Juniper Networks
Intrusion Detection & Prevention
June 2006
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 1
Agenda
Security Market Climate
IPS & Security Market
Market Drivers
Juniper Networks IDP Product Overview
Complete Solution Security Team
Product Features
Product Offering
Management with Juniper Networks NSM
Summary
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 3
IPS and Security Market
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 4
Security Market
IPS technology is a mainstream part of network
security for companies of all sizes
Keeping up with new security threats and finding
integrated management systems remain key
concerns for security admins
Assuring business critical applications have
predictable quality of service over nonessential
apps like P2P and IM
Need Visibility, Control and Ease of Use
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 5
Worldwide IPS Market
Market focus on IPS technology exemplified by market forecast
Worldwide IDS/IPS revenue expected to top $800 Million by year 2009
Network-based products continue to account for more than 2/3 of total
revenue
World Wide IDS/IPS Product Revenue
900 790 819
800 752
700 667
603
600 544
500 427
Revenue 384
($ Million) 400 277 Network-based
300 Host-based
200
100
0
CY01 CY02 CY03 CY04 CY05 CY06 CY07 CY08 CY09
Source: Network Security Appliance and Software
Year Quarterly Worldwide Market Share and Forecast for 1Q06
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 6
Customer Drivers
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 7
Fear of external network attack and internal
noncompliance
External attacks remain the top reason for
purchasing security appliances
Failure to block viruses, attacks or malware directly
impact end-users
A growing concern meanwhile is ensuring users
on the network are doing what theyre supposed
to be doing
Quantifiable loss of productivity
Impact to revenue
Direct impact to end-users Headaches to administrators
Unauthorized access to critical data
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 8
Firewall alone is not enough
Every organization is connected to the Internet
and deploys some form of firewall
Most enterprise realize firewall alone is not
sufficient to block sophisticated attacks
Lifecycle of Vulnerabilities and Threats
er ty
as s
le m
su ry
ov ili
ed
ed
le it
ed
Re or
sc ab
Is viso
R e p lo
as
ed
W
Di ner
Ex
Ad
l
Vu
Getting Shorter
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 9
Business compliance practices
Need to enforce business practices including
types and version of applications
Need to ensure non-business applications does
not hinder critical business applications
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 10
New Technology Adoption
Adoptions of new technologies continue to
increase
Enterprises are not satisfied to wait until
security catches up
Convergence of networks open up the
infrastructure to new attacks
New Technologies = New Risks
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 11
Not Only for Enterprise
Service Providers
face similar security
concerns as
enterprise
Keeping ahead of new
security threats
considered highest
technical challenge by
SP
Source: Service Provider Plans for VPNs and
Security North America, Europe, and Asia Pacific 2006
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 12
IDP Product Overview
Security Team
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 13
The Juniper Approach
Complete Solution
Service Provider
Security Teams
Technology
Technology Vendor
Vendor Cooperative
Relationships Security Research
Relationships
Worldwide
Juniper
Security Partner MSSP
Internal
Internal Research
Research Intelligence
Team
3 Daily
3rd Party Customer
rd
Party Customer
Security Updates
Security Teams
Teams Security
Security Team
Team
Juniper Products
Juniper Customers
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 14
The Basic Security Threat Landscape
Unknown Threats &
Vulnerabilities
Known Threats but no known
ways to protect
Known Threats with
available protection
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 15
The Juniper Advantage
Superior protocol decoding and anomaly
detection the majority of the unknown
Dedicated teams researching
protocols and standards
Provide breadth & Protocol Anomalies
depth of coverage
Give Security Experts better
tools to deal with the unknown
Unknown Threats &
Vulnerabilities
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 16
Dedicated Security Team
Dedicated team to research vulnerabilities and emerging threats
Protocol decode expertise
Multiple research and vendor partnerships
Reverse engineering experts
Global honey pot network
Industry-leading response time
Daily and Emergency signature
updates
Customer Accuracy Program
Team distributed globally
Emergency update within an hour
www.juniper.net/security
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 17
Real-world Example Security Teams Response
Typical chain of events on recent Microsoft Super Tuesday
10:17 AM Microsoft announces security bulletins; MS06-018, MS06-
5/9/2006 019, MS06-20 and posts patches for the vulnerabilities
10:21 AM Juniper Networks announces coverage for vulnerabilities
+4 min on all IDP platforms
11:50 AM
TippingPoint provides mixed messages on coverage
