Using Cloud Computing to Implement a Security Overlay Network
|
|
|
- Marcus Fisher
- 10 years ago
- Views:
Transcription
1 Using Cloud Computing to Implement a Security Overlay Network 1 K. Salah 2,3 J. M. Alcaraz-Calero 4 S. Zeadally 1 S. Almulla 1 M. Alzaabi 1 Computer Engineering Department, Khalifa University of Science Technology and Research (KUSTAR), Sharjah, UAE {khaled.salah, sameera.almulla, mohammed.zaabi}@kustar.ac.ae 2 Department of Communications and Information Engineering, University of Murcia, Murcia 30011, Spain 3 Hewlett-Packard Labs, Cloud and Security Lab, Bristol, BS34 8QZ, UK [email protected] 4 Department of Computer Science and Information Technology, University of the District of Columbia, Washington DC, [email protected] Abstract Cloud Computing and Overlay Networks have recently received a lot of attention in computing and networking areas. These technologies are being exploited and implemented in the design of large network infrastructures. They are being widely deployed by organizations, and research interests keep growing. We explore the use of Cloud Computing in implementing a security overlay network. In particular, we propose and analyze a general cloud-based security overlay network that can be used as a transparent overlay network to provide security services such as Intrusion Detection System (IDS), Anti-Virus software, Anti-Spam software and Distributed Denial of Service (DDoS). Each of these in-cloud security services is analyzed in terms of its resiliency, effectiveness, performance, flexibility, control, and cost. Keywords: Cloud Computing, Overlay Networks, Security, Denial of Service, Intrusion Detection, Anti-virus, Anti-Spam. 1. Introduction Cloud computing enables the usage of third-party IT infrastructures to be used on-demand according to the continuously changing customers requirements in a pay-per-use model. This paradigm reduces the necessity of investing in hardware for customers while improving the elasticity of the
2 computational resources in order to adapt to the business requirements. Businesses are quickly adopting the cloud computing paradigm. Overlay networks have also received a lot of attention in recent years due to its numerous benefits. The idea of an overlay network was first used in the deployment of the Internet over the existing telephone network. It can be defined as a virtual network that is built on top of an existing network. It consists of virtual nodes that are connected via virtual links. The main aim of overlay networks is to deploy a new network service that is not available in the underlying network. Cloud computing is mainly based on virtualization which enables multi-tenancy and scalable shared resources used on an on-demand basis by all tenants. Since overlay networks are also based on virtualized nodes for implementing network services, this fact allows combining both techniques to reap the benefits of each other together. This is particularly useful for the deployment of new transparent network security services over the current networks in order to enhance their protection. The primary contribution of this paper proposes and analyzes a cloud-based security overlay network that can be used to offer an integrated set of several security services. We focus on the most popular types of security software that are widely deployed. These include Intrusion Detection System (IDS), Distributed Denial of Service (DDoS) prevention, Security Management in protected endpoints, mainly, Anti-Virus and Firewall and also protection, including Anti-virus and Anti-Spam software. Throughout this paper, we refer to a protected endpoint as a physical or virtual computing host to be protected. The endpoint can be a service endpoint such as a web server or a client endpoint. Several security solutions have been examined and we discuss how they are best suited to be deployed as cloud services. The rest of the paper is organized as follows. Section 2 describes how cloud computing can be used as an overlay network for providing security services. Section 3 explains different overlay and cloudbased security systems. Section 4 describes and discusses a general architecture that can integrate different security solutions. Section 5 describes a proof-of-concept architecture deployed using today s available commercial solutions. Section 6 analyzes the proposed architecture in terms of performance, flexibility or cost. Finally, Section 7 concludes the paper and presents future work. 2
3 2. Cloud as a Security Overlay Network Cloud Computing is composed of three well-known layers. Infrastructure-as-a-Service (IaaS) layer is in charge of providing on-demand virtual infrastructures to third-parties using physical resources such as memory, storage and processors. This virtual infrastructure typically allocates resources from data centers owned and managed by the cloud provider and are used by customers through the Internet. The Platform-as-a-Service (PaaS) layer provides automatic provisioning of ready-to-use middleware services. Finally, the Software-as-a-Service (SaaS) layer makes use of the previous layers to offer end-user software services to customers. Software-as-a-Service (SaaS) SaaS API Plaform-as-a-Service (PaaS) IaaS API Infrastructure-as-a-Service (IaaS) Physical Machines IaaS API Virtual Infrastructure Figure 1. General overview of the Cloud Computing paradigm Various security applications such as Antivirus (AV), anti-spam and Intrusion Detection System (IDS) can be offered as Cloud services. These services can protect either the virtual infrastructure or the physical customer s infrastructure and are being designed as transparent services using an overlay network or as well-known endpoint services. This paper focuses on security systems designed to protect any virtual or physical machine using an overlay network. The collaboration among all of these security systems can provide a robust security elastic overlay network to protect customers virtual infrastructures transparently. 3
