Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu
|
|
|
- Christopher Hall
- 10 years ago
- Views:
Transcription
1 Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu Presented by Alaa Shublaq
2 SDN Overview Software-Defined Networking (SDN) is a new programmable network framework that separates the control plane from the data plane. The control plane is responsible for complicated network functions such as computing a routing path, monitoring network behavior, and managing network access control. The data plane takes care of hardware level network packet processing based on policies from the control plane.
3 SDN OpenFlow OpenFlow is a leading implementation of SDN that defines the communication protocol between the control plane and the data plane. The OpenFlow controller maintains topology information and provides visibility to upper services and applications.
4 OpenFlow Topology Management Topology management includes three parts: switch discovery, host discovery and internal links (switch-to-switch link) discovery. It is controlled by Topology Management Services. Within the OpenFlow controller: Host Tracking Service (HTS) maintains a host profile that includes MAC address, IP address, location information and VLAN ID. Host profile is maintained to track the location of a host and is updated dynamically. Link Discovery Service (LDS) uses Open Flow Discovery Protocol (OFDP) to detect internal links between switches.
5 The Security Issue If fundamental network topology information is poisoned, all the dependent network services will become immediately affected, causing catastrophic problems. Host location hijacking Attack and link fabrication attacks are two network topology poisoning attacks that are introduced in the paper.
6 Host Location Hijacking Attack Host Tracking Service maintains a host profile for each end host to track network mobility. The lack of consideration on security for the update process provides an opportunity for an adversary to tamper host location information which in turns affects routing decisions and hijack the traffic towards the host.
7 Link Fabrication Attack OpenFlow adopts OFDP by utilizing LLDP packets for topology management. There exist security flaws during the link discovery procedure which opens the door to inject fake links into network topology. In a Fake LLDP Injection and by monitoring the traffic from OpenFlow switches, the attacker can obtain the genuine LLDP packet, modify the specific contents of the LLDP packet, generates fake LLDP packets to announce bogus internal links between two switches. In LLDP Relay, when receiving an LLDP packet from one target switch, the attacker repeats it to another target switch without any modification constructing a fake topology view
8 Dynamic Defense Strategies against Host Location Hijack Authenticate Host Entity: Authenticate a host by adding additional public-key infrastructure - a host encodes the new location information into an unused field of packet with the encryption using its private key This adds storage overhead for keeping public keys in the OpenFlow controller side and computation overhead for handling each Packet-In message. Overhead and cost for the management of all keys of hosts Verify the Legitimacy of Host Migration verify the legitimacy of the host migration by checking the precondition (Port-Down) and post condition (Host unreachable in old location) Performance overhead but lighter and more feasible
9 Dynamic Defense Strategies against Link Fabrication Authentication for LLDP packets Adds extra controller-signed authenticator ((HMAC) code) TLVs in the LLDP packet and check the signature when receiving the LLDP packets. It fails to defend against the Link Fabrication attack in an LLDP relay/tunneling manner. Verification for Switch Port Property Check if any host resides inside the LLDP propagation If OpenFlow controllers detect host-generated traffic (e.g., DNS) from a specific switch port, Device Type of that port is set as HOST, otherwise switch ports are set as SWITCH.
10 TopoGuard Prototype System Automatic and real-time detection Extension Port Manager tracks dynamics of switch ports (ANY, SWITCH and HOST) Port Property maintains host list to verify the trustworthiness of a host migration. The Host Prober tests the liveness of the host in a specific location by issuing a host probing packet. Topology Update Checker verifies the legitimacy of a host migration, the integrity/origin of an LLDP packet and switch port property
11 TopoGuard Implementation Effectiveness A prototype implementation of TopoGuard on the master version of Floodlight.
12 TopoGuard Implementation Performance The performance penalty imposed by TopoGuard mainly comes from the Link Discovery Module and the Packet-In message processing. Port Manager incurs a slight delay over the normal LLDP and host-generated packets processing.
