IBM Cloud Academy Conference ICACON 2015
|
|
- Hugo Willis
- 8 years ago
- Views:
Transcription
1 by Eman Hossny, Sherif Khattab, Fatma Omara, Hesham Hassan Faculty of Computers and Information, Cairo University IBM Cloud Academy Conference ICACON 2015
2 Background Motivation Objective BTB Service EASI-CLOUDS project Conclusion and Future Work BTB Service, 22 may, Slide (2 of 21)
3 Bot A Malicious software helps an attacker to gain full control over a computer Zombie A computer that is infected by a bot Botnet A large number of bot-infected zombies. Under the control of an attacker (Bot master) Used to launch DDoS Send spam s Stole users' banking credentials Install additional malware BTB Service, Eman Hossny 22 may, Slide (3 of 21)
4 A study shows 40% of all computers connected to web are Infected bots and controlled by bot master. BTB Service, 22 may, Slide (4 of 21)
5 Date October, 2009 Cybercriminal Attackers used DDoS to hack the BitBucket.org site, deployed on Amazon EC2 April, 2011 January, 2014 Attackers rented a set of Amazon EC2 VMs and initiate a massive attack. Hacked more than 100 million personal accounts of Sony s customer Four of top malware sites are deployed on Amazon Web Services (AWS): e.g., Downloadinstantly.com and powerpackmm.com Therefore, Amazon is a hornet s nest of malware April, 2015 Law enforcement groups and private security companies have broken a huge botnet (Simda Botnet). Simda Botnet: 770,000 compromised computers in 190 countries. BTB Service, Eman Hossny 22 may, Slide (5 of 21)
6 BTB Service, 22 may, Slide (6 of 21)
7 BTB Bot TraceBack BTB Service, Eman Hossny 22 may, Slide (7 of 21)
8 Terminologies Use Cases BTB Architecture Detailed Operational Flow Running Scenarios BTB Service, 22 may, Slide (8 of 21)
9 Attacking VM: this is the Bot VM. Attacking IP address: this is the IP address of the bot VM. Attacked VM: this is the victim VM. Attacked IP address: this is the IP address of the victim VM.
10 BTB Service, Eman Hossny 22 may, Slide (9 of 21)
11 Help customers to send BTB reports to an IaaS Provider Report Attack Customer Portal Store historical data about all VMs Identify the Bot VM Report Bot VMs BTB Reporting Service Log Report Reports & VMs DB Pull Report Pull VMs info BTB Detection Service Security-aaS Log VMs Info Retrieve Security info Operation about all available Center (SOC) VMs for all users Monitoring BTB Service, 22 may, Slide (10 of 21)
12 Monitor Store and update VMs info Parse and Store report Parser Report Report Checker Search & Retrieve DB Run BTB To process a new report BTB Detection Service Search & Update Run the EASI-CLOUDS monitor API Every 5 min. To get the VMs logs Forward the report to a specific cloud provider` Send BTB Report EASI-CLOUDS BTB Service, Eman Hossny 22 may, Slide (11 of 21)
13 Send report REST API Send report Check report GUI Call Dumped on ClearDB online service REST API Check report REST API BTB Reporting Service Security-aaS Log Report Reports & VMs DB Pull Report Pull VMs info BTB Detection Service Security Operation Center (SOC) Both services are deployed on CloudFoundry Log VMs Info Monitoring Token API REST API Call Automatic Daemon Report checker Update monitoring info VMs information API Provided by an IaaS Cloud provider BTB Service, 22 may, Slide (12 of 21)
14 BTB Reporting Service (Request)
15 BTB Reporting Service (Response)
16 Check Report Service The sent report is not processed till now
17 Check Report Service Finished and Caught the infected VM
18 Check Report Service Wrong Report ID
19 Aims to advance cloud computing in Europe, Egypt, and Korea Provide a comprehensive cloud computing infrastructure Includes all layers (IaaS, PaaS, and SaaS) Satisfies reliability, elasticity, security and ease-ofuse characteristics. Wins ITEA Award of Excellence in the business category. BTB Service, Eman Hossny 22 may, Slide (19 of 21)
20 BTB Service, 22 may, Slide (20 of 21)
21 Bot Traceback (BTB) Service Objective: to identify a bot virtual machine inside an IaaS cloud provider Functionality: Reporting and Tracing back the presence of a bot inside an IaaS cloud provider in a federated environment. Implementation: implemented as a part of the security tools in the EASI-CLOUDS project. Future Work Performance evaluation of the proposed BTB service. Commercialization of the BTB service BTB Service, Eman Hossny 22 may, Slide (21 of 21)
22
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationChapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
More informationProactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
More informationOutline. Introduction Major cloud security risks Hacking the cloud Conclusion
Hacking the Cloud Eugene Schultz, Ph.D., CISSP, CISM, GSLC Chief Technology Officer Emagined Security EugeneSchultz@emagined.com ISSA-LA Security Summit West Los Angeles, California June 15, 2011 Emagined
More informationKorea s experience of massive DDoS attacks from Botnet
Korea s experience of massive DDoS attacks from Botnet April 12, 2011 Heung Youl YOUM Ph.D. SoonChunHyang University, Korea President, KIISC, Korea Vice-chairman, ITU-T SG 17 1 Table of Contents Overview
More informationCloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
More informationThreat Intelligence. How to Implement Software-Defined Protection. Nir Naaman, CISSP Senior Security Architect