4 The provisioning of services by Cloud providers or by third-parties opens up several challenges: the outsourcing of data and applications, the fulfillment of Service-Level Agreements (SLAs) between the cloud provider and customers, the extensibility and shared responsibility of the virtual infrastructures, the implementations of laws and the design of multi-tenancy services are some cloud computing related features which make security and privacy a real challenge. Takabi et al [1] present an overview of the security and privacy challenges in Cloud computing. It is worthwhile noting that this paper does not focus on providing novel approaches to these Cloud security challenges. Rather, we focus on providing security services to third-parties using a Cloud-based elastic and transparent overlay network assuming a secure cloud computing environment is already in place. 3. Related Work The literature has reported several articles on cloud-based security solutions related to DDoS attacks, Intrusion Detection Systems (IDS), Anti-virus and security. For example, Du et al. [2] have proposed the CLoud-based Attack Defense (CLAD) architecture for preventing DDoS attacks launched against Web servers. It is basically a distributed system which runs over a Cloud infrastructure as a security overlay network to protect Web servers by means of a set of smart collaborative and transparent web proxies. CLAD is not yet provided as a commercial product. Imperva Cloud DDos Protection Service [3] is an analogous commercial cloud-based service that protects Web applications from DDoS attacks using an overlay network. McAfee SaaS [4] and McAfee SaaS Web protection are also commercial products focused on and web protection which provide resiliency against DDoS attacks using a cloud-based solution designed as an overlay network for protecting services and web browsing, respectively. Arbor Peakflow SP [5] is another similar commercial service which provides DDoS protection for HTTP, VoIP and DNS servers. For Intrusion Detection Systems (IDS), Vieira et al. [6] proposed an intrusion detection architecture suitable for grid and cloud computing environments in which audit data is collected from the cloud and two intrusion detection techniques are applied. Roschke et al. [7] have proposed an extensible and distributed IDS architecture for Cloud Computing. This architecture involves several IDS sensors which are distributed across the Cloud and a central management unit. Each protected endpoint is monitored by a separate sensor. Each sensor reports alerts to the central management unit which 4
5 gathers all alerts from all sensors and processes them. Attacks can be detected by the correlated alerts from different IDS sensors. However, this prior work does not design such solution as an overlay network to offer such security service as a transparent service for customers protected endpoints. Finally, Guan et al. [8] described the basic features of a framework for the construction of a Cloud Provider intrusion detection system that an E-Government environment should fulfill. As for Anti-Virus (AV) solutions, Yan et al. [9] and Zheng et al. [10] proposed an automatic malware discovery system for providing anti-virus software support using the cloud. They proposed a hybrid approach in which the client has a lightweight version of the malware signatures and the central Cloud-hosted AV service hosts the large database of signatures. A hybrid processing model is established between the desktop and the cloud AV services. Oberheide et al. [11] proposed an in- Cloud architecture called CloudAV in which each host runs a process to detect executables entering a system which are then sent into the network for analysis, after which they are either executed or quarantined based on a threat report returned by the network service. McAfee SaaS Endpoint protection is a commercial product for providing a cloud-based AV service in which all the malware and viruses are intercepted in the cloud before they reach the customer mail servers. As for protection, Feamster [12] has proposed to shift from home-based spam filtering to a Cloud-based outsourced management and operation of this service by third parties which may have both operations expertise and a broader view of network activity. The Zscaler system provides antispam services, among others, in the Cloud. It uses a proxy for filtering the network traffic into the Cloud. Analogously, McAfee SaaS protection also provides a cloud-based anti-spam solution. 4. Proposed Security Overlay Network Figure 2 depicts an overview of the proposed architecture for providing an elastic security overlay network, i.e. a network that is deployed on-demand and grows as needed utilizing the virtual infrastructures provided by Cloud providers. As illustrated in Figure 2, our proposed architecture is generic in nature and it can be used for the deployment of any cloud-based security solutions. The proposed design architecture is comprised of primarily cloud security and management units in addition to protected endpoints of the customer network. Different management units are used to 5
6 support specific security solutions. We describe these units below. The protected end points include web servers, servers, and normal production workstations and desktops. Hosts Internet Scalable Load Balancer Security Layers Virtual Infrastructure IDS IPS/DDoS Prevention Firewall Anti-Spam Anti-Virus VM Scalable Architecture Sensor Sensor... VM Agent Agent VM Sensor Management Console (PaaS Layer)... ESVM, CSM, SEM ESVM Endpoint Security and Vulnerability Manager CSM Central Security Manager SEM Secure Event Manager Internet Gateway Router Production Network Agent Agent Agent.. Agent Web Server Mail Server PCs Figure 2. Conceptual Cloud-based Security Overlay Network Agents are installed at protected endpoints of the customer s production network to handle or carry out any communication or computation requested by the cloud-based security central services employed in the cloud, or more precisely within the cloud-based security overlay network. The security overlay network implemented in the cloud is comprised of different security sensors and management units. Sensors are multi-purpose and can perform specific actions depending on the type 6
