New Security Perspective for Virtualized Platforms
|
|
|
- Christine Goodwin
- 9 years ago
- Views:
Transcription
1 , July 3-5, 2013, London, U.K. New Security Perspective for Virtualized Platforms Abdelmajid Lakbabi, Said El hajji, Ghizlane Orhanou, Kaouthar Chetioui Abstract Recently, an important transition in IT infrastructure and delivery services occurs, based on the virtualization technology, cloud computing becomes the key for any successful information technology solution. Unfortunately, This success will brings fundamental changes in the classic network security concepts and implementation, since in virtualized environment, components are no longer considered as a separate systems, but resources, data and applications, are seen as services with no visible security perimeter, from this perspective, new adapted security approach to protect such environment is needed; Each physical security solution, like firewalls, intrusion prevention system and network access control, will have a corresponding that fits in the virtual platform, with automation capabilities to monitor, assess network traffic and stop threats accurately. The perspective of this paper is to propose a deep study of the virtualized platform, especially the hypervisor and the inter-virtual machines communications enumerates some of its important security concerns, then propose a solution to secure it. We will present the virtualized architecture, analyze its vulnerabilities and integrate it with virtual Firewall, virtual Intrusion Prevention Systems, and add NAC capabilities to protect the entire virtual environment. Index Terms Hypervisor, virtual Firewall, virtual IPS, virtual Switch, vulnerability exploit, NAC I. INTRODUCTION The virtualization [1] consists of the creation of many virtual resources from one physical resource. It materializes the use of virtual machines to let multiple network subscribers maintain individualized desktops and servers on a single, centrally located hardware machine that is generally located at a data center. Users may be geographically scattered but are all connected to the central machine by a proprietary local area network (LAN) or wide area network (WAN) or the Internet. a. Virtualization concept From an IT point of view, it is the ability to run multiple operating systems on a single physical system and share the underlying hardware resources. Abdelmajid Lakbabi is a Doctoral Student of Laboratory of Mathematics, Computing and Applications, Faculty of sciences, University of Mohammed V-Agdal, BP.1014 RP. Rabat, Morocco (Author s [email protected], Coauthor s [email protected], [email protected], [email protected]) b. Virtualization components Host or hypervisor: the machine that hosts other virtual machines using virtualization software. It can run virtual machines whose operating systems differ from that of the host machine. It manages multiple operating systems (or multiple instances of the same operating system) on a single computer system. The hypervisor manages the system's processor, memory, and other resources to allocate what each operating system requires. VMs: A virtual machine (VM) is a software implementation of a computing environment in which an operating system (OS) or a program can be installed and run. VMM: Virtual Machine Monitor, a software layer that creates and maintains the Virtual Machine environment. Virtual Switch (vswitch): A virtual switch is simply a core L2 forwarding engine that does VLAN tagging, stripping, filtering, L2 security, checksum, segmentation offload units, and many other tasks that are done by Physical Switchs (pswitches) in Physical networks (pnetworks), essentially: Models a physical Ethernet switch Connects VMs (Virtual machines ) to Uplink adapters Combines the bandwidth of multiples network adapters and balances traffic among them and handles physical NIC failover. Forward traffic between VMs and links to external networks. There are two types of virtual Switchs: Virtual standard Switch: A software-based switch that resides in the virtualized host kernel and provides traffic management for VMs; Administrators must manage vswitchs independently on each virtualized host. Virtual Distributed Switch: A software-based switch that resides in the virtualized host kernel and provides traffic management for VMs. Distributed vswitchs are shared by and managed across entire cluster of virtualized hosts.