How to Implement Software-Defined Protection Nir Naaman, CISSP Senior Security Architect Threat Intelligence 1 The Spanish flu, 1918 killing at least 50-100 million people worldwide. 2 The H1N1 Pandemic,
More informationCloud and Security (Cloud hacked via Cloud) Lukas Grunwald
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral
More informationComputer Meteorology: Monitoring Compute Clouds
Computer Meteorology: Monitoring Compute Clouds Lionel Litty, H. Andrés Lagar-Cavilla, David Lie University of Toronto Infrastructure as a Service (IaaS) Customer Virtual Machine Customer Virtual Machine
More informationProviding Flexible Security as a Service Model for Cloud Infrastructure
Providing Flexible Security as a Service Model for Cloud Infrastructure Dr. M. Newlin Rajkumar, P. Banu Priya, Dr. V. Venkatesakumar Abstract Security-as-a-Service model for cloud systems enable application
More informationCloud Computing Training
Cloud Computing Training TechAge Labs Pvt. Ltd. Address : C-46, GF, Sector 2, Noida Phone 1 : 0120-4540894 Phone 2 : 0120-6495333 TechAge Labs 2014 version 1.0 Cloud Computing Training Cloud Computing
More informationCloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
More informationwhitepaper Cloud Servers: New Risk Considerations
whitepaper Cloud Servers: New Risk Considerations Overview...2 Cloud Servers Attract e-criminals...2 Servers Have More Exposure in the Cloud...3 Cloud Elasticity Multiplies Attackable Surface Area...3
More informationThe Cloud, Virtualization, and Security
A Cloud: Large groups of remote servers that are networked to allow centralized, shared data storage and online access to computer services or resources A Cloud: Large groups of remote servers that are
More informationAPIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
More informationwww.boost ur skills.com
www.boost ur skills.com AWS CLOUD COMPUTING WORKSHOP Write us at training@boosturskills.com BOOSTURSKILLS No 1736 1st Amrutha College Road Kasavanhalli,Off Sarjapur Road,Bangalore-35 1) Introduction &
More informationThis presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
More informationNetwork attack and defense
Network attack and defense CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan 1 Outline 1. Overview
More informationCloud Computing Business, Technology & Security. Subra Kumaraswamy Director, Security Architecture, ebay
Cloud Computing Business, Technology & Security Subra Kumaraswamy Director, Security Architecture, ebay COT2010 29 June 2010 Cloud Computing: Evolution not a Revolution 2 What s Driving Interest in Clouds
More informationSubash Krishnaswamy Applications Software Technology Corporation
Oracle Applications and Cloud Computing - Future Direction Subash Krishnaswamy Applications Software Technology Corporation Agenda Introduction ti to CLOUD Oracle Corporation and CLOUD Oracle Applications
More informationThreat Modeling Cloud Applications
Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant smatsumoto@cigital.com Software Confidence. Achieved. www.cigital.com info@cigital.com +1.703.404.9293
More informationThreat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform
Threat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform Sebastian Zabala Senior Systems Engineer 2013 Trustwave Holdings, Inc. 1 THREAT MANAGEMENT
More informationSurvey on Security Attacks and Solutions in Cloud Infrastructure
Survey on Security Attacks and Solutions in Cloud Infrastructure Shilpa D 1, Nagashree C 2, Divya C 3, Spurthi G S 4 Assistant Professor, Department of Computer Science and Engineering, SVIT, Bangalore,
More informationLecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationFACING SECURITY CHALLENGES
24 July 2013 TimeTec Cloud Security FACING SECURITY CHALLENGES HEAD-ON - by Mr. Daryl Choo, Chief Information Officer, FingerTec HQ Cloud usage and trend Cloud Computing is getting more common nowadays
More informationDigital Forensics for IaaS Cloud Computing
Digital Forensics for IaaS Cloud Computing June 26, 2012 The views expressed in this presentation are mine alone. Reference to any specific products, process, or service do not necessarily constitute or
More informationCloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
More informationSecurity Business Review
Security Business Review Security Business Review Q4: 2014 2 By Bitdefender Labs Security Business Review Botnet Anonymization Raises New Security Concerns Executive Overview While botnets, which are large
More informationDéveloppement logiciel pour le Cloud (TLC)
Développement logiciel pour le Cloud (TLC) 7. Infrastructure-as-a-Service Guillaume Pierre Université de Rennes 1 Fall 2012 http://www.globule.org/~gpierre/ Développement logiciel pour le Cloud (TLC) 1
More informationMoMoD-Cloud Movie Mobile on Demand by Cloud
wolke.hs-furtwangen.de MoMoD-Cloud Movie Mobile on Demand by Cloud Prof. Dr. Ch. Reich Computer Science Hochschule Furtwangen University ia 1 http://www.treehugger.com/files/2007/10/articulate-ecuador.php
More informationProtect your network: planning for (DDoS), Distributed Denial of Service attacks
Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product
More informationGrowing Challenges. Securing the Internet Cloud: Challenges and Opportunities. Traffic Growing Rapidly on Fixed and Mobile Networks!
