Using Dust Clouds to Enhance Anonymous Communication
|
|
|
- Julian Sherman
- 10 years ago
- Views:
Transcription
1 Using Dust Clouds to Enhance Anonymous Communication Richard Mortier 1, Anil Madhavapeddy 2, Theodore Hong 2, Derek Murray 2, and Malte Schwarzkopf 2 1 Horizon Digital Economy Research Sir Colin Campbell Building, Triumph Road Nottingham NG7 2TU, UK [email protected] 2 University of Cambridge 15 JJ Thomson Avenue Cambridge CB3 0FD, UK [email protected] 1 Introduction Cloud computing platforms, such as Amazon EC2 [1], enable customers to lease several virtual machines (VMs) on a per-hour basis. The customer can now obtain a dynamic and diverse collection of machines spread across the world. In this paper we consider how this aspect of cloud computing can facilitate anonymous communications over untrusted networks such as the Internet, and discuss some of the challenges that arise as a result. Most anonymous networks act as a mix network, creating hard-to-trace communications by using chains of proxy servers. For example, Mixmaster 3 is an anonymous r er based on the mix-net protocol [2], MorphMix [10] is a peerto-peer circuit-based mix network, and the popular Tor [4] network is onion routed. Tor faces a major challenge: the pool of nodes available to route other people s traffic is limited. Individuals often desire anonymity for their communications, but they may be unwilling to route other (potentially illegal) traffic through their personal machines, and expose themselves to legal action in doing so. In addition, user-provided nodes are often short-lived and unreliable because they run on home machines or laptops, which can only route traffic when they are powered on and connected to the Internet. In this position paper, we introduce the concept of a dust cloud: a dynamic set of short-lived VMs that run on cloud computing platforms and act as Tor nodes. Users can join a dust cloud when they require anonymous communication, and incur charges only while participating. We outline the core architecture and benefits of dust clouds ( 2), before considering some of the challenges for successful adoption of dust clouds and suggesting avenues for development and research ( 3). 3
2 2 Dust Clouds A'' X A' X X B' Host A Host B Fig. 1. Dynamic VM-based Tor nodes in the cloud. Host A spawns two VMs (A and A ) and Host B spawns a single VM (B ). All VMs are full Tor routers. To use a dust cloud, we assume that users have access to public cloud computing facilities, e.g., Amazon EC2 or Rackspace. When a user wants to communicate anonymously, they spawn one or more dust motes, cloud VMs that run Tor and are configured to survive for fixed periods of time (possibly all different). These Tor nodes receive the user s traffic as possible ingress points, as well as routing for other nodes as normal. When the user finishes communicating via a particular dust mote, they disconnect from it, leaving it to continue routing other traffic until its allotted time expires and it is destroyed. 4 How is this better than the existing model of the user s host directly acting as a router? Privilege Separation. It is no longer the user s host computer that routes other traffic in the Tor network, but their dust motes instead. In case of, for example, complaints about abuse originating from the user s Tor node [8], the user can terminate the dust mote and demonstrate from the code image (also hosted on the cloud) that the offending traffic came from a participant in the mix network. This is considerably more difficult to do when Tor is installed directly on a personal computer, which typically have multiple applications that can generate traffic. Privilege separation also makes it more convenient for users to run exit routers, an important benefit as the Tor network currently suffers from a lack of exit bandwidth. 4 A real-world analogue uses ionization trails of meteors during atmospheric entry to establish short-lived communications paths [7].
