collaborative defence strategies for network security

14
Environmental Comparison of Collaborative Defence Strategies for Network Security.

Upload: sonukumar142

Post on 23-Jan-2017

136 views

Category:

Engineering


1 download

TRANSCRIPT

Environmental Comparison of Collaborative Defence Strategies for Network Security.

Environmental Comparison Collaborative Defence Strategies Network Security

What is Collaborative Defence Strategy?Comparison between different environment or situation.

I even don’t know what is strategy?

Different Strategies of Working Together.

Networking : Exchanging information for mutual benefit.

Coordination : Exchanging information for mutual benefit and alerting activities to achieve a common purpose.

Cooperation : Exchanging information for mutual benefit, alerting activities and sharing resources to achieve a common purpose.

Collaboration : Exchanging information for mutual benefit, alerting activities, sharing resources and enhancing the capacity to achieve a common purpose.

What is a Collaborative Network?

Collaborative network is a network consisting of a variety of entities (e.g. organizations and people) that are largely autonomous, geographically distributed, and heterogeneous in terms of their operating environment, culture, social capital and goals but they all collaborate.

Benefit : possibility of better achieving common goals by excelling the individual capabilities.

What is our goal?

Applying Collaborative Defence Strategies for Network Security.

Our goal is

How to Apply?

Environmental Comparison of Collaborative Defence Strategies.

1. DDoS (Distributed Denial of Service Attack)

2. Phishing Attack

How to apply Collaborative Defence strategy ?

CASE 1: DDoS

In Distributed denial of Service attack. Botnets are used to slow down the system performance.

To address such problems.

CNSMS is used.

What is CNSMS?

Collaborative Network Security Management System(CNSMS)

Collaborative Unified Threat Management(UTM) Cloud Based Security Centre Traffic Prober

Traffic ProberCaptures Network Traffic

UTM

Malicious code is checked

Cloud

Security Event is reported.

What Next?

Cloud

Generates security rules based on data mining.

Also Called Security Centre.

Rule

Networks

Also contains logs. Inefficient algorithms are

eliminated if necessary.

Command and ControlOf botnet is suppressed

Diagram

Phisher tries to send malicious mail or website to victim

Victim is forced to give confidential data to phisher. Phisher collects the data.

If the problem is complex then.

Collaboration of different techniques can be used

Game theory and other AI

Unified Threat Management

Security Experimentation Environment

Intrusion prevention system

Security in different layers of network

Now you know:

What is collaborative defence strategy ?Why it is used ?Where it is used ?How it is used ?