Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search...

8
Venus Project Brief Description

description

“At Once” structure

Transcript of Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search...

Page 1: Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.

Venus Project

Brief Description

Page 2: Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.

What It Do

What• Monitor• Log• Analyze• Block• Narrow• Report• Search

Where• Single stations• Internet Gates• Special Devices• Web servers• Separate Security Servers

Page 3: Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.

“At Once” structure

Page 4: Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.

Architecture

• Sensors for gathering data • Agents for traffic control (narrowing or

blocking)• Core Server (Venus Server) (Analysis, Log

Storing, Report Builder, Control Modules, AI)

Page 5: Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.

Example 1. Spam narrowing

Page 6: Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.

Functions

• Distributed Intrusion Detection System (dIDP)• Distributed Intrusion Prevention System• Distributed User Network Activity Monitor• Distributed Traffic Control• Distributed Firewall

Page 7: Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.

What we will use ?

• We plan to use open source software

Page 8: Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.

What we want to achieve

• Most comprehensive threat detection by using distributed system

• Super speed enquiry and response. (We want to identify and lock attacker, before it harm and that should be done really fast)

• Clever Approach to detection• Broaden detection approach and include piracy,

illegal matter, piracy, etc.