7 and the configuration of the cloud-based security solutions of interest. Each multi-purpose sensor is associated with a set of different security layers in which security checks are performed when information is crossing the sensor. A sensor acts as a proxy for monitoring the entire network traffic to a given customer s endpoint. We have chosen a proxy-based sensor because such an approach has already been validated by other research works [2] and by commercial solutions such as the provided by McAfee, Arbor and Imperva and this can benefit from the advantages of elasticity provided in the cloud. It is to be noted that while the overall sensors of the cloud-based security services are deployed in a transparent overlay network, the management console for configuring such services is exposed to endusers. Such a configuration setting includes increasing or decreasing the virtual resources used by each of these security services Intrusion Detection System A Network-based Intrusion Detection System (NIDS) passively monitors the traffic which traverses a given network which may carry malicious payload. Traffic is sniffed and captured by NIDS sensors. The collected data is analyzed to detect malicious activities and to respond or generate reports based on the detection. The NIDS examines the content of the network and the transport layer packet headers (such as TCP/IP), analyzes the sequence of packets and how these packets will affect applications that reside at the customer endpoints. The location of the network-based device in a given network has a great impact on the malicious traffic detection. There is a need for a centralized strategic location to place network-based devices for analyzing intrusions. Also, an isolation of the network-based devices from their monitoring targets is clearly needed to overcome the shortcomings of traditional IDS systems. This can be accomplished by using in-cloud IDS systems in which the devices are moved to the cloud. Figure 2 shows the proposed cloud-based IDS architecture that contains NIDS devices which are sensors having the IDS security layer activated and deployed in the cloud as a Virtual Machine (VM). The NIDS devices communicate with each other to coordinate intrusion detection schemes. This communication is done using the standardized Intrusion Detection Message Exchange Format (IDMEF). IDMEF is also used to integrate different NIDS sensors information and transfers such information to the Central Security Manager (CSM). This information is stored and retrieved in a Security Even Manager (SEM) 7
8 which is described later. This CSM is a cloud management unit which takes the role of gathering information from other sensors and processes the information from a global perspective. For this reason it does not constitute a central point of failure because if this unit fails, another VM will automatically take this role. The way to achieve this is by sending periodic alive messages to the wellknown CSM and in case it does not respond, then the VM sending messages will take the role of the CSM and will notify the rest of the VMs about this change in the system structure. When a host requests a service from any protected endpoint, the request has to pass through the incloud overlay network even if the endpoint is located in a virtual or a physical machine. Inside the cloud, a VM acts as a transparent proxy for the network traffic directed to a particular given endpoint. The way in which this transparency is accomplished is explained later in Section 5. The sniffed traffic information is processed by the associated sensor, and an alert or report is generated when necessary. It is worth noting that by inserting new on-demand NIDS sensors, the cloud elasticity mitigates the traffic bottlenecks of NIDS sensors when it is necessary do so Distributed Denial of Service Prevention Most of the measures taken against DDoS attacks rely mostly on the use of prevention techniques. Generally, the collaboration between multiple prevention techniques such as firewall, Intrusion Detection System (IDS), and Intrusion Prevention System (IPS) is the most widely adopted countermeasure. One of the well-known solutions is to use proxy servers between clients and the server. Note that these proxy servers are exactly the sensors described in the previous section but now, they are also acting as Intrusion Protecting System (IPS) because they are also able to enforce security protection techniques once the threat has been identified. In summary, the sensor performs the handshaking process with each client before forwarding the request to the endpoint or discarding it. This security solution introduces a potential bottleneck in the proxy server due to the latency associated with such processing. A trade-off between performance of the security solution and cost of the infrastructure has to be considered. Therefore, spending large amounts of money to prevent an attack that might happen with low probability is not a choice for small and medium size companies. As a result, cloud-based Anti-DDoS can be offered as an attractive and economical solution. Figure 2 illustrates the underlying architecture of the in-cloud DDoS security solution. This architecture comprises VMs providing a fault-tolerance entry point for external nodes. The system is 8
9 set up as an overlay network in which protected endpoints should be isolated from the Internet and should only accept non-malicious requests. Each request from a client should be handled by at least one in-cloud VM to verify the client, and then relays the request to the protected endpoint. Otherwise the endpoint is never reached. Each VM acts in an independent manner filtering all the traffic. It acts as a firewalled transparent proxy with various control mechanisms, namely admission control, network-layer filtering and congestion control mechanisms. Elasticity in the number of VMs is actively used to mitigate DDoS attacks to the system. The network-layer attack defense sniffs all packets detecting any malicious packets such as SYN, HTTP and UDP flooding. All the malicious packets are then dropped by the active cloud firewall composed of VMs. Admission control limits the number of hosts served by the endpoints to only the legitimate ones. Note that this admission control acts as an access control to the production network for external hosts. Congestion control limits the amount of resources consumed by each client. This protects the server from exhausting its resources. All the endpoints only accept traffic coming from the cloud security solution, configured in the firewall available in the gateway router (see Figure 2). This firewall configuration hampers security threats which try to bypass the cloud-based overlay security solution to attack directly the protected endpoints. There is also a non-external visible coordinator point, analogous to the CSM (described in the previous section), which is in charge of detecting complex and selective DDoS attacks. This requires an analysis of the information of the sensors involved to identify the attack Protection The premise with traditional anti-spam is that it can only detect threats or spam attacks which have already reached the enterprise network. Anti-spam does not proactively protect against network attacks. As the network of a typical organization grows, the centralized spam detection approach may not be able to support the different business locations. Scanning spam s in the cloud enables their detection before reaching the target client. This early detection provides an efficient security system that can mitigate attacks by blocking them. To date, some in-cloud anti-spam solutions are available on the market such as those of Symantec hosted Service and Zscaler. These solutions combine multiple commercial anti-virus and anti-spam engines, which result in a multi-layered defense to protect the client from -based attacks. They detect embedded suspicious URLs in s by the following-link capability and web links s 9
