AdSec: A System for Adaptive Network Security

Size: px
Start display at page:

Download "AdSec: A System for Adaptive Network Security"

Transcription

1 AdSec: A System for Adaptive Network Security Kihong Park Network Systems Lab & CERIAS Dept. of Computer Sciences Purdue University park@cs.purdue.edu Joint: E. Spafford (co-pi), M. Tripunitara, G. Nalawade

2 Motivation Network environment Secure QoS

3 Motivation (cont.) Goal Facilitate Secure QoS User plane protection Control plane protection Minimal footprint

4 Technical Challenges Integrate QoS & security architectures Minimize security footprint Fault-tolerance Programmability Interoperability

5 Approach User plane protection: end-to-end Security services: confidentiality, integrity, authentication, access control Property of cryptographic protocols well-understood

6 Approach (cont.) Control plane protection Proactive: authentication/integrity of certain signalling Reactive: too costly to make 100% proactive (e.g., Gbps switching) security-qos trade-off selective, controlled introduction of security holes reactive management

7 Approach (cont.) Adaptive security Combination of proactive/reactive rendering of security services Multiple levels of service Monitoring, control, and actuation Active resource management: control/scheduling Deterrent effect

8 Adaptive Security Architecture Short-term Long-term Monitoring Traffic monitoring Control input Logging and Access Control Control Filtering and data reduction On-line/off-line control Hierarchy management Switch/Router/ Network Element Actuation Information forwarding Control messaging

9 Security Middleware Layer Application Layer Transport Layer SML SML Application Layer Transport Layer Network Layer Network Layer Data Link Physical Layers Data Link Physical Layers Network

10 Monitoring & Control Hierarchy Level 2 Level 1 Level 0 Level 2 Level 1 Level 0 Hierarchical structure for resiliency and scalablity Byzantine agreement protocols (2/3 majority) for isolating compromised nodes

11 Overview of AdSec Function Programmable network management system for adaptive network security Implementation of any logical hierarchy Monitoring, control, and actuation SNMP based User programmable

12 AdSec: Components MIB Dependency Relation (MDR) Managers Agents Monitor function Control function System libraries config. snmpd wrapper wrapper

13 MIB Dependency Relation a b c d SNMP SET SNMP GET e f

14 Monitor & Control Functions Monitor function F : SNMP GET Control function G : SNMP SET user programmable Function wrappers Transparent read/write local vs. remote MIB OID (IP, Port) physical mapping

15 AdSec: Implementation Details Prototype system SNMP version 1 UC Davis snmpd implementation Others (e.g., Sun Microsystems) possible CMU SNMP library Functions: Intrusion detection Anomaly detection Automatic control

16 Benchmark: Set-up A Server (Manager) Legitimate Client (Manager) Ethernet Ethernet Internet Attacker Server (Manager) Router (Manager)

17 Benchmark: Set-up B Manager Manager Manager Victims (Agents) Internet Attacker Manager

18 On-going & Future Work Asynchronous extension: SNMP Trap Extensive monitor/control function libraries Integration with network management Active resource scheduling Integration with QoS management

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve

More information

Intrusion Detection for Mobile Ad Hoc Networks

Intrusion Detection for Mobile Ad Hoc Networks Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering tchen@engr.smu.edu http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems

More information

ESnet SDN Experiences. Roadmap to Operating SDN-based Networks Workshop July 14-16, 2015 Berkeley, CA C. Guok, B. Mah, I. Monga, E.

ESnet SDN Experiences. Roadmap to Operating SDN-based Networks Workshop July 14-16, 2015 Berkeley, CA C. Guok, B. Mah, I. Monga, E. ESnet SDN Experiences Roadmap to Operating SDN-based Networks Workshop July 14-16, 2015 Berkeley, CA C. Guok, B. Mah, I. Monga, E. Pouyoul Things We Have Tried Multi-Layer SDN Layer1 / Layer 2 modeling

More information

How To Manage A Network With Kepware

How To Manage A Network With Kepware Simple Network Management Protocol (SNMP) Products Kepware Product Offerings from Eternity Sales SNMP OPC Server: SNMP Manager used to poll SNMP Agents/Devices SNMP Agent: used to make KEPServerEX data

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

TELE 301 Network Management

TELE 301 Network Management TELE 301 Network Management Lecture 20: Management Tools and Protocols Haibo Zhang Computer Science, University of Otago TELE301 Lecture 20: Management tools and protocols 1 What is Network Management?