Securing the Internet Cloud: Challenges and Opportunities Farnam Jahanian Computer Science and Engineering University of Michigan December 5, 2009 Growing Challenges Traffic Growing Rapidly on Fixed and
More information1 What is Cloud Computing?... 2 2 Cloud Infrastructures... 2 2.1 OpenStack... 2 2.2 Amazon EC2... 4 3 CAMF... 5 3.1 Cloud Application Management
1 What is Cloud Computing?... 2 2 Cloud Infrastructures... 2 2.1 OpenStack... 2 2.2 Amazon EC2... 4 3 CAMF... 5 3.1 Cloud Application Management Frameworks... 5 3.2 CAMF Framework for Eclipse... 5 3.2.1
More informationSecurity Landscape of Cloud Computing
Security Landscape of Cloud Computing Amrith Nawoor Sales Consulting Team Leader East Africa & SADC 1 This document is for informational purposes. It is not a commitment to deliver any material, code,
More informationSecuring Elastic Applications for Cloud Computing. Many to One Virtualization
Securing Elastic Applications for Cloud Computing Many to One Virtualization Xinwen Zhang, Joshua Schiffman, Simon Gibbs, Anugeetha Kunjithapatham, and Sangoh Jeong Samsung Information Systems America
More informationAddressing Security for Hybrid Cloud
Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : sreek.iyer@in.ibm.com Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly
More informationUsing SUSE Studio to Build and Deploy Applications on Amazon EC2. Guide. Solution Guide Cloud Computing. www.suse.com
Using SUSE Studio to Build and Deploy Applications on Amazon EC2 Guide Solution Guide Cloud Computing Cloud Computing Solution Guide Using SUSE Studio to Build and Deploy Applications on Amazon EC2 Quickly
More informationCloud Computing. Adam Barker
Cloud Computing Adam Barker 1 Overview Introduction to Cloud computing Enabling technologies Different types of cloud: IaaS, PaaS and SaaS Cloud terminology Interacting with a cloud: management consoles
More informationWhat Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos
Research Challenges Overview May 3, 2010 Table of Contents I 1 What Is It? Related Technologies Grid Computing Virtualization Utility Computing Autonomic Computing Is It New? Definition 2 Business Business
More informationLarge-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity
Computer Crime and Intellectual Property Section Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity Albert Rees Computer Crime and Intellectual Property Section (CCIPS) Criminal Division,
More informationSecurity. TO Evolving. Data Center Security. Virtualization and Cloud Computing
Virtualization and Cloud Computing Security Threats TO Evolving Data Centers Data Center Security Executive Summary Many businesses are evolving their data centers to include virtualization and cloud computing
More informationDon t Forget Your Security Umbrella in the Cloud
Don t Forget Your Security Umbrella in the Cloud Richard Sheng Director of Product Marketing, APAC Why the cloud matters? Speed and Business Impact Expertise and Performance Massive Cost Reduction 1) The
More informationA Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
More informationCSE543 Computer and Network Security Module: Cloud Computing
CSE543 Computer and Network Security Module: Computing Professor Trent Jaeger 1 Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory 2 Computing Is Here Systems and Internet
More informationPASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者
PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者 http://www.pass4test.jp 1 年 で 無 料 進 級 することに 提 供 する Exam : C2120-800 Title : IBM PureApplication System V1.1, System Administration Vendor : IBM Version : DEMO 1 / 4
More informationCh. 4 - Topics of Discussion
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 6 Cloud Platform Architecture over Virtualized Data Centers Part -4 Cloud Security and Trust Management Text Book: Distributed
More informationCloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
More informationAPPLICATION PROGRAMMING INTERFACE
DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With
More informationEXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
More informationLogentries Insights: The State of Log Management & Analytics for AWS
Logentries Insights: The State of Log Management & Analytics for AWS Trevor Parsons Ph.D Co-founder & Chief Scientist Logentries 1 1. Introduction The Log Management industry was traditionally driven by
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
More informationTowards a Standard PaaS Implementation API: A Generic Cloud Persistent-Storage API
Towards a Standard PaaS Implementation API: A Generic Cloud Persistent-Storage API Abstract: Platform as a Service (PaaS) supports application developers with the ability to implement and deploy their
More informationAnalyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network
Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network 1 T.Ganesh, 2 K.Santhi 1 M.Tech Student, Department of Computer Science and Engineering, SV Collge of
More informationMucho Big Data y La Seguridad para cuándo?