10 are blocked in case malicious content is detected. This solution detects malwares that bypass the antimalware and IDS/IPS systems. The solution examines attachments,detects malicious ones and blocks them. With in-cloud anti-spam, the task of scanning for with malicious URLs and attachments will be carried out by the cloud provider infrastructure which secures the enterprise network. The proposed architecture for an in-cloud anti-spam solution is depicted in Figure 2. This architecture is composed of multiple mail servers as protected endpoints using different protocols such as SMTP, POP3, and IMAP. The network traffic going to the mail servers passes through the in-cloud anti-spam security system. Then, mail traffic is proxied by the sensor and the associated anti-spam security layer processes it at the cloud provider. These anti-spam services analyze all inbound POP3 and IMAP traffic and the outbound SMTP traffic to detect spam mail. The in-cloud anti-spam engine is composed of several sensors used to implement distributed data processing. This feature enables load balancing to improve performance and spam detection if heterogeneous anti-spam solutions analyzed the same in parallel. The coordinator of all the sensors is involved in a mail inspection. This is a simple role which can be acquired by any sensor in a peer-to-peer fashion with no central point of failure Anti-Virus Service The cloud-based AntiVirus (AV) security layer has been proposed in several places in the architecture. First, it is implemented as a security layer where all the files and malicious code filtered in the sensors are analyzed in real-time against a smart repository which acts as a collaborative repository where multiple users report threat activity collaboratively from around the world. It enables an efficient detection of the malware due to the up-to-date activity status of the threats which significantly reduces the time spent in performing the AV analysis. The idea is to provide, in realtime, the more probable signatures in the AV analysis in order to detect the current high active threats quickly. The cloud-based antivirus service is one of the security layers available in Figure 2. This cloud-based AV service is used in the previously described protection system to inspect e- mails and attached files for suspicious and malicious code. At the endpoint, AV agents need to be installed in order to protect against malicious files coming from external sources such as USB flash drives, disks, CD, DVD, etc. In addition to obtaining the latest AV 10
11 signatures from the cloud, the AV agents in protected endpoints exchange AV reports of the analysis done locally with the cloud-based AV service. Such an exchange helps in keeping a centralized AV database of signatures up-to-date and also enables generating global AV reports to the cloud customer about the security health of the production network Endpoint Security and Vulnerability Manager All the previously described security solutions focus on providing an overlay security solution in order to protect endpoints from external hosts. However, internal security threats are also critically important. The control of the security status of the internal hosts available in the production network needs to be managed. Traditionally, a centralized domain controller has been in charge of enforcing all the security policies, network access control and managing the hosts available in the domain. However, now the boundaries of the administrative domain are fuzzy because security is distributed between the cloud provider and the user s domain, and moreover, this domain controller requires an important hardware and software investment for network management purposes. A cloud-based Endpoint Security and Vulnerability Manager (ESVM) service can act as a domain controller in which all the security policies can be enforced and network access control can be determined based on such security policies. To this end, the proposed system for managing the security in the internal production network is depicted in Figure 2. In essence, all the endpoints available in the production network have installed an agent that enables the automated management of the security in the hosts and the exchange of information between them and the ESVM. Such an agent becomes a critical element of the overall Network Access Control (NAC ) mechanism in which the agent enforces the installation, configuration and automated execution of the host-based antivirus, firewall and web browsing security solutions as well as the security policies defined by the domain administrator using the ESVM service such as the AV updates and Windows updates requirements. This way the agent acts as an enforcing point to handle any violation of the security policies. The log and report information obtained by the agents are exchanged with the ESVM which stores this security information in a central repository - the Secure Event Manager (SEM). This information is globally available. To provide fault-tolerance, the roles of ESVM and SEM can be assigned to any VM in the cloud using a P2P approach. The ESVM service is not publicly available to prevent attacks and ensure that only the production network can reach such VMs. The ESVM can also use active 11