More information

0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV

0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV Best Connections in the Business ProSphere NMS 0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV Figure 1: Xedge Switches managed by ProSphere NMS 7KH#0XOWLVHUYLFH#&KDOOHQJH Managing diverse protocols, applications and topologies

More information

Training Course on Network Administration

Training Course on Network Administration Training Course on Network Administration 03-07, March 2014 National Centre for Physics 1 Network Security and Monitoring 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 Crafting a Secure

More information

A Resilient Protection Device for SIEM Systems

A Resilient Protection Device for SIEM Systems A Resilient Protection Device for SIEM Systems Nuno Neves University of Lisboa, Portugal http://www.di.fc.ul.pt/~nuno Work with: Alysson Bessani, Miguel Garcia, Eric Vial, Ricardo Fonseca, Paulo Veríssimo

More information

Ten Things to Look for in an SDN Controller

Ten Things to Look for in an SDN Controller Ten Things to Look for in an SDN Controller Executive Summary Over the last six months there has been significant growth in the interest that IT organizations have shown in Software-Defined Networking

More information

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security Chapter 12 Network Security Security Policy Life Cycle A method for the development of a comprehensive network security policy is known as the security policy development life cycle (SPDLC). Network Security

More information

How To Set Up Foglight Nms For A Proof Of Concept

How To Set Up Foglight Nms For A Proof Of Concept Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is

More information

SNMP Protocol for Easy Network Management

SNMP Protocol for Easy Network Management ACTi Knowledge Base Category: Educational Note Sub-category: Application Model: ACM Series TCM Series ACD-2100 TCD-2100 TCD-2500 Firmware: Software: N/A Author: Wells.Wei Published: 2010/10/22 Reviewed:

More information

Avaya TM G700 Media Gateway Security. White Paper

Avaya TM G700 Media Gateway Security. White Paper Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional

More information

Avaya G700 Media Gateway Security - Issue 1.0

Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise

More information

SNMP. Simple Network Management Protocol

SNMP. Simple Network Management Protocol SNMP Simple Network Management Protocol Introduction SNMP Simple Network Management Protocol A set of standards for network management Protocol Database structure specification Data objects A set of standardized

More information

Introduction to Simple Network Management Protocol (SNMP)

Introduction to Simple Network Management Protocol (SNMP) Introduction to Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an application layer protocol for collecting information about devices on the network. It is part

More information

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Exemplos de Projecto - Network Design Examples 1 Hierarchical Network Design 2 Hierarchical

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

Network Monitoring Assignments

Network Monitoring Assignments Network Monitoring Assignments Cyril Soldani INFO0056 11th February 2015 1 Outline 1 Introduction 2 Using SNMP Tools 3 Web-based SNMP Browser 4 Agenda 2 Network Management and Security Assignments There

More information

Security Toolsets for ISP Defense

Security Toolsets for ISP Defense Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.

More information

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? (cont d) Firewall is a set of related programs, located at a network gateway server. Firewalls

More information

Potential Thesis Topics in Networking

Potential Thesis Topics in Networking Geoff Xie 1 Potential Thesis Topics in Networking Prof. Geoffrey Xie xie@cs.nps.navy.mil, SP 544C April 2002 http://www.saamnet.org 1 What my Research Projects Offer Total learning experience for you You

More information

Network Monitoring and Diagnostics Connected Manufacturing usa.siemens.com/industry Page 1 What is Network Monitoring and Diagnostics? Network Monitoring A system that is constantly monitoring networks

More information

Network Security Demonstration - Snort based IDS Integration -

Network Security Demonstration - Snort based IDS Integration - Network Security Demonstration - Snort based IDS Integration - Hyuk Lim (hlim@gist.ac.kr) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and

More information

CISCO IOS NETWORK SECURITY (IINS)

CISCO IOS NETWORK SECURITY (IINS) CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o. NetFlow use cases ICmyNet / NetVizura, milos.zekovic@soneco.rs Soneco d.o.o. Serbia Agenda ICmyNet / NetVizura overview Use cases / case studies Statistics per exporter/interfaces Traffic Patterns NREN

