SlideShare una empresa de Scribd logo
1 de 25
Advanced Persistent Threats
     (APTs)


     Rainer Baeder
     Manager Systems Engineering

1   CONFIDENTIAL – INTERNAL ONLY
       Fortinet Confidential
AGENDA




       APT 101
       •FortiOS AV solution
       •Other tools



2   CONFIDENTIAL – INTERNAL ONLY
       Fortinet Confidential
Highlight


A.P.T.
• ADVANCED
   • Based on Zero Days
   • Part of Targeted Attacks
   • 75% Patchable Vulnerabilities
• PERSISTENT
   • Update Techniques
   • Low Profile
   • 85% Breachs take >5month to discover

3   CONFIDENTIAL – INTERNAL ONLY
       Fortinet Confidential
Some Statistics on APT




    • Different companies targeted
        • 50% Large enterprises / Gov
        • 20 % Small Businesses

    • Targeted Attacks
        • 20% target “C levels”
        • Sprawling 0-day market




4   CONFIDENTIAL – INTERNAL ONLY
       Fortinet Confidential
APT strategy


Advanced Persistent Defence
Fight APTs
 Multi-layer defense
        Cut the link anywhere in the
          chain
 Antivirus is the core

 Not the silver bullet though
         ―ALL ON‖ is the answer

 Extensive botnet research
        Communication channel
          Even fight internal threats




5   Fortinet Confidential
APT history




    Cyberwarfare: VoIP and Convergence
    Increase Vulnerability
    David L. Fraley
    By 2005, the United States and other nations will have the ability to
    conduct cyberwarfare. The increasing use of Voice over IP and the
    converging of voice/data networks is facilitating it.
    The aspects of cyberwarfare have been considered for years. Future cyberattacks could
    constitute an entire war or an attack type as part of a larger campaign. Cyberwarfare, like any
    military operation, has two components — offensive and defensive operations.
    The U.S. military complex continues work on Presidential Directive 16, including developing the
    rules and tools. The United States is not the only government thinking about cyberattacks. In the
    second quarter of 1995, Major General Wang Pufeng of The Chinese Army published a paper,
    ―The Challenge of Information Warfare.‖ In this paper, Pufeng writes that the information era will
    touch off a revolution in military affairs.



6     Fortinet Confidential
APT today




7   Fortinet Confidential
Generating APT




                            rename to CV_xx.pdf




8   Fortinet Confidential
Example of APT today




9   Fortinet Confidential
APT´s Procedure


                                 Step 1: Reconnaissance

                                Step 2: Spear-phishing attack

                                 Step 3: Establish presence

                             Step 4: Exploration and Enumeration

                                     Step 5: Steal Data

                                       Step 6: Stay in

10   Fortinet Confidential
Crimeware as a Service


                                     Hacking-
                                                   Fraud-as-
                                      as-a-
                                                      a-
                                     Service
                       Botnet-                      Service
                        as-a-
                       Service                                 dDoS-as-
                                                                  a-
                                                                Service
               Do-it-
                                         CaaS
              Yourself
                                                         Spyware-
                                                           as-a-
                             Designer-
                                                          Service
                             Malware-       Spam-as-
                               as-a-           a-
                              Service        Service


11   Fortinet Confidential
AGENDA




      •APT 101
      FortiOS APT solution
      •Other tools



12    Fortinet Confidential
Technologies




              Signatures
           Signatures               Behavioral               File Analysis
      • Detects and blocks          Evaluation            • Detects zero-day
      known malware and        • Detects and blocks       threats by executing
      some variants            malware based on           codes on emulators to
                               scoring system of          determine malicious
      • Highly accurate, low
                               known malicious            activities.
      false positives
                               behaviors or               • Resource intensive,
      • Requires up-to-date    characteristics            performance and
      signature updates
                               • Can be used to flag      latency impact
      • 3rd party validated    out suspicious files for
                               further analysis