+1hr 33min
11:58 AM ISS announces coverage only for MS06-019
+1hr 41min
No announcements from Cisco or McAfee
End of Day
Symantec announces coverage only for MS06-019
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 18
IDP Product Overview
Product Features
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 19
Thwart Attacks at Every Turn
Multiple Methods of Detection
Malicious Activities/Attacks
Recon Attack Proliferation
Traffic Anomaly Detection Protocol Anomaly Detection
Network Honeypot Stateful Signatures Backdoor Detection
Synflood Protector IP Spoof Detection
Layer-2 Attack Detection
Profiler Security Explorer
Multiple Method of Detection
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 20
Traffic Anomaly Detection
Method of identifying abnormal traffic usage
No protocol anomalies or specific attack
patterns but unusual traffic usage/volume
Example: Ping Sweep
Scan the network to identify resources for possible
attack in the future - reconnaissance
Ping sweep from external/suspicious source should alert
administrator
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 21
Protocol Anomaly Detection
Protocols are well defined allowing accurate
description of normal usage
Abuse or abnormal use of the protocol are
detected by the IDP appliances
Example: FTP Bounce Attack
FTP Client
Please open FTP connection
x.x.x.A
Please connect to x.x.x.B
FTP Server (so unauthorized client can receive data)
x.x.x.B is not the authorized client machine
Possible abuse of FTP protocol
Request denied!!!
x.x.x.B
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 22
Stateful Signatures
Look for attacks in context
Avoid blindly scanning all traffic for particular
pattern
Improve efficiency
Reduce false-positives
Example: Code Red Worm
Utilizes HTTP GET request for attack
IDP appliance only scan for the specific request and
not any other HTTP traffic
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 23
Backdoor Detection/Trojan
Well-known Trojan horse concept
Challenge is to identify the attack when the
first line of defense has been overcome
Heuristic method of analyzing interactive
traffic
Example: Traffic originating from web server
Web servers typically respond to requests for
information, not initiate one
A sign of infected server/node
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 24
Features Addressing Customer Challenges
How can easily I find out
whats really running on my
network?
I dont want to block
How can I uncover new non-business apps but
network activities? how else can I control
it?
Wireless is great but
How can I make sure new how can I secure it?
technologies doesnt translate
to new threats?
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 25
Security Explorer
Interactive and dynamic
touchgraph providing
comprehensive network and
application layer views
Integrated with Log Viewer and
Profiler
Identifies whats running on a
network host
Uncovers attacks, peer IP addresses,
open ports, available applications
and operating systems
NEW - IDP 4.0
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 26
Enhanced Profiler
Uncovers new activities and traffic
information across network and
application levels
Identifies new protocols,
applications and operating systems
Alerts on rogue hosts, servers or IP
addresses
Detect unwanted applications like P2P
and IM
Records information on active
hosts, devices, protocols and
services in various contexts
Instant Messaging alias, FTP username,
e-mail address, subject heading, etc
NEW - NSM 2006.1
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 27
Diffserv (DSCP) Marking
Controls bandwidth allocation based on specific
types of application
Marks on a packet that match an IDP signature
Allows upstream router to enforce on markings
(value 1-63) to assure quality of service on
critical applications or appropriate response to
nonessential apps
Available as an action per IDP rule for full
granular control
NEW - IDP 4.0
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 28
Securing VoIP Applications
New Protocol Decode H.225
Assures that the VoIP signaling and control
protocol cannot be used as a source of network
attacks or abuse
Protocol decode capability protects underlying
vulnerability of protocol
Allows creation of custom attack objects with
contexts
VoIP protection on top of existing SIP protocol
support
Proactively prevent future exploits
NEW - IDP 4.0
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 29
Securing Database Applications
New Protocol Decode Oracle TNS
Protects database applications from an
increasing number of exploits and buffer
overflows in the internal network
Blocks unauthorized users to Oracle servers
Protects the underlying vulnerability of Oracle
TNS protocol
Prevents future threats at day zero
NEW - IDP 4.0
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 30
Securing Mobile Data Networks
New Inspection Capability GTP Encapsulated
Traffic
Protects an inherently unsecured traffic
Supports UDP tunnel packets per GTPv0 and GTPv1
Ensures users on cellular network arent
exposing the entire network to possible attacks
Carrier protection on top of existing inspection
for GRE encapsulated traffic
NEW - IDP 4.0
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 31
Only from Juniper Networks !
