Information Sharing in the Cloud:



Similar documents
How To Understand Cloud Computing

Complexeventprocessingand the CoMiFinproject

1.5x Explosion of information driving 54% growth in storage shipments every year. 70 per $1

MASSIF: A Highly Scalable SIEM

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management

GigaSpaces Real-Time Analytics for Big Data

Certified Cloud Computing Professional VS-1067

Business Intelligence meets Big Data: An Overview on Security and Privacy

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Cloud Computing for SCADA

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos

Strategy and Architecture - Cloud overview


Cloud Computing Technology

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad

Manifest for Big Data Pig, Hive & Jaql

Cloud Computing Services and its Application

Contents. BBS Software as a Service (SaaS),7. EH introducing aoudco.pu.ing 1. Distinguishing Cloud Types 4. Exploring

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

White Paper on CLOUD COMPUTING

Stephen Coty Director, Threat Research

Emerging Technology for the Next Decade

Increasing Business Productivity and Value in Financial Services with Secure Big Data Architecture

Application and practice of parallel cloud computing in ISP. Guangzhou Institute of China Telecom Zhilan Huang

Clouds vs Grids KHALID ELGAZZAR GOODWIN 531

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Massive Cloud Auditing using Data Mining on Hadoop

Actionable information for security incident response

Cloud Computing An Introduction

P2P-Enabling for Critical Infrastructure Protection

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

1. Understanding Big Data

EVILSEED: A Guided Approach to Finding Malicious Web Pages

Cloud Computing Training

Objective 1.2 Cloud Computing, Internet of Services and Advanced Software Engineering

CIS 4930/6930 Spring 2014 Introduction to Data Science Data Intensive Computing. University of Florida, CISE Department Prof.

Utilizing big data to bring about innovative offerings and new revenue streams DATA-DERIVED GROWTH

Next Generation IPS and Reputation Services

Introduction to Cloud Computing

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Service Description DDoS Mitigation Service

Stop DDoS Attacks in Minutes

Converged, Real-time Analytics Enabling Faster Decision Making and New Business Opportunities

Using WebSphere Application Server on Amazon EC2. Speaker(s): Ed McCabe, Arthur Meloy

Seminar Monitoring large scale complex systems through Complex Event Processing Technologies

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity

Cloud Essentials for Architects using OpenStack

Concept and Project Objectives

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

The Evolving Threat Landscape and New Best Practices for SSL

Seminar: Security Metrics in Cloud Computing ( se)

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Cloud computing: benefits, risks and recommendations for information security

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Cloud Computing Capacity Planning. Maximizing Cloud Value. Authors: Jose Vargas, Clint Sherwood. Organization: IBM Cloud Labs

Analysis and Research of Cloud Computing System to Comparison of Several Cloud Computing Platforms

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

Managing Cloud Computing Risk

Management of Security Information and Events in Future Internet

Automated Mitigation of the Largest and Smartest DDoS Attacks

Beyond the Hype: Advanced Persistent Threats

Page 1. Editor Patrick Blandin, Centre Henri Tudor, Luxembourg

Swordfish

How To Handle Big Data With A Data Scientist

Business Cloud Systems Challenges and Uncertainty

Big Data Challenges and Success Factors. Deloitte Analytics Your data, inside out

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Software-Defined Networks Powered by VellOS

Cloud Computing Governance & Security. Security Risks in the Cloud

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time

Keyword: Cloud computing, service model, deployment model, network layer security.

Forecast of Big Data Trends. Assoc. Prof. Dr. Thanachart Numnonda Executive Director IMC Institute 3 September 2014

Dispelling the vapor around Cloud Security

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Multi-Datacenter Replication

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Firm Uses Internet Service Bus to Enable Smart Grid for Dynamic Energy Savings

Introduction to grid technologies, parallel and cloud computing. Alaa Osama Allam Saida Saad Mohamed Mohamed Ibrahim Gaber

An Oracle White Paper November Leveraging Massively Parallel Processing in an Oracle Environment for Big Data Analytics

Preface Introduction

Cloud Computing Trends

HP Converged Cloud Cloud Platform Overview. Shane Pearson Vice President, Portfolio & Product Management

Azure Data Lake Analytics

On-Premises DDoS Mitigation for the Enterprise

George Broadbent Director, Entium Technology Partners. Jamie Brown Director, Colt Telecom

Addressing Open Source Big Data, Hadoop, and MapReduce limitations

Security Considerations for Public Mobile Cloud Computing

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER CLOUD 2.0 MOVING FROM COST SAVINGS TO AGILE IT

Cloud Computing. Making legal aspects less cloudy. Erik Luysterborg Partner Cyber Security & Privacy Belgium EMEA Data Protection & Privacy Leader

Introducing IBM s Advanced Threat Protection Platform

CLOUD COMPUTING SECURITY CONCERNS

Google Cloud Platform The basics

Are You in Control of Your Cloud Data? Expanded options for keeping your enterprise in the driver s seat

