16

Click here to load reader

Network Security Monitoring or How to mitigate a DDoS attack in 20

  • Upload
    thaidn

  • View
    30.108

  • Download
    4

Embed Size (px)

DESCRIPTION

1. A brieft introduction to network security monitoring concept 2. Some experience in deploying NSM 3. A case study: how to use NSM to mitigate a DDoS attack in 20'

Citation preview

Page 1: Network Security Monitoring or How to mitigate a DDoS attack in 20

Network Security Monitoring

Thai N. Duong – Dương Ngọc Thá[email protected]

http://vnhacker.blogspot.com

Page 2: Network Security Monitoring or How to mitigate a DDoS attack in 20

Agenda – Nội dung

NSM Theory – Giám sát an ninh mạng

NSM Practice

Q & A – Hỏi đáp

Page 3: Network Security Monitoring or How to mitigate a DDoS attack in 20

About me – Tự giới thiệu

Page 4: Network Security Monitoring or How to mitigate a DDoS attack in 20
Page 5: Network Security Monitoring or How to mitigate a DDoS attack in 20

What is going on?Chuyện gì đang diễn ra?

Page 6: Network Security Monitoring or How to mitigate a DDoS attack in 20

Firewall, Anti-Virus, IDS, IPS, ISO 27001, etc.

Page 7: Network Security Monitoring or How to mitigate a DDoS attack in 20

Why still be attacked after deploying all these expensive controls?

Page 8: Network Security Monitoring or How to mitigate a DDoS attack in 20

We need skilled security analysts!Chúng ta cần các chuyên gia lành nghề!

Page 9: Network Security Monitoring or How to mitigate a DDoS attack in 20

Smart + Unpredictable + Highly motivatedThông minh + Khó lường + Động lực cao

Page 10: Network Security Monitoring or How to mitigate a DDoS attack in 20

We need to collect data as much as possible!Chúng ta cần thu thập dữ liệu càng nhiều càng tốt!

Page 11: Network Security Monitoring or How to mitigate a DDoS attack in 20

(Products) Collection -> (People) Analysis -> (Processes) Escalation

Thu thập -> Phân tích -> Leo thang

Page 12: Network Security Monitoring or How to mitigate a DDoS attack in 20

Some experiences

Technology: syslog-ng + Splunk

Most important: analyzing huge data fast!

Alternatives: Hadoop + Scribe + Hive

Page 13: Network Security Monitoring or How to mitigate a DDoS attack in 20

ROI

Zero unsolved incident so far!

Help detect and prevent 50% of incidents

Page 14: Network Security Monitoring or How to mitigate a DDoS attack in 20

What's next?

Security metrics: turn security into something that can be measured

Page 15: Network Security Monitoring or How to mitigate a DDoS attack in 20

Summary

Collect data as much as possible

Products and Processes are not enough, we need Skilled Analysts to perform 24/7 monitoring

Page 16: Network Security Monitoring or How to mitigate a DDoS attack in 20

Thank You ;-)Question?