Coordinated Threat Control
Identify specific attacks originating from remote user via SSL VPN
and quarantine the user (and only the offending user)
1. User logs in using SSL VPN & deliberate or inadvertent attacks are launched
2. IDP detect the attack and block requests to the internal resources
3. IDP sends identifying data to SA SSL VPN gateway
4. Based on data from IDP, SA quarantine and notifies the user Quarantine
Identifying Data
Infected
Attack
Attack
Available IDP 3.2r2
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 32
IDP Product Overview
Product Offering
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 33
IDP Product Overview -Timeline
First to introduce
Introduction of fully integrated Integrated Threat
multi-gigabit FW/VPN/IDP Control for SSL
system (ISG 1000 and 2000) and IDP appliances
IDP platform introduced First to introduce daily signature
Integrated Stateful Signature updates
creation and updates
Protocol decodes
Secure response notices 2006
2005
2004
2002 Next generation of
network visibility and
control
Consolidated
First and only IPS integrating
security management
Profiler for best-in-class
solution
network awareness
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 34
Typical IPS Deployment
Regional Head
Office
NSM
Satellite Office
Main Office
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 35
IDP Product Line
Service Provider
Large Enterprise Perimeter
Internal LAN
Enterprise Perimeter
Internal LAN
ISG 1000/2000
Enterprise
Perimeter
Med Bus IDP 1100@ 1 Gbps
Large BO
Enterprise
Perimeter
SMB IDP 600 @ 500Mbps
Branch
Office
IDP 200 @ 200Mbps
IDP 50 @ 50Mbps
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 36
IDP Standalone 1100 C/F
1100C IDP 1100 C/F
Optimal for large
enterprise / Gig
environments
Up to 1 Gbps
throughput
500,000 max
sessions
10 CG or 8 Fiber SX
+ 2 CG traffic, 1 CG
mgmt & 1 CG HA
ports
HA clustering option
Integrated bypass
1100F for CG traffic ports
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 37
High Availability Options
Bypass Third-party HA Standalone HA
Bypass Unit for
Fiber Gig networks
- IDP 600F
- IDP 1100F
- ISG
state-sync
state-sync
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 38
Solutions for Every Need
Juniper IDP Standalone Appliances Juniper ISG Series
50 Mbps 1 Gbps Next-Gen Security ASIC
HA Clustering (GigaScreen)
Centralized policy management Multi-Gigabit FW/VPN/IDP
Centralized policy management
Complement existing FW/VPN
Protect network segments High performance for demanding
DMZ networks
LAN Virtualization features
Departmental servers Granular rule-by-rule management
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 39
ISG Under the hood
Integrated Best-of-breed Security &
Networking gear
Multi-Gig 2-way Layer 7 IDP Security Modules
Module blades available for ISG-1000 and
ISG-2000
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 40
ISG Series Architecture
Management Processing
Dedicated processing helps ensure linear
performance
Dual 1Ghz PowerPC CPU High performance interconnect & flow setup
1GB RAM
Security Security Module Processing
modules Dedicated processing for other security
applications
GigaScreen3 ASIC
1GB RAM Network Level Security Processing
Programmable Processors
ASIC-accelerated security
I/O I/O I/O I/O Stateful FW, NAT, VPN, DoS/DDoS
Intelligent Intrusion Prevention session
load balancing
Unmatched processing power! Embedded programmable processor
facilitate new feature acceleration
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 41
ISG Series Summary:
ISG 1000 and ISG 2000
ISG 1000 ISG 2000
Max Throughput: Firewall 1 Gbps 2 Gbps
Max Throughput: IPSec VPN (3DES/AES) 1 Gbps 1 Gbps
Packets per second: FW/VPN 1.5/1.5 Million 3/1.5 Million
Max sessions 500,000 1,000,000
VPN tunnels 2000 10000
Max Throughput: Deep Inspection 200 Mbps 300 Mbps
Max Throughput: IDP Up to 1 Gbps Up to 2 Gbps
Number of supported security modules (IDP) Up to 2 Up to 3
Number of fixed I/O interfaces 4 10/100/1000 0
Max interfaces Up to 20 Up to 28
Number of I/O modules 2 4
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 42
Product Details
Juniper Firewall/VPN, with Juniper Stand-alone Juniper ISG Series
Screen OS Deep Inspection IDP with IDP
Hardware NS-5XT IDP 50 ISG 2000 with IDP
NS-5GT IDP 200 ISG 1000 with IDP
NS-25 IDP 600C
NS-50 IDP 600F
NS-204 IDP 1100C
NS-208 IDP 1100F
NS-500
ISG 1000
ISG 2000
NS-5200
Software ScreenOS
NS-5400 5.0, 5.1, 5.2 IDP 4.0 ScreenOS 5.0-IDP
Management NSM NSM 2006.1 NSM 2004 FP3-IDP1
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 43
Management
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 44
3-Tier Management Secure and Scalable
Distributed IDP Sensors
N
S
M
Centralized
NSM Server Distributed ISG with IDP
Common User
Interface
Standalone IDP appliances requires IDP 4.0 for NSM support
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 45
Customers with a Hybrid Network
Business Challenges FW
Regional Head Mgmt
What is on my network? Office
Who is on my network?