12 techniques such as port scanners and security checks at the endpoints and passive techniques such as processing of logs in order to determine the vulnerability available in the production network. The Management Console (shown in Figure 2) shows all the information provided by the different security systems involved from the SEM providing a global integrated status of all the interoperable security systems and the associated vulnerabilities involved in a unified, coherent and integrated manner to the domain administrator. This console can interact with all the security solutions in order to configure and administer the different parameters involved. 5. Proof-of-Concept Implementation This section describes a Proof-of-Concept (PoC) deployment of our proposed architecture in order to show how a cloud security overlay network can be implemented to provide a sound security service for a small-size production network. We have implemented this architecture using today s available technologies, primarily using McAfee s and Imperva cloud security solutions. Our small-size production network comprises a DNS, SMTP and WEB servers along with the rest of hosts available in the internal network, 40 VM hosts. To create 40 VM hosts, we used 8 physical HP xw8400 Workstations, each equipped with Intel Xeon CPU at 3.00 GHz and 6 GB of RAM in which the Open Stack Diablo release has been installed. Each workstation runs 5 Windows VMs, totaling 40 virtual hosts. We configured our production network such that physical machines are isolated from both the Internet and VMs, and only the virtual hosts are protected with the McAfee SaaS Protection Endpoint. This setup makes the production network similar to the shown in Figure 2. The deployed cloud-based security solution is shown in Figure 3. 12
13 Hosts Internet Management Front-End Proxy Server Mcafee SaaS Web Protection Antiphishing Anti- Spyware Anti-Virus Filtering DDoS Servers Imperva DDoS Prevention SMTP/ POP3 Server Mcafee SaaS Protection DDoS Prevention Filtering Anti-Spam Anti-Virus Mcafee SaaS Vulnerability Scanning Exploits Port Scanner etc... Mcafee Security Center SEM Security Policies Single Sign-On Proxy Mcafee IaaS Imperva IaaS Mcafee IaaS Internet Gateway Router Production Network Mcafee SaaS Endpoint Protection Anti-virus Firewall Mcafee SaaS Endpoint Protection Mcafee SaaS Endpoint Protection Mcafee SaaS Endpoint Protection Web Server Secure Browsing DNS Server SMTP/POP3 Server Figure 3. Deployed architecture using today s available commercial solutions Our setup utilizes the security policies and network access control from the McAfee Security Center software which is similar to the CSM and SEM components shown in Figure 2. The configuration of the McAfee Security Center can be done online via a secure HTTPS web-based interface. This interface is also similar to the Management Console shown in Figure 2. We were able to manage and configure the firewall, web security, and all mail security aspects. The Security Center provides a central web interface where the rest of the other security services are integrated using Single Sign-On (SSO). The traffic information generated by the endpoints available in the production network is filtered against anti-virus, anti-spam and anti-phishing using McAfee SaaS Web Protection service. 13
14 This service has been implemented as a transparent service from the hosts by a simple modification of the gateway router. Outbound traffic to this router is redirected to the McAfee service using a regular transparent proxy configuration. This modification is transparent to all hosts available in the internal network. The gateway router exclusively allows incoming traffic from the Mcafee and Imperva servers to reach the production network avoiding any security thread attempting to skip the overlay network. Our mail server has been protected using the McAfee SaaS Protection service which analyzes anti-spam and anti-virus and protects against DDoS attacks to the mail server. This security system is enabled by a smart configuration of the mail servers public MX DNS entries via inserting a MX entry which redirects all the inbound and outbound traffic to the McAfee services. This implementation acts as the anti-spam and anti-virus component shown in Figure 2. The Cloud-based DDoS prevention service provided by Imperva protects our corporate web server and all the incoming traffic to the production network against DDoS attacks by means of an IDS/IPS efficient solution. The only requirement for this deployment is to provide the IP associated with our web server to the Imperva security provider and a modification in our DNS (A entry) for which our domain name is resolved against the Imperva server. This service analyzed all the IP traffic received and acts as the DDoS prevention and IDS services shown in Figure 2. Note that the simple modification of these two DNS entries together with the basic setup of the gateway router allows a transparent overlay network which is not perceived by the hosts when accessing the production network. It is to be noted that the McAfee SaaS Vulnerability Assessment solution provides a complete overview of all the vulnerabilities available in the protected endpoint network. This is an advanced solution for analyzing and managing vulnerabilities, risk and possible threats in all the hosts. This component is similar to the ESVM component shown in Figure Analysis of Cloud-based Security Overlay Network This section discusses and analyzes the pros and cons of using cloud-based security overlay network in the context of our PoC implementation of the proposed architecture. We address key aspects related to resiliency to attacks, effectiveness, flexibility, control, costs and performance. To 14
15 accomplish this goal, we carried out a comprehensive penetrating testing using a BackTrack 5 R1 Linux distribution installed on an individual external host trying to attack the production network. 6.1 Network Security Assessment The design of a transparent overlay network of security services has a key advantage over the traditional cloud-based solutions, particularly in concealing the internal network information of security appliances and production networks, thereby protecting against network enumeration and reconnaissance techniques. To evaluate this, we have tried to discover the security services running in the network by performing a complete port scan with NMAP over the DNS name of the domain associated to the production network. The list of open ports retrieved matches exactly 100% with the ports opened by the Web server which was configured in the IDS service as the default endpoint for all the legitimate IP traffic. The port scanner was detected by the overlay IDS and reported to the administrator via instantaneously. We also tried to discover management ports but the service was completely hidden. We also attempted to obtain information from the DNS name using a whois command but the information returned was that of the Web server belonging to Mcafee. In addition, we have also evaluated accessing the cloud using the actual IP address of nodes resolved previously by the DNS server in order to bypass the overlay network. To account for