IaaS Clouds: Which Security for VMs and Hypervisors? Marc Lacoste Orange Labs

Size: px
Start display at page:

Download "IaaS Clouds: Which Security for VMs and Hypervisors? Marc Lacoste Orange Labs"

Transcription

1 IaaS Cloud: Which Security for VM and Hypervior? Marc Lacote Orange Lab ICAR (Intergiciel et Contruction d'application Répartie) Summer School. Grenoble, Augut 28 th, 2013.

2 The Two Facet of Cloud Computing Many benefit Cot reduction. Flexibility. Scalability. Pay-per-ue... Many form Private, public, hybrid, community. IaaS, PaaS, SaaS. Data center, mobile, peronal, on chip Virtualized reource for multiple ervice Many threat Virtualization layer VM-to-VM. Rootkit: Bluepill, CloudBurt, Virtunoid 2

3 Outline Part I: IaaS Threat and Security Challenge. Part II: VM Security. Part III: Hypervior Security. Part IV: What doe the Future Hold for IaaS Security? 3

4 Part I: Iaa Threat and Security Challenge 4

5 Threat 5

6 A Typical IaaS Infratructure VM-to-VM threat Fool VM placement trategy to become co-located with VM attack target. Launch ide-channel attack to teal / corrupt information from target VM. Marc Lacote, Orange Lab, ICAR 2013 Example: Hey You! Get Off My Cloud! on Amazon VM [Ritenpart et al., CCS 09]. Cro-VM Side Channel and Their Ue to Extract Private Key [Zhang et al. CCS 12]. 6

7 Threat in a IaaS Infratructure Hypervior ubverion Compromie VMM from maliciou VM. Miconfiguration, device driver. Threaten hypervior integrity, CIA attack againt VM. Marc Lacote, Orange Lab, ICAR 2013 Example: Virtunoid: KVM iolation breakout [Elhage, DEFCON 11]. CloudBurt: VMware guet VM ecape [Kortchinky et al. BLACKHAT 09]. Bluepill: rogue hypervior beneath VM [Rutkowka et al., BLACKHAT 06]. SubVirt: VM-baed rootkit [King et al., Security&Privacy 06]. 7

8 Threat in a IaaS Infratructure Network threat Traffic nooping. Addre poofing. VLAN hopping. Example: Critical vulnerability in Eucalyptu open ource cloud (2011). 8 Marc Lacote, Orange Lab, ICAR 2013

9 Threat in a IaaS Infratructure Availability threat Reource tarvation due to faulty or maliciou VM behavior. Crimeware-a-a-Service. Example: Major outage on Amazon EC2 torage (2011) DDoS attack on AWS bring Bitbucket ervice to a halt (2009). EC2 cloud ued againt Sony PlayStation Network (2011). 9 Marc Lacote, Orange Lab, ICAR 2013

10 BotCloud Threat 10

11 Security Challenge 11

12 Endpoint Security Guarantee ecurity when computing reource are virtualized.. Barrier #1: Hypervior Security Virtualization bring many threat. Hyperjacking, miconfiguration, maliciou device driver, backdoor between VM and hardware VM alo have their vulnerabilitie. Such threat may be mitigated by: Hardened image. Strict VM ecurity life-cycle management. Apply ecurity-by-default configuration. 12 Marc Lacote, Orange Lab, ICAR 2013

13 Network Security Guarantee ecurity when network reource are virtualized.???? Barrier #2: Network iolation I traditional ecurity till effective? Rik are imilar to known network. Many mechanim are till applicable. VPN, VLAN, firewall, IDS/IPS, encryption, ignature Iolation i no longer phyical but logical. Iolation i le precie. Security guarantee are weaker. Challenge: mapping exiting network ecurity component to new cloud architecture. 13 Marc Lacote, Orange Lab, ICAR 2013

14 Network Security Guarantee ecurity when network reource are virtualized. Barrier #3: Elatic Security Flexible ecurity proviioning to match fat evolving rik. Firt olution: Flexible management of VPN. Overlay in full network virtualization. Fully automated ecurity management i till lacking. Reearch: autonomic (elf-protecting) ecurity architecture. Operational: early warning, proactive ecurity ytem. 14 Marc Lacote, Orange Lab, ICAR 2013

15 Data Protection Guarantee data ecurity in a hared multi-tenant environment. Barrier #4: Identity Lack of end-to-end identity management Iue: calability, heterogeneity. Authentication: hould be overcome. Authorization: in it infancy. Security-a-a-Service opportunitie. Barrier #5: Privacy Strong iolation during peronal information life-cycle. Many tough quetion: Secure data torage, data retention and detruction, legal implication Today PET are not enough! 15 Marc Lacote, Orange Lab, ICAR 2013

