Bypass Network Security Detection Model for Virtual Machine Intranet
|
|
|
- MargaretMargaret Alexander
- 10 years ago
- Views:
Transcription
1 Bypass Network Security Detection Model for Virtual Machine Intranet 1 Jiao Guo, 2 Hang Wei, 2 Donghui Liu,* 2 Qinqun Chen, 2 Yuan Zheng, 2 Hongmin Cai, 2 Hao Chen 1 Guangzhou university of chinese medicie,guangzhou,[email protected] 2 School of Medical Information Engineering,Guangzhou university of chinese medicie, [email protected],[email protected],[email protected],[email protected],ch [email protected],[email protected] Abstract. Virtual intranet performance of virtual machine manager is important factor to keep the whole virtual platform works efficiently. This paper offer a bypass model to detect network attack in virtual machine intranet. Compare with filter model, bypass model expend very low performance of virtual machine manager. The model also allow efficient and advance detection by an external security device. 1. Introduction Keywords: Cloud, Virtual Machine, Security With the rapid development of could, its security problems emerge in large numbers. Gartner Inc. has drawn seven conclusions about the security risk of could computing[1], and Dengguo Feng, etc. have summarized three kinds of could security challenges on the research about could computing security[2]. The safety guidelines provided by Cloud Security Alliance (CSA) specified the could security theme from thirteen aspects, in which particularly point that virtualization is an important theoretical basis of the three reference model of cloud, namely Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) respectively[3]. Meanwhile virtualization also brings security and management issues of the virtual machine. Xen is the representative of virtualization project for open source. However, its network transfer among virtual machines is based on the mechanism of shared pages and event channel, thus it is difficult to utilize usually method for security detection. In this paper, intranet communication of virtual machines is detected by an outer security device through mirror the virtual bridged packets to physical NIC, which is a good solution to bottlenecks of performance caused by the security detection in server. Meanwhile, an application of security agent module achieved to restrain dangerous network behaviors. 2. The Feature of the Security and Firewall Work on Cloud. Deference to physical mode, feature of the cloud security mainly includes as follows[4]: (1) Providing the safeguards. There are some aspects of risk evaluation for data integrity, datarecovery and privacy protection. The data is centrally stored in different data centers, which carry outunified management and maintenance, take charge of resource allocation and deployment, safetycontrol and execute further safe and reliable realtime monitoring. (2) Unique mechanism of anticipating control. It is the most special mechanism in the cloudcomputing platform, can greatly improve users work environment and the settings of safe anticipatingcontrol, and realizes real time security prevention based on specific requirement. (3) The cloud environment realtime monitoring. It indexes and monitors the log recordingdynamic information according to real requirement, supports extending log record usingsystem s special C2 pattern of audit tracking, and may monitor unusual access attempts todatabase. (4) Safety performance test. It regularly carries out SAAS safety performance and password strengthtest for the cloud platform to guarantee system security and the reliability of password strength in time. (5) Updating traditional antivirus patterns. The most feature of the cloud security structure is becoming previous killing virus patterns into network cooperative ones, greatly enhances the efficiency of virus samples extraction and software update. Users neither need entirely setup and frequently upgrade antivirus software, nor occupy massive internal memory and network bandwidth. Advances in information Sciences and Service Sciences(AISS) Volume5, Number3, Feb 2013 doi: /AISS.vol5.issue
