The NSF SecureCloud Project: Cybersecurity for Enterprise Class Data Centers



Similar documents
Software Defined Networking Real World Use Cases (Test bed at Marist/IBM)

Software Defined Networking - Real World Use Cases (Test bed at Marist/IBM)

How to Achieve Operational Assurance in Your Private Cloud

Software Defined Networking Real World Use Cases (Test bed at Marist/IBM)

BlackRidge Technology Transport Access Control: Overview

Designing Virtual Network Security Architectures Dave Shackleford

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

Security Solution Architecture for VDI

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Flexible SDN Transport Networks With Optical Circuit Switching

Mirantis OpenStack Express: Security White Paper

APIs The Next Hacker Target Or a Business and Security Opportunity?

Cisco Advanced Services for Network Security

Firewalls. Chapter 3

Virtualization, SDN and NFV

Linux Network Security

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Software defined networking. Your path to an agile hybrid cloud network

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

Security Challenges & Opportunities in Software Defined Networks (SDN)

Citrix - CXD Deploying Citrix XenDesktop 7 Solutions

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Software Defined Network (SDN)

Technical Note. ForeScout CounterACT: Virtual Firewall

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Network Virtualization Solutions - A Practical Solution

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera VERSION May, 2015

Connecting your Virtual Machine to the Internet. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs

Implementing Cisco IOS Network Security

Secure Networks for Process Control

Securing Virtual Applications and Servers

THE BLUENOSE SECURITY FRAMEWORK

Netzwerkvirtualisierung? Aber mit Sicherheit!

Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

How To Orchestrate The Clouddusing Network With Andn

SDN Security Considerations in the Data Center. ONF Solution Brief October 8, 2013

Data Center Network Evolution: Increase the Value of IT in Your Organization

Recent Developments in Transport SDN

Check Point and Security Best Practices. December 2013 Presented by David Rawle

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

Web Application Firewall

OpenStack/Quantum SDNbased network virtulization with Ryu

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey

The Secure Web Access Solution Includes:

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Software Defined Networking Hva kan du starte med i dag? Geir Åge Leirvik HP Networking

SANS Top 20 Critical Controls for Effective Cyber Defense

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Securing end devices

Firewalls, Tunnels, and Network Intrusion Detection

Securing the Virtualized Data Center With Next-Generation Firewalls

Business Case for NFV/SDN Programmable Networks

Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain

Protecting Your SDN and NFV Network from Cyber Security Vulnerabilities with Full Perimeter Defense

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

Building A Secure Microsoft Exchange Continuity Appliance

SDN and NFV in the WAN

Top virtualization security risks and how to prevent them

SOFTWARE DEFINED NETWORKING

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Enterprise-Grade Security from the Cloud

Cisco IPS Tuning Overview

Leveraging SDN and NFV in the WAN

The Nexpose Expert System

SOFTWARE DEFINED NETWORKING: A PATH TO PROGRAMMABLE NETWORKS. Jason Kleeh September 27, 2012

Best Practices for DanPac Express Cyber Security

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

SOFTWARE-DEFINED NETWORKING (SDN)/NFV AND ACADEMIC RESEARCH IN CANADA

OPC UA vs OPC Classic

Threat-Centric Security for Service Providers

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Open Networking User Group SD-WAN Requirements Demonstration Talari Test Results

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms

Security Technology: Firewalls and VPNs

XPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin

Transcription:

The NSF SecureCloud Project: Cybersecurity for Enterprise Class Data Centers Casimer DeCusatis, Ph.D. Assistant Professor, Marist College @Dr_Casimer HVCSC

Overview Introduction to Marist College & the NY State Cloud Computing and Analytics Center Motivation for SDN/NFV/Cloud security research Goals of the NSF SecureCloud research program Experimental test bed and results to date

23 credit minor in Cybersecurity Intro to Programming (4 credits) Data Communication (4 credits) Internetworking (4 credits) Intro to Cybersecurity (4 credits Virtual Lab) offered every fall above 3 courses are prerequisites Hacking & Penetration Testing (3 credits Virtual Lab) offered every spring Intro Cybersecurity is a prerequisites Mobile Security (4 credits Virtual Lab) offered every spring Intro Cybersecurity is a prerequisites Intro Cybersecurity Hacking & Penetration Testing Mobile Device Security The first 3 courses are required for all computer science students, meaning they only need to complete the remaining 3 technical electives.

The Traditional Trust Economy 5

Trust used to be expensive Architecture of banks & government buildings evokes tradition, solidity, and enduring history Stamp of approval, guaranteed reputation Projects an aura of excellence Comes with a built-in reputation and social status Building brands in the pre-digital era was expensive 6

Trust used to be expensive Architecture of banks & government buildings evokes tradition, solidity, and enduring history Stamp of approval, guaranteed reputation Projects an aura of excellence Comes with a built-in reputation and social status Building brands in the pre-digital era was expensive Trust came from being purposely wasteful You can trust us, look at how much we spend on our buildings! 7

Why are we willing to put our trust in people we ve never met? A. Stan, The future is the trust economy, http://techcrunch.com/2016/04/24/thefuture-is-the-trust-economy/ (April 24, 2016) 8

Trust simply does not apply to packets. Identity at the network level is merely an assertion of certain attributes that may be true or false, forged or real. However, all we can truly know about network traffic is what is contained in packets, and packets cannot tell us about the veracity of the asserted identity, let alone the intentions or incentives of the entity generating the packets. http://csrc.nist.gov/cyberframework/rfi_comments/040813_forrester_research.pdf

Trust but Verify Verify and Never Trust pril 2013 http://csrc.nist.gov/cyberframework/rfi_comments/040813_forrester_research.pd

