Self-defending networks: reality or fiction?

The concept of a self-defending network is not new. In the early 2000s, leading network and security vendors such as IBM [1] and Cisco [2] used the term to describe a network-as-a-platform. A collection of network and security devices working together as one unit to defend against cyber-attacks by adapting continuously to stay one step ahead of cyber threats.
10 years ago, the technology and tools required to bring together multiple vendors to create a self-defending network was very limited. Moreover, the cost of building such as a system was prohibitive, and the market as a whole was not ready. Most security vendors had closed systems with no ability to integrate them with other third-party systems. Self-defending networking was more fiction than reality since organisations did not have a mature enough network and security ecosystem to implement it.
Things have changed. Today, the technology glue to bring different devices in a homogeneous framework is ripe, and the market is ready. The advances in data analytics, Robotic Process Automation (RPA), Machine Learning, Artificial Intelligence, and Application Programming Interfaces (APIs), means that all the ingredients necessary to create self-defending networks are in place.
Self-defending networks: why it matters
Enterprises worldwide are facing increasing challenges to protect their digital assets against the growing number of cyber-attacks. The global skills shortage in cybersecurity is not making it easier. [3] Cybercrime is growing rapidly worldwide. The global cost is estimated to reach $6 trillion annually by 2021 [4]. Enterprises are continuously looking for ways to stay one step ahead of cybercriminals by ensuring that their network and security infrastructure can detect and act quickly against active cyber-attacks before any damage is done. Doing this in an efficient and cost-effective manner remains a challenging task for all organisations globally.
There is no lack of technology to defend against cyber-attacks. What is lacking is an integration layer that can ensure that people, processes, and technology are working better together in a synchronised manner to defeat even the most persistent and well-resourced attacker.
Of course, technology alone is not the solution to stop cyber-attacks. The glue between people, technology, and processes must be in place. A self-defending network can help achieve that. The key business objectives of a network-as-a-platform include: (1) ensuring that security practises and policies are aligned to business needs; (2) ensuring that the cost of security operations is manageable; (3) reducing complexity and simplifying the overall network and security infrastructure to maximise effectiveness; and (4) detecting and responding to cyber threats faster, ultimately improving the Mean Time To Detect (MTTD) and Mean Time To Respond (MTTD).
Self-defending networks: what is it?
As a whole, self-defending networks comprise technology, processes and people. From a technology point of view, the ability to manage, monitor, orchestrate, automate and respond to cyber-attacks faster and in a cost-effective manner is at the centre. All the components of a self-defending are brought together using a set of tools and automation processes that provide the glue to all the network and security layers.
An effective layered defence approach also referred to as defence-in-depth ensures that all the components are working as one. Devices providing anti-virus, proxy, firewalling, VPN, endpoint detection, IDS/IPS, vulnerability assessment, patch management, SIEM, policy compliance, routing and switching are fully integrated. All these components are combined and tightly integrated using a vendor agnostic approach to provide deep monitoring and management, orchestration and automated response in order to effectively defend against cyber-attacks.
In multi-vendor security infrastructures, the ability to integrate different technologies from different vendors is key. A best of breed approach adopted by many medium and large organisations means that a self-defending network must provide a communication layer between all the systems involved in highly secure and seamless manner. The ability to manage and integrate several vendors in order to automate and orchestrate processes is also key. Ultimately, a vendor agnostic approach is required to ensure that an organisation security investment is protected to meet current and future cyber threats. Depending on the needs of the organisation, over time, vendors and technologies can be swapped as needed, ensuring minimum disruption of the overall security infrastructure.
Self-defending networks: how it works
The core components of a self-defending network can be grouped into 5 key categories: central management, monitoring, automation, orchestration and response.
Central management and deep integration:
In order to enforce an organisation policy, central management is required to bring all the different components into a unified ecosystem. A single command and control view ensures that policies and processes can be managed from a single pane of glass. By using APIs and native plugins, devices that are part of the system can be controlled in a consistent manner. A central management engine enforces the organization’s security policy at a global level.
Continuous monitoring:
Monitoring is key in order to ensure visibility across the entire ecosystem. A SIEM solution is used as a central collecting engine for all raw logs and events collected from devices. That data is then sent to an engine for correlation and long-term storage. Using Big Data and security analytics, events correlation can be used to give the overall self-defending network more intelligence. Anomalies can be detected faster. Rules can be pushed to devices in order to respond to cyber-attacks real-time using known patterns, heuristics and machine learning models. The data collected overtime across the network provides greater threat intelligence. The more data the better. As the self-defending network matures, it can ‘learn’ faster overtime by self-tuning, reducing false positives, maximising its effectiveness, and helping reduce the organisation overall cost in security operations.
Automation and orchestration:
Automation refers to the use of playbooks and rules that provide an abstraction layer required to formulate response plans. Using various tools and technology such as RPA, automation is allowing processes to be systematised. Menial network tasks can be automated freeing valuable time for security teams so that they can focus on critical incidents. Rules are pushed in a consistent manner to devices enforcing a defence-in-depth approach whereby protection is implemented at several layers in order to defend more effectively against cyber-attacks.
Responding faster to attacks:
The end result of an effective self-defending network is the ability to respond faster than current systems can. By leveraging deep integration with devices that are part of the self-defending network, playbooks and rules are used to take specific actions. For example, a ransomware is detected at the endpoint device, not only is that threat neutralised at the end point, but the adjacent network switches can also quarantine the device by blocking the port until a successful remediation is applied. Many other rules can be created and applied at global level. With all these components working together in a coherent and consistent manner, security teams can reduce operational cost and complexity dramatically. The bottom line is that organisation can dramatically improve their Mean Time To Detect (MTTD) and Mean Time To Respond (MTTD).
Self-defending networks: business benefits
The benefits to organisations are tangible. Network and security automation means that security teams can free up valuable time by automating menial tasks so that they can focus on critical incidents. Playbooks can be created and re-used on demand throughout the enterprise, cutting down online enterprise applications delivery lead times and ensuring that online business applications are delivered in a fast and secure manner in the cloud or on-premise. Key business benefits can be summarised as:
1. A central management of network and security infrastructures that simplifies management of disjoint and different technologies.
2. Automation of menial tasks in order to free up time from security teams given the resourcing challenges facing many organisations worldwide.
3. Consistency in delivering services across the organisations since automation provides a way to re-uses rules and playbooks in a predictable and consistent manner.
4. Integration of network and security processes with overall organisations business workflows which brings security operations and development operations together.
5. Institutional memory within the self-defending network ecosystems means that knowledge transfer is consistent, and the intelligence acquired within the enterprise over time can be safeguarded given the global cybersecurity resourcing challenge.
References
source icybersecurity
Industry: Cyber Security

Latest Jobs
-
- Contract (outside) Cyber Incident manager – current SC clearance ESSENTIAL
- United Kingdom
- N/A
-
Contract (outside) Cyber Incident manager – current SC clearance ESSENTIAL Outside IR35 Client facing (Remote UK) with occasional site visit. Must have current Cyber incident response / management experience. Both proactive planning, escalation, coordination and coordinating response. Stakeholder engagement both technical and non technical teams. Prior experience with Technical incident / digital forensics / crisis management. Immediate role.
-
- Tenable Vulnerability Analyst - CONTRACT outside IR35. SC cleared.
- United Kingdom
- N/A
-
6 month rolling contract Outside IR35- immediate start. Threat and Vulnerability Analyst. Tenable.sc experience needed. The ability to deploy agent, configure environments, run active and passive scans, produce reports and prioritise remediation activities based on output Current and ACTIVE SC clearance is required
-
- ForgeRock Consultant
- N/A
- £600 per day
-
ForgeRock Consultant required for 6 Month Contract (with potential to extend) Outside IR35, Must be willing to work Europe hours (GMT+1) This is a remote position, Looking for a lead ForgeRock Technical Consultant with strong experience of ForgeRock to lead the next phase of deployment. Good understanding of ForgeRock Directory Services. · Responsible for the design and implementation of ForgeRock stack · Install and configure ForgeRock stack to meet customer authentication and authorization requirements, · Design and implement OAuth2 protocol using ForgeRock OpenAM, · Design and develop OpenAM custom authentication modules, · Configure ForgeRock stack to protect RESTful API, · Troubleshoot and support ForgeRock IAM stack. · Designed and developed Restful APIs, This is a great project with an expanding ForgeRock Partner, where you will get to work on some high level deployment projects We are looking for someone with the above experience, who is comfortable hitting the ground running and taking on the reins mid project
-
- Network Security Engineer
- Germany
- €550 a day
-
German- based contract opportunity This is an onsite based position, we would need the Network Security engineer to be able to work on the client site 5 days a week Seeking an experienced Network Security Engineer for a leading technology company. Strong expertise in firewall/IPS solutions, proxy solutions, and certificate management is required. Good hands-on experience in networking and web-related technologies necessary. Strong problem-solving skills and the ability to work under pressure are essential. we are looking for a Network Security Engineer with the following experience: · Expertise in Administration, Management & Troubleshooting of Firewall / IPS solutions / Proxy solutions/Certificate Management Solutions · Good Hands-on Experience on security devices (PaloAlto/ /McAfee Proxy/CISCO ISE/Certificate Management) · Good Hands-on Experience in Networking with skills of switching, routing & wireless Technologies · Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocol · Configuration of NAT / PAT, firewall policies, profiling, objects, AD-Integration, backup – restore · Knowledge of Subnetting TCP/IP Communication, VLSM Configuration of VLAN VTP · Configuration of Routing Protocols e.g. RIPv1 & v2, OSPF, EIGRP, BGP Knowledge of standard and extended ACL 12 month contract