13 Summary SDN is a new programmable network framework. OpenFlow is a leading implementation of SDN. OpenFlow Topology Management services and examples of related security attacks. Propose TopoGuard framework for automatic and real-time detection extension to OpenFlow.
14 Criticism OpenFlow is an open protocol but not mandatory for SDN and accordingly this is an OpenFlow specific research. The paper avoids some security features such as ARP and LLDP protection because of static nature. Holistic approach is not considered (SDN as part of the whole network). Security of the network and underlying networking components are essential for SDN security. The approach is considering topology management services security as a silo solution. Not considered in relation to other layers or components of SDN architecture. Performance and security issues that may arise as a result of the use of keyed-hash message authentication code (HMAC) as an optional TLV for LLDP packets.
15 Questions?
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong* SUCCESS Lab Texas A&M University [email protected] Lei Xu* SUCCESS Lab Texas A&M University [email protected]
Security Challenges & Opportunities in Software Defined Networks (SDN)
Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products
SDN and OpenFlow. Naresh Thukkani (ONF T&I Contributor) Technical Leader, Criterion Networks
SDN and OpenFlow Naresh Thukkani (ONF T&I Contributor) Technical Leader, Criterion Networks Open 2014 Open SDN Networking India Foundation Technology Symposium, January 18-19, 2015, Bangalore Agenda SDN
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: [email protected]
Securing Local Area Network with OpenFlow
Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University
Software Defined Networking Security
Software Defined Networking Security Outline Introduction What is SDN? SDN attack surface Recent vulnerabilities Security response Defensive technologies Next steps Introduction Security nerd, recovering
Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks
1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion
Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering
Institute of Computer and Communication Network Engineering Institute of Computer and Communication Network Engineering Communication Networks Software Defined Networking (SDN) Prof. Dr. Admela Jukan Dr.
FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks
FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks Haopei Wang SUCCESS Lab Texas A&M University [email protected] Lei Xu SUCCESS Lab Texas A&M University [email protected]
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
Software Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David
OpenFlow - the key standard of Software-Defined Networks. Dmitry Orekhov, Epam Systems
OpenFlow - the key standard of Software-Defined Networks Dmitry Orekhov, Epam Systems Software-defined network The Need for a New Network Architecture Limitations of Current Networking Technologies Changing
Ethernet-based Software Defined Network (SDN)
Ethernet-based Software Defined Network (SDN) Tzi-cker Chiueh Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 Cloud Data Center Architecture Physical Server
DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING
DEMYSTIFYING ROUTING SERVICES IN STWAREDEFINED NETWORKING GAUTAM KHETRAPAL Engineering Project Manager, Aricent SAURABH KUMAR SHARMA Principal Systems Engineer, Technology, Aricent DEMYSTIFYING ROUTING
Software Defined Networks
Software Defined Networks Dr. Uttam Ghosh, CDAC, Bangalore [email protected] Outline Networking Planes OpenFlow Software Defined Network (SDN) SDN Origin What is SDN? SDN Architecture SDN Operation Why We
This presentation will define what we mean by hybrid mode, how that concept is supported by the OpenFlow specification, and some of the benefits of
1 A little about myself since I am a new face to most of you. My name is Shaun Wackerly and I ve been an HP Developer for the past 11 years. I developed switch firmware for 9 years, then transitioned to
SDN_CDN Documentation
SDN_CDN Documentation Release 0.1.1 introom9 October 27, 2015 Contents 1 What s it about 1 2 Get the code 3 3 Contents: 5 3.1 Overview................................................. 5 3.2 sdn_module................................................