Transcription:

Sapienza Università di Roma Dipartimento di Informatica e Sistemistica Information Sharing in the Cloud: Opportunities and Challenges Roberto Baldoni Università degli Studi di Roma La Sapienza baldoni@dis.uniroma1.it, http://www.dis.uniroma1.it/~baldoni/ Microsoft Faculty day Rome, Italy 16/9/2010

The case of Collaborative Cyber Security in Financial Ecosystem What is information sharing; Which applications can primarily enjoying from it; Why cloud computing Issues related to cloud computing : the case of the financial infrastructure;

What is information sharing The term "information sharing" gained popularity as a result of the 9/11 Commission Hearings. The resulting commission testimony led to the enactment of several executive orders by President Bush that mandated agencies implement policies to "share information" across organizational boundaries. (Wikipedia) Information sharing is a behavior and not a technology issue. It includes: Cultural: the will to share and to collaborate Governance: the importance define instruments for information sharing Policy: the importance to define rules for sharing Economic: understanding the value of sharing

What is information sharing.but technology can help along several directions sharing huge amount of information sharing information in a timely manner correlating the shared information How is done now such information sharing in several contexts?

The case of Collaborative Cyber Security A payment card fraud (2008) 100 compromised payment cards used by a network of coordinated attackers retrieving cash from 130 different ATMs in 49 countries worldwide, totaling 9 million of US dollars. High degree of coordination, half an hour to be executed evade all the local monitoring techniques used for detecting anomalies in payment card usage patterns. The fraud has been detected only later, after aggregating all the information gathered locally by each financial institution involved in the payment card scam

Best Practices: Interact, the Canadian payment network Creation of new services for citizens used through ATM Information sharing for fraud protection Assumption: frauds hurt each bank randomly Action: Sharing some banking account information

Sapienza Università di Roma Dipartimento di Informatica e Sistemistica Collaborative Sense-and-Response application

Sense-and-Response applications Monitoring Continuous Control Command and Control Mashup services Business intelligence

Structure of a sense-respond application Sensors Event Notification Basic events Data Dissemination Complex Event Processing CEP Application level Correctness factors Accuracy (no false warning) Completeness (no detection of actual warning) Timeliness (no late warning) warnings

Collaborative sense-and response applications Some warning cannot be detected only correlating local information Events coming from different organizations over distinct administration boundaries; Sharing information potentially improves correctness factors: Improved accuracy Improved completeness Better timeliness

Examples of Collaborative sense-and-respond applications Collecting Network Anomalies [Huang et al, SIGMETRICS 2007] known, documented network disruptions are reflected in the BGP routing data within that network network-wide analysis can expose classes of network disruptions that are not detectable with existing techniques correlating different routing streams in real-time to localize network disruptions

Examples: Collaborative sense-and-response applications Smart Mobility Project involving Sapienza Univ. of Rome, Microsoft, Municipality of Rome live bing map (continuous queries) Events injected by traffic operators (local media, local transportation companies), traffic, citizens etc. Target: reducing the time to destination by assisting the person during the trip Platform based on MS Azure to optimize workload changes

Sense and response application characteristics It needs commodities CPUs In-Memory storage File system It is characterized by a uneven workload Cloud Computing is the right platform to use for implementing collaborative sense and response applications

Cloud Computing Definitions are Varied But There Are Some Common Attributes IT Customers: - Flexible pricing - Outsourced, on demand provisioning - Unlimited scaling - SW developer platform - Flexible Common Attributes of Clouds Flexible pricing Elastic scaling Rapid provisioning Advanced virtualization IT Analysts: - Variable pricing - No long term commitments - Hosted, on demand provisioning - Massive, elastic scaling - Standard Internet technology - Abstracted infrastructure - Service-oriented Press: - Pay by consumption - Lower costs - On demand provisioning - Grid and SaaS combination - Massive scaling - Efficient infrastructure - Simple and easy Frequently Cited Examples Amazon Compute and Storage Services Google App Services Salesforce App Exchange Financial Analysts: - Utility pricing - Multi-core chips - Hosted, a-a-s provisioning - Parallel, on demand processing - Scalable - Virtualized, efficient infrastructure - Flexible Source: IBM Corporate Strategy analysis of MI, PR, AR and VCG compilations

Data Management/Policy problems in the cloud Jurisdiction and regulation (Where and how will it be governed?) Ownership of Data (Who owns the data in the cloud?) Data Portability (Can you migrate between services?) Data Retention/Permanence (What happens to data over time?) Intellectual Property Security and Privacy (How is data secure and protected?) Reliability, Liability and Quality of Service (What happens when the cloud fails?)