16 Data Protection Guarantee data ecurity in a hared multi-tenant environment. Barrier #6: Traceability How to locate the data and it path? Legal, political, and trut iue: Compliance. Data hoted abroad expoed to foreign government. Proving data come from a truted ource? Barrier #7: Legal iue Multiple conflicting juriiction for cloud data flow. Provider: how to provide aurance of regulation compliance? Cutomer: what are the right and obligation of each party? Importance of ecurity SLA. 16 Marc Lacote, Orange Lab, ICAR 2013

17 Trut Enabler Prove to third partie that the cloud infratructure i trutworthy. Barrier #8: Tranparency Prove ecurity hygiene of provider infratructure to third partie. Auditability, certification proce, rik analyi methodologie, compliance. Truted cloud computing technologie provide cryptographic evidence. Source: L. McVittie. Cloud Balancing, Cloud Burting, and the InterCloud, Cloud Computing Journal, Barrier #9: Openne Avoid vendor lock-in. Main iue: API portability acro provider. Bai of inter-cloud infratructure. Flexibility and ecurity benefit of open ource cloud architecture. Clear-cut SLA to clarify reponibilitie. Barrier #10: End-to-End Security Orchetrating ecurity mechanim. A cloud reference ecurity architecture i needed for overall view of cloud ecurity. Importance of tandardization. 17 Marc Lacote, Orange Lab, ICAR 2013

18 Part II: Protecting Virtual Machine 18

19 Virtual Security Appliance Security objective: 360 confidentiality, integrity, and availability of VM. Key propertie Iolation: control ditributed information flow between VM. Zoning. Overight: oberve and intervene in VM tate / behavior. Intropection. Zoning Architecture Deign iue Horizontal: which network ecurity architecture? Phyical, virtual, hybrid Vertical: which oftware layer? vswitch, hypervior, VM, multi-layer. 1. Phyical 2. Virtual Marc Lacote, Orange Lab, ICAR Hybrid 19

20 VM Intropection Monitored VM 1. hook Hypervior 2. monitoring agent Limitation of pure network-baed and hot-baed monitoring for cloud infratructure. 20

21 VM Intropection Monitored VM Security VM (Virtual Appliance) 1. hook VM Intropection Idea: ue the capabilitie of the hypervior to upervie VM behavior 1. Monitoring agent Hypervior 2. Monitoring agent 3. Monitoring agent Compute, network, torage intropection Fat path, low path, hybrid path architecture 1. In-VM monitoring: SIM 2, 3. With no hook in VM: CloudSec 2. monitoring agent Some Sytem 2,3. With hook in VM: Lare, XenAcce, KVMSec In-VM Placement Detection accuracy: proximity to target Stealth: protecting the monitoring component Security Appliance Security, performance improvement Le reactive? Hypervior-Baed Tranparent VM acce Security of monitoring component Semantic gap Little remediation action Check out paper «Engineering Intruion Service for IaaS Cloud : The Way of The Hypervior» at IEEE SOSE 2013 for more information!! Marc Lacote, Orange Lab, ICAR

22 Some VMI-Related IDPS & Anti-Malware Sytem Source: Baliga et al. Paladin: Automated Detection and Containment of Rootkit Attack, Computer & Security, Source: Wang et al. Detecting Stealth Software with Strider GhotButer. DSN 05. An extenive number of generic technique for intruion and malware detection: increaingly ue virtualization to mitigate both known and unknown threat. Policie: ome flexibility. Cro-layering: ome attempt uing VMI and emantic-view recontruction. Openne: to enable election and compoition of multiple detection / reaction algorithm. 22

23 vshield EndPoint vshield = VMware IaaS ecurity uite vshield App/Zone Hypervior-level firewall for VM network ecurity. vshield Manager Centralized adminitration. vshield Edge Virtual appliance firewall for perimetric ecurity. vshield Endpoint Anti-malware virtual appliance for intra-vm ecurity. vshield Endpoint Security feature: anti-malware, integrity monitoring, firewall, Deep Packet Inpection (DPI), log inpection. Policy-baed management. Cro-layering: module in hypervior + ecurity appliance. Openne: EPSec API. Marc Lacote, Orange Lab, ICAR 2013 Source: VMware. 23