Product Challenges IPS
Mgmt
Complex network
environments
FW Mgmt
Multi-vendor FW and
IPS systems
Multiple Management
Systems
IPS
Mgmt
IPS Mgmt
Satellite Office
Main Office FW Mgmt
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 46
Juniper Networks Customers
Juniper Offering
Juniper Networks IDPs &
Regional Head
Firewalls Office
Single Management System
Single User Interface
Business Benefits
Enhanced Network Visibility
Granular Control
Ease of Use
Satellite Office
NSM
Main Office
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 47
NSM Management Features NEW - NSM 2006.1
Scheduled Security Updates Automatically update devices with new attack objects.
Domains Service providers and distributed enterprises may use this
mechanism to logically separate devices, policies, reports,
objects, etc
Role-based Administration granular approach in which all 100+ activities in the system
may be assigned as separate permissions.
Object Locking Multiple administrators can safely and concurrently modify
different objects in the system at the same time.
Audit Logs Sortable and filterable record of who made which changes
to which objects in the system.
Device Templates Manage shared configuration such as sensor settings in one
place.
Job Manager View pending and completed directives (such as device
updates) and their status.
High Availability Active/passive high availability of the management server.
Scheduled Database Backups Copies of the NSM database may be saved on a daily basis.
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 48
Granular IDP Control w/NSM
Firewall and IDP management from same user interface
Configure desired response Configure attack detection
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 49
Summary
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 50
Why Juniper Networks IDP products?
Security Coverage
Product Innovation
Trusted Company
Market Recognition
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 51
Security Coverage
Multiple prevention methods for protection against entire
'Vulnerability & Attack Lifecycle
Complete packet capture and protocol decode @ Layer 7, including
VoIP protocols
2-way Layer 7 inspection: blocks attacks from client-to-server and
server-to-client
100% prevention and accuracy for Shellcode/buffer overflow
attacks
100% prevention in protecting against Microsoft Vulnerabilities:
Same day & Zero protection on Patch Tuesdays
Comprehensive Spyware protection, including 700+ signatures and
growing daily
Daily signature updates, including auto signature updates and auto
policy push
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 52
Product Innovation
Next generation of network visibility w/ Security Explorer
Granular, Flexible Management solution for all Juniper Networks
security appliances
Automatic custom reports
Multi Gigabit Performance
Multiple Deployment Options
Profile the network to understand applications and network
traffic
Carrier Class IDP: Multi-Gbps combined with SDX / JNPR Router
integration
Custom Signature Editor / Open Signatures Database
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 53
Trusted Company
Financial Strength / $2 Billion in Revenue /
Profitable / Cash Reserves
Investment in R&D 25% - 30% of revenue
Product Roadmap IDP plays a key role in
Junipers Infranet solution
Global Support & Relationships
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 54
Market Recognition
Most decorated IPS product in 2005
Winner Editors Choice Network Computing: The Great IPS Test
Winner Best Multifunction Appliance Network Computing (Well-Connected)
Winner Best IPS Appliance Network Computing (Well-Connected)
Winner Product of the Year SearchNetworking.com
Winner Product of the Year IDG Research / TechWorld
Winner Best Deployment Scenario ISP Guide: City of Burbank, Juniper IDP
Customer
Awarded NSS Certification for Industry Approved IPS: IDP 600F
Winner Product of the Year ISG 1000 - ZDnet Australia
Winner Editors Choice IDP 200 - ZDnet Australia
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 55
Thanks You!
Copyright 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 56