More information

Management Tools, Systems and Applications. Network Management

Management Tools, Systems and Applications. Network Management Management Tools, Systems and Applications Network Management 13.5.2013 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management

More information

Private Industry Role in Next Generation Internet. Bob Aiken. NGI Project Leader DOE er.doe..doe.gov Large Scale Networking Working Group June 1997

Private Industry Role in Next Generation Internet. Bob Aiken. NGI Project Leader DOE er.doe..doe.gov Large Scale Networking Working Group June 1997 Private Industry Role in Next Generation Internet Bob Aiken NGI Project Leader DOE aiken@er er.doe..doe.gov Large Scale Networking Working Group June 1997 NGI: Foundation for the Future Points to Remember

More information

Presented by Aurang Zeb 14CS-03. Network Management System

Presented by Aurang Zeb 14CS-03. Network Management System Presented by Aurang Zeb 14CS-03 Network Management System INTRODUCTION o We can define network management as monitoring, testing, configuring, and troubleshooting network components to meet a set of requirements.

More information

Network Management System (NMS) FAQ

Network Management System (NMS) FAQ Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

SDN Architecture and Service Trend

SDN Architecture and Service Trend 2013 SDN 高 峰 論 壇 SDN Architecture and Service Trend Dr. Yu-Huang Chu Broadband Network Lab Chunghwa Telecom Co., Ltd., Taiwan 10/09/13 1 Outlines SDN & NFV introduction Network Architecture Trend SDN Services

More information

Network Management 2. Learning Objectives. Centralized network management? School of Business Eastern Illinois University

Network Management 2. Learning Objectives. Centralized network management? School of Business Eastern Illinois University School of Business Eastern Illinois University 2 (Week 16, Thursday 4/19/2007) Abdou Illia, Spring 2007 Learning Objectives 2 List main elements in Centralized network management Describe Centralized principles

More information

OM2012 Network Monitoring. Phil Bracher Sr. Premier Field Engineer Microsoft Corporation

OM2012 Network Monitoring. Phil Bracher Sr. Premier Field Engineer Microsoft Corporation OM2012 Network Monitoring Phil Bracher Sr. Premier Field Engineer Microsoft Corporation Continuous Availability of the Management Group: Resource Pooling Config service Scale and Federation Data Access

More information

Ranch Networks for Hosted Data Centers

Ranch Networks for Hosted Data Centers Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch

More information

Secure SCADA Network Technology and Methods

Secure SCADA Network Technology and Methods Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea sntdvl@yahoo.com, taihoonn@paran.com Abstract: The overall

More information

How To Manage A Network Management System (Hitachi)

How To Manage A Network Management System (Hitachi) Hitachi Review Vol. 51 (2002), No. 2 65 Integrated Management System Job Management Partner 1 (JP1), Version6i for Broadband Networks Yoshiyuki Kurosaki Toshio Sato Kiminori Sugauchi Tokuji Tamada OVERVIEW:

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Network Security. Chapter 9 Integrating Security Services into Communication Architectures

Network Security. Chapter 9 Integrating Security Services into Communication Architectures Network Security Chapter 9 Integrating Security Services into Communication Architectures Network Security (WS 00): 09 Integration of Security Services Motivation: What to do where?! Analogous to the methodology

More information

Performance Evaluation of Intrusion Detection Systems

Performance Evaluation of Intrusion Detection Systems Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

Securing VoIP Networks using graded Protection Levels

Securing VoIP Networks using graded Protection Levels Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn Andreas.Schmidt@bsi.bund.de Abstract

More information

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack Sugih Jamin EECS Department University of Michigan jamin@eecs.umich.edu Internet Design Goals Key design goals of Internet protocols:

More information

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices DNP SCADA to SCADA Over : Standards, Regulations Security and Best Practices Earl Emerson, Director Systems Engineering RAD Data Communications 2014 Utilities Telecom Council of Canada Motivations for

More information

Software Defined Networking (SDN)

Software Defined Networking (SDN) Software Defined Networking (SDN) Overview Traditional Switches Approaches and Issues Software Defined Networking Overview OpenFlow Controller/Network Operating Systems Traditional Switch Configuration

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

Deploying ACLs to Manage Network Security

Deploying ACLs to Manage Network Security PowerConnect Application Note #3 November 2003 Deploying ACLs to Manage Network Security This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx Abstract With new system