24 Part III: Protecting the Hypervior 24

25 Virtualization Reviited 25

26 From Sytem Virtualization to the Hypervior Sytem virtualization i the ue of an encapulating oftware layer that urround or underlie an operating ytem, providing the ame input, output, and behavior that would be expected from phyical hardware. M. Pearce et al. Virtualization: Iue, Security Threat, and Solution. ACM Computing Survey, 45(2), Thi tak i performed by the hypervior or Virtual Machine Monitor (VMM): Allocation of phyical reource (e.g., CPU, torage, network) to Virtual Machine (VM). VM iolation. Type I : Bare Metal Type II : Hoted The hypervior provide it own driver Marc Lacote, Orange Lab, ICAR 2013 Driver may be hared with the hot OS 26

27 Propertie of a Virtualized Architecture Theoretical foundation [Popek and Goldberg74]: Analyi of requirement for a phyical architecture to be virtualizable. VMM requirement: 1. Efficiency The major part of intruction mut be run directly on the CPU, without VMM intervention. 2. Reource Control The VMM mut be in complete control over phyical reource, e.g., for multiplexing, iolation, complete mediation. 3. Equivalence Program running on the VMM mut have the ame behavior a if running directly on an equivalent phyical machine. 27

28 Intruction Senitivity Privilege level Senitive: may interfere with a factor under VMM control. Control enitive. Behavior enitive. Innocuou otherwie. Privileged: require proce to be highly privileged to be called. Trap if CPU in uer mode Not if CPU in upervior mode. Non-privileged otherwie. Reult: The architecture i fully virtualizable if : Senitive Intruction Privileged Intruction. «Trap-and-emulate» approach to virtualization. Unfortunately, x86 architecture i not fully virtualizable! Privileged Non-privileged Senitive Marc Lacote, Orange Lab, ICAR 2013 Intruction that do not trap in privileged mode 28

29 Virtualization and x86 Privilege Ring x86 architecture define 4 protection ring. Software-approach to virtualization: VMM run in ring 0, guet OS in ring 1. Some enitive intruction may not work properly due to inufficient privilege. Hardware-aited virtualization: VMM run in hardware-enforced ring -1. The OS can run tranparently in ring 0 a in non-virtualized ytem. 29

30 Some Method for Virtualizing the x86 Architecture Paravirtualiation: The guet OS i modified to better cooperate with the hypervior. Senitive non-privileged intruction are replaced by hypercall. Only a limited number of paravirtualized driver are needed. Not compatible with proprietary kernel. Binary tranlation: The VMM convert problem intruction in moother binary code Compatible with mot guet OSe. Doe not require pecific hardware upport. Require many optimization to be efficient. Hardware-aited virtualization: The hardware facilitate virtualization with pecific intruction (e.g., Intel VT-x). The guet OS run tranparently without modification. Allow to run OS which cannot be paravirtualized. Security i alo enhanced. Hardware context witching might be cotly. Implementation may alo be difficult. 30

31 I/O Management Device driver implementation: Virtualized: plit (back-end/front-end), emulated (HVM), or hypervior direct. Pathrough: from guet OS driver to device without hypervior intervention. 31

32 I/O Management Device driver implementation: Virtualized: plit (back-end/front-end), emulated (HVM), or hypervior direct. Pathrough: from guet OS driver to device without hypervior intervention. Map device addree to phyical addree in main memory. Very ueful to mitigate DMA attack. 32

33 Network Management The VM virtual network interface (VNIC) can be: Bridged to a phyical network interface (PNIC). Part of a Virtual Network (VN): device are connected to (virtual) hub, connected to other hub or to phyical network via virtual router. VN can be iolated, routed, or NAT-routed. 33

34 Hypervior Security Mechanim 34

35 Hypervior Integrity and Authenticity Threat The VMM i implicitly truted. I thi really true? Security objective: trutworthy VMM, with high aurance for authenticity and integrity. Truted computing technologie. Provide attetation of integrity of oftware/hardware component relying on chain of trut. For the Hypervior 2. monitoring agent VM VM VM VM Hypervior 1. Monitoring agent Sytem Integrity checking TCG IMA, Hyperguard, HyperCheck, HyperSentry Control flow integrity HyperSafe 2. Monitoring agent 35

36 Hypervior Integrity and Authenticity Threat For VM 2. monitoring agent Monitored VM e.g., for integrity Hypervior Management VM 1. Monitoring agent Management VM 2. Monitoring agent 1. hook Truted VMM Terra + TPM In management VM vtpm Sytem 2. monitoring agent Hot OS driver?? 36 Marc Lacote, Orange Lab, ICAR 2013

37 Hypervior Integrity and Authenticity Threat Benefit and Limitation Strong ecurity: attetation capabilitie. Vulnerable if oftware-only. Stealth? SMM vulnerabilitie? Flexibility: different ecurity policie Limited to integrity meaurement. No remediation. Eay to perform tatically In-context meaurement i hard: hypervior or proceor context? 37

