Workshop on Collaborative Security and Privacy Technologies Dr. Sathya Rao KYOS; Switzerland, Sathya.rao@kyos.ch CSP EU FORUM 2012, 25 April 2012, Berlin
Trust and Society Trustworthy systems essential in society: E.g. legal code, democratic institutions, moral code, justice, identity, accountability and auditing, transparency In digital life: secure, reliable systems and services, that protect privacy, and can be trusted to deliver properly; e-identity; data protection Resulting trust strongly influences economic growth. It took generations to build our democratic values One must nurture them into the digital age.
Security, Privacy, Trust Interplay in the Information Society Technology & Innovation Complexity, ease of use Role of end-users Society-protecting business models End-Users & the Society Global ICT - national frontiers Economics of security Policies for privacy-respecting Trust and Identity? TRUST in ICT Networks and Services Security, privacy, identity Protection of human values Transparency, accountability Auditing and Law enforcement Policy & Regulation
Network Monitoring Network Traffic monitoring: a must To operate & manage network To guarantee network infrastructure security To provide citizen s safety and public interest To enforce data retention and security laws To supply research activities devised to understand and improve network dynamics Network Traffic monitoring: a threat Against users privacy Infringement of data protection laws Profiling and wiretapping abuses Even by highly reputed national operators (at least three recent scandals only in 2006-2007) Measurement data misuse
FP7 Project : DEMONS DEMONS: Decentralised, Cooperative and Privacy Preserving Monitoring for Trustworthiness Consortium of 13 European organisations TID (ES), NEC (UK/GE), CNIT (IT), FTW (AT), Polish Telecom (PL), FT (FR), Intitut Telecom FR), ETHZ (CH), InveatTech (CZ), Singularlogic (GR), ICCS/NTUA (GR), OPTENET (ES), KYOS (CH) Duration of 30 months, from Sept. 2010 Budget: 8.3 M s
Motivation Collector Collector Today s monitoring systems Centralized Huge amount of exported/collected data Hard/no cooperation across domains Poor flexibility in access control to monitored data (little more than Y/N) Hardly coping with - Higher link rates and traffic volumes - Networks pervasiveness & capillarity - distributed, cross-domain, threats 5
Vision and Overlay of in-network monitoring devices From data-gathering probes to collaborative P2P computing and filtering devices Innovation pillars In-network processing and distributed intelligence Application-tailored data reduction and protection Resilient autonomic monitoring overlay Cross-domain interworking Target Impact Scalability Privacy preservation Flexibility and resilience Cross-domain threat detection and mitigation Exchange only the information strictly necessary for a given monitoring and analysis objective 6
Workshop Agenda 13.30 13.50 Inter-domain secure collaborative network monitoring: challenges and data protection approaches Giuseppe Bianchi, CNIT, Italy, DEMONS project 13.50 14.10 Blockmon A modular high performance data analysis framework Nico dheuruse, Maurizio Dusi, NEC, Germany, DEMONS project 14.10 14.30 Managing Threats and Vulnerabilities in the Future Internet Evangelos Markatos, Ioannis Sotiris, FORTH, Greece, SYSSEC NOE project 14.30 14.50 Some preliminary analysis of the economics of malware kits and traffic brokers Fabio Massacci, Luca Allodi, University of Trento, Italy, SECONOMICS project 14.50 15.10 Using Ontologies for Privacy-Awareness in Network Monitoring Workflows Georgios Lioudakis, ICCS; NTUA; Greece, DEMONS Project 15.10 15.30 COFFEE BREAK 15.30 15.50 Hardware acceleration enhancing network security Petr Kastovsky, INVEA-TECH, Czech Republic, DEMONS project 15.50 16.10 MASSIF: A Highly Scalable Security Information and Event Management (SIEM) Ricardo Jimenez-Peris, Universidad Politecnica de Madrid, Spain, MASSIF project 16.10 16.30 Architecture concept of trustworthy industrial sensor network deployments Markus Wehner, University of Applied Sciences, Dresden, Germany, TWISNET project 16.30 16.50 Managed Incident Lightweight Exchange: Standards for Cross-Domain Incident Handling Brian Trammell, ETH Zurich, Switzerland, DEMONS project 16.50 17.00 Conclusions CSP EU FORUM 2012, 25 April 2012, Berlin
Thank you! Questions? Contact: Sathya.rao@kyos.ch Tel: +41 79 2153566 CSP EU FORUM 2012, 25 April 2012, Berlin