Workshop on Collaborative Security and Privacy Technologies



Similar documents
Coordinating Attack Response at Internet Scale (CARIS)

MASSIF: A Highly Scalable SIEM

Briefing note. Survey of environmental liability insurance developments

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

H2020 "Secure Societies" Work Programme Digital Security 2015

MASSIF: A Promising Solution to Enhance Olympic Games IT Security

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

Management of Security Information and Events in Future Internet

SESAR. Luftfahrttechnologie - Auftaktveranstaltung zum 7. EU-Forschungsrahmenprogramm Wien, 4 Dezember 2006

European Network on Cyber Security. NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga

Trust areas: a security paradigm for the Future Internet

Information Services Strategy

Cloud Security Trust Cisco to Protect Your Data

Online/Cloud Services Trust challenges & eidentity-aspects

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

The internet and digital technologies play an integral part

Cloud Security Introduction and Overview

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Cyber security initiatives in European Union and Greece The role of the Regulators

FlowMon. Complete solution for network monitoring and security. INVEA-TECH

Cybercrime & Cybersecurity

Schengen routing or Schengen encryption?

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Overview of DG INFSO R&D on Trust & Security

Data Masking Best Practices

How To Write An Article On The European Cyberspace Policy And Security Strategy

CALNET 3 Category 7 Network Based Management Security. Table of Contents

MEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries

OVERVIEW OF RESEARCH PROJECTS IN THE ICT DOMAIN ICT statistical report for annual monitoring (StReAM)

How To Understand And Understand The European Priorities In Information Security

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

The Legal Protection Insurance Market in Europe. October 2013

Deliverable 1.2 Project Presentation

Ecom Infotech. Page 1 of 6

Mobile Cloud Networking

Social dumping and free movement: Overview of current issues from an economic point of view

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

Implementing the cooperation mechanisms of the RES directive current status and open questions

How To Become A Computer Scientist

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

Network Security Deployment Obligation and Expenditure Report

WWRF Cloud Implications to Security, Privacy, and Trust

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Information Security Management at the Olympics: Finding the Needle in the Haystack

GEOG 482/582 : GIS Data Management. Lesson 10: Enterprise GIS Data Management Strategies GEOG 482/582 / My Course / University of Washington

Enterprise IT Security Market Forecast to 2018: Technology, Market Trends, Size, and Opportunity

How To Help The European Single Market With Data And Information Technology

INTERNET DATA SAFE SOLUTIONS TURNKEY AND CUSTOM MADE

FLEXIANT. Utility Computing on Demand

Nokia Networks. security you can rely on

McAfee Security Architectures for the Public Sector

IAAS CLOUD EXCHANGE WHITEPAPER

Towards a Cloud of Public Services

INNOBAROMETER THE INNOVATION TRENDS AT EU ENTERPRISES

Protecting Communication in SIEM systems

New Frontiers for Official Statistics

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures

The Pan-European In-depth Accident Investigation Network

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Objective 1.2 Cloud Computing, Internet of Services and Advanced Software Engineering

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept.

ENTERING THE EU BORDERS & VISAS THE SCHENGEN AREA OF FREE MOVEMENT. EU Schengen States. Non-Schengen EU States. Non-EU Schengen States.

PV GRID. Efficient Grid Integration of European PV: Project Results. Jörg Mayer, Managing Director German Solar Industry Association (BSW-Solar)

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

[Selezionare la data] INNOVERY GROUP COMPANY PROFILE. [Digitare il sottotitolo del documento] * *

honeytarg Chapter Activities

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

IT Governance Regulatory. P.K.Patel AGM, MoF

Securing the E-Health Cloud

Transcription:

Workshop on Collaborative Security and Privacy Technologies Dr. Sathya Rao KYOS; Switzerland, Sathya.rao@kyos.ch CSP EU FORUM 2012, 25 April 2012, Berlin

Trust and Society Trustworthy systems essential in society: E.g. legal code, democratic institutions, moral code, justice, identity, accountability and auditing, transparency In digital life: secure, reliable systems and services, that protect privacy, and can be trusted to deliver properly; e-identity; data protection Resulting trust strongly influences economic growth. It took generations to build our democratic values One must nurture them into the digital age.