3 Storage Separation. A dust mote can run independent processing and has some storage, enabling it to buffer traffic to improve mixing. Doing this efficiently requires protocol proxies inside the dust mote that understand the application traffic to some extent. For example, an SMTP proxy could receive , and hold it for a random amount of time before passing it along to the next Tor node. Crucially, this delay does not require the user to be online and connected the dust mote continues running for its allotted time without the original user being connected. Processor Separation. Running proxies alongside nodes enables other interesting use models. Streaming large video files is currently impractical since the regular traffic patterns and limited node bandwidth make anonymising the paths difficult. Viewing a long video or, more generally, performing any long-lived transfer over Tor makes it easier for an adversary to perform a timing correlation attack. If the user requests the content in advance, the dust mote can cache the content from the origin server. The user then re-connects to Tor and retrieves the content for offline viewing anonymously, but without having to be online while it is assembled. Similar methods work for PDF files (HTTP range requests) and peer-to-peer networks, since the dust mote s local storage can serve as a buffer. For the truly paranoid, the dust mote could even connect to Freenet [3] to store its data. One extremely useful combination of streaming and clouds might be to provide anonymous audio, and even video, conferences. Self-organising transcoding systems have been proposed to let real-time audio scale with network capacity in multicast trees [6]. These can be adapted for scaling with anonymity in mind, by introducing jitter when routing audio to the participants so that everyone receives a slightly different signal. The CPU capacity for this would be provided by dust motes owned by those participating in the call. Usage Accounting. Each dust mote that the user creates is paid for, and helps to grow the network as well as anonymise that user s traffic. Thus, a heavy user will naturally pay more by spawning more dust motes, and since these dust motes must route other user s traffic in order to preserve anonymity, it also helps to grow the network as a whole. Ease of Use. The provision of pre-configured VM templates makes it easy to create and destroy Tor nodes in the cloud. Ease of use is important for mix networks in order to grow the set of users, and hence the size of the anonymity set and the relay bandwidth available. Using pre-defined templates which can clearly be shown to act only as Tor nodes and not to manipulate the data also helps to achieve plausible deniability. 5 5 There are cases of arrests due to running Tor exit nodes, e.g., 5WAflQ.
4 3 Challenge/Response Cloud computing is a promising platform for a mix network such as Tor, but it also presents several interesting challenges. In this section, we discuss some of these challenges, and suggest potential mitigations wherever possible. 3.1 Longevity Challenge. Dust motes are relatively short-lived and exhibit a high churn rate. This can disrupt Tor usage: a dust mote might be terminated while still in use as a relay. Response. As a cloud VM s lifetime is paid for and fixed ahead of time, dust motes can advertise their scheduled termination time, allowing users to manage the effects of termination. Tor circuits are pre-emptively constructed and rotated frequently, so clients can stop using a dust mote that is about to shut down without disruption. Indeed, in many ways the predictable life expectancy of dust motes makes the cloud a more suitable platform for Tor than personal computers, which may be turned off at any time without warning. 3.2 Diversity Challenge. There are two associated diversity challenges for the dust cloud, provider and geographic. At present there are relatively few significant cloud computing providers such as Amazon or Rackspace, and these major providers have restricted geographical diversity and hence applied jurisdiction of their datacenters. For example, Amazon EC2 has datacenters in only three regions: California, Virginia, and Ireland. Both effects make it relatively easy to monitor or block access to the cloud for a set of users. Response. In response we note that there is a similarly limited number of major ISPs, and as cloud computing takes off we can expect the number of cloud computing providers to increase from its current level. Indeed, previous studies of location diversity [5] have indicated that the best places for nodes may be at points that are connected to a large number of other ASes. Cloud providers are likely to be positioned at such locations in order to provide good network connectivity to their customers. 3.3 Billing Challenge. As cloud instances are paid for by users, billing records may provide a way to link individuals with their dust motes.