38 DoS Threat Threat againt availability. Local Threat Network Threat VMM bug : privilege ecalation, VMM crah, diable acce to adminitration channel. Reource tarvation: allocation of too many reource cauing failure of other component. From hot or VM. Mitigation: reource allocation limit. Attack vector: network channel, e.g., network flooding. 2. monitoring agent Target: VMM, hot OS, guet OSe. Mitigation: network ecurity countermeaure (NIDS, firewalling, inkhole). Level 2: ebtable (Xen/KVM) Level 3: Open Vwitch (VMware), CISCO Nexu 1000v (Xen/KVM). 38

39 Information Leakage and Privilege Ecalation Threat Threat againt confidentiality and integrity. VM information leakage Privilege ecalation Exfiltrating information out of VM uing covert channel (hardware and oftware). Such channel may alo erve to corrupt VM. Leaked information: cutomer data, reource uage, location, hot or network information. Two repreentative clae of attack: Cache-baed attack. Timing-baed attack. Very few protection againt uch threat. VM ecape: a VM break the hypervior iolation code to become over-privileged. 2. monitoring agent Ecape to hot: Attack vector: device driver, Direct Memory Acce (DMA), CPU/GPU cache. Mitigation: VMM andboxing, hot ecurity. Ecape to other VM. Mitigation: +Truted Virtual Domain. Ecape to Virtual Network. Mitigation: + network ecurity. 39

40 The «Hey You! Get Off My Cloud» Attack 1 Map the Cloud Identify potential target 2 Determine co-reidence Check if two VM are co-located on ame phyical erver VM? VM 3 Send probe VM Co-locate attacker VM with target VM 4 Ue VM ide-channel Extract information, perform DoS Example: infer number of web ite viitor from traffic load. 40

41 Sandboxing Device Driver Threat VM VM VM VM VM Idea: confine maliciou code by controlling communication between driver, and device, kernel, and VM pace. 1. hook 1. RM Example of Sytem Hypervior Driver 2. RM 1. Reference Monitor (RM) between driver / VM pace: MicroDriver, Proxo 3. RM 2. RM between driver and hypervior: Software Fault Iolation (SFI) technique 2. monitoring agent Device 3. RM between driver and device: Nook Strong ecurity Good performance RM difficult to protect without hardware mechanim No remediation, only containment Reduced code ize Hypervior i modified Some iolation flexibility Policie difficult to configure 41

42 Part IV: What doe the Future Hold for IaaS Security? 42

43 Major Evolution in IaaS Architecture Ahead! Architecture i fundamental for IaaS ecurity But hypervior architecture i changing rapidly! New hypervior architecture are defined to mitigate new threat. Virtualization i expanding outide the data center. Two dimenion in change: Scale. Abtraction. Three main trend 1. Virtualization goe embedded. 2. Security move toward the hardware. 3. The cloud become uer-centric. A Big Picture 43

44 Major Evolution in IaaS Architecture Ahead! 44

45 Diruption #1: Virtualization Goe Embedded 45

46 Embedded Hypervior DC Hypervior Embedded Hypervior Cloud-on-chip hypervior Hypervior for mobile phone, enor, automotive ytem, avionic Application BYOD. Segment profeional / peronal environment Which Architecture? Key propertie Hypervior have trong limitation. Reource abtraction. Iolation. Performance. Minimal TCB. Real-time guarantee. Modularity. Fine-grained control. Micro-kernel eem better uited. Micro-vior are perhap even better. One of the mot advanced deign i OKL4 (Open Kernel Lab). 46

47 Microvior Architecture DC Hypervior Embedded Hypervior Cloud-on-chip hypervior Microvior = convergence of hypervior and micro-kernel: Abtraction OKL4 architecture: TCB minimization Source: J. Matthew. Virtualization and Componentization in Embedded Sytem. Open Kernel LabTechnology White Paper,

48 Toward the Cloud-on-Chip DC Hypervior Embedded Hypervior Cloud-on-chip hypervior Hypervior for multi-core architecture Key propertie Strong reource haring limitation. Maive calability. Key point Multiple hypervior on the ame chip. Independent ecurity realm per hypervior, with dedicated core and memory. Two-level reource management: intra-hypervior for VM. inter-hypervior uing multiplexing HAL. Source: Intel. 48 Marc Lacote, Orange Lab, ICAR 2013 Source: W. Shi. Architectural Support of Multiple Hypervior over Single Platform for Enhancing Cloud Computing Security. ACM International Conference on Computing Frontier (CF), 2012.