2 , July 3-5, 2013, London, U.K. vnetwork: Virtual Network that contains all the VMs, vswitchs, and virtual systems connected all together using virtual network interfaces. II. VIRTUALIZATION AND NETWORKING ENVIRONMENT Virtualization is revolutionizing the data center, delivering capacity escalation and flexible utilization when improving productivity. It is also changing the network by adding a rapidly growing virtual network of virtual machines (VMs) connected to each other and to the physical network through virtual switches. Then, local switching is required between different VMs within the same server, with other hypervisor s VMs and with the physical network as well. This feature is provided using a software-based virtual switch. From a security perspective, we need to study the vulnerability vectors and surface attacks to understand the risks and propose solution when connecting such virtualized network to the physical network and the cloud [2]. Fig. 1. Virtualized network architecture A. Virtualized plateform vulnerabilties Hosting multiple components on one physical system, leads to greatly increase the potential impact if an attacker gains physical access to that host system or lunch an arp based attack or a denial of service against it. Since each Hypervisor held hudred of VMs with eachone has its own Operating System and its own vulnerabilities, each succefull attack againt the Hypervisor, will lead to compromise all the VMs inside it. B. The hypervisor attack surface Virtualized plateforms are vulnerable to all types of attacks for normal infrastructures. However, security is a greater challenge as virtualization adds more points of entry and more interconnection complexity. The hypervisor present to the guest VM a view that appears as though the VM s operating system and applications are running directly on the hardware. The hypervisor achieves this by emulating the underlying hardware and arbitrating access to it. Realizing this functionality requires a complex software routines that require a frequent interaction between the guest VMs and the hypervisor. This interaction is a security threat which a malicious VM can utilize to attack the hypervisor and exploit bugs in the hypervisor or to attack another VM inside the hypervisor. Unlike physical servers, virtualized systems have two boundaries: 1. Physical boundarie security Within the Data Link layer of the TCP/IP protocol stack, Address Resolution Protocol (ARP) is used convert IP addresses to Media Access Control (MAC) addresses, to assure computers communication in a Local Area Network (LAN). When a node wants to send data, it refers to the ARP cache to find out the MAC address corresponding to the target IP address. ARP implementations update their cache of ARP to IP mappings whenever a reply is received. If the MAC address reported in the packet for the given IP has changed, the new value will overwrite the old one. That way makes possible many sorts of attacks based on the man in the middle attack technique, by sending an ARP reply packets to perform ARP cache poisoning against the VMM that represents the management channel of the hypervisor. This attack scenario will start by sending an ARP reply to the VMM ( the hypervisor managemnt interface ) stating that management client s IP maps to attacker s MAC address, and another ARP reply to that management client stating that VMM s IP maps to attacker s MAC. Since ARP is a stateless protocol, the VMM and the management client B assume they sent a ARP request at some point in the past and update their ARP caches with this new information. We propose at this point to use an ARP Poisoning that is the basis of more complex attacks, by sending an ARP reply packets to perform ARP cache poisoning against the VMM that represents the management channel of the hypervisor. Many higher level protocols such as IP, TCP and even SSL depend on ARP. The inherent weakness in the ARP protocol directly affects the security of these higher level protocols. As we have seen, these attacks are relatively simple to employ, as there are a wide variety of automated tools available, while any defense against them is minimal. Security measures such as switched networks and hard coded ARP tables do not offer great protection against ARP poisoning attacks. To deal with such attacks, a security layer should be added: EAP-TLS Transport Layer Security. EAP TLS is one of the most commonly implemented EAP type for securing LANs through a RADIUS Server. Each machine must have a certificate that a RADIUS server can validate. Likewise, the RADIUS server must have a
3 , July 3-5, 2013, London, U.K. certificate that the server can validate. This is referred to mutual authentication. This is true if both parties can validate the other s certificate. This is typically done by having both certificates issued by one Certificate Authority (CA), and for each party to have the CA s certificate. Pros: Client 802.1x is included in Windows and Linux operating systems EAP-TLS is resilient to man-in-the-middle attacks It provides explicit mutual authentication between the workstation and RADIUS server Cons: Requires the complexity and expense of a CA to support the workstation and RADIUS server authentication Requires certificate distribution and administration 2. Virtual boundarie security The biggest challenges after securing the Hypervisor is to maintain and secure all of the VMs, since many instances and configurations can be rapidly created or modified. Hypervisors can allow VMs to