5 Response. We note that the same is also true for residential ISP connections and standard use of Tor. This effect could be mitigated in at least two ways. First, by building an exchange where users can swap access to dust motes. For example, user A pays for one dust mote but allows user B to use it as a cloud node, while user B pays for a different dust mote but allows user A to use it. Second, by providing coarse-grained pre-payment options so that users detailed usage need not be tracked by the cloud provider. If the user then multiplexes legitimate use of cloud nodes with their use as dust motes, it may help them to attain plausible deniability. 3.4 Traffic Mixing Challenge. As the number of dust motes might easily scale in proportion to the number of users, it could be difficult to ensure a sufficiently rich mix of traffic to provide effective hiding. Response. Again, we propose two ways in which this can be addressed. First, by establishing the market proposed above for dust motes, in order to restrict the dust cloud s rate of scaling and ensure that, while providing acceptable service, it does not scale up so fast that the level of mixing is too low. Second, by using the fact that dust motes have compute and storage available to generate spurious mix-in traffic. Doing this effectively is an open problem, but the extra resources available to dust motes might make it more tractable in this environment. 3.5 Attack by the Cloud Provider Challenge. Having both physical access to the cloud VMs and control of the virtualization stack, the cloud provider can potentially inspect a dust mote s memory and storage, compromising private keys and modifying code [9]. Response. There are two layers of trust here: (i) the provider controls the host machine and can inspect memory, network and disk; and (ii) other users on the same cloud infrastructure may snoop on traffic via timing attacks [11]. At some level protecting against the provider is impossible to prevent: with physical access to both computing and network infrastructure, the provider can do anything it so chooses without the user even being aware. In order to mitigate the second risk, we require some cooperation from the provider. By using trusted computing techniques [12] or disaggregating the virtualization stack [9], the provider can limit the opportunity for compromise. In practice, the user can make it more difficult for a particular provider to compromise the system (i) by ensuring diversity in placement among their set of dust motes; (ii) by frequently and randomly hopping dust motes between cloud nodes; and (iii) by taking care with items such as private keys, e.g., avoiding storing them on the disk to which they are applied. We believe one of the biggest
6 dangers to anonymity in Tor remains the shortage of exit nodes and the possibility of malicious snooping on them [13]: a dust cloud would greatly increase their number and help mitigate this problem. We would like to thank Christian Kreibich, Alastair Beresford and Jon Crowcroft for useful discussions on this paper. References 1. Amazon EC D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84 88, Feb I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. Lecture Notes in Computer Science, 2009:46 66, R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium. USENIX Association, N. Feamster and R. Dingledine. Location diversity in anonymity networks. In Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pages ACM, I. Kouvelas, V. Hardman, and J. Crowcroft. Network adaptive continuous-media applications through self organized transcoding. In Proceedings of the 8th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pages , K. Mahmud, K. Mukumoto, and A. Fukuda. Development of MBC System Using Software Modem. IEICE Transactions on Communications (Special Issue on Software Defined Radio and its Technologies), pages , D. Mccoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker. Shining Light in Dark Places: Understanding the Tor Network. In Proceedings of the 8th International Symposium on Privacy Enhancing Technologies, pages Springer- Verlag, D. G. Murray, G. Milos, and S. Hand. Improving Xen security through disaggregation. In Proceedings of the 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pages ACM, M. Rennhard and B. Plattner. Practical anonymity for the masses with MorphMix. In Proceedings of the Financial Cryptography Conference (FC 2004), pages , Key West, USA, Feb T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security, pages ACM, N. Santos, K. P. Gummadi, and R. Rodrigues. Towards Trusted Cloud Computing. In Proceedings of the 1st USENIX Workshop on Hot Topics in Cloud Computing, Berkeley, CA, USA, USENIX Association. 13. L. Sassaman. The Faithless Endpoint: How Tor puts certain users at greater risk. Technical Report , ESAT-COSIC, 2007.
