HP to scale up TippingPoint network security with SDN
The company's Sentinel software would run on an SDN controller and tap into TippingPoint's intelligence
IDG News Service - Hewlett-Packard plans to use its recently announced SDN controller to distribute its TippingPoint intrusion prevention system across networks, overcoming the scale limitations of dedicated appliances.
The research project, called Sentinel, is one of HP's first steps to use the distributed nature of SDN (software-defined networking) to change what networks can do. In this case, SDN can make it easier to provide protection against Internet malware throughout an enterprise or carrier network. Sentinel can scale up to handle thousands of endpoints, helping to keep enterprises secure as they embark on BYOD (bring your own device) policies, said Mauricio Sanchez, chief security architect at HP Networking.
"It's bringing that level of capability to the entire network and not just to the Internet gateway," Sanchez said. Leveraging its security capabilities along with SDN is one move by HP to compete with rivals such as Cisco and Juniper in the rapidly evolving SDN market.
TippingPoint keeps track of known sources of malware on the Internet, with a list of about 700,000 sites today, according to the company. It consists of software and an accompanying service, in which security researchers identify sites that contain hazardous code.
Currently, the TippingPoint software is deployed in appliances, which are installed as gateways between the public Internet and a private network. But those appliances can become bottlenecks because their performance is limited by the speed of their network links and hardware components.
Researchers at HP are now working on turning TippingPoint into an application that runs on HP's SDN controller, said Sanchez, a co-creator of the application. Because SDN separates the control of a network from its forwarding plane, it allows networking applications to be distributed wherever in the network they need to be. HP's controller is designed to host many different applications.
Sanchez demonstrated Sentinel at a media event at HP on Thursday. The software works by capturing and analyzing the DNS (Domain Name System) traffic that's generated when a user on the network tries to go to a website. If the site's DNS information matches that of any site on the TippingPoint list, Sentinel will take action over the network using the OpenFlow protocol, Sanchez said. It can redirect the user's request or take other steps, including sending a warning that the endpoint may have gone to that site because it was infected.
Because the Sentinel application has a real-time connection to the TippingPoint service, which updates its database at least every two hours, it has the latest information to secure the network. And because it only captures DNS traffic instead of the full flow of Web-browsing data, it can work efficiently, Sanchez said.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Binary Option: Neustar SiteProtect Case Study Learn how Neustar helped Top10optionbinaire.com protect against DDoS attacks with SiteProtect DDoS mitigation technology.
- Four Ways DNS Can Accelerate Business Growth This DNS eBook describes how DNS has developed over the years to support business growth as new needs have emerged, for example, advanced...
- Architecting the Network of the Future Networks need to change, as does the way IT thinks about and manages them. In addition to reliability, IT must now add higher...
- Ecommerce Site Needs Protection Against Cyber 'Pirate' Learn how a Neustar customer thwarted 'Blackbeard,' a self-styled DDoS Pirate. Using Neustar SiteProtect, a cloud-based DDoS mitigation service, this everyday IT hero...
- Tales from the Trenches - Industry Risks and Examples of DDoS Watch Neustar experts as they discuss how DDoS impacts technology companies including online gaming, e-commerce and more. All Network Security White Papers | Webcasts