GRIDLOCK. Personnel. Duration: 3 years, starting in August 2002



Similar documents
WebDAVA: An Administrator-Free Approach To Web File-Sharing

Managing Access Control in Large Scale Heterogeneous Networks

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 (MS6416)

Implementing a Distributed Firewall

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

Design and Implementation of Virtual Private Services


Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

Firewalls and IDS. Sumitha Bhandarkar James Esslinger

Network Virtualization Network Admission Control Deployment Guide

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT. mcsa (70-413) Microsoft certified system administrator. (designing & implementing server infrasturcure)

Designing and Implementing a Server Infrastructure

Microsoft SharePoint 2007: for End Users and Site Owner

Updating Your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

Hypothesis Testing for Network Security

Recommended IP Telephony Architecture

Designing and Implementing a Server Infrastructure

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.

COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

Monitoring Remote Access VPN Services

Planning for Windows Server 2008 Servers

Network Services Internet VPN

Course Syllabus. 6416: Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server Key Data.

SolarWinds Certified Professional. Exam Preparation Guide

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Course # 20417B. Upgrading Your Skills to MCSA Windows Server 2012

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Secret Server Qualys Integration Guide

Networking with Windows Server vb. Day(s): 5. Version: Overview

In this training module, you learn how to configure and deploy a machine with a monitoring agent through Tivoli Service Automation Manager V7.2.2.

Cloud Security Best Practices

Designing and Implementing a Server Infrastructure

Upgrading Your Skills to MCSA Windows Server 2012 Course 20417A: 5 Days; Instructor-Led

20413C: Designing and Implementing a Server Infrastructure

Introduction to Endpoint Security

How To Use The Dcml Framework

20417-Upgrading Your Skills to MCSA Windows Server 2012

Lecture 02b Cloud Computing II

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence

Augmented Search for Software Testing

Best practices on cellular M2M deployment. Paul Bunnell November 2014

Security Considerations for DirectAccess Deployments. Whitepaper

Firewalls P+S Linux Router & Firewall 2013

Apple Pro Training Series. OS X Server. Essentials. Arek Dreyer. and Ben Greisler

Designing and Deploying Cloud Solutions for Small and Medium Business

Cisco Certified Security Professional (CCSP)

Private Cloud Solutions Virtual Onsite Data Center

Designing and Implementing a Server Infrastructure

Build Your Knowledge!

Designing and Implementing a Server Infrastructure

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Privacy and Identity Management for Europe

This How To guide will take you through configuring Network Load Balancing and deploying MOSS 2007 in SharePoint Farm.

REMOTE ASSISTANCE SOLUTIONS Private Server

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Delivering Managed Services Using Next Generation Branch Architectures

How To Manage A Virtualization Server

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Configuring Windows Server 2008 Network Infrastructure

VMware vcloud Air Security TECHNICAL WHITE PAPER

Course 20417B: Upgrading Your Skills to MCSA Windows Server 2012

Course Outline: Course Designing and Implementing a Server Infrastructure

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

Proposal to Migrate from a Workgroup to a Domain

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

CISCO IOS NETWORK SECURITY (IINS)

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Link Layer and Network Layer Security for Wireless Networks

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days)

Where can I install GFI EventsManager on my network?

Emulating an Embedded Firewall

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

What are your firm s plans to adopt x86 server virtualization? Not interested

70-685: Enterprise Desktop Support Technician

15 th April 2010 FIA Valencia

Microsoft Windows Server System White Paper

Implementing Reverse Proxy Using Squid. Prepared By Visolve Squid Team

Alcatel-Lucent Services

ICAWEB423A Ensure dynamic website security

Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector

AN INTEGRATED SECURITY ARCHITECTURE FOR ENTERPRISE NETWORKS. BY OWOH, Nsikak Pius (B.Sc. Computer Science & M.Tech Cyber Security Science)

Content-Centric Networking Applications For Medical Devices and Healthcare Management Systems

