Download - Venus Project
![Page 1: Venus Project](https://reader033.vdocuments.us/reader033/viewer/2022051216/56815036550346895dbe3253/html5/thumbnails/1.jpg)
Venus Project
Brief Description
![Page 2: Venus Project](https://reader033.vdocuments.us/reader033/viewer/2022051216/56815036550346895dbe3253/html5/thumbnails/2.jpg)
What It Do
What• Monitor• Log• Analyze• Block• Narrow• Report• Search
Where• Single stations• Internet Gates• Special Devices• Web servers• Separate Security Servers
![Page 3: Venus Project](https://reader033.vdocuments.us/reader033/viewer/2022051216/56815036550346895dbe3253/html5/thumbnails/3.jpg)
“At Once” structure
![Page 4: Venus Project](https://reader033.vdocuments.us/reader033/viewer/2022051216/56815036550346895dbe3253/html5/thumbnails/4.jpg)
Architecture
• Sensors for gathering data • Agents for traffic control (narrowing or
blocking)• Core Server (Venus Server) (Analysis, Log
Storing, Report Builder, Control Modules, AI)
![Page 5: Venus Project](https://reader033.vdocuments.us/reader033/viewer/2022051216/56815036550346895dbe3253/html5/thumbnails/5.jpg)
Example 1. Spam narrowing
![Page 6: Venus Project](https://reader033.vdocuments.us/reader033/viewer/2022051216/56815036550346895dbe3253/html5/thumbnails/6.jpg)
Functions
• Distributed Intrusion Detection System (dIDP)• Distributed Intrusion Prevention System• Distributed User Network Activity Monitor• Distributed Traffic Control• Distributed Firewall
![Page 7: Venus Project](https://reader033.vdocuments.us/reader033/viewer/2022051216/56815036550346895dbe3253/html5/thumbnails/7.jpg)
What we will use ?
• We plan to use open source software
![Page 8: Venus Project](https://reader033.vdocuments.us/reader033/viewer/2022051216/56815036550346895dbe3253/html5/thumbnails/8.jpg)
What we want to achieve
• Most comprehensive threat detection by using distributed system
• Super speed enquiry and response. (We want to identify and lock attacker, before it harm and that should be done really fast)
• Clever Approach to detection• Broaden detection approach and include piracy,
illegal matter, piracy, etc.