this case, we configured the firewall iptables to redirect such direct traffic to the overlay security network to be analyzed. As for remote management and administration, a different IP address managed by the Mcafee and Imperva is provided. This IP address is the entry point for all the Mcafee customers using this service and requires a sophisticated monitoring. We have issued commands such as whois and traceroute for this IP address. Neither the traceroute information nor the HTTP header revealed any valuable network address. Next, we have evaluated the resiliency and effectiveness of our proposed architecture against popular attacks and threats. First, we tested the effectiveness of the anti-spam detection. To accomplish this, we executed the GFI [13] security test against an client host with the Mcafee Total Protection 2012 and also against an client host located in our PoC. The test sends 24 s (out of which 22 were spams) to an client. With our PoC architecture, the client received 2 s, and the other 22 were correctly identified as spams. Whereas without the PoC architecture, 15
16 all the s were received by the targeted client. Second, we tested the effectiveness of the IDS. We executed a complete set of modern and sophisticated attacks using the Metasploit Framework 4.3 from the BackTrack 5 R1 Linux distribution. Specifically, we have launched: i) SQL Injection attack (using SQLMAP external module); ii) Cross-site Scripting attack (using XSSF module); iii) Remote File Inclusion attack (Using the php_include module); and iv) Directory Transversal attack (using VMWare Directory Transversal external module). In all the cases, the attacks were detected, reported, and mitigated successfully. Third, we have assessed the effectiveness of AV detection. Rather than performing a horizontal assessment to check for different viruses and malware, we have preformed a vertical assessment in order to test the architecture. We sent 5 s with malware attached using both encrypted and nonencrypted SSL communications in the setup. In both cases, the malware was successfully detected and quarantined. We have tried to upload the same files to the Web server using both HTTP and HTTPS. In this case, the malicious HTTP upload was detected but the encrypted HTTP malicious upload was not detected. This is a limitation of the architecture. Advantages. A cloud-based NIDS service may seem to offer equal effectiveness in detecting threats when compared with the traditional non-cloud solution. However, this is not clearly the case for the anti-spam and the AV services. With the AV service, the cloud-based solution is far more effective than the conventional approaches due to the large data collected from various sources (collective intelligence), thereby offering the opportunity to quickly respond to new threats. The cloud-based anti-spam service is also more effective because spam and threats can be quickly detected before reaching the end user as stated in the penetration testing performed. Disadvantages. The security effectiveness of the overall system primarily depends on the instant and the constant update, upgrade and improvement of the security tools offered by the cloud provider. To support this requirement, the cloud provider needs to state clearly in the SLA agreement the rate and constant update of signatures and tools. 6.2 Performance Advantages. The elasticity of the cloud-based architecture enables an efficient distribution of the processing among multiple sensors with a load balancing mechanism that can reduce the latency. The 16
17 elastic nature of the cloud provider can be configured to provide enough flexibility. The endpoints are relieved of the processing required by traditional security solutions in which endpoints must do complete AV protection in addition to Web and spam filtering thereby enhancing the performance of endpoints. The bandwidth consumption of the production network is reduced because a good percentage of noisy and unwanted network packets are filtered by the overlay security network nodes. For example, SMTP consumes one third of an organization s bandwidth and about 90% of this bandwidth is used by spam mails. Disadvantages. Some cloud-based security solutions, such as Web security or mail security introduce significant network latency because network packets get intercepted and examined in the cloud before being sent to the production network elements. The interception is done by placing sensors between clients and the production network. To quantify such a latency, we have sent 100 consecutive pings to the protected web server and we compare it with the unprotected web server scenario. The results show that the average times are about 78 ms vs. 53 ms. For the case of downloading a 5 kilobytes file, the average times are 1123 ms and 1179 ms, respectively. This additional delay can be further reduced with the introduction of faster and load-balanced sensors. 6.3 Flexibility Advantages. The overlay design enables the extension, modification, upgrade and improvement of the security solution in a transparent way from the cloud adopters and users. The way in which the security solution is provided enables flexibility in growth and size. The unified set of security policies can ensure the same expected behavior for all the cloud users. The proposed architecture is flexible enough to provide security services to mobile and remote clients as well. The elastic nature of the cloud is a major benefit for the Anti-DDoS system to reconfigure on demand by adding and removing VMs when required in order to mitigate DDoS attacks. Additional benefits such as fault-tolerance and load-balancing are achieved by services that are directly provided by the IaaS provider. Disadvantages. The scalability of the proposed architecture directly relies on the cloud providers. For example, McAfee, used in our implementation, uses data centers allocated in Sydney, Tokio, Denver, Atlanta, Santa Clara, London and Amsterdam to provide scalability for the proposed solution. However, this scalability management is out of the control of the customer. Another disadvantage is 17
