Portal Home > Knowledgebase > Articles Database > The ultimate network security: IDS + TVA +...?


The ultimate network security: IDS + TVA +...?




Posted by BunkerDatacenter, 08-22-2010, 09:17 AM
What would you do to protect your network and what kind of tools (soft- or hardware?) would you implement? What would you use on the borders, the aggregation-level and access-level? Would you use an IDS, a TVA solution? Not talking about single server protection, but complete network coverage... Like to hear different opinions and solutions to start a discussion about the ultimate network security setup.

Posted by aleb, 08-22-2010, 11:45 AM
What is TVA? Tennessee Valley Authority? If you ask about the design of Data Center: Very good design: (in attach) If you prefer, we can discuss this in the correspondence. Attached Thumbnails  

Posted by BunkerDatacenter, 08-22-2010, 02:01 PM
Hi Aleb, A TVA is a 'Topological Vulnerability Analysis' system. It's a proactive intrusion prevention and response via attack graphs. It constantly attacks your own network with known and new exploits/hacks etc. to look for weak spots before it is actually attacked. TVA automates the type of labor-intensive analysis usually performed by penetration-testing experts. It encourages inexpensive “what-if” analyses, in which candidate network configurations are tested for overall impact on network security. It also allows for the computation of network-hardening options that protect given critical resources while requiring minimal network changes. Thnx for the network layout, will look it over. Last edited by BunkerDatacenter; 08-22-2010 at 02:07 PM.

Posted by aleb, 08-22-2010, 02:41 PM
I forgot about this term. As far as I remembered it all based on the work: S. Jajodia, S. Noel, B. O'Berry, "Topological Analysis of Network Attack Vulnerability" And the only known product (with the term TVA) is the product Couldron. http://www.epok.net/pdf/Cauldron-Top...w_Approach.pdf This look like as theoretical model. Partial functionality is in Cisco MARS. You can try to build a system yourself. Hardly search of vulnerabilities can be fully automated. Besides the idea of "The [GMU] project looked at ways to improve on the efficiency of reviewing vulnerabilities and trying to focus on what vulnerabilities should be resolved first - with tons of network scans and data" seems to me questionable.

Posted by GOT, 08-23-2010, 12:57 PM
I always liked this product: http://www.tippingpoint.com/

Posted by BunkerDatacenter, 08-24-2010, 09:19 AM
Thnx for the feedback. No other experiences, solutions or suggestions?



Was this answer helpful?

Add to Favourites Add to Favourites    Print this Article Print this Article

Also Read
what about hosting24-7 (Views: 750)


Language:

LoadingRetrieving latest tweet...

Back to Top Copyright © 2018 DC International LLC. - All Rights Reserved.