More information

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline

More information

Current and Future Research into Network Security Prof. Madjid Merabti

Current and Future Research into Network Security Prof. Madjid Merabti Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition

More information

Firewalls and Network Defence

Firewalls and Network Defence Firewalls and Network Defence Harjinder Singh Lallie (September 12) 1 Lecture Goals Learn about traditional perimeter protection Understand the way in which firewalls are used to protect networks Understand

More information

Router Security - Approaches and Techniques You Can Use Today

Router Security - Approaches and Techniques You Can Use Today Router Security - Approaches and Techniques You Can Use Today Neal Ziring System and Network Attack Center Information Assurance Directorate National Security Agency 1 Introduction and Outline GOAL: Define

More information

Designing for Cisco Internetwork Solutions

Designing for Cisco Internetwork Solutions Designing for Cisco Internetwork Solutions Course DESGN v2.1; 5 Days, Instructor-led Course Description: Designing for Cisco Internetwork Solutions (DESGN) v2.1 is an instructor-led course presented by

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

An Overview of SNMP on the IMG

An Overview of SNMP on the IMG An Overview of SNMP on the IMG Description SNMP The SNMP provides a way to control and monitor a variety of equipment using one network management protocol. To do this, SNMP uses a number of common Management

More information

Virtual Server in SP883

Virtual Server in SP883 Virtual Server in SP883 1 Introduction: 1.1 Micronet SP883 is a hard QoS broadband router, means its guaranteed service can provide absolute reservation of resource (bandwidth) for specific traffic;not

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Cisco Network Foundation Protection Overview

Cisco Network Foundation Protection Overview Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and

More information

ScotGrid. Bolting the door. Network Based Security Mechanisms. David Crooks, Mark Mitchell on behalf of ScotGrid Glasgow

ScotGrid. Bolting the door. Network Based Security Mechanisms. David Crooks, Mark Mitchell on behalf of ScotGrid Glasgow Bolting the door Network Based Security Mechanisms David Crooks, Mark Mitchell on behalf of ScotGrid Glasgow Infrastructure overlooked? Network infrastructure attacks less common than host based However,

More information

IBM Tivoli Network Manager software

IBM Tivoli Network Manager software Perform real-time network discovery, topology visualization and root-cause analysis IBM Tivoli Network Manager software Highlights Help increase the availability and performance of critical business services

More information

AN-POV-011 SNMP use with POV

AN-POV-011 SNMP use with POV Introduction This document describes the SNMP Interface provided with Point of View (POV). Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

SECURITY ADVISORY FROM PATTON ELECTRONICS

SECURITY ADVISORY FROM PATTON ELECTRONICS SECURITY ADVISORY FROM PATTON ELECTRONICS Potential Security Vulnerabilities Identified in Simple Network Management Protocol (SNMP) Revision 1.0 For Public Release March 7, 2002 Last Updated March 7,

More information

Campus LAN at NKN Member Institutions

Campus LAN at NKN Member Institutions Campus LAN at NKN Member Institutions RS MANI rsm@nkn.in 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

A standards-based network monitoring system

A standards-based network monitoring system A standards-based network monitoring system Javier F. Díaz Laura A. Fava Alejandro J. Sabolansky Computer Science School, National University of La Plata 50 and 120, 2nd floor, La Plata, Buenos Aires,

More information

SolarWinds Certified Professional. Exam Preparation Guide

SolarWinds Certified Professional. Exam Preparation Guide SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Science DMZ Security

Science DMZ Security Science DMZ Security Eli Dart, Network Engineer ESnet Network Engineering Group Joint Techs, Winter 2013 Honolulu, HI January 15, 2013 Outline Quick background Firewall issues Non-firewall security options

More information

MX Platform Architecture Overview

MX Platform Architecture Overview MX Platform Architecture Overview Table of Contents MPATHIX MX PLATFORM: OVERVIEW...1 Open Architecture...1 Transitioning to VoIP?...1 MX PLATFORM MULTI-TIERED ARCHITECTURE...1 Key Architectural Interfaces...2

More information

MPLS VPN Security Best Practice Guidelines

MPLS VPN Security Best Practice Guidelines Security Best Practice Guidelines con 2006 May 24 2006 Monique Morrow and Michael Behringer Distinguished Consulting Engineer and Distinguished Systems Engineer Cisco Systems, Inc. mmorrow@cisco.com mbehring@cisco.com