18 the clear dependence susceptible to receive an on-cascade attack. which is established between the cloud provider and the customer being 6.4 Control Advantages. The cloud-based network overlay solution offers a centralized point of security management in which the complete security aspects of the infrastructure can be configured, managed, and administered. Disadvantages. The burden of maintenance and support is placed on the cloud providers which take control of the management of the security systems ensuring that everything will be running, up-todate and correctly configured. The dependency on the cloud provider can cause potential security risks in terms of privacy, migration, reliability, and sniffed traffic. Such risks can be overcome if clear and detailed SLAs can be established to protect against abuse of leakage or disclosure of sensitive information. 6.5 Cost The basic cloud-based security solution described in the previous section costs around N per year, where N is the number of protected endpoints, or a cost of 782 in our scenario. Using traditional IT approach, this solution would approximately cost 3100 for hardware and 53N per year for software maintenance, or in our scenario, totaling a cost of Table 1 compares the cost of cloud-based security solutions with traditional IT security solutions used for our deployed scenario. The listed cost is based on advertised prices as of November 2011 gathered directly from official sources. According to VeriSign [14], a typical DDoS prevention solution requires at least 11 workers when compared to the cloud-based solution which may require 1 or 2 workers. Assuming an average IT engineering salary around /year (obviously, it depends on geographical locations), the difference in the investment is 5.5 times less expensive for the cloud-based solution. The costs involved demonstrate the maintenance and management of cloud-based security solutions can be very attractive. 18
19 Complete Security Solution Table 1. Cost comparison between traditional and cloud-based basic security solutions Basic Security Solution: web, mail, and endpoint protection Vulnerability Management Advanced IDS/IPS DDoS Prevention Traditional IT Solution McAfee and Web Security Appliance cost 3100 McAfee total endpoint protection standard costs 53 /year/vm McAfee vulnerability manager Starter Kit of 1000 IP addresses costs 8300 Hardware and software cost Maintenance 11 Workers 2 Workers Cloud-based Solution McAfee SaaS web and mail protection cost 22 /year McAfee SaaS endpoint protection costs 19 /year/vm McAfee SaaS vulnerability assessment costs 155 /year Software costs /year No cost for hardware Figure 4 and Table 1 compare the total annual cost of traditional and cloud-based security solutions with respect to the number of protected virtual host endpoints. We assume that a security hardware can handle a maximum of 1000 IPs. Figure 4(Left) shows the prices of the complete solution which may be adopted by big organizations, whereas Figure 4(Right) shows the prices of the basic solution which may be adopted by small and medium size organizations. The cost calculation in the figure take into account both security services and maintenance costs shown in Table 1. The calculation is based on linear formulas assuming a reasonable average lifetime of 7 years for hardware failure, with hardware acquisition costs divided over a period of 7 years with 0% interest. Advantages. The results show how the complete and basic cloud-based security solutions are on average 3.6 and 3.5 times, respectively, less expensive for organizations with a size PCs. For organization with a size of PCs, the complete and basic solutions are on average 3.6 and 2.9 times cheaper. For larger sizes, both types of solutions are on average 2.8 times cheaper. Disadvantages. In the case of a traditional non-cloud based solution, the acquisition of software licenses and hardware allows an organization to resell part of the equipment, thus recovering part of the investment made. This is not possible in case of the cloud-based solutions which are renting the services and hardware rather than owning them. 19
20 Cost (in 1000s ) Cost (in 1000 ) # Protected Endpoints (in 100s) Traditional Complete Security Solution Cloud-based Complete Security Solution # Protected Endpoints (in 100s) Traditional Basic Security Solution Cloud-based Basic Security Solution Figure 4. Comparing the cost of protection for cloud-based and traditional security solutions with the complete solution (Left) and with the basic solution (Right) 7 Conclusions In this paper, we have discussed a wide range of security solutions and how they can successfully be deployed and supported in the cloud. These in-cloud solutions may include Intrusion Detection System (IDS), Anti-Virus software, Anti-Spam software and Distributed Denial of Service (DDoS). We have proposed a general architecture for a security overlay network that can be deployed over a cloud infrastructure. We have shown a real-world proof-of-concept implementation of our proposed architecture to protect a small-size production network. The implementation was done using today s available cloud technologies. We have discussed and analyzed our cloud-based security overlay network in the context of a small prototype implementation. In particular, we have addressed key aspects related to effectiveness, flexibility, control, costs and performance. We have shown that in general the cloud-based security solution is an attractive option in terms of cost, flexibility, effectiveness. However, future research work needs to be done to quantify the actual performance latency that could be associated with implementing cloud-security solutions. 20
21 Acknowledgements We thank all the anonymous reviewers for their constructive comments which helped us to improve the quality and presentation of this paper. We are also grateful to the Associate Editor whose pertinent remarks also contributed toward further improvements of the paper. References [1] Takabi, H., Joshi, J. B. D., Ahn, G.-J.: Security and Privacy Challenges in Cloud Computing Environments. IEEE Security and Privacy. IEEE Computer Society. Vol. 8, Issue 6, pp , 2010 [2] Du, P., Nakao, A.: DDoS defense as a network service. IEEE Network Operations and Management Symposium NOMS. pp , Osaka, Japan. [3] Imperva Inc.: Imperva Cloud DDOs Protection Service. cloud-ddosprotection-service.html [4] McAfee Inc.: McAfee SaaS protection. [5] Arbor Inc.: Arbor Peakflow SP. [6] Vieira, K., Schulter, A., Westphal, C.B.: Intrusion Detection Techniques in Grid and Cloud Computing Environment. IT Professional. IEEE Computer Society. Vol. 12, Issue 4, pp [7] Roschke, S., Cheng, F., Meinel, C.: Intrusion Detection in the Cloud. Proceedings of IEEE International Conference on Dependable, Autonomic and Secure Computing, pp , Chengdu, China [8] Guan, Y., Bao, J.: A CP Intrusion Detection Strategy on Cloud Computing. Proceedings of International Symposium on Web Information Systems and Applications, pp , Nanchang, China. [9] Yan, W., Wu, E.: Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer. Vol. 4. pp , [10] Zheng, X., Fang, Y.: An AIS-based cloud security model. Proceedings of International Conference on Intelligent Control and Information Processing (ICICIP), pp , Delian, China. [11] Oberheide, J., Cooke, E., Jahanian, F.: Rethinking Antivirus: Executable Analysis in the Network Cloud. Proceedings of 2nd USENIX Workshop on Hot Topics in Security. August Boston, Massachusset. [12] Feamster, N.: Outsourcing home network security. Proceedings of the 2010 ACM SIGCOMM workshop on Home networks, pp , New Delhi, India. [13] GFI Software. GFI Security Test, Available at [14] Duffy Marsan, C.: Verisign to extend cloud-based DDoS protection to SMEs. Computer World UK, Available at smes/ 21