13    Fortinet Confidential
Technologies




                  Application Control            Botnet IP Reputation DB
      •Detects and blocks nearly 50 active   •Detects and blocks known Botnet
      botnets                                C&C Communication by matching
      •Botnet network activities by          against Botnet command blacklisted
      examining traffic                      IPs
      • Prevents zombies from data leaks     •Stops dial back by infected zombies.
        or communicates for instructions




14     Fortinet Confidential
AV Engine


                               File Sample

                                                                                     Local Sandbox
       Signature Match                      Decryption/unpacking                     Lightweight Emulators
      (CPRL/Checksum)                             System                                •   Good against VM evasion
                                                                                     OS-Independent file
       Behavior Analysis                            Local Sandbox                    analysis, all file type
                                                                                        •   Java Scripts, Flash, PDF
                                                                                     Best against Malware
                   FortiGate AV Engine 2.0                                           Injections via (compromised)
                                                                                     web 2.0 applications


 Suspicious                         Pass                     Blocked
Forward to cloud-based          No Further Action        File discarded, option to
 FortiGuard AV service                                 Quarantine and event logged


15     Fortinet Confidential
FortiGuard AV


                               File Sample
                      (Manual or auto Submission)



                                                                          Botnet Servers
                                 VM Sandbox
                                                                             Blacklist


                                                                       AV, IPS & Application
                               Analyst Review
                                                                            Signatures


                        FortiGuard Analytics                       Database Update Service
                                File Analysis Service




        New detection                               Pass                      Update
     New signature is developed, Alert         No Further Action        Push/pull/manual updates
         to Inform Administrator


16     Fortinet Confidential
FortiGuard AV Service


     Cloud Based Sandbox
     As part of FortiGuard Analytics Service, Enabled on FortiOS (Proxy Based AV)
     True VM Environments – test across various OS, patch levels & application versions
        •      Windows, MAC, Linux

     Bayesian Scoring & Classification using detection criteria
        •      File system, permission/memory/registry modifications
        •      Network activities, API calls, etc
     Test all filetypes:
        •      Portable Executables (PEs) – DLL, Font files, object codes
        •      Browsers & OS Scripts
        •      PDF, Flash etc …




17      Fortinet Confidential
Analytics via Forticloud service




•Inspection stats

•Sample scan status

•Time / IP based correlation




18   Fortinet Confidential
FortiOS + Analytics




                               Local Lightweight             FortiGuard Botnet IP
     Hardware Accelerated      Sandboxing
     & Code optimized                                        Reputation DB

                               Behavior / Attribute Based
     Real time updated,        Heuristic Detection           Cloud Based
     3rd party validated                                     Sandboxing
     Signature DB              Application Control –
                               Botnet Category




              In-box AV functions                      Cloud Based AV Service


19     Fortinet Confidential
AGENDA




      •APT 101
      •FortiOS APT solution
      Other tools



20    Fortinet Confidential
Client Reputation

                                                                   Identify
                                                                   potential …
                                                                   zero-day
                                                                   attacks
                                 Reputation by Activity  Threat Status
                                Multiple Scoring Vectors Real Time, Relative,
                                                              Drill-down, Correlated




                                  Policy       Score
Identification                                                      Ranking
                               Enforcement   Computation


21     Fortinet Confidential
Client Reputation Example


     • View of “Reputation Score” & clickable detail drill-
       down



                                                  Click for
                                                further drill-
                                                down detail




22     Fortinet Confidential
Intercepting Botnets



      Botnet C&C
      communications
      Extension to AV Signature updates
      IP/Port list of know C&C servers


                                          Real Time
                               X             IP
                                          Reputation
                                             DB
 23    Fortinet Confidential
AV enhancements result