2 To cope with the new security problem, cloud firewall possesses some characteristics as follows[5]: (1) SensorBase-based dynamic updating polices. The cloud database-sensorbase deployed in internet is the core of the cloud firewall, which can around the world collect some kind of malicious URL, the websites inserted by Trojan horse and the features of detected s and viruses, and timely sends dynamic update to world wide client side users. This is the most characteristic of the cloud firewall. (2) Building reputation-associated cooperation with IPS. The cloud firewall records the operating actions reputation value of users threatening network security, and when the value decrease to fixed threshold, the reputation link is automatically closed. The users having good reputaion once in a while are ed by viruses or misoperation, they only are given a warning prompt. (3) The virtual cloud sides mobile safety access. Presently, mobile network security access has aroused significant attention. The cloud security can realize the safeguard of mobile access through SSL VPN technology. (4) Real time monitoring the netflow in the cloud. The one of import means of the cloud security and network protection is monitoring the abnormal netflow. In the cloud firewall, such as Netflow V9 technology adopted by Cisco, not only is the netflow detected by it, but the network administrators make use of it to manage network. Some researchers have presented such as user authentication, device authentication, and the establishment of secure communication channel to solve the new problem[6]. 2. Xen and Its Network Communication Model in Virtualized Environment At present, Xen become extensive research platform for virtualization technology, such as OVS introduced by Oracle that is based on Xen with linux kernel[7]. The integral structure of Xen is depicted as Fig.1, Xen Hypervisor is the virtualized platform, domain0 acts as the management agent of Xen Hypervisor and domainu is the actual business virtual machine. Thus Xen supports both para-virtualization and fully-virtualization at the same time. PV provides efficient performance and HVM supports for almost all operating systems including Windows by hardware virtualization technology[8]. Figure 1. Structure of Virtual Machine Run on Single Node Xen implement the network transfer among domainus and between domainu and external through the shared page and event channel. Firstly, all network communication data of domainu is transferred to netback of domain0 through its netfront, then domain0 handle. The default Xen configuration uses bridging within domain0 to allow all domains to appear on the network as individual hosts, virtual machine manager acts like a switch. It works in the rout model well, while virtual machine manager acts like a route. 3. Security Issues and Plight of Virtual Machine Intranet To protect physical servers, internet data center(idc) use external security devices such as Intrusion Detection System(IDS) and so on, these devices provide security service through the bypass or filter mode outside of the physical servers. However, network transfer within Domains entirely does not pass external hardware infrastructure, so the current network security devices have no use to these security problem. 2/8 rule of thumbs tell us that 80% of the risks will come from interior, that include the attack 117
3 of the intranet denial of service(dos), the spoofing attack of intranet and the vulnerability attack of intranet so on. The current detection ideas are chiefly as that security strategy is deployed in virtual machine manager to detect and protect the virtual intranet communication, which expend a lot of CPU of virtual machine manager. Tiejun Jia, etc. design an intelligent IPS model based on dynamic cloud firewall linkage which can seamlessly integrate intelligent defensive system with software of killing virus, and greatly decreased the occupation of computer s resources[9]. This model work well to the data which pass through the data switch but do nothing to the data pass in a single node. Figure 2. Model of Intranet IPS Liangliang Huang, etc. put forward network security model based on virtual secure server [10], the main idea of the model is that virtual secure server is carried out in domain0, which is responsible for the overall deployment of security strategy, after that an agent module filter all data passed through the domain vif, so that the secure deploymentis realize. In practice, we found that the model is suitable in a virtual environment for compute-intensive, while it would result in severe performance degradation in the IO-intensive virtual environments. When the utilization rate of domain0 Vcpu reached 100%, the increase of the number of virtual machines would lead to a gradual decline in network throughput[11]. When the virtual machine technology was applied in the field such as server consolidation, the communication within virtual machines would be quite frequent, thus the communication mechanism of virtual machine would be bottleneck[12]. Figure 3. Model of Virtual Security Server The virtualization technology attracts attention again latest to improve the utilization of the hardwareresource and overcome the limitation of standalone system. This technology allows us to enableto consolidate several isolated virtual machines into one physical hardware system. If server spend too much performance to protect the virtual network, it can hardly improve its utilization. So how to realize network security communication by cost the performance of server as little as possible is the key to ensure availability of the security model. 118
