Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons
|
|
|
- Elfreda Austin
- 10 years ago
- Views:
Transcription
1 Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1
2 Tradi=onal Host- Based Security Misuse detec=on: cannot handle unknown akacks Anomaly detec=on: mimicry akacks 2
3 Mo=va=on Defining akack is hard 0- day, mimicry akack, and etc AKacks are keep evolving Then, can we design a security monitor that works for the new akacks? 3
4 A New Approach Objec=ve Protec=ng integrity of user intended text content that will be sent as network packets. AKack- agnos=c Defense It does not depend on the how the akack works. Examples of the ways of akacks AKach to a process to change some text values Directly write on /dev/mem to modify sensi=ve values We only make sure the monitored system is behaving correctly Essen=ally looking at the opposite side of akack detec=on. 4
5 Related Works Using Timing Informa=on BINDER [ACSAC 05, Cui et. al.] Not- A- Bot, [NSDI 09, Gummadi et. al.] User- intent Detec=on Monitors physical keystrokes/mouse clicks A traffic without user input preceded in a short =me window is not user- intended, a malicious ac=vity. User- intended behavior: T network T input < T threshold Simple, but effec=ve defense for exis=ng akacks 5
6 Related Works (Cont d) User- Driven Access Control [Oakland 12, Roesner et. al.] Access Control Gadget (ACG) A UI gadget that grants permission to the resource when it is clicked. Examples» Camera icon - > grant access to camera» File- saving icon - > grant access to filesystem 6
7 Related Works (Cont d) Problem Only checks existence of user intent (yes/no) BINDER & Not- A- Bot Send malicious network traffic shortly aler every keystrokes ACG Free to use the resource aler gemng of the access Nobody took account into monitoring user- intended content. Why? 7
8 Capturing User- intended Text Straighoorward way Looking at keystrokes Keycode can be caught at keyboard driver w, r, i, t, e, ENTER Cursor point and bukon can be caught at mouse driver (x, y, bukon) - > (325, 641, LCLICK) 8
9 Capturing User- intended Text Challenges Mouse Move cursor on click! Drag to select text, then delete Keyboard Copy & Paste AutoComplete Rich seman=cs of UI is needed. 9
10 Capturing User- intended Text A beker approach User interacts with computer using input/output hardware Input: Keyboard, Mouse Output: Display screen Feedback loop in the user interac=on 10
11 Capturing User- intended Text Observa=on User naturally verifies what they type by what they sees on the screen A New Security Policy What You See Is What You Send (WYSIWYS) We assume on- screen text is user- intended Only allows outgoing traffic that matches on- screen text Hi, there! Hey, send me $100 11
12 Secure Overlay Combined Screen On- screen text is always same with captured text on the security monitor. 12
13 Secure Overlay Only re- draws editbox Exactly same loca=on, size, and color Can support rich- text Font, size, color, style, and etc. Passive UI It does not gets any user input. Content will be updated aler each applica=ons gets input. Support selec=on, copy/paste, spell correc=on, auto- comple=on, etc 13
14 UI Monitor Uses library for UI Tes=ng (UIAutoma=on) 14
15 The Gyrus Architecture 15
16 Threat Model Hypervisor and security VM is fully trusted. Assumes VM escape is impossible. Hardware input devices are trusted, and the akacker has no physical access to it. AKacker cannot forge hardware input event 16
17 Threat Model (Cont d) All hardware input event is interposed at hypervisor first, then delivered to User VM Security VM cannot miss hardware event, and User VM cannot emulate it. We completely distrust User VM We allows all akacks including Kernel- level malware. UI monitor is untrusted. 17
18 How Gyrus Works Iden=fying and overlaying all editboxes Only shows for focused window Suppress background update Track updates Updates all editbox on Change of focus Change of loca=on Change of content 18
19 How Gyrus Works On every user interac=on, checks whether it triggers traffic Traffic- triggering event Click `Send bukon on GMail Pressing `ENTER on facebook message dialog Pressing Ctrl- S on Outlook Express 19
20 Capture User- Intent Extract all required text from Secure Overlay when traffic- triggering event happens. Store it to Authoriza=on DB for enforcement at network level. 20
21 Applica=on- specific Logics User Intent Signature 21
22 Network Monitor A transparent proxy with deep- packet inspec=on Extract user- intent from the traffic, query authoriza=on DB Pass only when it is matched with stored intent Requires proxy per each protocol SSL traffic should be decrypted (MITM) 22
23 Applica=on Examples 23