49 Diruption #2: Security Move Toward the Hardware 49

50 Micro-Hypervior The problem Hypervior are too big, too complex. Source of vulnerabilitie: bounce attack. DC Hypervior Solution Micro-hypervior Virtualized hypervior TCB hardening: mechanim Protect «by hand» hypervior from ubverion. Truted computing, language technique, andboxing TCB reduction: architecture Reduce code ize and complexity and increae modularity. For the core hypervior: Micro-hypervior. For the management VM: Diaggregated hypervior. Reducing the TCB VM VM Service VM Service VM VM Management VM Core hypervior: virtualization ikernel (for driver), NOVA, NoHype VMM Hypervior VMM VMM Micro-hypervior Management VM Service VM VMM Service VM Expel a much code a poible from TCB Strong ecurity Flexibility with open architecture. Extenive code rewriting Limited operational ervice Hard to apply to legacy hypervior. 50

51 Micro-Hypervior The problem Hypervior are too big, too complex. Source of vulnerabilitie: bounce attack. DC Hypervior Solution Micro-hypervior Virtualized hypervior TCB hardening: mechanim Protect «by hand» hypervior from ubverion. Truted computing, language technique, andboxing TCB reduction: architecture Reduce code ize and complexity and increae modularity. For the core hypervior: Micro-hypervior. For the management VM: Diaggregated hypervior. Reducing the TCB VM VMM Hypervior VM VMM VMM Micro-hypervior Management VM Service VM Service VM Service VM VM Management VM VMM Service VM Management VM: componentization XOAR, MinV, Diaggregated Xen Tranform Dom0 into a et of ervice VM, limiting reource haring, reducing priviilege. Improved ecurity, flexibility, and control. Doe not limit operational ervice. More ready to apply to legacy hypervior. 51

52 Some Example DC Hypervior Micro-hypervior Virtualized hypervior NOVA Architecture Source: U. Steinberg and B. Kauer. NOVA: A Microhypervior Baed Secure Virtualization Architecture. EUROSYS XOAR Architecture Source: P. Colp et al. Breaking Up i Hard to Do: Security and Functionality in a Commodity Hypervior. SOSP

53 For Automated Hardening Some hard problem ecurity component heterogeneity between layer and domain. infratructure complexity impoibility of manual adminitration. Autonomic ecurity approach: cloud with elf-defene capabilitie 53

54 For Automated Hardening Some hard problem ecurity component heterogeneity between layer and domain. infratructure complexity impoibility of manual adminitration. Autonomic ecurity approach: cloud with elf-defene capabilitie Lighter adminitration. Increaed reactivity. Lower operational cot. Graduated repone. Security uperviion enabler. 54

55 VESPA: Multi-Layer IaaS Self-Protection = Virtual Environment Self-Protecting Architecture An autonomic ecurity framework for regulating protection of IaaS reource. Implementation: KVM-baed IaaS infratructure. Application to hypervior elf-protection: in progre. 55

56 Illutration Flexible confinement of VM according to rik level 56

57 Illutration Flexible confinement of VM according to rik level 57

58 Virtualized hypervior DC Hypervior Micro-hypervior Virtualized hypervior The problem IaaS infratructure lack: Vertically: ecurity - Untrutworthy, vulnerable layer. Horizontally: flexibility, interoperability - (Security) feature not deployed. - Too monolithic for cutomization. 58

59 Virtualized hypervior DC Hypervior Micro-hypervior Virtualized hypervior Idea: Virtualize the hypervior Hypervior-Secure Virtualization (HSV): - The hypervior i no longer part of the TCB. - Protection by a ecurity layer underneath. - Separation of reource management from ecurity. Software HSV approach: neted virtualization. Source: IBM, Turtle project, OSDI

60 Virtualized hypervior DC Hypervior Micro-hypervior Virtualized hypervior Benefit Vertically: more ecurity - Trutworthy ecurity layer. Horizontally: more flexibility, interoperability - Ditributed ecurity abtraction layer. - Enabler for cro-provider ecurity ervice. Source: Zhang et al., CloudVior, SOSP

61 The Hypervior in Hardware Virtualized hypervior The hypervior in hardware Hardware HSV Benefit A hardware controller a only ecurity manager. - Dedicated Page Ownerhip Table for checking memory mapping permiion. The VMM perform tranparently VM cheduling and reource allocation. Stronger ecurity and better performance than oftware olution Cot might no longer be a barrier: - Change in micro-architecture are fairly mall. - Provider might pay for extra aurance level. 61 Source: J. Szefer and R. Lee, Architectural Support for Hypervior-Secure Virtualization, ASPLOS,2012.