Mucho Big Data y La Seguridad para cuándo? Juan Carlos Vázquez Sales Systems Engineer, LTAM mayo 9, 2013 Agenda Business Drivers Big Security Data GTI Integration SIEM Architecture & Offering Why McAfee
More information(In-)Security of Backend-as-a-Service
(In-)Security of Backend-as-a-Service Siegfried Rasthofer (TU Darmstadt / CASED) Steven Arzt (TU Darmstadt / CASED) Robert Hahn (TU Darmstadt) Max Kolhagen (TU Darmstadt) Eric Bodden (Fraunhofer SIT /
More informationHow to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
More informationTop virtualization security risks and how to prevent them
E-Guide Top virtualization security risks and how to prevent them There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced
More informationHow To Use Arcgis For Free On A Gdb 2.2.2 (For A Gis Server) For A Small Business
Esri Middle East and Africa User Conference December 10 12 Abu Dhabi, UAE Understanding ArcGIS in Virtualization and Cloud Environments Marwa Mabrouk Powerful GIS capabilities Delivered as Web services
More informationIAAS REFERENCE ARCHITECTURES: FOR AWS
IAAS REFERENCE ARCHITECTURES: FOR AWS Section 1 - Overview 2 Section 2 - What is IaaS? 2 Section 3 - Blueprints 3 Section 4 - Imperva Solution 9 Section 5 - Case Studies 10 Section 6 - Conclusion 12 OVERVIEW
More informationisheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
More informationHong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
More informationEvolution of Cyber Security and Cyber Threats with focus on Cloud Computing
Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing Igor Nai Fovino-Head of Research GCSEC The last two years will surely enter in the history of IT Security. 2010 was the year
More informationBotnets: The dark side of cloud computing
Botnets: The dark side of cloud computing By Angelo Comazzetto, Senior Product Manager Botnets pose a serious threat to your network, your business, your partners and customers. Botnets rival the power
More informationSecure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
More informationTechnical Challenges of Forensic Investigations in Cloud Computing Environments
Technical Challenges of Forensic Investigations in Cloud Computing Environments Dominik Birk January 12, 2011 Abstract Cloud Computing is arguably one of the most discussed information technology topics
More informationSecurity A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
More informationConPaaS: an integrated runtime environment for elastic cloud applications
ConPaaS: an integrated runtime environment for elastic cloud applications Guillaume Pierre Vrije Universiteit Amsterdam July 24th 2012 contrail is co-funded by the EC 7th Framework Programme under Grant
More informationVisualizing Threats: Improved Cyber Security Through Network Visualization
Visualizing Threats: Improved Cyber Security Through Network Visualization Intended audience This white paper has been written for anyone interested in enhancing an organizational cyber security regime
More informationElastic Detector on Amazon Web Services (AWS) User Guide v5
Elastic Detector on Amazon Web Services (AWS) User Guide v5 This guide is intended for Elastic Detector users on AWS. Elastic Detector is available as SaaS or deployed as a virtual appliance through an
More informationNetwork Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim (hlim@gist.ac.kr) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
More informationSecurity Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
More informationEvolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance
Evolving Threats and Attacks: A Cloud Service Provider s viewpoint John Howie Senior Director Online Services Security and Compliance Introduction Microsoft s Cloud Infrastructure Evolution of Threats
More informationThe Threat of Coexisting With an Unknown Tenant in a Public Cloud
royal holloway The Threat of Coexisting With an Unknown Tenant in a Public Cloud An examination of the vulnerabilities of the cloud, with a focus on the issues of attackers ability to load malicious programs
More informationOpenStack Introduction. November 4, 2015
OpenStack Introduction November 4, 2015 Application Platforms Undergoing A Major Shift What is OpenStack Open Source Cloud Software Launched by NASA and Rackspace in 2010 Massively scalable Managed by
More informationIDSaaS: Intrusion Detection System as a Service in Public Clouds
IDSaaS: Intrusion Detection System as a Service in Public Clouds Turki Alharkan School of Computing Queen's University Kingston, ON Canada alharkan@cs.queensu.ca Patrick Martin School of Computing Queen's
More informationCloud Computing Security Master Seminar, Summer 2011