24 Evalua=on Security For exis=ng akacks on Apps WYSIWYS is enforced All malware failed to send their traffic on» E- mail client (send spam)» Internet Messenger (send spam)» Facebook (post ar=cle, message, and etc.)» Paypal (XSS)» Etc.. 24
25 Evalua=on Security Incorrect User Intent Signature On akacking UI monitor in Guest VM Failure on gemng correct informa=on False posi=ve, user traffic will be blocked DoS 25
26 Evalua=on Performance Interac=on delay Checked turn- around =me star=ng from the input, end with the resul=ng text or ac=ons on the Overlay Can handle around 1,400 inputs / min (43ms delay) 26
27 Evalua=on Performance Network delay 27
28 Limita=ons Can only handle text so far.. File/Image akachments What we see: name of path (e.g., c:\boot.ini) What machine sends: content of the file Using ACG would be helpful Only works if what you see is really what you send Not the case if displayed text undergone a lot of (proprietary) processing before being sent out. However, base64, SSL, and REST API through HTTPS can be handled. 28
29 Conclusion Gyrus A correct- behavior based monitoring system. Monitors user- intended text through on- screen UI data, and enforcing WYSIWYS policy. Protect most of text- based user applica=ons with minimal overhead. Its akack- agnos=c defense works for preven=ng future akacks. 29
30 Ques=ons? Q&A 30
31 Discussions AKacks on UI monitor Malware that tries to modify text At network monitor, it only allows text in the authoriza=on DB. Authoriza=on DB only stores on- screen text. => The text content malware would send should be on- screen. => User will be no=fied from on- screen changes. 31
32 Future Works Implement in different plaoorm Android (DalVik VM) Thin- client model, a terminal for cloud service Protect different target Disk write (think disk opera=on as a network traffic) Confiden=ality protec=on Gyrus only protects integrity of user intent. 32
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal
Gyrus: A Framework for User-Intent Monitoring of Text-Based Networked Applications
Gyrus: A Framework for User-Intent Monitoring of Text-Based Networked Applications Yeongjin Jang, Simon P. Chung Georgia Institute of Technology [email protected], [email protected] Bryan
Computer Security Incident Handling Detec6on and Analysis
Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION
Design and Evalua.on of a Real- Time URL Spam Filtering Service
Design and Evalua.on of a Real- Time URL Spam Filtering Service Kurt Thomas, Chris Grier, Jus.n Ma, Vern Paxson, Dawn Song University of California, Berkeley Interna.onal Computer Science Ins.tute Mo.va.on
FRESCO: Modular Composable Security Services for So;ware- Defined Networks
FRESCO: Modular Composable Security Services for So;ware- Defined Networks Seungwon Shin, Phil Porras, Vinod Yegneswaran, MarIn Fong, Guofei Gu, and Mabry Tyson SUCCESS LAB, Texas A&M and SRI Interna7onal
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
PALO ALTO SAFE APPLICATION ENABLEMENT
PALO ALTO SAFE APPLICATION ENABLEMENT 1 Palo Alto Networks Product Overview James Sherlow SE Manager WEUR & Africa [email protected] @jsherlow Palo Alto Networks at a Glance Corporate Highlights
Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765]
Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765] Irena Shaigorodsky Java One, 2014 [email protected] @ishaigorodsky hops://github.com/ishaigor/rest- retro- sample 1 Quick Survey
How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9
Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may
Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology
Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology Alexey Kirichenko, F- Secure Corpora7on ICT SHOK, Future Internet program 30.5.2012 Outline 1. Security WP (WP6) overview
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu Georgia Institute of Technology Annual Computer Security Applications Conference
8/25/14 SMORE : So)ware- Defined Networking Mobile Offloading Architecture
: So)ware- Defined Networking Mobile Offloading Architecture Junguk Cho, Binh Nguyen, Arijit Banerjee, Robert Ricci, Jacobus Van der Merwe, and Kirk Webb 1/59 MoQvaQon Mobile Network Game server enbs PGW
Open-Xchange Guard Major Release v2.0.0. Feature Overview V1.4
Open-Xchange Guard Major Release v2.0.0 Feature Overview V1.4 2015 Copyright Open-Xchange Inc. This document is the intellectual property of Open-Xchange Inc. The document may be copied in whole or in
Understanding and Detec.ng Real- World Performance Bugs
Understanding and Detec.ng Real- World Performance Bugs Gouliang Jin, Linhai Song, Xiaoming Shi, Joel Scherpelz, and Shan Lu Presented by Cindy Rubio- González Feb 10 th, 2015 Mo.va.on Performance bugs
Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik
Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer
Defending Against Web App A0acks Using ModSecurity. Jason Wood Principal Security Consultant Secure Ideas