Personal Containers: Yurts for Digital Nomads 1
Personal Containers: Yurts for Digital Nomads 1 Malte Schwarzkopf, Anil Madhavapeddy, Theodore Hong, Richard Mortier University of Cambridge Computer Laboratory 15 JJ Thomson Avenue Cambridge CB3 0FD [email protected]
Internet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, [email protected],
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE IN THIRD-PARTY COMPUTE CLOUDS T. Ristenpart, H. Shacham, S. Savage UC San Diego E. Tromer MIT CPCS 722: Advanced Systems Seminar Ewa Syta GET
Detecting Denial of Service Attacks in Tor
Detecting Denial of Service Attacks in Tor Norman Danner, Danny Krizanc, and Marc Liberatore Department of Mathematics and Computer Science Wesleyan University Middletown, CT 06459 USA Abstract. Tor is
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks Rungrat Wiangsripanawan, Willy Susilo and Rei Safavi-Naini Center for Information Security School of Information
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage
Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage UCSD MIT UCSD UCSD Today s talk in one slide Third-party
Tor Anonymity Network & Traffic Analysis. Presented by Peter Likarish
Tor Anonymity Network & Traffic Analysis Presented by Peter Likarish This is NOT the presenter s original work. This talk reviews: Tor: The Second Generation Onion Router Dingledine, Mathewson, Syverson
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
TOR (The Onion Router)
TOR (The Onion Router) TOR (The Onion Router) is a free software implementation of second generation onion routing a system enabling its users to communicate anonymously on the Internet. Originally sponsored
The Evolution of Application Acceleration:
WHITE PAPER The Evolution of Application Acceleration: From Server Load Balancers to Application Delivery Controllers www.crescendonetworks.com Corporate Headquarters 6 Yoni Netanyahu Street Or-Yehuda
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Cloud computing security
Cloud computing security Exploring information leakage in third-party compute clouds Yangchun Fu November 18 th, 2011 Outline 1 Introduction 2 EC2 cloud cartography 3 Co-residence 4 side-channel cross-vm
Storm Clouds Rising: Security Challenges for IaaS Cloud Computing
Storm Clouds Rising: Security Challenges for IaaS Cloud Computing Brian Hay Kara Nance Matt Bishop Department of Computer Science Department of Computer Science Department of Computer Science University
CIT 668: System Architecture
CIT 668: System Architecture Cloud Security Topics 1. The Same Old Security Problems 2. Virtualization Security 3. New Security Issues and Threat Model 4. Data Security 5. Amazon Cloud Security Data Loss
Chapter 19 Cloud Computing for Multimedia Services
Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5
Proxy Services: Good Practice Guidelines
Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance Prog. Director Mark Ferrar Owner Tim Davis Version 1.0 Author James Wood Version Date 26/01/2006 Status APPROVED Proxy Services:
Monitoring the I2P network
Monitoring the I2P network Juan Pablo Timpanaro, Isabelle Chrisment*, Olivier Festor INRIA Nancy-Grand Est, France *LORIA - ESIAL, Henri Poincaré University, Nancy 1, France Abstract. We present the first
A Case Study on Measuring Statistical Data in the Tor Anonymity Network
A Case Study on Measuring Statistical Data in the Tor Anonymity Network Karsten Loesing 1,StevenJ.Murdoch 1,2, and Roger Dingledine 1 1 The Tor Project 2 Computer Laboratory, University of Cambridge, UK
Cyber Crime Scene Investigations (C 2 SI) through Cloud Computing
Cyber Crime Scene Investigations (C 2 SI) through Cloud Computing Xinwen Fu University of Massachusetts Lowell [email protected] Zhen Ling Southeast University, China zhen [email protected] Wei Yu Towson
The Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
Network performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
Debugging With Netalyzr
Debugging With Netalyzr Christian Kreibich (ICSI), Nicholas Weaver (ICSI), Boris Nechaev (HIIT/TKK), and Vern Paxson (ICSI & UC Berkeley) 1 What Is Netalyzr?! Netalyzr is a comprehensive network measurement
Top virtualization security risks and how to prevent them
E-Guide Top virtualization security risks and how to prevent them There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced
Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing Nicholas Jones, Matvey Arye, Jacopo Cesareo, and Michael J. Freedman Princeton University Abstract Internet censorship and surveillance
Examining Proxies to Mitigate Pervasive Surveillance
Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract The notion of pervasive surveillance assumes that it is possible for an attacker to have access to all links and
Security Issues On Cloud Computing
Security Issues On Cloud Computing Pratibha Tripathi #1, Mohammad Suaib #2 1 M.Tech(CSE), Second year 2 Research Guide # Department of Computer Science and Engineering Abstract Integral University, Lucknow
Peer-to-Peer Networks Anonymity 9th Week
Peer-to-Peer Networks Anonymity 9th Week Department of Computer Science 1 Motivation Society Free speech is only possible if the speaker does not suffer negative consequences Thus, only an anonymous speaker
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Anonymity & Monitoring:
Anonymity & Monitoring: How to Monitor the Infrastructure of an Anonymity System Martin Mulazzani 1, Markus Huber 2, and Edgar Weippl 3 1 Security Research, Vienna, Austria [email protected]
Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)
1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication
MOR: Monitoring and Measurements through the Onion Router
MOR: Monitoring and Measurements through the Onion Router Demetris Antoniades 1, Evangelos P. Markatos 1, and Constantine Dovrolis 2 1 Institute of Computer Science Foundation for Research & Technology
PineApp TM Mail Encryption Solution TM
PineApp TM Mail Encryption Solution TM How to keep your outgoing messages fully secured. October 2008 Modern day challenges in E-Mail Security Throughout the years, E-Mail has evolved significantly, emerging
Efficient Data Management Support for Virtualized Service Providers
Efficient Data Management Support for Virtualized Service Providers Íñigo Goiri, Ferran Julià and Jordi Guitart Barcelona Supercomputing Center - Technical University of Catalonia Jordi Girona 31, 834
Towards Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms. Mobilware 2010
Towards lication Model for Augmenting Computing Capabilities of Mobile Platforms Mobilware 2010 Xinwen Zhang, Simon Gibbs, Anugeetha Kunjithapatham, and Sangoh Jeong Computer Science Lab. Samsung Information
IP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
Dynamic Resource allocation in Cloud
Dynamic Resource allocation in Cloud ABSTRACT: Cloud computing allows business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Testing & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
Managing Central Monitoring in Distributed Systems
Managing Central Monitoring in Distributed Systems White Paper Author: Daniel Zobel, Documentation and Support at Paessler AG Published: August 2010 PAGE 1 OF 11 Contents Introduction... 3 The probe principle
Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access
Covert Channels Covert Channels Tunnels that are used to bypass filters and intrusion detection systems Use traffic that is thought to be something else (i.e. DNS tunnels) Can also provide encryption (i.e.
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,
Data Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
Internet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, [email protected] Ling Guan, [email protected] 1 Outline Internet video streaming Overview Video coding Approaches for video
Introduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, [email protected] - Add-on material included of Peterson, Davie: Computer Networks February
Geoprocessing in Hybrid Clouds
Geoprocessing in Hybrid Clouds Theodor Foerster, Bastian Baranski, Bastian Schäffer & Kristof Lange Institute for Geoinformatics, University of Münster, Germany {theodor.foerster; bastian.baranski;schaeffer;
Operating Systems 4 th Class
Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
Data Center Content Delivery Network
BM 465E Distributed Systems Lecture 4 Networking (cont.) Mehmet Demirci Today Overlay networks Data centers Content delivery networks Overlay Network A virtual network built on top of another network Overlay
A Proposed Service Broker Strategy in CloudAnalyst for Cost-Effective Data Center Selection
A Proposed Service Broker Strategy in CloudAnalyst for Cost-Effective Selection Dhaval Limbani*, Bhavesh Oza** *(Department of Information Technology, S. S. Engineering College, Bhavnagar) ** (Department
Cloud Design and Implementation. Cheng Li MPI-SWS Nov 9 th, 2010
Cloud Design and Implementation Cheng Li MPI-SWS Nov 9 th, 2010 1 Modern Computing CPU, Mem, Disk Academic computation Chemistry, Biology Large Data Set Analysis Online service Shopping Website Collaborative
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
ACANO SOLUTION VIRTUALIZED DEPLOYMENTS. White Paper. Simon Evans, Acano Chief Scientist
ACANO SOLUTION VIRTUALIZED DEPLOYMENTS White Paper Simon Evans, Acano Chief Scientist Updated April 2015 CONTENTS Introduction... 3 Host Requirements... 5 Sizing a VM... 6 Call Bridge VM... 7 Acano Edge
Cloud security CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642
Cloud security CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642 Announcements Take- home final versus in- class Homework
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida
Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.