4 4. Bypass detection model 4.1 Requirement analysis of security model Since the feature of cloud security and we need to take virtual machine managers performace consuming into account, the model must have these feature: (1)Model allow use professional and efficiently security devices. Today, many efficiently security devices base on ASIC and network processor are used to detect the packets which transferd in physical network. How to use these professional device to detect the packets which transfered in virtual network is an import job. (2) In order to keep high efficiency of the physical server, model comsume very little performance of virtual machine manager which used for security detection. So the model just handle packets in low layer, and almost do not participate in security detection. (3)Model can restrain attack in short time. In cloud system, each server deploy many virtual machines and virtual machines can be migrated to other server. So restrain attack in short time is very an import thing to prevent system crash. (4)System is based on modularize method. Model can combine different security detection and be replaced expediently. (5)Model must designed as distributed detection node and centralized management architecture. In the cloud, each virtual machine manager run as detection nodes to protect the virtual network which run on the server, so network administrators need a center to manager all virtual network and detection nodes. 4.2 Bypass Detection Model design Main mentality of model is to release security detection from the Xen server by send the virtual bridged packets to the external security devicen, and then enforce complex and efficient detection. Because the detection do by the external devicen, we call it bypass model. Just like other virtual machine system, model have two kind of physical nic, one is linked to outside network and the other is linked to management network. Beyond that, the model set up an extra physical interface which call security nic is linked to security network. Security device can be an IDS, or more than two IDS run on cluster mode which server security detection. Serurity center act as a manager center, the first job is to receive alarm from security device and deploy restrain policy to virtual machine manager, the other is to provide an unified management interface. In this model, virtual machine manager do not analyse datas, it just make sure that the packets are sent with its own source mac adress and mirror packets to the physical nic. So that it cost very little performance of server.figure 2 show structure of the whole model. 119
5 4.3 Single Server Security Model Figure 4. Structure of the Bypass Detection Model There are three key points in the model :Mirror the packets from the virtual bridge in data link layer; detect packets by the external device; restrain virtual machine attacker by security agent deployed on domain0. Figure 2 show structure of bypass model. Figure 5. Structure of a Single Server Model works as the following processes : (1)Domain0 provides Xen network access for guests each referred to as a domainu. When packets transferred in bridge, domain0 can make copys just like port mirror, and send the copys to a physical eth which is connected to an external security device. (2)Security device detect net flows as usual. When it get security event, it send warning info to the security agent which working on domain0. (3)Security agent choose reaction base on security policy for the warning info. (4)Security agent restrain VM attacker by call the xm tools. Following operations can be use to achieve restraint : reduce vcpu Cap of the attacker;remove attacker s network connection from bridge; shutdown the attacker and so on. There are three Reasons that the model use mirror mode to transfer datas which will be detected: (1)The model are designed to detect attack and restrain it, not blocking-up attack. Many cloud system use cluster mode to deploy one application, one virtual machine failure will not cause whole application crash, redeploy a new virtual machine will cost little time, and the most important of all is 120