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
IMPLEMENTATION AND EVALUATION OF THE MOBILITYFIRST PROTOCOL STACK ON SOFTWARE-DEFINED NETWORK PLATFORMS
IMPLEMENTATION AND EVALUATION OF THE MOBILITYFIRST PROTOCOL STACK ON SOFTWARE-DEFINED NETWORK PLATFORMS BY ARAVIND KRISHNAMOORTHY A thesis submitted to the Graduate School New Brunswick Rutgers, The State
Software Defined Networking and OpenFlow: a Concise Review
Software Defined Networking and OpenFlow: a Concise Review Stefano Forti [email protected] MSc in Computer Science and Networking Scuola Superiore Sant'Anna - University of Pisa 1. Introduction
OrchSec: An Orchestrator-Based Architecture For Enhancing Network Monitoring and SDN Control Functions
OrchSec: An Orchestrator-Based Architecture For Enhancing Network Monitoring and SDN Control Functions 9 May 2014 Dr.-Ing. Kpatcha Bayarou Head, Mobile Networks Fraunhofer SIT [email protected]
Network Security through Software Defined Networking: a Survey
[email protected] 09/30/14 Network Security through Software Defined Networking: a Survey Jérôme François, Lautaro Dolberg, Olivier Festor, Thomas Engel 2 1 Introduction 2 Firewall 3 Monitoring
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Configuring DHCP Snooping
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.
Firewalls CSCI 454/554
Firewalls CSCI 454/554 Why Firewall? 1 Why Firewall (cont d) w now everyone want to be on the Internet w and to interconnect networks w has persistent security concerns n can t easily secure every system
OF-RHM: Transparent Moving Target Defense using Software Defined Networking
OF-RHM: Transparent Moving Target Defense using Software Defined Networking Haadi Jafarian, Qi Duan and Ehab Al-Shaer ACM SIGCOMM HotSDN Workshop August 2012 Helsinki, Finland Why IP Mutation Static assignment
IxNetwork OpenFlow Solution
IxNetwork OpenFlow Solution Solution Highlights OpenFlow Controller Emulation OpenFlow Switch Emulation OpenFlow Benchmarking Test OpenFlow Switch Conformance Test Key Features Software Defined Networking
ViSION Status Update. Dan Savu Stefan Stancu. D. Savu - CERN openlab
ViSION Status Update Dan Savu Stefan Stancu D. Savu - CERN openlab 1 Overview Introduction Update on Software Defined Networking ViSION Software Stack HP SDN Controller ViSION Core Framework Load Balancer
Trusting SDN. Brett Sovereign Trusted Systems Research National Security Agency 28 October, 2015
Trusting SDN Brett Sovereign Trusted Systems Research National Security Agency 28 October, 2015 Who I am 18 years experience in Cryptography, Computer and Network Security Currently work at Trust Mechanisms,
Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)
Denial of Service Attacks and Countermeasures Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS) Student Objectives Upon successful completion of this module,
FlowGuard: Building Robust Firewalls for Software-Defined Networks. Hongxin Hu, Wonkyu Han, Gail-Joon Ahn and Ziming Zhao
FlowGuard: Building Robust Firewalls for Software-Defined Networks Hongxin Hu, Wonkyu Han, Gail-Joon Ahn and Ziming Zhao HotSDN 2014 Outline Introduction Challenges for Building FW in SDN FlowGuard framework
Ten Things to Look for in an SDN Controller
Ten Things to Look for in an SDN Controller Executive Summary Over the last six months there has been significant growth in the interest that IT organizations have shown in Software-Defined Networking
Concepts and Mechanisms for Consistent Route Transitions in Software-defined Networks
Institute of Parallel and Distributed Systems Department Distributed Systems University of Stuttgart Universitätsstraße 38 D-70569 Stuttgart Studienarbeit Nr. 2408 Concepts and Mechanisms for Consistent
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks
A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and
Software-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe
Software-Defined Networking for the Data Center Dr. Peer Hasselmeyer NEC Laboratories Europe NW Technology Can t Cope with Current Needs We still use old technology... but we just pimp it To make it suitable
Open Source Network: Software-Defined Networking (SDN) and OpenFlow
Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking
Software Defined Networking
Software Defined Networking Dr. Nick Feamster Associate Professor In this course, you will learn about software defined networking and how it is changing the way communications networks are managed, maintained,
Network Security: Network Flooding. Seungwon Shin GSIS, KAIST
Network Security: Network Flooding Seungwon Shin GSIS, KAIST Detecting Network Flooding Attacks SYN-cookies Proxy based CAPCHA Ingress/Egress filtering Some examples SYN-cookies Background In a TCP 3-way
SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network
SDN AND SECURITY: Why Take Over the s When You Can Take Over the Network SESSION ID: TECH0R03 Robert M. Hinden Check Point Fellow Check Point Software What are the SDN Security Challenges? Vulnerability
Let SDN Be Your Eyes: Secure Forensics in Data Center Networks
Let SDN Be Your Eyes: Secure Forensics in Data Center Networks Adam Bates University of Oregon Kevin Butler University of Oregon Andreas Haeberlen University of Pennsylvania Micah Sherr Georgetown University
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Eric Choi < [email protected]> Senior Manager, Service Provider Business Unit, APJ 2012 Brocade Communications Systems, Inc. EPF 7 2012/09/17 Software-Defined Networking
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1
SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1 A First Step Towards Network Security Virtualization: From Concept To Prototype Seungwon Shin, Haopei
OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?
OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Software Defined Networking (SDN) OpenFlow and OpenStack. Vivek Dasgupta Principal Software Maintenance Engineer Red Hat
Software Defined Networking (SDN) OpenFlow and OpenStack Vivek Dasgupta Principal Software Maintenance Engineer Red Hat CONTENTS Introduction SDN and components SDN Architecture, Components SDN Controller
SDN Programming Languages. Programming SDNs!
SDN Programming Languages Programming SDNs! The Good Network-wide visibility Direct control over the switches Simple data-plane abstraction The Bad Low-level programming interface Functionality tied to
New Cloud Networking Enabled by ProgrammableFlow
New Cloud Networking Enabled by ProgrammableFlow NISHIHARA Motoo, IWATA Atsushi, YUN Su-hun WATANABE Hiroyuki, IIJIMA Akio, KANOH Toshiyuki Abstract Network virtualization, network programmability, and
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
A denial of service attack against the Open Floodlight SDN controller
A denial of service attack against the Open Floodlight SDN controller Jeremy M. Dover Dover Networks LLC [email protected] Open Floodlight is an open-source software-defined network controller,
SDN Overview for UCAR IT meeting 19-March-2014. Presenter Steven Wallace ([email protected]) Support by the GENI Program Office!
SDN Overview for UCAR IT meeting 19-March-2014 Presenter Steven Wallace ([email protected]) Support by the GENI Program Office! Patterns (here, there, everywhere) Patterns (here, there, everywhere) Today s Internet
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
So#ware(Defined-Networking-andthe-Floodlight-OpenFlow-Controller
So#ware(Defined-Networking-andthe-Floodlight-OpenFlow-Controller Mike Cohen Big Switch Networks [email protected] Faan DeSwardt Symantec [email protected] Big$Switch$/$Symantec$Overview$
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Improving the Security and Efficiency of Network Clients Using OpenFlow
Improving the Security and Efficiency of Network Clients Using OpenFlow Adam Coxhead This report is submitted in partial fulfillment of the requirements for the degree of Bachelor of Computing and Mathematical
Designing Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
Configuring LLDP, LLDP-MED, and Location Service
27 CHAPTER Configuring LLDP, LLDP-MED, and Location Service This chapter describes how to configure the Link Layer Discovery Protocol (LLDP), LLDP Media Endpoint Discovery (LLDP-MED), and Location Service
An Introduction to Software-Defined Networking (SDN) Zhang Fu
An Introduction to Software-Defined Networking (SDN) Zhang Fu Roadmap Reviewing traditional networking Examples for motivating SDN Enabling networking as developing softwares SDN architecture SDN components
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
Software Defined Networking
Software Defined Networking Olaf Hagemann SE Director for DACH and HGM [email protected] SDN Drivers User, Device, App Mobility Cloud-Sourcing Consumerization of IT Silo d Workflows Dynamism
Software Defined Networking (SDN)
Software Defined Networking (SDN) Overview Traditional Switches Approaches and Issues Software Defined Networking Overview OpenFlow Controller/Network Operating Systems Traditional Switch Configuration
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, University of Padua, Italy {surname}@math.unipd.it
Software Defined Networking Seminar
Software Defined ing Seminar Introduction - Summer Term 2014 Net Jeremias Blendin [email protected] Prof. Dr. David Hausheer [email protected] PS Peer-to-Peer Systems Engineering Prof
On real-time delay monitoring in software-defined networks
On real-time delay monitoring in software-defined networks Victor S. Altukhov Lomonosov Moscow State University Moscow, Russia [email protected] Eugene V. Chemeritskiy Applied Research Center for