Bitmessage: A Peer to Peer Message Authentication and Delivery System
Bitmessage: A Peer to Peer Message Authentication and Delivery System Jonathan Warren [email protected] www.bitmessage.org November 27, 2012 Abstract. We propose a system that allows users to securely
Resilient Botnet Command and Control with Tor
Resilient Botnet Command and Control with Tor Dennis Brown July 2010 10/14/10 1 Who am I? Dennis Brown Security Researcher for Tenable Network Solutions Toorcon 10, 11 Defcon 18 PaulDotCom Podcast Rhode
Sistemi Operativi e Reti. Cloud Computing
1 Sistemi Operativi e Reti Cloud Computing Facoltà di Scienze Matematiche Fisiche e Naturali Corso di Laurea Magistrale in Informatica Osvaldo Gervasi [email protected] 2 Introduction Technologies
Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments
Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments Branko Radojević *, Mario Žagar ** * Croatian Academic and Research Network (CARNet), Zagreb, Croatia ** Faculty of Electrical
The Disadvantages of Free MIX Routes and How to Overcome Them
The Disadvantages of Free MIX Routes and How to Overcome Them Oliver Berthold 1, Andreas Pfitzmann 1, and Ronny Standtke 2 1 Dresden University of Technology, Germany {ob2,pfitza}@inf.tu-dresden.de 2 Secunet,
Locating Hidden Servers
Locating Hidden Servers Lasse Øverlier Norwegian Defence Research Establishment and Gjøvik University College lasse.overlier@{ffi,hig}.no Paul Syverson Naval Research Laboratory [email protected]
Elastic Management of Cluster based Services in the Cloud
First Workshop on Automated Control for Datacenters and Clouds (ACDC09) June 19th, Barcelona, Spain Elastic Management of Cluster based Services in the Cloud Rafael Moreno Vozmediano, Ruben S. Montero,
TLP WHITE. Denial of service attacks: what you need to know
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
Network Security. Chapter 9 Integrating Security Services into Communication Architectures
Network Security Chapter 9 Integrating Security Services into Communication Architectures Network Security (WS 00): 09 Integration of Security Services Motivation: What to do where?! Analogous to the methodology
Sabbia: a low-latency design for anonymous networks
Sabbia: a low-latency design for anonymous networks Claudio Agosti 1 and Stefano Zanero 2 1 Sikurezza.org research group http://www.sikurezza.org [email protected] 2 DEI-Politecnico di Milano, via Ponzio
Energy Constrained Resource Scheduling for Cloud Environment
Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering
3. Firewall Evaluation Criteria
Firewall Management Prep. drd. Radu Constantinescu Academy of Economics Studies, Bucharest ABSTRACT Network connectivity can be both a blessing and a curse. On the one hand, network connectivity can enable
DoS/DDoS Attacks and Protection on VoIP/UC
DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements
Network Performance Between Geo-Isolated Data Centers. Testing Trans-Atlantic and Intra-European Network Performance between Cloud Service Providers
Network Performance Between Geo-Isolated Data Centers Testing Trans-Atlantic and Intra-European Network Performance between Cloud Service Providers Published on 4/1/2015 Network Performance Between Geo-Isolated