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing
An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing Partha Ghosh, Ria Ghosh, Ruma Dutta Abstract: The massive jumps in technology led to the expansion of Cloud Computing
CALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution
AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution The present document offers a comprehensive analysis of the ways to secure corporate email systems. It provides an expert opinion on
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Astaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
Advantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
IDSaaS: Intrusion Detection System as a Service in Public Clouds
IDSaaS: Intrusion Detection System as a Service in Public Clouds Turki Alharkan School of Computing Queen's University Kingston, ON Canada [email protected] Patrick Martin School of Computing Queen's
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Database Security in Virtualization and Cloud Computing Environments
White Paper Database Security in Virtualization and Cloud Computing Environments Three key technology challenges in protecting sensitive data Table of Contents Securing Information in Virtualization and
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239
ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239 Check Point Firewall Software and Management Software I. Description of the Item Up gradation, installation and commissioning of Checkpoint security gateway
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network
Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network 1 T.Ganesh, 2 K.Santhi 1 M.Tech Student, Department of Computer Science and Engineering, SV Collge of
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Intrusion Detection from Simple to Cloud
Intrusion Detection from Simple to Cloud ICTN 6865 601 December 7, 2015 Abstract Intrusion detection was used to detect security vulnerabilities for a long time. The methods used in intrusion detection
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Securing Cloud using Third Party Threaded IDS
Securing Cloud using Third Party Threaded IDS Madagani Rajeswari, Madhu babu Janjanam 1 Student, Dept. of CSE, Vasireddy Venkatadri Institute of Technology, Guntur, AP 2 Assistant Professor, Dept. of CSE,
Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser
Security and Billing for Azure Pack Presented by 5nine Software and Cloud Cruiser Meet our Speakers Symon Perriman VP of Business Development 5nine Software [email protected] @SymonPerriman Paul Zinn Senior
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013
Total Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.
Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High
The Advantages of Security as a Service versus On-Premise Security
The Advantages of Security as a Service versus On-Premise Security ABSTRACT: This document explores the growing trend of hosted/managed security as a service and why the cloud is quickly becoming the preferred
PART I: The Pros and Cons of Public Cloud Computing
PART I: The Pros and Cons of Public Cloud Computing Pros 1. Efficiently use the resource through sharing Users from companies or enterprises can access to the centralized servers where data are stored
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Trend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE. (Updated April 14, 2008)
KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE (Updated April 14, 2008) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium
Gateway Security at Stateful Inspection/Application Proxy
Gateway Security at Stateful Inspection/Application Proxy Michael Lai Sales Engineer - Secure Computing Corporation MBA, MSc, BEng(Hons), CISSP, CISA, BS7799 Lead Auditor (BSI) Agenda Who is Secure Computing
ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE
The Leader in Cloud Security DATA SHEET ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE OVERVIEW Email volume is growing every day. Administrators struggle with a growing number of appliances
BitDefender Client Security Workstation Security and Management
BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
White Paper A10 Thunder and AX Series Load Balancing Security Gateways
White Paper A10 Thunder and AX Series Load Balancing Security Gateways June 2013 WP_LB FW 062013 Disclaimer This document does not create any express or implied warranty about A10 Networks or about its
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
Load Balancing Security Gateways WHITE PAPER
Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...
Web Request Routing. Technical Brief. What s the best option for your web security deployment?
Web Request Routing and Redirection What s the best option for your web security deployment? Choosing the right method for redirecting traffic to your secure web gateway is absolutely essential to maximize
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
Importance of Web Application Firewall Technology for Protecting Web-based Resources
Importance of Web Application Firewall Technology for Protecting Web-based Resources By Andrew J. Hacker, CISSP, ISSAP Senior Security Analyst, ICSA Labs January 10, 2008 ICSA Labs 1000 Bent Creek Blvd.,
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Chapter 4 Application, Data and Host Security
Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request
KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks
KASPERSKY DDOS PROTECTION Discover how Kaspersky Lab defends businesses against DDoS attacks CYBERCRIMINALS ARE TARGETING BUSINESSES If your business has ever suffered a Distributed Denial of Service (DDoS)
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
