INTRODUCTION

As the nature of threats to organizations continues to evolve, so must the defense
posture of the organizations. In the past, threats from both internal and external
sources were relatively slow-moving and easy to defend against. In today's
environment, where Internet worms spread across the world in a matter of minutes,
security systems - and the network itself - must react instantaneously.

The foundation for a self-defending network is integrated security - security that is
native to all aspects of an organization. Every device in the network - from
desktops through the LAN and across the WAN - plays a part in securing the
networked environment through a globally distributed defense. Such systems help
to ensure the privacy of information transmitted and to protect against internal and
external threats, while providing corporate administrators with control over access
to corporate resources. SDN shows that the approach to security has evolved from
a point product approach to this integrated security approach


These self-defending networks will identify threats, react appropriately to the
severity level, isolate infected servers and desktops, and reconfigure the network
resources in response to an attack. The vision of the Self-Defending Network
brings together Secure Connectivity, Threat Defense and Trust and Identity
Management System with the capability of infection containment and rouge device
isolation in a single solution.

SELF DEFENDING NETWORKS

To defend their networks, IT professionals need to be aware of the new nature of
security threats, which includes the following:

Shift from internal to external attacks Before 1999, when key applications ran on
minicomputers and mainframes, threats typically were perpetrated by internal users
with privileges. Between 1999 and 2002, reports of external events rose 250
percent, according to CERT.

Shorter windows to react. When attacks homed in on individual computers or
networks, companies had more time to understand the threat. Now that viruses can
propagate worldwide in 10 minutes, that "luxury" is largely gone. Antivirus
solutions are still essential but are not enough: by the time the signature has been
identified, it is too late. With self-propagation, companies need network
technology that can autonomously take action against threats.
More difficult threat detection. Attackers are getting smarter. They used to attack
the network, and now they attack the application or embed the attack in the data
itself, which makes detection more difficult.An attack at the network layer, for
example, can be detected by looking at the header information. But an attack
embedded in a text file or attachment can only be detected by looking at the actual
payload of the packet--something a typical firewall doesn't do.The burden of threat
detection is shifting from the firewall to the access control server and intrusion
detection system.Rather than single-point solutions, companies need holistic
solutions.

A lowered bar for hackers. Finally, a proliferation of easy-to-use hackers' tools and
scripts has made hacking available to the less technically-literate. The advent of
'point-and-click' hacking means the attacker doesn't have to know what's going on
under the hood in order to do damage.

These trends in security are what have lead to the advent of SDNs or Self
Defending Networks as the latest version in security control.

More Related Content

PPTX
fog computing ppt
PPTX
Self Defending Network
PPTX
Fog computing technology
PPTX
Security in IoT
PPTX
Screenless display
PPTX
Fog Computing
PPT
918 prasu seminar
PPT
fog computing ppt
Self Defending Network
Fog computing technology
Security in IoT
Screenless display
Fog Computing
918 prasu seminar

What's hot (20)

PPTX
Fog computing 000
PPTX
Virtual keyboard seminar ppt
PPTX
BLUE EYES TECHNOLOGY
PPT
Cloud architecture
PPTX
flexpad
PDF
Security in IoT
PPTX
Blue Eyes Technology
PPT
Sensors On 3d Digitization
PDF
Internet of Things (IoT) and Big Data
PPTX
presentation on Edge computing
PPTX
Rain technology ppt
PPTX
FOG COMPUTING- Presentation
PPTX
Cloud security ppt
DOCX
Seminar report on blue eyes
POTX
Rover Technology
PPT
Ppt presentation
PPTX
Seminar presentation on embedded web technology
DOC
I.t in space
PDF
Community cloud
PPTX
screen-less displays
Fog computing 000
Virtual keyboard seminar ppt
BLUE EYES TECHNOLOGY
Cloud architecture
flexpad
Security in IoT
Blue Eyes Technology
Sensors On 3d Digitization
Internet of Things (IoT) and Big Data
presentation on Edge computing
Rain technology ppt
FOG COMPUTING- Presentation
Cloud security ppt
Seminar report on blue eyes
Rover Technology
Ppt presentation
Seminar presentation on embedded web technology
I.t in space
Community cloud
screen-less displays
Ad

Similar to Self defending networks (20)

