incident Trigger File Reputation Correlation Web Reputation Monitor Immediate Protection Email Reputation Domain / Name Server / IP / Register’s Email Correlation to build up a Spider Network Feb 2009 Copyright 2009 - Trend Micro Inc.
  • 6. Smart Protection Network against Conficker Threat Intelligence Incident Trigger File Reputation Correlation Web Reputation Monitor Immediate Protection Email Reputation Domain / Name Server / IP / Register’s Email Correlation to build up a Spider Network Feb 2009 Copyright 2009 - Trend Micro Inc.
  • 7. What & How Trend Micro use Cloud Computing HTTP DNS FTP Monitor Incident Trigger Correlation Correlation Clustering Analyzer Clawer MapReduce Data Processing Tracking System Hadoop ( HBASE / Meta Data ) Data Archive Message Routing framework Hadoop (HDFS) Infrastructure Virtualization Operating system OS Server Farm Smart Protection Network Internal - Confidential Feb 2009 Copyright 2009 - Trend Micro Inc.
  • 8. Why Smart Protection Network Time to Protect Threat Intelligence Immediate Protection Threat Lifecycle Early Warning Management Less Complexity Reduce Cost Lightweight Clients Reduce Downtime Costs Less Memory Usage Reduce Hardware Costs Internal - Confidential Feb 2009 Copyright 2009 - Trend Micro Inc.
  • 9. Copyright 2009 - Trend Micro Inc.
  • 10. Thank You 業務專線 : (02) 2378-2666

Notes de l'éditeur

  1. During today’s presentation we will cover a variety of topics. We’ll start with an overview of the changing threat landscape, explain what Smart Protection Network is and does and then wrap it up with any questions you may have.