communicate amongst themselves, and this communication will not even go onto the physical network and can t always be seen as it s carried by the hypervisor, then it is not easy to secure it. The contents of each guest OS is a virtual disk, stored as a file. If this file is accessed, copied, or modified on the host by an unauthorized party, then the privacy and integrity of the VM is compromised. Likewise, if an attacker accesses the host and directly modifies the hypervisor, then he will be able to run arbitrary code. The vulnerability in the hypervisor (or configuration) allows any virtual guest to break out into the host environment and affect other virtual guests. Inter-VMs communication refers to connection between coresident virtual machines in a physical machine. A efficient communication is expected because the hardware is shared including disks, memory and others. Therefore, the hypervisor should strictly control communication between VMs and limit resource consumption of each VM to a finite bound and to prevent attacks on vulnerabilities of VMs. So, but it is absolutely essential to secure the host and each guest OS in order to create a secure virtual environment, Inter-VM communication traffic never touches the physical network, making it invisible to physical network monitoring tools and unprotected by physical network security. Uncontrolled network with no enforceable security policies is a big concern. Since there is the potential for privilege escalation when VM workloads with different trust levels. This risk is amplified when VMs move from a host to another. To resume, Virtual networks can be configured to be completely isolated from all other virtual and physical networks. Or, if necessary, they can be configured to have limited isolation on the network until the point of connection to the physical network as detailed below: Network isolation To configure a virtual machine to have complete network isolation, each virtual machine must be assigned to only one internal virtual network. This virtual network must be configured so that it does not use a physical network adapter. Once a virtual network is attached to a physical network adapter, it is exposed to the same security risks as that physical network adapter. Network packet isolation Virtual machines should not intercept network packets from the host operating system. Similarly, the host operating system should not intercept network packets from a virtual machine. This isolation is enforced by the virtual machine network services driver, which determines whether a network packet is routed to the host operating system or to a virtual machine III. NETWORK ACCESS CONTROL FOR VIRTUALIZED NETWORK Virtualization breaks traditional security models by creating new attack surfaces--guest-to-guest, guest-tohypervisor, network/external-to-hypervisor. It introduces another switch layer into the network topology, the vswitch that is invisible to traditional network security techniques and products. As detailed above, access controls and proper network segmentation are key requirements in many compliance mandates. Indeed, creating network boundaries and enforcing traffic flow among distinct network segments are a security best practice that should be considered fundamental to securing both physical and virtual environment. Specific threat vectors include exposure of traffic to attackers and sniffers, as well as common network-based attacks such as spoofing and man-in-the- middle. We intend to virtual network components within virtualized network and a number of security settings impacting traffic flows among the host and virtual guests. With the increasing use of the virtualization and the cloud computing concepts, it becomes necessary to think about efficient solutions to ensure the virtual environment security. In this section, we will propose our vision to securing the virtual networks by using virtual security solution for virtual platforms. We propose a distributed solution to add NAC[3] mechanism to protect the hypervisor itself and the VMs from network attacks, based on the Access control technology and deep inspection solution to inspect traffic inter VM and traffic between the hypervisor and physical switchs. This will allow us to: Manage flows Control the virtual and physical switches Manage and control access for users and machines Tracking malware source and locate it quickly
4 , July 3-5, 2013, London, U.K. The virtual firewall and IPS/IDS use adapteded technology to meet the virtual environment security challenges; by enforcing a rule-based policy for each VM, such virtualized network control, is based on a well designed security architeture, to inspect trafic inside virtual plateforms, and inter-vm traffic. To achieve this high security level, Access Control features should be implemented to strengthen the isolation between virtual images, and allow VMs to run in a separate security context, with the appropriate policy. VLANs should be used to isolate traffic from one customer VM to another customer VM. This requires VLANs to be extended beyond the core switching infrastructure. There could be an issue with scaling VLAN capabilities to support very large clouds. At this point, we will study, in the following subsection, virtual network architecture to understand the security issues inside such environment. Then we will propose the implementation of such open source platform, based on a virtual Firewall, Virtual IPS/IDS and a NAC policy server in order to mitigate the attacks against the hypervisor end secure the communication inter-vms. A. The proposed solution components Our proposed solution is based on the following security components: Virtual Firewall Virtual IPS NAC policy server It controls the access between security zones within the virtual or cloud environments using policy rules. For higher end workloads, there is quite a bit more architecture to be done to make use of a virtual firewall, as there are limits with nearly any technology. 