This ppt describes Environmental comparison of Collaborative defence strategies for network security. Collaborative defence Strategies accumulates several algorithms and techniques to enhance and enrich network security.
2. Environmental Comparison
Collaborative Defence Strategies Network Security
What is Collaborative Defence Strategy?Comparison between
different environment or
situation.
I even don’t
know what is
strategy?
3. Different Strategies of Working Together.
Networking : Exchanging information for mutual benefit.
Coordination : Exchanging information for mutual benefit and
alerting activities to achieve a common purpose.
Cooperation : Exchanging information for mutual benefit, alerting
activities and sharing resources to achieve a common purpose.
Collaboration : Exchanging information for mutual benefit, alerting
activities, sharing resources and enhancing the capacity to achieve a
common purpose.
4. What is a Collaborative Network?
Collaborative network is a network consisting of a variety of entities (e.g. organizations and people) that
are largely autonomous, geographically distributed, and heterogeneous in terms of their operating
environment, culture, social capital and goals but they all collaborate.
Benefit : possibility of
better achieving
common goals by
excelling the individual
capabilities.
What is our goal?
6. Environmental Comparison of Collaborative Defence Strategies.
1. DDoS (Distributed
Denial of Service
Attack)
2. Phishing Attack
7. How to apply Collaborative Defence strategy ?
CASE 1: DDoS
In Distributed denial of Service
attack. Botnets are used to slow
down the system performance.
To address such problems.
CNSMS is used.
What is CNSMS?
8. Collaborative Network Security Management System(CNSMS)
Collaborative Unified Threat Management(UTM)
Cloud Based Security Centre
Traffic Prober
Traffic Prober
Captures Network Traffic
UTM
Malicious code is checked
Cloud
Security Event is reported.
9. What Next?
Cloud
Generates security rules
based on data mining.
Also Called
Security Centre.
Rule
Networks
Also contains logs.
Inefficient algorithms are
eliminated if necessary.
Command and Control
Of botnet is suppressed
11. Phisher tries to send malicious mail or website to
victim
Victim is forced to give confidential data to phisher.
Phisher collects the data.
12. If the problem is complex then.
Collaboration of different techniques can be used
Game theory and
other AI
Unified Threat
Management
Security Experimentation
Environment
Intrusion
prevention system
Security in different
layers of network
13. Now you know:
What is collaborative defence strategy ?
Why it is used ?
Where it is used ?
How it is used ?