Defending Against Web App A0acks Using ModSecurity Jason Wood Principal Security Consultant Secure Ideas Background Info! Penetra?on Tester, Security Engineer & Systems Administrator!!!! Web environments
benefit of virtualiza/on? Virtualiza/on An interpreter may not work! Requirements for Virtualiza/on 1/06/15 Which of the following is not a poten/al
1/06/15 Benefits of virtualiza/on Virtualiza/on Which of the following is not a poten/al benefit of virtualiza/on? A. cost effec/ve B. applica/on migra/on is easy C. improve applica/on performance D. run
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
Email/Endpoint Security and More Rondi Jamison
Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on
WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons
WSECU Cyber Security Journey David Luchtel VP IT Infrastructure & Opera:ons Objec:ve of Presenta:on Share WSECU s journey Overview of WSECU s Security Program approach Overview of WSECU s self- assessment
List Management : Campaign Dashboard. Campaign Dashboard. Displays all recent campaign ac5vity when you first log in
List Management List Management : Campaign Dashboard Campaign Dashboard Displays all recent campaign ac5vity when you first log in List Management : List View List Management View Easily Edit, Copy, Delete,
Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars
Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on
Office of History. Using Code ZH Document Management System
Office of History Document Management System Using Code ZH Document The ZH Document (ZH DMS) uses a set of integrated tools to satisfy the requirements for managing its archive of electronic documents.
Main Research Gaps in Cyber Security
Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis
An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style
An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style Agenda A quick look at ManageEngine Tradi/onal Traffic Analysis Techniques & Tools Changing face of Network
Splunk and Big Data for Insider Threats
Copyright 2014 Splunk Inc. Splunk and Big Data for Insider Threats Mark Seward Sr. Director, Public Sector Company Company (NASDAQ: SPLK)! Founded 2004, first sohware release in 2006! HQ: San Francisco
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Security Challenges & Opportunities in Software Defined Networks (SDN)
Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products
Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks
Palo Alto Networks Cyber Security Platform for the Software Defined Data center Zekeriya Eskiocak Security Consultant Palo Alto Networks Evolution towards a software defined data center Server Virtualiza-on
Using Mobile to Capture In- the- Moment Insights
With the global leader in sampling and data services Using Mobile to Capture In- the- Moment Insights Saran Ganesh Director, Mobile product marke8ng 2015 Survey Sampling Interna6onal 1 During this webcast
SECURING YOUR MODERN DATA CENTER WITH CHECK POINT
SECURING YOUR MODERN DATA CENTER WITH CHECK POINT Javier Hijas Security Architect Check Point Europe 1 Agenda 1 2 3 4 What Questions is a modern / Answers datacenter Datacenter protection evolution Security
Privileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training
End- User Informa/on Security Awareness Training 1 Why Awareness Training? NCLM sanc:oned mul:ple Security Risk Assessments for a broad spectrum of member municipali:es The assessments iden:fied areas
Networked Virtual Spaces and Clouds. Magda El Zarki UC Irvine
Networked Virtual Spaces and Clouds Magda El Zarki UC Irvine Outline Introduc6on to Networked Virtual Environments (NVE) Networked Virtual Environment Architectures Quality of Experience Clouds and real
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections Abhinav Srivastava and Jonathon Giffin School of Computer Science Georgia Institute of Technology Attacks Victim System Bot
Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More
Copyright 2015 Splunk Inc. Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Stela Udovicic Sr. Product Marke?ng Manager Clayton
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
SDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar
SDN- based Mobile Networking for Cellular Operators Seil Jeon, Carlos Guimaraes, Rui L. Aguiar Background The data explosion currently we re facing with has a serious impact on current cellular networks
CONTENTS. Introduction... 3. Outlook at a glance... 3. Configure Outlook 2010 on-campus... 3. Creating Folders... 4. Sorting Emails...
OFFICE OF INFORMATION TECHNOLOGY Academic Technology Unit Microsoft Outlook 2010 Basics Workbook CONTENTS Introduction... 3 Outlook at a glance... 3 Configure Outlook 2010 on-campus... 3 Creating Folders...