2. Virtual Intrusion prevention/detection system The IDS mode is used for aggregating network traffic from multiple physical and virtual traffic sources, such as switches and Wire TAPs, into one centralized IDS sensor or IDS cluster. In such case, IDS is able to restrict traffic by sending resets or requesting a firewall or Inline IPS to isolate the segment from other networks using a blacklisting mechanism. When we have to protect large Local Area Network (LAN) segments, IPS mode is good to block attacks, since it is able to identify a clear threat path, such the case of traffic from an Internet attacker to DMZ segment.. 3. Virtual NAC Policy Server The IPS/IDS system will observe the network traffic and notify the NAC server in case potential suspicious network activities are detected. For this reason, we use an IPS/IDS VM in such a way that it is acting as IPS virtual appliance. It sends alerts to the NAC server based upon malicious traffic that was observed, and then NAC server changes the corresponding switch port vlan to contain the potential risk. B. How the proposed security solution works Basically this is an open source solution, and each component handles a specific task in order to detect and prevent network attacks. The NAC policy server supervise, assure the correlation of decision based on the traffic inspection result, and administer the switch accordingly The Firewall implements the policy access rules to prevent unauthorized access. The open source IPS/IDS snort is composed of different components; each one is responsible for a particular task in the prevention and detection process: 1. Virtual Firewall 1. Sniffer: Packet Sniffer Taps into network; 2. Preprocessor: examine packets for suspicious activity 3. Checks against plug-ins 4. Port scanner plug-in 5. Detection Engine: the snort intrusion detection process based on : Snort signature-based Implemented via rule-sets Rules: the rules header contain some important information like Action to take, Type of packet, Source, destination IP address, etc.
5 , July 3-5, 2013, London, U.K. 6. Alert Logging: this module is responsible to trigger warning and alert to the NAC policy Server that administer the Switch using snmp and order it to stop or limit the access for the suspected VM. LAB and experimentation The proposed solution is based on following free products: o Snort [4] o Vmware ESX [5] o Iptables [6] C. Cloud Security Identity-based Policy Enforcement It is particularly challenging to define granular user roles, to do separation of network administrator from server administrator, and access policies across a distributed, virtualized environment. The risks of failing to properly define roles and access policies are significant because access to the hypervisor can potentially provide broad access to key infrastructure components (including switches, firewalls, payment applications, log aggregation servers, databases, etc.). Because of the increased accessibility to multiple virtual devices and functions from a single logical location or a user, monitoring and enforcement of appropriate separation of duties is crucial in a virtual environment. IV. CONCLUSION Our proposition aims to reduce the risk and the attack surface, but it doesn't fix all security issues, especially that related to users identity in the cloud. In addition to this, there is the lack of hypervisor-vm visibility, accountability, and consistency of the management model, to effectively troubleshoot roles and responsibilities inside virtualized platforms. Such important security feature still presenting a security challenge for the virtualization and cloud technology. As a perspective, we count to extend our future work to this security area. REFERENCES [1] Dave Shackleford, Virtualization Security: Protecting Virtualized Environments book, Wiley, November [2] David Newman, Is Your Network Ready For Cloud Computing?, Cisco, [3] A. Lakbabi, G. Orhanou, S. El Hajji : Network Access Control Technology - Proposition to contain new security challenges, International Journal of Communications, Network and System Sciences, Vol. 5, No 8, August [4] Open Source Network Intrusion Prevention and Detection System, by Sourcefire April [5] Ruest, Danielle and Nelson Ruest, Virtualization: Beginner s Guide, McGraw Hill Books, 2009 [6] Open Source packet filtering software, by Core Team, March 2013.
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
5 Best Practices to Protect Your Virtual Environment
CONTENTS OF THIS WHITE PAPER Security Virtualization s Big Hurdle..1 Why Old-STyle Protections Fall short..2 Best Practices...3 Create A VM Service Good List... 3 Monitor and Protect the Hypervisor...
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
VMware: Advanced Security
VMware: Advanced Security Course Introduction Course Introduction Chapter 01 - Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge ESX Networking Components How Virtual Ethernet Adapters
Mitigating Information Security Risks of Virtualization Technologies
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.
Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Analysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic
VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of
ALTERNATIVES FOR SECURING VIRTUAL NETWORKS
White Paper ALTERNATIVES FOR SECURING VIRTUAL NETWORKS A Different Network Requires a Different Approach Extending Security to the Virtual World Copyright 2013, Juniper Networks, Inc. 1 Table of Contents
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
WHITE PAPER. Addressing Monitoring, Access, and Control Challenges in a Virtualized Environment
WHITE PAPER Addressing Monitoring, Access, and Control Challenges in a Virtualized Environment www.ixiacom.com 915-6892-01 Rev. A, July 2014 2 Table of Contents The Challenge of the Virtual Environment...
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Virtualization and Cloud Computing
Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing
TABLE OF CONTENTS NETWORK SECURITY 1...1
Network Security 1 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
FIREWALLS & CBAC. [email protected]
FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Security Overview of the Integrity Virtual Machines Architecture
Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
Overcoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 9 Firewalls and Intrusion Prevention Systems First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Firewalls and Intrusion
Own your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
Quantum Hyper- V plugin
Quantum Hyper- V plugin Project blueprint Author: Alessandro Pilotti Version: 1.0 Date: 01/10/2012 Hyper-V reintroduction in OpenStack with the Folsom release was primarily focused
PCI DSS Virtualization Guidelines. Information Supplement: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011
Standard: Version: 2.0 Date: June 2011 Author: PCI Data Security Standard (PCI DSS) Virtualization Special Interest Group PCI Security Standards Council Information Supplement: PCI DSS Virtualization Guidelines
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Does your Citrix or Terminal Server environment have an Achilles heel?
CRYPTZONE WHITE PAPER Does your Citrix or Terminal Server environment have an Achilles heel? Moving away from IP-centric to role-based access controls to secure Citrix and Terminal Server user access cryptzone.com
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Fall 2010 Sonja Buchegger [email protected] Lecture 6, Nov. 10, 2010 Firewalls, Intrusion Prevention, Intrusion Detection
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS
1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University [email protected] Abstract
Cisco Nexus 1000V Switch for Microsoft Hyper-V
Data Sheet Cisco Nexus 1000V Switch for Microsoft Hyper-V Product Overview Cisco Nexus 1000V Switches provide a comprehensive and extensible architectural platform for virtual machine and cloud networking.
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
Honeypot as the Intruder Detection System
Honeypot as the Intruder Detection System DAVID MALANIK, LUKAS KOURIL Department of Informatics and Artificial Intelligence Faculty of Applied Informatics, Tomas Bata University in Zlin nam. T. G. Masaryka
Broadcom Ethernet Network Controller Enhanced Virtualization Functionality
White Paper Broadcom Ethernet Network Controller Enhanced Virtualization Functionality Advancements in VMware virtualization technology coupled with the increasing processing capability of hardware platforms
FIREWALL AND NAT Lecture 7a
FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security
Database Security, Virtualization and Cloud Computing
Whitepaper Database Security, Virtualization and Cloud Computing The three key technology challenges in protecting sensitive data in modern IT architectures Including: Limitations of existing database
Blind as a Bat? Supporting Packet Decryption for Security Scanning
Sponsored by VSS Monitoring Blind as a Bat? Supporting Packet Decryption for Security Scanning November 2012 A SANS Whitepaper Written by: Dave Shackleford Options for SSL Inspection Page 2 Implementing
Introduction to Firewalls Open Source Security Tools for Information Technology Professionals
Introduction to Firewalls Open Source Security Tools for Information Technology Professionals School of Professional Studies (SPS) The City University of New York (CUNY) Aron Trauring Adjunct Professor
PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data
White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Five Steps For Securing The Data Center: Why Traditional Security May Not Work
White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain
Microsoft SQL Server 2012 on Cisco UCS with iscsi-based Storage Access in VMware ESX Virtualization Environment: Performance Study
White Paper Microsoft SQL Server 2012 on Cisco UCS with iscsi-based Storage Access in VMware ESX Virtualization Environment: Performance Study 2012 Cisco and/or its affiliates. All rights reserved. This
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
8. Firewall Design & Implementation
DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or
Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop
White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization
Meeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Top virtualization security risks and how to prevent them
E-Guide Top virtualization security risks and how to prevent them There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent
Technical Note. ForeScout CounterACT: Virtual Firewall
ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
Programmable Networking with Open vswitch
Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads
