AdSec: A System for Adaptive Network Security



Similar documents
Top-Down Network Design

Intrusion Detection for Mobile Ad Hoc Networks

ESnet SDN Experiences. Roadmap to Operating SDN-based Networks Workshop July 14-16, 2015 Berkeley, CA C. Guok, B. Mah, I. Monga, E.

How To Manage A Network With Kepware

CTS2134 Introduction to Networking. Module Network Security

How To Understand and Configure Your Network for IntraVUE

TELE 301 Network Management

0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV

Training Course on Network Administration

A Resilient Protection Device for SIEM Systems

Ten Things to Look for in an SDN Controller

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

How To Set Up Foglight Nms For A Proof Of Concept

SNMP Protocol for Easy Network Management

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

SNMP. Simple Network Management Protocol

Introduction to Simple Network Management Protocol (SNMP)

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

IP Telephony Management

Cisco Certified Security Professional (CCSP)

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Secure Networks for Process Control

Network Monitoring Assignments

Security Toolsets for ISP Defense

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Potential Thesis Topics in Networking


Network Security Demonstration - Snort based IDS Integration -

CISCO IOS NETWORK SECURITY (IINS)

Stateful Inspection Technology

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

Management Tools, Systems and Applications. Network Management

Private Industry Role in Next Generation Internet. Bob Aiken. NGI Project Leader DOE er.doe..doe.gov Large Scale Networking Working Group June 1997

Presented by Aurang Zeb 14CS-03. Network Management System

Network Management System (NMS) FAQ

PANDORA FMS NETWORK DEVICES MONITORING

SDN Architecture and Service Trend

Network Management 2. Learning Objectives. Centralized network management? School of Business Eastern Illinois University

OM2012 Network Monitoring. Phil Bracher Sr. Premier Field Engineer Microsoft Corporation

Ranch Networks for Hosted Data Centers

Secure SCADA Network Technology and Methods

How To Manage A Network Management System (Hitachi)

Lecture 02b Cloud Computing II

Network Security. Chapter 9 Integrating Security Services into Communication Architectures

Performance Evaluation of Intrusion Detection Systems

Network Virtualization Network Admission Control Deployment Guide

PANDORA FMS NETWORK DEVICE MONITORING

Securing VoIP Networks using graded Protection Levels

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

Software Defined Networking (SDN)

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Deploying ACLs to Manage Network Security

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Current and Future Research into Network Security Prof. Madjid Merabti

Firewalls and Network Defence

Router Security - Approaches and Techniques You Can Use Today

Designing for Cisco Internetwork Solutions

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

An Overview of SNMP on the IMG

Virtual Server in SP883

Cisco Advanced Services for Network Security

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Cisco Network Foundation Protection Overview

ScotGrid. Bolting the door. Network Based Security Mechanisms. David Crooks, Mark Mitchell on behalf of ScotGrid Glasgow

IBM Tivoli Network Manager software

AN-POV-011 SNMP use with POV

Basics of Internet Security

SECURITY ADVISORY FROM PATTON ELECTRONICS

Campus LAN at NKN Member Institutions

SDN and NFV in the WAN

A standards-based network monitoring system

SolarWinds Certified Professional. Exam Preparation Guide

IT Networking and Security

Science DMZ Security

MX Platform Architecture Overview

MPLS VPN Security Best Practice Guidelines

The SCAMPI Scaleable Monitoring Platform for the Internet. Baiba Kaskina TERENA

Chapter 9 Integrating Security Services into Communication Architectures

Network Management Functions RMON1, RMON2. Network Management

High-performance VoIP Traffic Optimizer Client Solution

Protection profile of an industrial firewall

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

8. Firewall Design & Implementation

Simple Network Management Protocol

Tech Note Cisco IOS SNMP Traps Supported and How to Conf

Alternatives to SNMP and Challenges in Management Protocols. Communication Systems Seminar Talk 10 Francesco Luminati

Restorable Logical Topology using Cross-Layer Optimization

ITEC310 Computer Networks II

Intrusion Detection Systems

NEN Community REANNZ. Design Statement: NEN Edge Device

Huawei One Net Campus Network Solution

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

SNMP Network Management Concepts

COORDINATED THREAT CONTROL

Network Virtualization

Managing a Fibre Channel Storage Area Network

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

Transcription:

AdSec: A System for Adaptive Network Security Kihong Park Network Systems Lab & CERIAS Dept. of Computer Sciences Purdue University park@cs.purdue.edu Joint: E. Spafford (co-pi), M. Tripunitara, G. Nalawade

Motivation Network environment Secure QoS

Motivation (cont.) Goal Facilitate Secure QoS User plane protection Control plane protection Minimal footprint

Technical Challenges Integrate QoS & security architectures Minimize security footprint Fault-tolerance Programmability Interoperability

Approach User plane protection: end-to-end Security services: confidentiality, integrity, authentication, access control Property of cryptographic protocols well-understood

Approach (cont.) Control plane protection Proactive: authentication/integrity of certain signalling Reactive: too costly to make 100% proactive (e.g., Gbps switching) security-qos trade-off selective, controlled introduction of security holes reactive management

Approach (cont.) Adaptive security Combination of proactive/reactive rendering of security services Multiple levels of service Monitoring, control, and actuation Active resource management: control/scheduling Deterrent effect

Adaptive Security Architecture Short-term Long-term Monitoring Traffic monitoring Control input Logging and Access Control Control Filtering and data reduction On-line/off-line control Hierarchy management Switch/Router/ Network Element Actuation Information forwarding Control messaging

Security Middleware Layer Application Layer Transport Layer SML SML Application Layer Transport Layer Network Layer Network Layer Data Link Physical Layers Data Link Physical Layers Network

Monitoring & Control Hierarchy Level 2 Level 1 Level 0 Level 2 Level 1 Level 0 Hierarchical structure for resiliency and scalablity Byzantine agreement protocols (2/3 majority) for isolating compromised nodes

Overview of AdSec Function Programmable network management system for adaptive network security Implementation of any logical hierarchy Monitoring, control, and actuation SNMP based User programmable

AdSec: Components MIB Dependency Relation (MDR) Managers Agents Monitor function Control function System libraries config. snmpd wrapper wrapper

MIB Dependency Relation a b c d SNMP SET SNMP GET e f

Monitor & Control Functions Monitor function F : SNMP GET Control function G : SNMP SET user programmable Function wrappers Transparent read/write local vs. remote MIB OID (IP, Port) physical mapping

AdSec: Implementation Details Prototype system SNMP version 1 UC Davis snmpd implementation Others (e.g., Sun Microsystems) possible CMU SNMP library Functions: Intrusion detection Anomaly detection Automatic control

Benchmark: Set-up A Server (Manager) Legitimate Client (Manager) Ethernet Ethernet Internet Attacker Server (Manager) Router (Manager)

Benchmark: Set-up B Manager Manager Manager Victims (Agents) Internet Attacker Manager

On-going & Future Work Asynchronous extension: SNMP Trap Extensive monitor/control function libraries Integration with network management Active resource scheduling Integration with QoS management