6 the virtual machine attacker is absolutely controled by virtual machine manager. So all we need is to find the attacker as fast as we can, not to blocking-up attack. (2)Mirror mode can support higher data speed but cost little detection delay. (3)Mirror mode cost lesser performance for manager, because the virtual machine manager do not need to deal with the packets sent from security device. 4.2 Implementation of Packets Mirror. We call skb_copy function which in linux kernel to copy packets as new sk_buff struct, but when to call skb_copy has different result. As we know, all bridged packets pass through the BROUTING, PREROUTING, and then distribute to INPUT, FORWARD OUTPUT and POSTROUTING chains. In this case, core concerns are the packets which are sent to domain0 or other domainus. So we have following choices : (1)Before mirror packet, we checkout the packet s source mac address in INPUT chain. If the packet do not have a correct mac address, virtual machine manager will drop it. (2)After source mac address check, if we want to mirror packets which are sent to domain0, we call skb_copy in INPUT chain. (3)If we want to mirror packets which are sent to other domainus, we call skb_copy in FORWARD chain. (4)IF we want to mirror packets which are sent to either domain0 or other domainus, we call skb_copy in PREROUTING chian. 4.3 Implementation of Attack Restrain Attack restrain processes are implemented by security center and security agent.there are four processes by security center: (1)Security center receive s-event from security device. S-event is a http post from security device. Http post method has following parameters: S-id means id of external security device,event-id means type id of warning info,srcmac means source mac address of attacker,srcip means source ip address of attacker After that,receiver will generate a security event object include above attributes and transfer it to controler. (2)Security center check attacker s source mac address, and find out that which virtual machine own the mac address. (3)Security center find the reaction for the event-id by query security policy database which has a list of reactions that maps the event-id. Database manager we use mysql. (4)security center send c-event contains restrain policy to the security agent which running in the virtual machine manager. C-event is a http post method has following parameters: C-id means id of the event, operation-id means type id of restrain operation,srcmac means source mac address of attacker, srcip means source ip address of attacker. (5)Security agent receive c-event from security center and restrain attacker by calling xm tools or by calling xen API. Figure 6. Process of Attack Restrain 121
7 5. Testing and Result Testing simulate a vm infect Virus and send a large number of arp packet,it cause the domain0 be in high Vcpu usage state. The security device detect this attack and send warning info to security agent, the agent reduce the vm s Vcpu Cap to rehabilitate the domain0. Environment of our testing: two server with couple cpu(2 core 1.8Ghz), one for Xen server and the other act as security device. Xen version use oracle ovs, domain0 domain0 kernel is ovs el5xen. Security device run a program name checkarp to detect illegal arp packets on fedora16. Guest run anysent in unlimited mode on win2003 to simulate arp attack. Domain0 run xm tools to monitoring the vm state. Guest simulate arp attack when Cap no limit, and then bypass model how to work Table 1. Xen Domains Vcpu set Name Vcpu Weight Cap Domain Guest Table 2. Testing result. rate (pps) dom0vcpu (%) domuvcpu (%) domu-cap (%) no limit At the beginning, guest s packets sending rate is 824pps, it cause domain0 works on 88.4% Vcpu usage,after detecting attack, security agent reduce VM attacker s Vcpu Cap by 10% per step. When the Cap reduce to 10%, attacker just can send packets at 37pps rate, then domain0 works on 13.3% Vcpu usage.for The Results, There three answers : (1)Deploy packets mirror on the bridge have very little influence on domain0 s Vcup usage. (2)Reduce Vcpu Cap of the VM attacker can restrain its attacker and rehabilitate the domain0. (3)Bypass model is feasible. 6. Discussion Because of packets analysis expend far more cpu performance than packets mirror, bypass model is more efficient than filter model. And as we know, bypass model is weaker in controllability, so bypass model can t works well on internet which hardly control the attacker. But in the case of virtual machine intranet, all attackers are whole control by the virtual machine manager, bypass model can be a good solution for the virtual machine structure. At present, our bypass model just in its infancy, there are far more research need to do,such as how it works in large pps status, how to improve its controllability and so on. But we consider that bypass model will prove to be effective and feasible solution for increase security of virtual machine intranet. 122