PDF
Enterprise Immune System
PDF
5 Essential Network Security Strategies to Defend Against Modern Cyberattacks...
PDF
Network Defense and Countermeasures: Principles and Practices, 4th Edition Wi...
PDF
Enterprise Edge Security with Cisco ISE
DOCX
Different Types Of Network Security Devices And Tools.docx
PDF
Security Industry Overview
PDF
Cisco Addresses the Full Attack Continuum
PPTX
Network-Security 1.hahahhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
PPTX
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
PDF
Sonic WALL Secure Wireless Network Integrated Solutions Guide 1st Edition Joe...
PPTX
Network Security ppt
PPTX
unit 2 IT security solution.pptx
PPTX
M1_Introduction_IPS.pptx
PDF
Types of Computer Network Attacks presentation.pdf
PPTX
Network security (syed azam)
PPTX
NETWORK SECURITY dibyendu das.pptx
PDF
Toward Continuous Cybersecurity with Network Automation
PDF
Toward Continuous Cybersecurity With Network Automation
PPTX
What is network security and Types
PPTX
Webinar 2.1 - Network protection and devices.pptx
Enterprise Immune System
5 Essential Network Security Strategies to Defend Against Modern Cyberattacks...
Network Defense and Countermeasures: Principles and Practices, 4th Edition Wi...
Enterprise Edge Security with Cisco ISE
Different Types Of Network Security Devices And Tools.docx
Security Industry Overview
Cisco Addresses the Full Attack Continuum
Network-Security 1.hahahhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
Sonic WALL Secure Wireless Network Integrated Solutions Guide 1st Edition Joe...
Network Security ppt
unit 2 IT security solution.pptx
M1_Introduction_IPS.pptx
Types of Computer Network Attacks presentation.pdf
Network security (syed azam)
NETWORK SECURITY dibyendu das.pptx
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity With Network Automation
What is network security and Types
Webinar 2.1 - Network protection and devices.pptx
Ad

Self defending networks

  • 1. INTRODUCTION As the nature of threats to organizations continues to evolve, so must the defense posture of the organizations. In the past, threats from both internal and external sources were relatively slow-moving and easy to defend against. In today's environment, where Internet worms spread across the world in a matter of minutes, security systems - and the network itself - must react instantaneously. The foundation for a self-defending network is integrated security - security that is native to all aspects of an organization. Every device in the network - from desktops through the LAN and across the WAN - plays a part in securing the networked environment through a globally distributed defense. Such systems help to ensure the privacy of information transmitted and to protect against internal and external threats, while providing corporate administrators with control over access to corporate resources. SDN shows that the approach to security has evolved from a point product approach to this integrated security approach These self-defending networks will identify threats, react appropriately to the severity level, isolate infected servers and desktops, and reconfigure the network resources in response to an attack. The vision of the Self-Defending Network brings together Secure Connectivity, Threat Defense and Trust and Identity Management System with the capability of infection containment and rouge device isolation in a single solution. SELF DEFENDING NETWORKS To defend their networks, IT professionals need to be aware of the new nature of security threats, which includes the following: Shift from internal to external attacks Before 1999, when key applications ran on minicomputers and mainframes, threats typically were perpetrated by internal users with privileges. Between 1999 and 2002, reports of external events rose 250 percent, according to CERT. Shorter windows to react. When attacks homed in on individual computers or networks, companies had more time to understand the threat. Now that viruses can propagate worldwide in 10 minutes, that "luxury" is largely gone. Antivirus solutions are still essential but are not enough: by the time the signature has been identified, it is too late. With self-propagation, companies need network technology that can autonomously take action against threats.
  • 2. More difficult threat detection. Attackers are getting smarter. They used to attack the network, and now they attack the application or embed the attack in the data itself, which makes detection more difficult.An attack at the network layer, for example, can be detected by looking at the header information. But an attack embedded in a text file or attachment can only be detected by looking at the actual payload of the packet--something a typical firewall doesn't do.The burden of threat detection is shifting from the firewall to the access control server and intrusion detection system.Rather than single-point solutions, companies need holistic solutions. A lowered bar for hackers. Finally, a proliferation of easy-to-use hackers' tools and scripts has made hacking available to the less technically-literate. The advent of 'point-and-click' hacking means the attacker doesn't have to know what's going on under the hood in order to do damage. These trends in security are what have lead to the advent of SDNs or Self Defending Networks as the latest version in security control.