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
Tutorial: OpenFlow in GENI
Tutorial: OpenFlow in GENI GENI Project Office The current Internet is at an impasse because new architecture cannot be deployed or even adequately evaluated [PST04] [PST04]: Overcoming the Internet Impasse
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
SDN/Virtualization and Cloud Computing
SDN/Virtualization and Cloud Computing Agenda Software Define Network (SDN) Virtualization Cloud Computing Software Defined Network (SDN) What is SDN? Traditional Network and Limitations Traditional Computer
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices
DNP SCADA to SCADA Over : Standards, Regulations Security and Best Practices Earl Emerson, Director Systems Engineering RAD Data Communications 2014 Utilities Telecom Council of Canada Motivations for
Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication
Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Requirements You can configure voice over IP (VoIP) on an EX Series switch to support IP telephones. To configure
2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
The State of OpenFlow: Advice for Those Considering SDN. Steve Wallace Executive Director, InCNTRE SDN Lab Indiana University ssw@iu.
The State of OpenFlow: Advice for Those Considering SDN Steve Wallace Executive Director, InCNTRE SDN Lab Indiana University [email protected] 2 3 4 SDN is an architecture Separation of Control and Data Planes
A. Hot-Standby mode and Active-Standby mode in High Availability
High Availability (HA) is the feature that ensures the business continuity for your organization. IT staff can take HA as a simple solution for the disaster recovery. DrayTek utilizes the Common Address
I. ADDITIONAL EVALUATION RESULTS. A. Environment
1 A. Environment I. ADDITIONAL EVALUATION RESULTS The tests have been performed in a virtualized environment with Mininet 1.0.0 [?]. Mininet is tool to create a virtual network running actual kernel, switch
How To Understand The Power Of The Internet
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
COMPSCI 314: SDN: Software Defined Networking
COMPSCI 314: SDN: Software Defined Networking Nevil Brownlee [email protected] Lecture 23 Current approach to building a network Buy 802.3 (Ethernet) switches, connect hosts to them using UTP cabling
IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...
IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V
Mobility Management Framework in Software Defined Networks
, pp. 1-10 http://dx.doi.org/10.14257/ijseia.2014.8.8,01 Mobility Management Framework in Software Defined Networks Kyoung-Hee Lee Department of Computer Engineering, Pai Chai University, Korea [email protected]
OpenFlow: Concept and Practice. Dukhyun Chang ([email protected])
OpenFlow: Concept and Practice Dukhyun Chang ([email protected]) 1 Contents Software-Defined Networking (SDN) Overview of OpenFlow Experiment with OpenFlow 2/24 Software Defined Networking.. decoupling
Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow
Wedge Networks: EXECUTIVE SUMMARY In this paper, we will describe a novel way to insert Wedge Network s multiple content security services (such as Anti-Virus, Anti-Spam, Web Filtering, Data Loss Prevention,
OF 1.3 Testing and Challenges
OF 1.3 Testing and Challenges May 1 st, 2014 Ash Bhalgat (Senior Director, Products), Luxoft Santa Clara, CA USA April-May 2014 1 Agenda OpenFlow : What and Why? State of OpenFlow Conformance Challenges
Network Services in the SDN Data Center
Network Services in the SDN Center SDN as a Network Service Enablement Platform Whitepaper SHARE THIS WHITEPAPER Executive Summary While interest about OpenFlow and SDN has increased throughout the tech
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