Sapienza Università di Roma Dipartimento di Informatica e Sistemistica The case of the Financial Critical Infrastructure

The case of Collaborative Cyber Security in Financial Ecosystem "webification" of critical financial services, such as home banking, online trading, remote payments; Cross-domain interactions, spanning different organization boundaries are in place in financial contexts; Heterogeneous infrastructure systems such as telecommunication supply, banking, and credit card companies working on heterogeneous data;

The case of Collaborative Cyber Security in Financial Ecosystem A payment card fraud (2008) 100 compromised payment cards used by a network of coordinated attackers retrieving cash from 130 different ATMs in 49 countries worldwide, totaling 9 million of US dollars. High degree of coordination, half an hour to be executed evade all the local monitoring techniques used for detecting anomalies in payment card usage patterns. The fraud has been detected only later, after aggregating all the information gathered locally by each financial institution involved in the payment card scam

The case of Collaborative Cyber Security in Financial Ecosystem Distributed Denial Of Service Attack (2007, Northern Europe) render web-based financial services unreachable from legitimate users. DDoS attack targeted a credit card company and two DNS. Internet restored only after several trial-and-error activities carried out manually by network administrators of the attacked systems and of their Internet Service Providers (ISPs). Long preparation time (days), short attack time (seconds)

The case of Collaborative Cyber Security in Financial Ecosystem Both previous attacks cannot be detected quickly through information available at the IT infrastructure of a single financial player (i.e., using local monitoring) Need of Information Sharing Exchange non-sensitive status information Set up of agreements Advantages of a global monitoring system Damage mitigation Quick reaction

Barriers to Collaboration Barriers to collaboration Understanding the economics Trust LLYODS Legal Issues UBS France Telecom Internet AT&T Unicredit EDF Events SWIFT warnings

Sapienza Università di Roma Dipartimento di Informatica e Sistemistica EU CoMiFin Project EU CoMiFin Project www.comifin.eu

Collaborative Cyber Security: CoMiFin platform CoMiFin offers to FIs a platform for gaining the benefits of community-based collaboration over a business social network CoMiFin platform addresses needs considered important in the financial operator community (such as: information security, data privacy, SLA, contractual relationship for entering a community, certified anonimity, ) CoMiFin project had been submitted to three Financial Advisory Board (FAB) meeting evaluation sessions that have highlighted its possible business value in real financial use cases. Some FAB members: SWIFT, SIA-SSB, IMI-SAN PAOLO, BANK OF ITALY, UBS.

Collaborative Cyber Security: CoMiFin platform CoMiFin platform can be potentially useful for addressing the following business use cases Monitoring and reaction to threats (MitM, Stealty Scan, Phishing, ) Black/white lists distribution (for credit reputation, trust level, ) Anti-terrorism lists (with name check VAS) Anti money laundering monitoring Risk management support These use cases imply value added services that can be offered by SPs to FIs over CoMiFin

Collaborative Cyber Security: CoMiFin platform CoMiFin platform can be potentially useful for addressing the following business use cases Monitoring and reaction to threats (MitM, Stealty Scan, Phishing, ) Black/white lists distribution (for credit reputation, trust level, ) Anti-terrorism lists (with name check VAS) Anti money laundering monitoring Risk management support These use cases imply value added services that can be offered by SPs to FIs over CoMiFin

The notion of semantic room Contract set of processing and data sharing services provided by the SR along with the data protection, privacy, isolation, trust, security, dependability, performance requirements. The contract also contains the hardware and software requirements a member has to provision in order to be admitted into the SR. Objective each SR has a specic strategic objective to meet (e.g, large-scale stealthy scans detection, detecting Man-In-The-Middle attacks) Deployment highly flexible to accommodate the use of different technologies for the implementation of the processing and sharing within the SR (i.e., the implementation of the SR logic or functionality).

The notion of semantic room: relationship with cloud computing

CoMiFin Software Architecture contract

Sapienza Università di Roma Dipartimento di Informatica e Sistemistica Semantic Room I: Preventing Stealthy Scan

Collaborative Stealthy scan Attacker performs port scanning simultaneously at multiple sites trying to identify TCP/UDP ports that have been left open. Those ports can then be used as the attack vectors Added value of collaboration: Ability to identify an attacker trying to conceal his/her activity by accessing only a small number of ports within each individual domain Action taken: black list IP addresses update historical records

Example of semantic room for stealthy scan: Ingredients WebSphere extreme Scale (WXS): in-memory distributed storage High-level language for processing logic: Jaql (SQL-like, supports flows) Distributed processing runtime: MapReduce Distributed file system for long-term storage: HDFS Agilis consists of a distributed network of processing and storage elements hosted on a cluster of machines (also geographycally dispersed)

Data Dissemination: Agilis

Example of semantic room for stealthy scan: architecture

Collaborative Stealthy scan detection with Agilis Detection of stealty scan

Conclusion Information sharing is mandatory to reason on a complex world Security Enhancing productivity and the economy Cloud computing can provide necessary technological commodities to cope with such a complexity Privacy vs information sharing: the dilemma of the 21 st century