53 200906 ISS PRG UTIMACO

background image

What LI can learn from Anti-SPAM, Anti-Virus,
IDS/IPS, and DPI technologies

Dirk Schrader
4 June 2009, ISS Track 2, 13:30 ! 14:00

Utimaco Safeware AG

background image

2

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

Contents

!

Introductions

!

Anti-SPAM and LI

!

Anti-Virus and LI

!

IDS/IPS and LI

!

DPI and LI

!

Summary

!

Q&A and Thank You

background image

3

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

Introductions ! About Dirk

Dirk Schrader
Sales Director @ Utimaco LIMS

CISSP

Certified Information

System Security Professional

background image

4

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

Offices
Reseller/Distributors

Introductions ! About Utimaco

!

Founded in 1983

!

Listed on the German Stock
Exchange

!

"59.2 million (fiscal year 07/08)

!

300+ employees
in offices worldwide

!

Headquarters in Germany

!

12 subsidiaries and established
distributor and partner network
around

!

recently acquired by Sophos Plc

background image

5

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

Introductions ! About the topic

You have heard about this technologies protecting your Notebook from
the evil lurking out there in the Net.

What do they do exactly? How to use their methods for LI?

This session shall give an overview about the methods and the way
they can help improving LI in a world communicating in packets.

!

Anti-SPAM,

!

Antivirus,

!

Intrusion Detection/
Prevention Systems,

!

Deep Packet Inspection.

background image

6

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

Anti-SPAM ! Overview

!

Basics

aka Email-Filtering, used in
automated techniques.
Some of these depend upon
rejecting email from Internet sites
known or likely to send spam.
Others rely on automatically
analyzing the content of email
messages and weeding out those
which resemble spam.

!

Keywords

w

Regular Expressions

w

Blocking and Filtering

w

Checksum-based

w

C/R System

w

Bayesian (Statistical)
Filtering

w

Transparent Proxy

w

B/W-List (DNS-based)

background image

7

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

Anti-SPAM ! LI implications

!

Filters can help, but can also be evaded, if not kept up-
to-date

!

Mass data (in average 80% of email is SPAM) needs to
be (pre-)handled, but can never be 100% correct

!

Different approaches targeting the same goal can
increase accuracy

background image

8

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

Anti-Virus ! Overview

!

Basics

identifies and removes SW viruses,
or any kind of malware. Several
methods exist to identify malware.
Signature based detection is
limited as it can only identify a
limited amount of emerging threats.
Suspicious behavior monitors the
behavior of all programs. If one tries
to write data to an executable
program, the antivirus alerts.
Sophisticated AV-SW uses
heuristic analysis to identify new
malware.

!

Keywords

w

Metamorphic viruses

w

False positives

w

False negatives

w

Signature Updates

w

Sandbox

background image

9

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

Anti-Virus ! LI implications

!

Signatures must be kept up-to-date, using them for LI
purposes requires a repository to keep track.

!

False positives are likely, as well as false negatives

!

A secured environment is necessary to find information
covered by something which poses a threat to the LI
system.

background image

10

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

IDS/IPS ! Overview

!

Basics

is SW a/o HW designed to
detect/prevent unwanted attempts
to manipulate a PC.
A statistical anomaly based
system establishes a performance
baseline based on normal network
traffic evaluations.
A signature based system
examines network traffic for
preconfigured and predetermined
attack patterns.

!

Keywords

w

False positives

w

False negatives

w

Signature Updates

w

Network-based

w

Protocol-based

w

Host-based

w

Content-based

background image

11

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

IDS/IPS ! LI implications

!

The interception access point dominates the LI
approach.

!

Again: False positives are likely, as well as false
negatives

!

T$e 'roblem of baselines2 3$a4 is 5normal‘

background image

12

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

DPI ! Overview

!

Basics

DPI is a form of computer network
packet filtering that examines the
data and/or header part of a
packet as it passes an inspection
point.
It enables advanced security
functions as well as internet data
mining.
DPI combines the functionality of
IDS, IPS and Stateful Firewalls to
have the ability to look at Layer 2
through Layer 7 of the OSI model.

!

Keywords

w

Traffic access point

w

Intercepting proxy
server

w

Protocol-awareness

background image

13

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

DPI ! LI implications

!

Layer 7 interception needs understanding of the ever
changing world of protocols.

!

TA8 a4 4$e 3rong 'lace2 an; you‘ll never see your 
target.

!

Layer 2 technologies like MPLS can be cumbersome

background image

14

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

Summary

!

Keep track of your trigger criterias in a kind of repository

!

Keep your trigger criterias up-to-date

!

Automation never produces 100% results, but greatly
reduces the workload for human intelligence.

!

The key is tuning the sensitivity (balancing false pos.
against false neg.)

!

Mind your point of access to the network

!

Protocol-awareness is crucial

background image

15

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

Q&A and Thank You

Feel free to start the Q&A part

Thank you for your kind attention!

background image

16

©

U

tim

ac

o

Sa

fe

w

ar

e

AG

2

00

8

Contact details

Dirk Schrader

Director Sales LIMS

Utimaco Safeware AG

Germanusstrasse 4

DE-52080 Aachen

dirk.schrader@aachen.utimaco.de

Fon +49(241) 1696-226 ? @aA BCDEFCGH GIDI-199

Mobile +49(172)7556617


Wyszukiwarka

Podobne podstrony:
47 200906 ISS PRG ETSI
48 200906 ISS PRG GROUP2000
43 200906 ISS PRG COBHAM
28 200810 ISS PRG ETSI3
41 200810 ISS PRG VASTECH
22 200810 ISS PRG CECRATECH
32 200810 ISS PRG NETI
29 200810 ISS PRG GROUP2000 2
19 200810 ISS PRG ADAE
27 200810 ISS PRG ETSI2
21 200810 ISS PRG AMESYS
23 200810 ISS PRG DETICA
26 200810 ISS PRG ETSI
33 200810 ISS PRG NOKIA SIEMENS
196 201106 ISS UTIMACO FLYER
53 LEKI WYKRZTUŚNE I SEKRETOLITYCZNE
cwiczenie 04 53
200906180002 7 26
49 53

więcej podobnych podstron