Cloud Computing Security Master Seminar, Summer 2011 Maxim Schnjakin, Wesam Dawoud, Christian Willems, Ibrahim Takouna Chair for Internet Technologies and Systems Definition of Cloud Computing 2 Cloud
More informationCurrent counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol hcjung@kisa.or.kr April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
More informationDynamic Resource Distribution Across Clouds
University of Victoria Faculty of Engineering Winter 2010 Work Term Report Dynamic Resource Distribution Across Clouds Department of Physics University of Victoria Victoria, BC Michael Paterson V00214440
More informationOpenStack Cloud Migration : Migrating On-premise workloads to OpenStack Private Cloud
OpenStack Cloud Migration : Migrating On-premise workloads to OpenStack Private Cloud June 16, 2015 DONGJOON MIN ISA TECHNOLOGIES,INC. 1 djmin@zconverter.com Table of Contents Executive Summary.. 3 What
More information10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
More informationCloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu
Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5 www.kc-class.eu 1 1 Outline Cloud computing General overview Deployment and service models Security issues Threats
More informationPublic Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
More informationComparing Open Source Private Cloud (IaaS) Platforms
Comparing Open Source Private Cloud (IaaS) Platforms Lance Albertson OSU Open Source Lab Associate Director of Operations lance@osuosl.org / @ramereth About me OSU Open Source Lab Server hosting for Open
More informationOpsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview
Opsview in the Cloud Monitoring with Amazon Web Services Opsview Technical Overview Page 2 Opsview In The Cloud: Monitoring with Amazon Web Services Contents Opsview in The Cloud... 3 Considerations...
More informationA Review of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
A Review of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Trupti Dange 1, Pankaj Bhalerao 2 1 Professor, Department of Computer Engineering, RMD Sinhgad School of
More informationHow To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
More informationIntroduction to Cloud Computing
Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services
More informationSecurity Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
More informationCloud Computing Trends
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered
More informationUnleash the IaaS Cloud About VMware vcloud Director and more VMUG.BE June 1 st 2012
Unleash the IaaS Cloud About VMware vcloud Director and more VMUG.BE June 1 st 2012 2 Who? Viktor van den Berg Consultant @ PQR Former Dutch VMUG Leader Blogger at www.viktorious.nl Twitter @viktoriousss
More informationSecuring Cloud using Third Party Threaded IDS
Securing Cloud using Third Party Threaded IDS Madagani Rajeswari, Madhu babu Janjanam 1 Student, Dept. of CSE, Vasireddy Venkatadri Institute of Technology, Guntur, AP 2 Assistant Professor, Dept. of CSE,
More informationIntegrating cloud services with Polaris. Presented by: Wes Osborn
Integrating cloud services with Polaris Presented by: Wes Osborn Topics Why the cloud? Cloud Backups DNS Notices IAAS vs PAAS Cloud Providers IAAS = Infrastructure as a Service Run a virtual machine on
More informationChallenges in Delivering Large-scale Services over Cloud Environments
Computation World 2014 Panel CLOUD/SERVICES Challenges in Delivering Large-scale Services over Cloud Environments Moderator Christoph Reich, Furtwangen University of Applied Science, Germany Panelists
More informationVirtualization & Cloud Computing (2W-VnCC)
Virtualization & Cloud Computing (2W-VnCC) DETAILS OF THE SYLLABUS: Basics of Networking Types of Networking Networking Tools Basics of IP Addressing Subnet Mask & Subnetting MAC Address Ports : Physical
More information2012 Bit9 Cyber Security Research Report
2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by
More informationTLP WHITE. Denial of service attacks: what you need to know
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
More informationThe Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
More informationIntroduction to Cloud Computing
Introduction to Cloud Computing Shang Juh Kao Dept. of Computer Science and Engineering National Chung Hsing University 2011/10/27 CSE, NCHU 1 Table of Contents 1. Introduction ( 資 料 取 自 NCHC 自 由 軟 體 實
More informationCloud Computing. Cloud computing:
Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:
More informationUnmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
More information