More information

The SCAMPI Scaleable Monitoring Platform for the Internet. Baiba Kaskina TERENA baiba@terena.nl

The SCAMPI Scaleable Monitoring Platform for the Internet. Baiba Kaskina TERENA baiba@terena.nl The SCAMPI Scaleable Monitoring Platform for the Internet Baiba Kaskina TERENA baiba@terena.nl Agenda Project overview Project objectives Project partners Work packages Technical information SCAMPI architecture

More information

Chapter 9 Integrating Security Services into Communication Architectures

Chapter 9 Integrating Security Services into Communication Architectures Network Security Chapter 9 Integrating Security Services into Communication Architectures Prof. Dr.-Ing. Georg Carle Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science

More information

Network Management Functions RMON1, RMON2. Network Management

Network Management Functions RMON1, RMON2. Network Management Network Management Functions RMON1, RMON2 Network Management 30.5.2013 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management

More information

High-performance VoIP Traffic Optimizer Client Solution

High-performance VoIP Traffic Optimizer Client Solution AP-VTO200 VoIP Traffic Optimizer Client High-performance VoIP Traffic Optimizer Client Solution AddPac Technology 2014, Sales and Marketing www.addpac.com Contents Product Overview Benefits and Features

More information

Protection profile of an industrial firewall

Protection profile of an industrial firewall Version 1.0 mid-term GTCSI July 13, 2015 Preface In the whole document, the acronym ToE (Target of Evaluation) designates the component being evaluated. Text in red differs from the short-term version

More information

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,

More information

8. Firewall Design & Implementation

8. Firewall Design & Implementation DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or

More information

Simple Network Management Protocol

Simple Network Management Protocol A Seminar Report on Simple Network Management Protocol Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org

More information

Tech Note Cisco IOS SNMP Traps Supported and How to Conf

Tech Note Cisco IOS SNMP Traps Supported and How to Conf Tech Note Cisco IOS SNMP Traps Supported and How to Conf Table of Contents Cisco IOS SNMP Traps Supported and How to Configure Them...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Alternatives to SNMP and Challenges in Management Protocols. Communication Systems Seminar Talk 10 Francesco Luminati

Alternatives to SNMP and Challenges in Management Protocols. Communication Systems Seminar Talk 10 Francesco Luminati Alternatives to SNMP and Challenges in Management Protocols Communication Systems Seminar Talk 10 Francesco Luminati Introduction Structure Network management Management approaches SNMP Alternatives: NetConf

More information

Restorable Logical Topology using Cross-Layer Optimization

Restorable Logical Topology using Cross-Layer Optimization פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 28 Network Management: Department of Information Technology Eastern Mediterranean University Objectives 2/60 After completing this chapter you should be able to do

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Advanced Computer Networks 2007 Reinhard Wallner reinhard.wallner@student.tugraz.at Outline Introduction Types of IDS How works an IDS Attacks to IDS Intrusion Prevention Systems

More information

NEN Community REANNZ. Design Statement: NEN Edge Device

NEN Community REANNZ. Design Statement: NEN Edge Device TO FROM NEN Community REANNZ DATE June 2010 SUBJECT Design Statement: NEN Edge Device Background This National Education Network (NEN) design statement was developed by REANNZ with input from the relevant

More information

Huawei One Net Campus Network Solution

Huawei One Net Campus Network Solution Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,

More information

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2009-2010 Projecto de Rede / Sistema - Network / System Design 1 Hierarchical Network Design 2 Hierarchical

More information

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and

More information

SNMP Network Management Concepts

SNMP Network Management Concepts SNMP Network Management Concepts Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Background Basic Concepts Summary The Origins of TCP/IP Starts at 1969, and founded

More information

COORDINATED THREAT CONTROL

COORDINATED THREAT CONTROL APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,

More information

Network Virtualization

Network Virtualization Network Virtualization Jennifer Rexford Advanced Computer Networks http://www.cs.princeton.edu/courses/archive/fall08/cos561/ Tuesdays/Thursdays 1:30pm-2:50pm Introduction Motivation for network virtualization

More information

Managing a Fibre Channel Storage Area Network

Managing a Fibre Channel Storage Area Network Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical

More information

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future

More information