collaborative defence strategies for network security
TRANSCRIPT
Environmental Comparison Collaborative Defence Strategies Network Security
What is Collaborative Defence Strategy?Comparison between different environment or situation.
I even don’t know what is strategy?
Different Strategies of Working Together.
Networking : Exchanging information for mutual benefit.
Coordination : Exchanging information for mutual benefit and alerting activities to achieve a common purpose.
Cooperation : Exchanging information for mutual benefit, alerting activities and sharing resources to achieve a common purpose.
Collaboration : Exchanging information for mutual benefit, alerting activities, sharing resources and enhancing the capacity to achieve a common purpose.
What is a Collaborative Network?
Collaborative network is a network consisting of a variety of entities (e.g. organizations and people) that are largely autonomous, geographically distributed, and heterogeneous in terms of their operating environment, culture, social capital and goals but they all collaborate.
Benefit : possibility of better achieving common goals by excelling the individual capabilities.
What is our goal?
Environmental Comparison of Collaborative Defence Strategies.
1. DDoS (Distributed Denial of Service Attack)
2. Phishing Attack
How to apply Collaborative Defence strategy ?
CASE 1: DDoS
In Distributed denial of Service attack. Botnets are used to slow down the system performance.
To address such problems.
CNSMS is used.
What is CNSMS?
Collaborative Network Security Management System(CNSMS)
Collaborative Unified Threat Management(UTM) Cloud Based Security Centre Traffic Prober
Traffic ProberCaptures Network Traffic
UTM
Malicious code is checked
Cloud
Security Event is reported.
What Next?
Cloud
Generates security rules based on data mining.
Also Called Security Centre.
Rule
Networks
Also contains logs. Inefficient algorithms are
eliminated if necessary.
Command and ControlOf botnet is suppressed
Phisher tries to send malicious mail or website to victim
Victim is forced to give confidential data to phisher. Phisher collects the data.
If the problem is complex then.
Collaboration of different techniques can be used
Game theory and other AI
Unified Threat Management
Security Experimentation Environment
Intrusion prevention system
Security in different layers of network
Now you know:
What is collaborative defence strategy ?Why it is used ?Where it is used ?How it is used ?