62 Diruption #3: The Cloud Become Uer-Centric 62

63 Provider-centric cloud deficiencie Marc Lacote, Orange Lab, ICAR 2013 The uer-centric cloud (a.k.a uper-cloud) Lack of unified control: vendor-lock-in, monolithic infratructure Lack of interoperability: for infratructure ervice Cloud reource ditribution plane eparating production from conumption. Diruption #3: The Cloud Become Uer-Centric Benefit: Independence from provider. Increaed cutomizability. New buine opportunitie. 63

64 Provider-centric cloud deficiencie Marc Lacote, Orange Lab, ICAR 2013 The uer-centric cloud (a.k.a uper-cloud) Lack of unified control: vendor-lock-in, monolithic infratructure Lack of interoperability: for infratructure ervice Cloud reource ditribution plane eparating production from conumption. Diruption #3: The Cloud Become Uer-Centric Benefit: Independence from provider. Increaed cutomizability. New buine opportunitie. Toward fully ditributed hypervior. 64

65 Perpective Static Cloud Security Flexible Cloud Security Automated Cloud Security Exploitation of virtualization vulnerabilitie are ome of the mot eriou cloud threat, making the hypervior a keytone component of cloud ecurity. Some key point: The main challenge are riing infratructure complexity and rapid threat evolution. Mechanim are not well integrated. New architecture are promiing but far from mature. Two ultimate goal are cro-layer protection and end-to-end ecurity. A virtualization expand, not one but multiple «good» ecurity architecture. A vibrant reearch domain, critical to monitor to protect future cloud ytem. 65

66 Thank! Contact: Marc Lacote Orange Lab Senior Reearch Scientit rue du Général Leclerc Iy-Le-Moulineaux, France

SHARESYNC SECURITY FEATURES

SHARESYNC SECURITY FEATURES www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements : S.No Functional Requirement : 1 The propoed olution mut allow ingle policy rule creation for application control, uer baed control, hot profile, threat prevention, Anti-viru, file filtering, content filtering,

More information

OPINION PIECE. It s up to the customer to ensure security of the Cloud

OPINION PIECE. It s up to the customer to ensure security of the Cloud OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

License & SW Asset Management at CES Design Services

License & SW Asset Management at CES Design Services Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

Thank you for attending the MDM for the Enterprise Seminar Series!

Thank you for attending the MDM for the Enterprise Seminar Series! Thank you for attending the MDM for the Enterprie Seminar Serie! Pleae do not ditribute thi preentation without permiion from the peaker (ee contact information within.) Thi i jut intended a an additional

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Schmid Peoplemover Overpass and Revolution. The Discovery of a New Way.

Schmid Peoplemover Overpass and Revolution. The Discovery of a New Way. Schmid Peoplemover Overpa and Revolution. The Dicovery of a New Way. A Company of ThyenKrupp Elevator ThyenKrupp Aufzüge TK Creating New Way Demand New Way of Thinking. The Schmid Peoplemover Remove the

More information

Virtual Machines. Virtualization

Virtual Machines. Virtualization Virtual Machines Marie Roch Tanenbaum 8.3 contains slides from: Tanenbaum 3 rd ed. 2008 1 Virtualization Started with the IBM System/360 in the 1960s Basic concept simulate multiple copies of the underlying

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

McAfee Total Protection

McAfee Total Protection McAfee Total Protection Reduce the comlexity and cot of managing ecurity Protect what you value. 06 0 o t 4-- N #4 O VERSI 8 07020 McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054 888.847.8766 www.mcafee.com

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

Cloud Computing #6 - Virtualization

Cloud Computing #6 - Virtualization Cloud Computing #6 - Virtualization Main source: Smith & Nair, Virtual Machines, Morgan Kaufmann, 2005 Today What do we mean by virtualization? Why is it important to cloud? What is the penalty? Current

More information

Virtualization Technologies (ENCS 691K Chapter 3)

Virtualization Technologies (ENCS 691K Chapter 3) Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing

More information

Leveraging Thin Hypervisors for Security on Embedded Systems

Leveraging Thin Hypervisors for Security on Embedded Systems Leveraging Thin Hypervisors for Security on Embedded Systems Christian Gehrmann A part of Swedish ICT What is virtualization? Separation of a resource or request for a service from the underlying physical

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

Compromise-as-a-Service

Compromise-as-a-Service ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013

More information

Clouds, Virtualization and Security or Look Out Below

Clouds, Virtualization and Security or Look Out Below Clouds, Virtualization and Security or Look Out Below Lee Badger Hardware Virtualization (Box View) 1 2 dom0 HW type 1 Para-virtualization I/O Host HW type 2 dom0 HW type 1 Full virtualization I/O Host

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis

Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis William A. R. de Souza and Allan Tomlinson Information Security Group Royal Holloway, University of London Egham Hill,

