Enterprise Worm Mitigation--A Community of Interest based .ppt
《Enterprise Worm Mitigation--A Community of Interest based .ppt》由会员分享,可在线阅读,更多相关《Enterprise Worm Mitigation--A Community of Interest based .ppt(19页珍藏版)》请在麦多课文档分享上搜索。
1、1,Enterprise Worm Mitigation- A Community of Interest based approach,Bill Aiello Computer Science UBC,2,The Network Effect for (In)Security,Where were we twenty years ago? PSTN: signaling over a separate network Layer 2 data networks: single administrative domain, closed user group Since then, IP an
2、d the Internet have grown exponentially and surpassed the PSTN, Frame and ATM. Why? Internetworking/Interoperability: IP originally designed to “glue” together different layer 2 and layer 3 technologies Open access: Access is not controlled by a single administrative domain. It is not a closed user
3、group Control plane and data plane carried over same network fabric: Allows disparate network services to be integrated These combine to create the Network Effect Once an open network has a large number of nodes with whom to communicate and a large number of services, new hosts have a great deal of
4、incentive to connect to the network The flip side-the Network Effect for (In)Security For each new host connected to the network, every other host is a potential attacker and every network service is a potential attack point.Securing an integrated, packet-based IP network is a much more complex task
5、 than securing segregated/circuit switched networks,3,IP Network Security Vulnerabilities,IP Protocol Vulnerabilities: No admission control for “data” services Susceptible to flooding attacks Weak source authentication in: UDP/TCP protocols, routing table update protocols, Domain Name Service protoc
6、ols Protocols/mechanisms for authentication and QoS must be added on top of basic protocol suite for some services Software Vulnerabilities: Frequent implementation errors in OSes, protocols and applications Cause of the large majority of security incidents An unfortunate fact of life for the forese
7、eable future An accurate and up-to-date software inventory and a well-defined change control process are needed Configuration Vulnerabilities Syntax for configurations are low level, complex and vendor specific Configuration provisioning is currently prone to error Scalable, vendor agnostic automate
8、d provisioning and management tools are required.,4,Security Threats,Base Vulnerabilities + the Network Effect for Insecurity make large-scale automated attacks possible Worms, Viruses, and DDoS Unmanaged complexity gives hackers additional opportunities Software modules are very large and complex I
9、ndividual hosts require great care to manage-few are receiving such care Timely software updates Proper configurations Networks are very large, very complex, very heterogeneous, very hard to manage Network perimeter is disolving Evolution from client-server to automated workflow Hackers take advanta
10、ge of all this complexity and chaos Install zombies, trojan horses, backdoors Use as launch points for DDoS attacks, worms, spam Routing infrastructure attacks a looming threat,5,SecurityWhy so complicated? The Network Security Matrix,6,Current Initiatives,Enterprise-level Worm Mitigation Enterpise-
11、level virus mitigation through host diversity ISP-level DDoS Mitigation Traffic Anomaly Detection, control and data plane correlation ISP & Enterprise Configuration Provisioning & Management VoIP Security Interdomain Routing Security,7,Viruses,Worms, DDoS,Worms and Viruses Many sources, many destina
12、tions Carriers have mixed incentives to block or thwart them Enterprises feel the most pain from worms and viruses and thus have a lot of incentive DDOS Many sources, few destinations exhaust b/w on a link exhaust server resources Enterprise has few tools to combat DDoS attacks ISP may have some too
13、l and it has incentives to do so Main idea: Deploy farms of resources, e.g., scrubbing farms, email server farms, etc. Reroute attack traffic through shared resources.,8,Enterprise Pain,Enterprises are feeling the most pain from viruses and worms Carriers have mixed incentives to block virus and wor
14、m propagation in their networks + marketing - hard to do it in a way that doesnt break real applications Two main problems Large monocultures of complex, vulnerable code The enterprise lan and enterprise desktops are complete chaos Our main approach Restriction of lan and desktop behavior,9,Beyond C
15、ommunities of Interest Reducing Desktop Chaos,Potential Enterprise Restrictions A. Software download: restrict and enable automated up-to-date database view Can be done for Windows 2000/XP B. Software configuration: automate provisioning and enable database view Need strong config management tools C
16、. Communities of interest: Most desktops only need to talk to a handful of servers Desktops almost never need to talk to other desktopsbut this is precisely how many worms propagate Restrict Who x who x what on the LAN These restrictions can be automatically coupled to the applications and configura
17、tion of each desktop E.g., a desktop can only talk to one email server and that server is governed by the email client installed on that machine. All policies and meta data should be stored and managed in centralized databases Policies may allow user to “auto-provision” through, say, a Web interface
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ENTERPRISEWORMMITIGATIONACOMMUNITYOFINTERESTBASEDPPT

链接地址:http://www.mydoc123.com/p-374454.html