8 7. Acknowledgement This paper was supported by the special financial fund projects of Guangdong province, Building up the Information-Technology Platform and Comprehensive Management System for the Inheritage and Innovation of TCM Culture, 2011.This paper is also supported by GuangDong Natural Science Fund under grant No. S References [1] Jon Brodkin Gartner, "seven cloud-computing security risks", /news /2008 / cloud.html. [2] Deng-Guo Feng, Min Zhang, Yan Zhang, Zhen Xu, "Study on Cloud Computing Security ", Journal of Software,vol.22,no.1,pp ,2011. [3] Do-Yoon Ha, Chang-Yong Lee, Hyun-Cheol Jeong, Bong-Nam Noh, "Design and Implementation of SIP-aware DDoS Attack Detection System", AISS, Vol. 2, No. 4, pp , [4] Chang-Lung Tsai, Uei-Chin Lin, "Information Security of Cloud Computing for Enterprises", AISS: Advances in Information Sciences and Service Sciences, Vol. 3, No. 1, pp. 132 ~ 142, 2011 [5] Tiejun Jia, Xiaogang Wang, "The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 5, No. 3, pp. 304 ~ 309, [6] Liang-liang Huang, Jun Han, Lun-wei Wang, " Research on Secure-communication Mechanism Based Xen Hardware Virtual Machine",Computer Security,vol. 3,pp [7] FU Sai-ping, Guo-lin Ren, "Research on Scalability of XEN Network I/O Full-virtualization Mechanism", Computer Engineering,vol34,no.23,pp ,2008. [8] Tuan-jie Zhu; Li-rong Ai, "Research on Xen Inter Domain Communication Based on Shared Memory", Computer Technology and Development,vol.21,no.7,pp.5-8,2011. [9] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, I. Brandic, "Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility", Future Generation Computer Systems, vol.25, no.6, pp , [10] M. Naghshineh, R. Ratnaparkhi, D. Dillenberger, J. R. Doran, C. Dorai, L. Anderson, G. Pacifici, J. L. Snowdon, A. Azagury, M. VanderWiele, Y. Wolfsthal, "IBM research division cloud computing initiative", IBM Journal of Research and Development, vol.53, no.4, pp.1:1-1:10,
Cloud Security - Characteristics, Advantages and Disadvantages
The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,
On Cloud Computing Technology in the Construction of Digital Campus
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus
Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
Software. Quidview 56 CAMS 57. XLog NTAS 58
Software Quidview 56 CAMS 57 XLog NTAS 58 55 Quidview Quidview Network Management System Quidview network management software is a suite of scalable tools for simplifying the network management and maintenance.
Configuring DHCP Snooping
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
Huawei Network Edge Security Solution
Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD. Huawei Network Edge Security Solution Huawei Network Edge Security 1 Overview
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
, pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.
A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud
A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud Vivek Sridhar Rational Software Group (India Software Labs) IBM India Bangalore, India Abstract Cloud
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
How To Create A Cloud Based System For Aaas (Networking)
1 3.1 IaaS Definition IaaS: Infrastructure as a Service Through the internet, provide IT server, storage, computing power and other infrastructure capacity to the end users and the service fee based on
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
Securing Your Cloud with Xen Project s Advanced Security Features
Securing Your Cloud with Xen Project s Advanced Security Features Russell Pavlicek, Xen Project Evangelist CloudOpen North America 2013 Who is the Old, Fat Geek Up Front? Xen Project Evangelist Employed
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista
Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista Setting the Stage This presentation will discuss the usage of Linux as a base component of hypervisor components
Virtual Machine in Data Center Switches Huawei Virtual System
Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Securing Virtualization with Check Point and Consolidation with Virtualized Security
Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
Optimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
Log Audit Ensuring Behavior Compliance Secoway elog System
As organizations strengthen informatization construction, their application systems (service systems, operating systems, databases, and Web servers), security devices (firewalls and the UTM, IPS, IDS,
Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS
Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Shantanu Sasane Abhilash Bari Kaustubh Memane Aniket Pathak Prof. A. A.Deshmukh University of Pune University of Pune University
How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X
Performance Evaluation of Virtual Routers in Para-virtual Environment 1. Abhishek Bajaj [email protected] 2. Anargha Biswas [email protected] 3. Ambarish Kumar [email protected] 4.
An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide
Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.
