Download pptx - Venus Project

Transcript
Page 1: Venus Project

Venus Project

Brief Description

Page 2: Venus Project

What It Do

What• Monitor• Log• Analyze• Block• Narrow• Report• Search

Where• Single stations• Internet Gates• Special Devices• Web servers• Separate Security Servers

Page 3: Venus Project

“At Once” structure

Page 4: Venus Project

Architecture

• Sensors for gathering data • Agents for traffic control (narrowing or

blocking)• Core Server (Venus Server) (Analysis, Log

Storing, Report Builder, Control Modules, AI)

Page 5: Venus Project

Example 1. Spam narrowing

Page 6: Venus Project

Functions

• Distributed Intrusion Detection System (dIDP)• Distributed Intrusion Prevention System• Distributed User Network Activity Monitor• Distributed Traffic Control• Distributed Firewall

Page 7: Venus Project

What we will use ?

• We plan to use open source software

Page 8: Venus Project

What we want to achieve

• Most comprehensive threat detection by using distributed system

• Super speed enquiry and response. (We want to identify and lock attacker, before it harm and that should be done really fast)

• Clever Approach to detection• Broaden detection approach and include piracy,

illegal matter, piracy, etc.


Recommended