     FortiOS 5 Delivers:
       25+ VB100 Awards
       VB100 RAP Leaders (#1)
               Reactive & Proactive Test
               96% Detection Rate!
       100% Detection on ItW
                In the Wild / Reactive
       Intelligence Proxy Combined with
       Cloud Analytics
               Allows proactive detection for
                 new viral variants



24     Fortinet Confidential
ONE More thing: Sniffer Mode




     One-arm Sniffer
     Offline Monitoring with Flow based UTM



25      Fortinet Confidential

Más contenido relacionado

La actualidad más candente

Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesPriyanka Aash
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Novell
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open SourceSuhas Desai
 
Defcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillDefcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillPriyanka Aash
 
Fortinet icons
Fortinet iconsFortinet icons
Fortinet iconsttran21
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012Agora Group
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC PresentationCloudComputing
 
FortiGate-310B Datasheet
FortiGate-310B DatasheetFortiGate-310B Datasheet
FortiGate-310B Datasheetdemoteam
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security SuiteCharles McNeil
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisP1Security
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutionshemantchaskar
 

La actualidad más candente (20)

Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Day4
Day4Day4
Day4
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
Forti cloud
Forti cloudForti cloud
Forti cloud
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
 
Day1
Day1Day1
Day1
 
Defcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillDefcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveill
 
Day3
Day3Day3
Day3
 
Silc
SilcSilc
Silc
 
Fortinet icons
Fortinet iconsFortinet icons
Fortinet icons
 
VoIP Fraud
VoIP FraudVoIP Fraud
VoIP Fraud
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012
 
Inside forti os-v524-r5
Inside forti os-v524-r5Inside forti os-v524-r5
Inside forti os-v524-r5
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
FortiGate-310B Datasheet
FortiGate-310B DatasheetFortiGate-310B Datasheet
FortiGate-310B Datasheet
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
 
SBC: Do I really need it?
SBC: Do I really need it?SBC: Do I really need it?
SBC: Do I really need it?
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 

Similar a Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės

13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...Aditya K Sood
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009abhicc285
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalMahmoud Yassin
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGrant Swanson
 
I Pv6 Cyber Criminal Opportunities 05
I Pv6 Cyber Criminal Opportunities 05I Pv6 Cyber Criminal Opportunities 05
I Pv6 Cyber Criminal Opportunities 05Barry Greene
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011Agora Group
 
IT Vulnerability & Tools Watch 2011
IT Vulnerability & Tools Watch 2011IT Vulnerability & Tools Watch 2011
IT Vulnerability & Tools Watch 2011WASecurity
 
Vulnerability in Security Products
Vulnerability in Security ProductsVulnerability in Security Products
Vulnerability in Security ProductsDaveEdwards12
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionWebroot
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYjmical
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence ServiceF5 Networks
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentationsaddepalli
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxRahul Mohandas
 
Toorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksToorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksAditya K Sood
 

Similar a Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės (20)

Fortinet av
Fortinet avFortinet av
Fortinet av
 
Fortinet, держи марку!
Fortinet, держи марку!Fortinet, держи марку!
Fortinet, держи марку!
 
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control System
 
I Pv6 Cyber Criminal Opportunities 05
I Pv6 Cyber Criminal Opportunities 05I Pv6 Cyber Criminal Opportunities 05
I Pv6 Cyber Criminal Opportunities 05
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011
 
IT Vulnerability & Tools Watch 2011
IT Vulnerability & Tools Watch 2011IT Vulnerability & Tools Watch 2011
IT Vulnerability & Tools Watch 2011
 
Vulnerability in Security Products
Vulnerability in Security ProductsVulnerability in Security Products
Vulnerability in Security Products
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
S series presentation
S series presentationS series presentation
S series presentation
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentation
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
 
Toorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksToorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit Packs
 

Más de TEO LT, AB

K. Šliužas at "CEO meets investors" 2014
K. Šliužas at "CEO meets investors" 2014K. Šliužas at "CEO meets investors" 2014
K. Šliužas at "CEO meets investors" 2014TEO LT, AB
 
Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...
Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...
Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...TEO LT, AB
 
TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...
TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...
TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...TEO LT, AB
 
TEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptį
TEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptįTEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptį
TEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptįTEO LT, AB
 
Televizijos ateitis. Šiandien
Televizijos ateitis. ŠiandienTelevizijos ateitis. Šiandien
Televizijos ateitis. ŠiandienTEO LT, AB
 
TEO Wi-Fi strategy including offering Wi-Fi for schools
TEO Wi-Fi strategy including offering Wi-Fi for schoolsTEO Wi-Fi strategy including offering Wi-Fi for schools
TEO Wi-Fi strategy including offering Wi-Fi for schoolsTEO LT, AB
 
Saugi ir išmani mokykla
Saugi ir išmani mokyklaSaugi ir išmani mokykla
Saugi ir išmani mokyklaTEO LT, AB
 
Wi-Fi Lietuvos mokyklose
Wi-Fi Lietuvos mokykloseWi-Fi Lietuvos mokyklose
Wi-Fi Lietuvos mokykloseTEO LT, AB
 
How telecommunications are changing the world and themselves
How telecommunications are changing the world and themselvesHow telecommunications are changing the world and themselves
How telecommunications are changing the world and themselvesTEO LT, AB
 
Kompiuterių istorija vaikams
Kompiuterių istorija vaikamsKompiuterių istorija vaikams
Kompiuterių istorija vaikamsTEO LT, AB
 
Provisioning business services on IMS
Provisioning business services on IMSProvisioning business services on IMS
Provisioning business services on IMSTEO LT, AB
 
Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?
Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?
Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?TEO LT, AB
 
Lietuvos įmonių IT saugumo tyrimas. 2013 04 11
Lietuvos įmonių IT saugumo tyrimas. 2013 04 11Lietuvos įmonių IT saugumo tyrimas. 2013 04 11
Lietuvos įmonių IT saugumo tyrimas. 2013 04 11TEO LT, AB
 
Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...
Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...
Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...TEO LT, AB
 
Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?
Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?
Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?TEO LT, AB
 
Aleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektai
Aleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektaiAleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektai
Aleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektaiTEO LT, AB
 
Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...
Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...
Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...TEO LT, AB
 
Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...
Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...
Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...TEO LT, AB
 
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizėGuillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizėTEO LT, AB
 
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...TEO LT, AB
 

Más de TEO LT, AB (20)

K. Šliužas at "CEO meets investors" 2014
K. Šliužas at "CEO meets investors" 2014K. Šliužas at "CEO meets investors" 2014
K. Šliužas at "CEO meets investors" 2014
 
Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...
Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...
Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...
 
TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...
TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...
TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...
 
TEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptį
TEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptįTEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptį
TEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptį
 
Televizijos ateitis. Šiandien
Televizijos ateitis. ŠiandienTelevizijos ateitis. Šiandien
Televizijos ateitis. Šiandien
 
TEO Wi-Fi strategy including offering Wi-Fi for schools
TEO Wi-Fi strategy including offering Wi-Fi for schoolsTEO Wi-Fi strategy including offering Wi-Fi for schools
TEO Wi-Fi strategy including offering Wi-Fi for schools
 
Saugi ir išmani mokykla
Saugi ir išmani mokyklaSaugi ir išmani mokykla
Saugi ir išmani mokykla
 
Wi-Fi Lietuvos mokyklose
Wi-Fi Lietuvos mokykloseWi-Fi Lietuvos mokyklose
Wi-Fi Lietuvos mokyklose
 
How telecommunications are changing the world and themselves
How telecommunications are changing the world and themselvesHow telecommunications are changing the world and themselves
How telecommunications are changing the world and themselves
 
Kompiuterių istorija vaikams
Kompiuterių istorija vaikamsKompiuterių istorija vaikams
Kompiuterių istorija vaikams
 
Provisioning business services on IMS
Provisioning business services on IMSProvisioning business services on IMS
Provisioning business services on IMS
 
Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?
Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?
Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?
 