Security, Privacy, Trust Interplay in the Information Society Technology & Innovation Complexity, ease of use Role of end-users Society-protecting business models End-Users & the Society Global ICT - national frontiers Economics of security Policies for privacy-respecting Trust and Identity? TRUST in ICT Networks and Services Security, privacy, identity Protection of human values Transparency, accountability Auditing and Law enforcement Policy & Regulation

Network Monitoring Network Traffic monitoring: a must To operate & manage network To guarantee network infrastructure security To provide citizen s safety and public interest To enforce data retention and security laws To supply research activities devised to understand and improve network dynamics Network Traffic monitoring: a threat Against users privacy Infringement of data protection laws Profiling and wiretapping abuses Even by highly reputed national operators (at least three recent scandals only in 2006-2007) Measurement data misuse

FP7 Project : DEMONS DEMONS: Decentralised, Cooperative and Privacy Preserving Monitoring for Trustworthiness Consortium of 13 European organisations TID (ES), NEC (UK/GE), CNIT (IT), FTW (AT), Polish Telecom (PL), FT (FR), Intitut Telecom FR), ETHZ (CH), InveatTech (CZ), Singularlogic (GR), ICCS/NTUA (GR), OPTENET (ES), KYOS (CH) Duration of 30 months, from Sept. 2010 Budget: 8.3 M s

Motivation Collector Collector Today s monitoring systems Centralized Huge amount of exported/collected data Hard/no cooperation across domains Poor flexibility in access control to monitored data (little more than Y/N) Hardly coping with - Higher link rates and traffic volumes - Networks pervasiveness & capillarity - distributed, cross-domain, threats 5

Vision and Overlay of in-network monitoring devices From data-gathering probes to collaborative P2P computing and filtering devices Innovation pillars In-network processing and distributed intelligence Application-tailored data reduction and protection Resilient autonomic monitoring overlay Cross-domain interworking Target Impact Scalability Privacy preservation Flexibility and resilience Cross-domain threat detection and mitigation Exchange only the information strictly necessary for a given monitoring and analysis objective 6

Workshop Agenda 13.30 13.50 Inter-domain secure collaborative network monitoring: challenges and data protection approaches Giuseppe Bianchi, CNIT, Italy, DEMONS project 13.50 14.10 Blockmon A modular high performance data analysis framework Nico dheuruse, Maurizio Dusi, NEC, Germany, DEMONS project 14.10 14.30 Managing Threats and Vulnerabilities in the Future Internet Evangelos Markatos, Ioannis Sotiris, FORTH, Greece, SYSSEC NOE project 14.30 14.50 Some preliminary analysis of the economics of malware kits and traffic brokers Fabio Massacci, Luca Allodi, University of Trento, Italy, SECONOMICS project 14.50 15.10 Using Ontologies for Privacy-Awareness in Network Monitoring Workflows Georgios Lioudakis, ICCS; NTUA; Greece, DEMONS Project 15.10 15.30 COFFEE BREAK 15.30 15.50 Hardware acceleration enhancing network security Petr Kastovsky, INVEA-TECH, Czech Republic, DEMONS project 15.50 16.10 MASSIF: A Highly Scalable Security Information and Event Management (SIEM) Ricardo Jimenez-Peris, Universidad Politecnica de Madrid, Spain, MASSIF project 16.10 16.30 Architecture concept of trustworthy industrial sensor network deployments Markus Wehner, University of Applied Sciences, Dresden, Germany, TWISNET project 16.30 16.50 Managed Incident Lightweight Exchange: Standards for Cross-Domain Incident Handling Brian Trammell, ETH Zurich, Switzerland, DEMONS project 16.50 17.00 Conclusions CSP EU FORUM 2012, 25 April 2012, Berlin

Thank you! Questions? Contact: Sathya.rao@kyos.ch Tel: +41 79 2153566 CSP EU FORUM 2012, 25 April 2012, Berlin