Dynamic resource management for energy saving in the cloud computing environment
Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239
ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239 Check Point Firewall Software and Management Software I. Description of the Item Up gradation, installation and commissioning of Checkpoint security gateway
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
Virtualization Support - Real Backups of Virtual Environments
Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in
Virtual Switching Without a Hypervisor for a More Secure Cloud
ing Without a for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton) 1 Public Cloud Infrastructure Cloud providers offer computing resources
Installing & Using KVM with Virtual Machine Manager COSC 495
Installing & Using KVM with Virtual Machine Manager COSC 495 1 Abstract:. There are many different hypervisors and virtualization software available for use. One commonly use hypervisor in the Linux system
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration
ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing
Hillstone Intelligent Next Generation Firewall
Hillstone Intelligent Next Generation Firewall Kris Nawani Solution Manager (Thailand) 12 th March 2015 1 About Hillstone Networks Founded 2006 by Netscreen visionaries World class team with security,
Dynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
Effective Security Architecture for Virtualized Data Center Networks
Effective Security Architecture for Virtualized Data Center Networks 1 Udeze Chidiebele. C, 3 Okafor Kennedy.C 1,3 R & D Department, Electronics Development Institute (FMST-NASENI), Awka, Nigeria. Abstract
How To Create A Network Access Control (Nac) Solution
Huawei Terminal Security Management Solution Create Enterprise Intranet Security Terminal Security Management Solution 01 Introduction According to the third-party agencies such as the Computer Security
Securing Cloud using Third Party Threaded IDS
Securing Cloud using Third Party Threaded IDS Madagani Rajeswari, Madhu babu Janjanam 1 Student, Dept. of CSE, Vasireddy Venkatadri Institute of Technology, Guntur, AP 2 Assistant Professor, Dept. of CSE,
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
Date: December 2009 Version: 1.0. How Does Xen Work?
Date: December 2009 Version: 1.0 How Does Xen Work? Table of Contents Executive Summary... 3 Xen Environment Components... 3 Xen Hypervisor... 3... 4 Domain U... 4 Domain Management and Control... 6 Xend...
5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager
5nine Security for Hyper-V Datacenter Edition Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager November 2013 11 Table of Contents Summary... 5 System requirements... 5 Permissions...
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
Internet infrastructure. Prof. dr. ir. André Mariën
Internet infrastructure Prof. dr. ir. André Mariën (c) A. Mariën 31/01/2006 Topic Firewalls (c) A. Mariën 31/01/2006 Firewalls Only a short introduction See for instance: Building Internet Firewalls, second
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
An Oracle Technical White Paper November 2011. Oracle Solaris 11 Network Virtualization and Network Resource Management
An Oracle Technical White Paper November 2011 Oracle Solaris 11 Network Virtualization and Network Resource Management Executive Overview... 2 Introduction... 2 Network Virtualization... 2 Network Resource
Secospace elog. Secospace elog
Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall
SOFTWARE ENGINEERING 4C03 Computer Networks & Computer Security Network Firewall HAO WANG #0159386 Instructor: Dr. Kartik Krishnan Mar.29, 2004 Software Engineering Department of Computing and Software
8. Firewall Design & Implementation
DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway
TESTING & INTEGRATION GROUP SOLUTION GUIDE Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway INTRODUCTION...2 RADWARE SECUREFLOW... 3
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
How To Use Vsphere On Windows Server 2012 (Vsphere) Vsphervisor Vsphereserver Vspheer51 (Vse) Vse.Org (Vserve) Vspehere 5.1 (V
Jaan Feldmann Sergei Sokolov System Resource Host VM Cluster Windows Server 2008 R2 Hyper-V Windows Server 2012 Hyper-V Improvement Factor Logical Processors 64 320 5 Physical Memory 1TB 4TB 4 Virtual
The Power Marketing Information System Model Based on Cloud Computing
2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V51.96 The Power Marketing Information
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Securing the Intelligent Network
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
Programmable Networking with Open vswitch
Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads
A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service
78 A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service Jung-oh Park Dept. of Information Communications, DONGYANG MIRAE University,
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
AppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
Firewall. User Manual
Firewall User Manual 1 IX. Firewall This chapter introduces firewall general policy, access rule, and content filter settings to ensure network security. 9.1 General Policy The firewall is enabled by default.
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
Securing the private cloud
Securing the private cloud Gary Gardiner Security Engineer 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone Top Trends of 2011 1 2 3 4 5 6 7 8 9 Virtualization & Cloud Computing
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
CompTIA Cloud+ 9318; 5 Days, Instructor-led
CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,
Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V
Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...