Lietuvos įmonių IT saugumo tyrimas. 2013 04 11
Lietuvos įmonių IT saugumo tyrimas. 2013 04 11Lietuvos įmonių IT saugumo tyrimas. 2013 04 11
Lietuvos įmonių IT saugumo tyrimas. 2013 04 11
 
Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...
Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...
Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...
 
Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?
Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?
Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?
 
Aleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektai
Aleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektaiAleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektai
Aleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektai
 
Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...
Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...
Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...
 
Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...
Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...
Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...
 
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizėGuillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
 
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
 

Último

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 

Último (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės

  • 1. Advanced Persistent Threats (APTs) Rainer Baeder Manager Systems Engineering 1 CONFIDENTIAL – INTERNAL ONLY Fortinet Confidential
  • 2. AGENDA APT 101 •FortiOS AV solution •Other tools 2 CONFIDENTIAL – INTERNAL ONLY Fortinet Confidential
  • 3. Highlight A.P.T. • ADVANCED • Based on Zero Days • Part of Targeted Attacks • 75% Patchable Vulnerabilities • PERSISTENT • Update Techniques • Low Profile • 85% Breachs take >5month to discover 3 CONFIDENTIAL – INTERNAL ONLY Fortinet Confidential
  • 4. Some Statistics on APT • Different companies targeted • 50% Large enterprises / Gov • 20 % Small Businesses • Targeted Attacks • 20% target “C levels” • Sprawling 0-day market 4 CONFIDENTIAL – INTERNAL ONLY Fortinet Confidential
  • 5. APT strategy Advanced Persistent Defence Fight APTs  Multi-layer defense  Cut the link anywhere in the chain  Antivirus is the core  Not the silver bullet though  ―ALL ON‖ is the answer  Extensive botnet research  Communication channel  Even fight internal threats 5 Fortinet Confidential
  • 6. APT history Cyberwarfare: VoIP and Convergence Increase Vulnerability David L. Fraley By 2005, the United States and other nations will have the ability to conduct cyberwarfare. The increasing use of Voice over IP and the converging of voice/data networks is facilitating it. The aspects of cyberwarfare have been considered for years. Future cyberattacks could constitute an entire war or an attack type as part of a larger campaign. Cyberwarfare, like any military operation, has two components — offensive and defensive operations. The U.S. military complex continues work on Presidential Directive 16, including developing the rules and tools. The United States is not the only government thinking about cyberattacks. In the second quarter of 1995, Major General Wang Pufeng of The Chinese Army published a paper, ―The Challenge of Information Warfare.‖ In this paper, Pufeng writes that the information era will touch off a revolution in military affairs. 6 Fortinet Confidential
  • 7. APT today 7 Fortinet Confidential
  • 8. Generating APT rename to CV_xx.pdf 8 Fortinet Confidential
  • 9. Example of APT today 9 Fortinet Confidential
  • 10. APT´s Procedure Step 1: Reconnaissance Step 2: Spear-phishing attack Step 3: Establish presence Step 4: Exploration and Enumeration Step 5: Steal Data Step 6: Stay in 10 Fortinet Confidential
  • 11. Crimeware as a Service Hacking- Fraud-as- as-a- a- Service Botnet- Service as-a- Service dDoS-as- a- Service Do-it- CaaS Yourself Spyware- as-a- Designer- Service Malware- Spam-as- as-a- a- Service Service 11 Fortinet Confidential