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
Google Cloud Print Guide
Google Cloud Print Guide Version A ENG Definitions of notes We use the following note style throughout this user s guide: Notes tell you how you should respond to a situation that may arise or give tips
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Splunk for Networking and SDN
Copyright 2013 Splunk Inc. Splunk for Networking and SDN Stela Udovicic Senior Product Marke?ng Manager, Splunk #splunkconf Legal No?ces During the course of this presenta?on, we may make forward- looking
IT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
NFPA 70E: What Contractors and Employers Need to Know
2014 NFPA Conference & Expo NFPA 70E: What Contractors and Employers Need to Know Presented by: Michael J. Johnston Execu
Adobe Marketing Cloud Bloodhound for Mac 3.0
Adobe Marketing Cloud Bloodhound for Mac 3.0 Contents Adobe Bloodhound for Mac 3.x for OSX...3 Getting Started...4 Processing Rules Mapping...6 Enable SSL...7 View Hits...8 Save Hits into a Test...9 Compare
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in
The Data Reservoir. 10 th September 2014. Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons
Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Solu4ons The Reservoir 10 th September 2014 A growing demand Business Teams want Open access to more informa4on More
Using Outlook Web Access
Using Outlook Web Access Log on JTSA Outlook Web Access 1. Enter the following URL into the address bar on your web browser (Internet Explorer recommended) and press enter http://exweb.jtsa.edu 2. The
GroupWise to MS Outlook 2007
GroupWise to MS Outlook 2007 "GroupWise to MS Outlook 2007" The following is a list of GroupWise features with the equivalent names and brief instructions for performing similar actions in Microsoft Outlook.
Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months
Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months Our program is a practical knowledge oriented program aimed at making innovative and attractive applications for mobile
VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
Google Cloud Print Guide
Google Cloud Print Guide Version A ENG Definitions of notes We use the following note style throughout this user s guide: Notes tell you how you should respond to a situation that may arise, or give tips
BadUSB On accessories that turn evil
BadUSB On accessories that turn evil Karsten Nohl Sascha Krißler Jakob Lell SRLabs Template v12 Demo 1 USB s&ck takes over Windows machine 2 Agenda
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com 2 Fraud Prevention for Endpoints KASPERSKY FRAUD PREVENTION 1. Ways of Attacking The prime motive behind cybercrime is making money, and today
What Role Does Hardware Design Have to Play in Cybersecurity? Srini Devadas Massachuse0s Ins2tute of Technology
What Role Does Hardware Design Have to Play in Cybersecurity? Srini Devadas Massachuse0s Ins2tute of Technology Agenda Cyber threats today Defensive strategies Role of hardware design Research direc=ons
Cloud Compu)ng: Overview & challenges. Aminata A. Garba
Cloud Compu)ng: Overview & challenges Aminata A. Garba Outline I. Introduc*on II. Virtualiza*on III. Resources Op*miza*on VI. Challenges 2 A Historical Note 1960, the idea of organizing computa)on as a
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
The Seven Habits of State-of-the-Art Mobile App Security
#mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App
Email at Bradford - Outlook
This document provides guidance for staff using Office 365 with Microsoft Outlook 2010 for email at the University of Bradford. The University of Bradford retains copyright for this material, which may
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Some Security Challenges of Cloud Compu6ng. Kui Ren Associate Professor Department of Computer Science and Engineering SUNY at Buffalo
Some Security Challenges of Cloud Compu6ng Kui Ren Associate Professor Department of Computer Science and Engineering SUNY at Buffalo Cloud Compu6ng: the Next Big Thing Tremendous momentum ahead: Prediction
WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
M100 System File Manager Help
Copyright (c) Vuzix Corporation 2013-2014. All Rights Reserved. M100 System File Manager Help Section I) Installation of the M100 Section II) General Information Section III) Troubleshooting Section IV)
Software design (Cont.)
Package diagrams Architectural styles Software design (Cont.) Design modelling technique: Package Diagrams Package: A module containing any number of classes Packages can be nested arbitrarily E.g.: Java
GUJARAT TECHNOLOGICAL UNIVERSITY
GUJARAT TECHNOLOGICAL UNIVERSITY Seminar on Intrusion Detection for Hypervisor- Based Cloud Computing Infrastructure by Dr. Rajeev Agrawal, North Carolina A&T State University, USA GTU s PG Research Center
Internet Storage Sync Problem Statement
Internet Storage Sync Problem Statement draft-cui-iss-problem Zeqi Lai Tsinghua University 1 Outline Background Problem Statement Service Usability Protocol Capabili?es Our Explora?on on Protocol Capabili?es
Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones
Network Security Security in Compu5ng, Chapter 7 Topics l Network AAacks l Reconnaissance l AAacks l Spoofing l Web Site Vulnerabili5es l Denial of Service l Network Defences l Firewalls l Demilitarised