DIRECTACCESS FEATURE IN WINDOWS 7

With a little bit of IPv6 magic: Windows 7 DirectAccess

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

INTRODUCTION TO FIREWALL SECURITY

NetScreen s Approach to Scalable Policy-based Management

BM482E Introduction to Computer Security

Course 20413: Designing and Implementing a Server Infrastructure

Windows 7, Enterprise Desktop Support Technician

Transcription:

GRIDLOCK Personnel Joan Feigenbaum, Yale (jf@cs.yale.edu) Angelos D. Keromytis, Columbia (angelos@cs.columbia.edu) Jonathan M. Smith, Penn (jms@cis.upenn.edu) PhD students: Zhong, Ioannidis, Cook Duration: 3 years, starting in August 2002 Research Goals: Security management in large multi-application environments Unified approach to network and host security Virtual Private Services

General Problem Network and host security are now handled separately Incompatible configurations of components Leads to lack of end-to-end coherence Security vulnerabilities Loss of functionality VPN Configuration Packet filtering Firewall Apache Policy CGI CGI Local FS File ACLs Host based Network ACLs File Server Remote FS File ACLs Web Server Outside Inside View based ACLs Credit Card DB

GRIDLOCK Hypothesis Unification of network and host access-control mechanisms Technical components: Globally specified, locally interpreted policies Domain-specific policy meta-languages Virtual Private Services: Extend OS notions of virtual machine and process isolation to distributed systems Host 1 Policy Policy File System Data Base Policy Other Policy Network Policy... Host N Policy File System Policy Policy Other Network Host1 File Server FS View1 FS View2 Web Server CGI1 CGI2 Network Layer Network Layer Network Layer Host2 File Server FS View1 FS View2 Host3 Data Base DB View1 DB View2

Virtual Private Services Examples, in increasing order of complexity: Distributed database Virtual network infrastructure Virtual organization To achieve vision, we need: Efficient policy-enforcement mechanisms for the different components High-level, domain-specific policy languages Tools for verifying correctness and consistency Automated administration Starting point: trust management KeyNote trust-management system Distributed policy expressed explicitly and via credentials

Challenges Devising good application-domain (AD) languages Expressive, usable, efficiently implementable Cover multiple applications within a domain Managing diverse security mechanisms Example: filesystem vs. firewall semantics Conflict resolution and non-monotonicity Scalability Automating administration Performance

Current Activities Develop tools PEPL: framework for creating AD-specific languages DisCFS: credential-based network filesystem WebDAVA: user-managed, web-based file storage Translate AD-specific policies to KeyNote Use conflict-resolution capabilities of trust-management engines Augment existing access-control points with KeyNote Lightweight decision making Leverage localization of access control for scalability Enhance KeyNote as needed

Planned Experimentation Deploy shared filesystem across the three institutions Combine file-access control, firewall configuration, and web-server ACLs Use environment for joint authoring of reports and papers Implement full-fledged distributed database Extend to storage marketplace Integrate payment mechanism Virtual organization Combine network services and distributed-database services Integrate VPN and QoS capabilities

First-Year Accomplishments Sample of publications from first year - "EasyVPN: IPsec Remote Access Made Easy," USENIX LISA, October 2003 - "Secure and Flexible Global File Sharing," USENIX Freenix, June 2003 - "Experience with the KeyNote Trust Management System: Applications and Future Directions," 1st International Conference on Trust Management, May 2003 - "Design and Implementation of Virtual Private Services," IEEE WETICE, June 2003 - "WebDAVA: An Administrator-Free Approach to Web File-Sharing," IEEE WETICE, June 2003 - "Sprite: A Simple, Cheat-proof, Credit-based System for Mobile Ad-Hoc Networks," IEEE Infocom, April 2003 - "Verifiable Distributed Oblivious Transfer and Mobile Agent Security," DIALM/POMC, September 2003 DisCFS prototype (http://www.seas.upenn.edu/~miltchev) PEPL compiler (http://www.cs.columbia.edu/~angelos/code/canon31.tar.gz) WebDAVA prototype (http://www.cs.columbia.edu/~angelos/code/dava-demo.tar.gz)