  • 12. AGENDA •APT 101 FortiOS APT solution •Other tools 12 Fortinet Confidential
  • 13. Technologies Signatures Signatures Behavioral File Analysis • Detects and blocks Evaluation • Detects zero-day known malware and • Detects and blocks threats by executing some variants malware based on codes on emulators to scoring system of determine malicious • Highly accurate, low known malicious activities. false positives behaviors or • Resource intensive, • Requires up-to-date characteristics performance and signature updates • Can be used to flag latency impact • 3rd party validated out suspicious files for further analysis 13 Fortinet Confidential
  • 14. Technologies Application Control Botnet IP Reputation DB •Detects and blocks nearly 50 active •Detects and blocks known Botnet botnets C&C Communication by matching •Botnet network activities by against Botnet command blacklisted examining traffic IPs • Prevents zombies from data leaks •Stops dial back by infected zombies. or communicates for instructions 14 Fortinet Confidential
  • 15. AV Engine File Sample Local Sandbox Signature Match Decryption/unpacking Lightweight Emulators (CPRL/Checksum) System • Good against VM evasion OS-Independent file Behavior Analysis Local Sandbox analysis, all file type • Java Scripts, Flash, PDF Best against Malware FortiGate AV Engine 2.0 Injections via (compromised) web 2.0 applications Suspicious Pass Blocked Forward to cloud-based No Further Action File discarded, option to FortiGuard AV service Quarantine and event logged 15 Fortinet Confidential
  • 16. FortiGuard AV File Sample (Manual or auto Submission) Botnet Servers VM Sandbox Blacklist AV, IPS & Application Analyst Review Signatures FortiGuard Analytics Database Update Service File Analysis Service New detection Pass Update New signature is developed, Alert No Further Action Push/pull/manual updates to Inform Administrator 16 Fortinet Confidential
  • 17. FortiGuard AV Service Cloud Based Sandbox As part of FortiGuard Analytics Service, Enabled on FortiOS (Proxy Based AV) True VM Environments – test across various OS, patch levels & application versions • Windows, MAC, Linux Bayesian Scoring & Classification using detection criteria • File system, permission/memory/registry modifications • Network activities, API calls, etc Test all filetypes: • Portable Executables (PEs) – DLL, Font files, object codes • Browsers & OS Scripts • PDF, Flash etc … 17 Fortinet Confidential
  • 18. Analytics via Forticloud service •Inspection stats •Sample scan status •Time / IP based correlation 18 Fortinet Confidential
  • 19. FortiOS + Analytics Local Lightweight FortiGuard Botnet IP Hardware Accelerated Sandboxing & Code optimized Reputation DB Behavior / Attribute Based Real time updated, Heuristic Detection Cloud Based 3rd party validated Sandboxing Signature DB Application Control – Botnet Category In-box AV functions Cloud Based AV Service 19 Fortinet Confidential
  • 20. AGENDA •APT 101 •FortiOS APT solution Other tools 20 Fortinet Confidential
  • 21. Client Reputation Identify potential … zero-day attacks Reputation by Activity Threat Status Multiple Scoring Vectors Real Time, Relative, Drill-down, Correlated Policy Score Identification Ranking Enforcement Computation 21 Fortinet Confidential
  • 22. Client Reputation Example • View of “Reputation Score” & clickable detail drill- down Click for further drill- down detail 22 Fortinet Confidential
  • 23. Intercepting Botnets Botnet C&C communications Extension to AV Signature updates IP/Port list of know C&C servers Real Time X IP Reputation DB 23 Fortinet Confidential
  • 24. AV enhancements result FortiOS 5 Delivers:  25+ VB100 Awards  VB100 RAP Leaders (#1) Reactive & Proactive Test 96% Detection Rate!  100% Detection on ItW  In the Wild / Reactive  Intelligence Proxy Combined with Cloud Analytics Allows proactive detection for new viral variants 24 Fortinet Confidential
  • 25. ONE More thing: Sniffer Mode One-arm Sniffer Offline Monitoring with Flow based UTM 25 Fortinet Confidential

Notas del editor

  1. ##need to update with screenshot of drill-down {to-do later!}