20
Thales © 2019 All rights reserved Hard Wired Security and Performance in a Virtual World Electronic Warfare Europe 2019 5/14/2019 Joe Warren, Global Business Development Mgr. Network Security Products

Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

Thales © 2019 All rights reserved

Hard Wired Security and Performance in a Virtual World

Electronic Warfare Europe 2019

5/14/2019

Joe Warren, Global Business Development Mgr.

Network Security Products

Page 2: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

2 Thales Group InternalThales © 2019 All rights reserved

Actual Quotes!

▌Pre-WiFi, 802.11b circa 1995

My Desktop PC is wired.

Why would I need wireless connectivity at work?

A Wireless Network in my home?

That’s the silliest thing I have ever heard in my life!

Page 3: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

3 Thales Group InternalThales © 2019 All rights reserved

Perspective: The Common Threads are “Change” and “Adapt”

▌As computing became more mobile, so did networking

▌As devices and demand for data “changed”,

networks “adapted” yet security methods remain fairly stagnant

Page 4: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

4 Thales Group InternalThales © 2019 All rights reserved

More Ridiculous Quotes to Ponder

My Network is Wireless and my VPN is Private.

No one can see it so why should I worry?

I Spend €70k/yr on a Leased Line.

65% is used for Overhead, 35% for Data!

I’m Wasting €45k/year … Isn’t That Great?

Page 5: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

5 Thales Group InternalThales © 2019 All rights reserved

Securing Data In Motion – The Old Days….

▌Three Fundamental Components

Encrypt the Data

Send Encrypted Data Over Physically

Secured Links (No Listeners)

Preserve Efficiency

Underground EthernetEncased in Cement

Ethernet insidePressurized Conduit

Ethernet insidePressurized Conduit

Page 6: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

6 Thales Group InternalThales © 2019 All rights reserved

Securing Data In Motion – Today….

▌Networks are more complex

Wired and Wireless Links

Layer 2, Layer 3, Layer 4, etc.

▌Yet Security Fundamentals Remain

Encrypt the Data

Send Encrypted Data Over Physically

Secured Links: wired, virtual, and wireless

(No Listeners)

Move data quickly and efficiently

Page 7: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

7 Thales Group InternalThales © 2019 All rights reserved

Ingredients for Successful Data in Motion Security

Data encryption

Little to No Impact on Network Performance (Efficiency)

Complete Connection Obfuscation (No Eyes on Data)

Page 8: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

8 Thales Group InternalThales © 2019 All rights reserved

Data Encryption – to each his own

▌Data Encryption is a matter of regulation and/or personal choice

▌Global Standardization is Neither Desirable Nor Practical

GOST, AES, RAS, HAIPE, it doesn’t matter

Protection of Data is best implemented and regulated on its own

However, hardened hardware encryption ensures best performance and data security

▌If Encryption is the Commodity, then Efficiency

and Transport Security are the Key Differentiators

Page 9: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

9 Thales Group InternalThales © 2019 All rights reserved

Efficiency…If Encrypted Data Packets were Bars of Gold….

▌How Do We Typically Transport Our Gold?

Each packet is secured…..one at a time

Overhead required for each and every frame

Encrypted

DataOverhead

(Header)

Overhead (Trailer)

Encrypted

DataOverhead

(Header)

Overhead (Trailer)

Inter Frame Gap

(IFG)

Driver NavigatorSecurity Guard

(InitVect/GCM)

Gold(Data)

Watchman(FCS)

Page 10: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

10 Thales Group InternalThales © 2019 All rights reserved

Compound Problem – Different Data Types

Average Size Data Packets

Smaller Size Data Packets (VoIP)

Depending on the Data Type, The Ratio of Overhead to Data can be exponential

Page 11: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

11 Thales Group InternalThales © 2019 All rights reserved

Efficiency

Page 12: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

12 Thales Group InternalThales © 2019 All rights reserved

Adjusting the MTU Size at the Encryption Point

▌Create a Large “Container” and Insert Encrypted Data

▌Reduce Overhead from Individual Packets

▌Gain Efficiency Through Economies of Scale

Same Levels of Security for Data Encryption

Same Levels of Security on the Transport of Encrypted Data

Larger Packets Reduces Ratio of Overhead to Data

Overhead (Header)

Overhead (Trailer)

Adjusted MTU Size – Filling the Large Container

Page 13: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

13 Thales Group InternalThales © 2019 All rights reserved

Efficiency Though Economies of Scale

▌Up to 98% Network Efficiency Can Be Obtained

Reduction in Overhead

▌No Reductions in Data Security or Transport Security

Same Great Security, Just Fewer Packets to Secure

Overhead (Header)

Overhead (Trailer)

Fragmented Packet for 100% Frame Fill

Mixed Packets Inside a large “Container”

VOICEVOICEVOICEVOICEVOICE DATADATA

Page 14: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

14 Thales Group InternalThales © 2019 All rights reserved

The Must Haves

Data encryption

Little to No Impact on Network Performance (Efficiency)

Complete Connection Obfuscation (No Listeners)

Page 15: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

15 Thales Group InternalThales © 2019 All rights reserved

Leveraging Efficiency Mode for Obfuscation

Page 16: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

16 Thales Group InternalThales © 2019 All rights reserved

What Does The Listener See?

▌Without Data Obfuscation a Listener CAN

Determine packet sizes

Determine data types (backups vs. voice)

Tell when utilization occurs (peak vs. downtime)

Possibly determine classified vs. unclassified data

Potentially determine location of assets

▌With Data Obfuscation a Listener

Cannot determine packet sizes or data types

Cannot distinguish between real and random data

Cannot determine utilization times

Cannot determine classified vs. unclassified data

Traffic Analysis Without Obfuscation (TFS)

Traffic Analysis With Obfuscation (TFS)

Sporadic use of the bandwidth and packet sizes can be noted.

100% bandwidth utilization 24x7 prevents any analyses.

BANDWIDTH

Page 17: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

17 Thales Group InternalThales © 2019 All rights reserved

Just Like The Good Old Days….

Then

and

Now

Familiar Data Encryption

Complete Obfuscation

Superior Performance

Physical Networks

Virtual Networks

Page 18: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

18 Thales Group InternalThales © 2019 All rights reserved

More Quotes!

Now I Can Fully Secure Wired, Wireless, and Virtual

Networks Without Sacrificing Performance!

Who Knew?

I Reduced Overhead by 75% and I Don’t Need To

Purchase More Capacity……I Saved €70,000!

Who Knew?

Page 19: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

19 Thales Group InternalThales © 2019 All rights reserved

Summary

▌Data Security and Transport Security are separate yet complementary

▌As networks and transport techniques evolve, transport security

methods must evolve as well

▌NEVER sacrifice security for performance or performance for security

▌The techniques abbreviated in this presentation preserve the

fundamental requirements of Data Security, Transport Security, and

Efficiency over hard-wired and virtual infrastructures

Page 20: Hard Wired Security and Performance in a Virtual World … · Traffic Analysis Without Obfuscation (TFS) Traffic Analysis With Obfuscation (TFS) Sporadic use of the bandwidth and

Thales © 2019 All rights reserved

Joe Warren

Business Development, Network Security

HIGH SPEED ENCRYPTION (HSE) Products

[email protected]

@JoeWarren99

+1-321-704-6494