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,

More information

Warehouse Security System based on Embedded System

Warehouse Security System based on Embedded System International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity

More information

Delivering the Next Generation of Satellite and Terrestrial Communications

Delivering the Next Generation of Satellite and Terrestrial Communications Delivering the Next Generation of Satellite and Terretrial Communication Editor Letter Developing new technology i a daunting and neceary tak if companie are to tay competitive in today global communication

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

Chapter 5 Cloud Resource Virtualization

Chapter 5 Cloud Resource Virtualization Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

Virtual Switching Without a Hypervisor for a More Secure Cloud

Virtual Switching Without a Hypervisor for a More Secure Cloud ing Without a for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton) 1 Public Cloud Infrastructure Cloud providers offer computing resources

More information

Virtualization. Jukka K. Nurminen 23.9.2015

Virtualization. Jukka K. Nurminen 23.9.2015 Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,

More information

Securing the Physical, Virtual, Cloud Continuum

Securing the Physical, Virtual, Cloud Continuum Securing the Physical, Virtual, Cloud Continuum By Ted Ritter, CISSP Senior Research Analyst Executive Summary The data center is undergoing a radical shift, from virtualization towards internal cloud

More information

Virtualization. Types of Interfaces

Virtualization. Types of Interfaces Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity

More information

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits: Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique

More information

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines: Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between

More information

CS 695 Topics in Virtualization and Cloud Computing. Introduction

CS 695 Topics in Virtualization and Cloud Computing. Introduction CS 695 Topics in Virtualization and Cloud Computing Introduction This class What does virtualization and cloud computing mean? 2 Cloud Computing The in-vogue term Everyone including his/her dog want something

More information

Virtualization Technology. Zhiming Shen

Virtualization Technology. Zhiming Shen Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became

More information

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

Chapter 2 Addendum (More on Virtualization)

Chapter 2 Addendum (More on Virtualization) Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)

More information

Knut Omang Ifi/Oracle 19 Oct, 2015

Knut Omang Ifi/Oracle 19 Oct, 2015 Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What

More information

CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction

CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction CS 695 Topics in Virtualization and Cloud Computing and Storage Systems Introduction Hot or not? source: Gartner Hype Cycle for Emerging Technologies, 2014 2 Source: http://geekandpoke.typepad.com/ 3 Cloud

More information

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds !111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure

More information

Can PCI DSS Compliance Be Achieved in a Cloud Environment?

Can PCI DSS Compliance Be Achieved in a Cloud Environment? royal holloway Can Compliance Be Achieved in a Cloud Environment? Organisations are considering whether to run -based systems in a cloud environment. The security controls in the cloud may be sufficient

More information

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved. Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

ANALYSIS OF RISKS AND SKEPTICISM OF ORGANIZATIONAL CLOUD COMPUTING

ANALYSIS OF RISKS AND SKEPTICISM OF ORGANIZATIONAL CLOUD COMPUTING ANALYSIS OF RISKS AND SKEPTICISM OF ORGANIZATIONAL CLOUD COMPUTING Richmond Ikechukwu Ibe (Ph.D.) Assistant Professor of business Management, Jarvis Christian College, Howkins, TX United States of America

More information

A Survey on Virtual Machine Security

A Survey on Virtual Machine Security A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology jreubens@cc.hut.fi Abstract Virtualization plays a major role in helping the organizations to reduce the operational

More information

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics

More information

EECatalog SPECIAL FEATURE

EECatalog SPECIAL FEATURE Type Zero Hypervisor the New Frontier in Embedded Virtualization The hypervisor s full control over the hardware platform and ability to virtualize hardware platforms are beneficial in environments that

More information

Virtualization for Future Internet

Virtualization for Future Internet Virtualization for Future Internet 2010.02.23 Korea University Chuck Yoo (hxy@os.korea.ac.kr) Why Virtualization Internet today Pro and con Your wonderful research results Mostly with simulation Deployment

More information

Securing Cloud Infrastructures with Elastic Security

Securing Cloud Infrastructures with Elastic Security Securing Cloud Infrastructures with Elastic Security White Paper September 2012 SecludIT 1047 route des dolines, 06560 Sophia Antipolis, France T +33 489 866 919 info@secludit.com http://secludit.com Core

More information

Strategic Plan of the Codex Alimentarius Commission 2014-2019 1

Strategic Plan of the Codex Alimentarius Commission 2014-2019 1 Strategic Plan of the Codex Alimentariu Commiion 2014-2019 1 STRATEGIC PLAN OF THE CODEX ALIMENTARIUS COMMISSION 2014-2019 INTRODUCTION The Codex Alimentariu Commiion (CAC) wa etablihed by the Food and