Eliminates the notion of a trusted vs untrusted network Disruptive technologies like SDN, NFV enable zero trust

The need for visibility and agility Yet only 25% of these were discovered In a few days Average time to discovery = 205 days (6-7 months) From Verizon data breach report

NSF SecureCloud Project Campus Cyberinfrastructure Data Networking Integration (2 years, $690 K) Casimer DeCusatis (PI), 4 students, other faculty/cio co-pi Industry partners including IBM, Ciena, Brocade, BlackRidge, Cisco Autonomic security for cloud computing environments Develop & deploy novel end-to-end security policy for each application Dynamically monitor the network both within and between data centers (up to 100 km) and change security configuration in response to attacks Develop & test new code, eventually deploy into production at Marist Goals Sense & response for denial of service attacks, IP spoofing, botnets, and malware Segregate traffic based on properties for improved visibility & quarantine threats Security analytics on big data sets collected from honeypots & cloaking key infrastructure

Identity-Based Network Security for the Cloud Networks do not allow for user or device identity to be determined before establishing network connections BlackRidge Transport Access Control (TAC) authenticates identity and enforces security policy on the first packet, before a network session is established Caller-ID for the Internet First Packet Authentication Before caller-id, you needed to answer to determine identity. After caller-id, you only answer authenticated and authorized callers. Session Setup Data Packet Flows time First Packet Authentication stops unauthorized access at the earliest possible time. Current security products start after network sessions are established.

Trusted Client Trusted Client Switch Untrusted Ingress port Management Port And NTP Port TAC insertion hardware Untrusted Management Network Virtual TAC validation Virtual Machine (VM) Trusted Egress port Protected Resource (SDN Controller) SDN Honeypot (fake SDN controller) UnTrusted Client

Without BlackRidge Servers Being Scanned Cloaked and Protected: You Can t Attack What You Can t See BlackRidge Enforce Mode Servers Not Found 12 Open Ports Found No Open Ports Found Cloaked, Protected, and Isolated!

Live Research Results: Blocking 100% of Unauthorized Traffic http://longtail.it.marist.edu/honey/statistic s_all.shtml Firewall IPS Protection BlackRidge Protection Firewall/IPS allows large number of TCP connection attempts through and information to leak. BlackRidge does not allow any unauthorized connection attempts or scans (information leakage) to occur.

LongTail Live Updates & Honeypots http://longtail.it.marist.edu/honey/ We have deployed 21 SSH honeypots across the Hudson Valley Collected and analyzed over 41 million data points over a 12 month period, and identified over 100 unique attack patterns IEEE TryCybSi Project, LongTail Honeypot http://try.cybersecurity.ieee.org/trycybsi/explore/honeypot 19

ICO with Application Security Policy Marist Remote Management App SDN Controller and Network Hypervisor With cloud orchestrator API Marist API code NetConf Ciena Blue Planet SDN Controller and Network Hypervisor With cloud orchestrator API Local Probes Marist LongTail & Honeypot (SSH, SDN) Remote Probes Brocade/Vyatta 5600 V-Router/Firewall WDM Node C Ciena Metro Ethernet WDM Node B Brocade/Vyatta 5600 V-Router/Firewall WDM Node A

Conclusions Zero Trust is an emerging network security framework Trust nothing, verify everything NSF SecureCloud uses first packet authentication and transport layer cloaking to implement the principles of zero trust NSF SecureCloud uses LongTail analytics to classify attack patterns, and generate rapid, automated, proportional response SSH Honeypots available now, SDN honeyports coming soon

Recent Research Publications C. DeCusatis, J. Ziskin, T. Bundy, The rise of SDN optical networks; has automated provisioning arrived?, invited presentation, Pacific Telecom Conference, Honolulu, Hawaii (January 2014) C. DeCusatis, R. Cannistra, B. Carle, M. Johnson, J. Kapadia, Z. Meath, M. Miller, D. Young, T. Bundy, G. Zussman, K. Bergman, A. Carranza, C. Sher-DeCusatis, A. Pletch, R. Ransom, Dynamic orchestration test bed for SDN and NFV at the New York State Center for Cloud Computing & Analytics, OFC 2014 annual meeting, San Francisco, CA (accepted & to be published, March 2014) C. DeCusatis et.al., Developing a software defined networking curriculum through industry partnership, Proc. ASEE Annual Meeting, Hartford, CT (April 3-5, 2014) ** named among top 10 conference papers ** http://aseene.org/proceedings/2014/index.htm Internet2 Global Summit, April 6-10, 2014, Denver, Colorado http://meetings.internet2.edu/2014-global-summit/detail/10003109/ C. DeCusatis, SDN, NFV, and the cloud disruption: the next generation open data center interoperable network (ODIN), BrightTalk webinar, April 17, 2014 https://www.brighttalk.com/search?q=decusatis C. DeCusatis, R. Cannistra, T. Bundy, Software Defined Environments and Next Generation Networks: a tutorial, Proc. Keystone Initiative for Network Based Education and Research (KINBER) 2014 annual meeting (an Internet2 affiliate), Harrisburg, PA, April 23-25, 2014 C. DeCusatis and L. Miano, Cloud computing and software defined environments, Pace University college of computer science and engineering seminar series, April 30, 2014 C. DeCusatis and R. Cannistra, Dynamic management and provisioning of software defined cloud data centers, Proc. NSF Enterprise Computing Conference (ECC), paper SC3101, June 8-10, Marist College, Poughkeepsie, NY (2014) 22

Follow @Dr_Casimer or http://www.ofcconference.org/en-us/home/about/ofc-blog/