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the

More information

Requirements Engineering Databases: The Good, The Bad, and The Ugly

Requirements Engineering Databases: The Good, The Bad, and The Ugly New England Databae Day (NEDBDay08) February 4, 2008 Requirement Engineering Databae: The Good, The Bad, and The Ugly Brian Berenbach Siemen Corporate Reearch brian.berenbach@iemen.com 1 Agenda Brief Introduction

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Products and Services

Products and Services Product and Service With client ranging from mall buinee to Fortune 500 firm, GIS ha vat experience undertanding and delivering on the unique need of a wide range of client. By providing uperior product

More information

Windows Server Virtualization & The Windows Hypervisor

Windows Server Virtualization & The Windows Hypervisor Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick

More information

How To Create A Cloud Based System For Aaas (Networking)

How To Create A Cloud Based System For Aaas (Networking) 1 3.1 IaaS Definition IaaS: Infrastructure as a Service Through the internet, provide IT server, storage, computing power and other infrastructure capacity to the end users and the service fee based on

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

Virtualization and Cloud Computing

Virtualization and Cloud Computing Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing

More information

Enabling Technologies for Distributed and Cloud Computing

Enabling Technologies for Distributed and Cloud Computing Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example.

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example. Brand Equity Net Promoter Score Veru Mean Score. Which Preent a Clearer Picture For Action? A Non-Elite Branded Univerity Example Ann Miti, Swinburne Univerity of Technology Patrick Foley, Victoria Univerity

More information

COS 318: Operating Systems. Virtual Machine Monitors

COS 318: Operating Systems. Virtual Machine Monitors COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have

More information

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Microkernels, virtualization, exokernels. Tutorial 1 CSC469 Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,

More information

A Communication Model with Limited Information-Processing Capacity of Recipients. Oleg V. Pavlov WPI. Robert K. Plice San Diego State University

A Communication Model with Limited Information-Processing Capacity of Recipients. Oleg V. Pavlov WPI. Robert K. Plice San Diego State University A Communication Model with Limited Information-Proceing Capacity of Recipient Oleg V. Pavlov WPI Robert K. Plice San Diego State Univerity Nigel Melville Univerity of Michigan, Ann Arbor Keyword pam, email,

More information

APEC Environmental Goods and Services Work Program

APEC Environmental Goods and Services Work Program APEC Environmental Good and Service In Sydney in 2007 APEC Leader committed, through wide-ranging and ambitiou action, a et out in the Sydney Action Agenda, to enuring the energy need of the economie whilt

More information

IINS Implementing Cisco Network Security 3.0 (IINS)

IINS Implementing Cisco Network Security 3.0 (IINS) IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

What Cloud computing means in real life

What Cloud computing means in real life ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)

More information

The Open Cloud Near-Term Infrastructure Trends in Cloud Computing

The Open Cloud Near-Term Infrastructure Trends in Cloud Computing The Open Cloud Near-Term Infrastructure Trends in Cloud Computing Markus Leberecht BELNET Networking Conference 25-Oct-2012 1 Growth & IT Challenges Drive Need for Cloud Computing IT Pros Growth IT Challenges

More information

BlackRidge Technology Transport Access Control: Overview

BlackRidge Technology Transport Access Control: Overview 2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

9/26/2011. What is Virtualization? What are the different types of virtualization.

9/26/2011. What is Virtualization? What are the different types of virtualization. CSE 501 Monday, September 26, 2011 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,

More information

Survey on virtual machine security

Survey on virtual machine security Survey on virtual machine security Bright Prabahar P Post Graduate Scholar Karunya university Bijolin Edwin E Assistant professor Karunya university Abstract Virtualization takes a major role in cloud

More information

Get Here Jeffrey M. Kurtz Client Feedback Evaluation Implementation Extenion/Termination Solution Development Analyi Data Collection Problem Definition Entry & Contracting CORE to all Problem Solving Equilibrium

More information

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of

More information

Virtualization Technology

Virtualization Technology Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst mhw@linux.vnet.ibm.com 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards

Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards I.J. Information Technology and Computer Science, 2013, 07, 1-11 Publihed Online June 2013 in MECS (http://www.mec-pre.org/) DOI: 10.5815/ijitc.2013.07.01 Integration of Independent Application and EAI

More information

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson

More information

Change Management Plan Blackboard Help Course 24/7

Change Management Plan Blackboard Help Course 24/7 MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen

More information

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com 1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

Security Challenges & Opportunities in Software Defined Networks (SDN)

Security Challenges & Opportunities in Software Defined Networks (SDN) Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information