Storage Cloud Infrastructures

Similar documents
Goals. Understanding security testing

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

Malicious Network Traffic Analysis

Security Techniques for Protecting Data in Cloud Computing one SHOULD know WHAT...

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Security and Vulnerability Testing How critical it is?

Stealing credentials for impersonation

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

General Network Security

Vulnerability Analysis of Energy Delivery Control Systems

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Enumerating and Breaking VoIP

CS5008: Internet Computing

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

Analytics: The Future of Security

Penetration Testing Service. By Comsec Information Security Consulting

Network Security Fundamentals

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Perspectives on Cybersecurity in Healthcare June 2015

Professional Penetration Testing Techniques and Vulnerability Assessment ...

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Effective Methods to Detect Current Security Threats

Jort Kollerie SonicWALL

Is Your SSL Website and Mobile App Really Secure?

Basics of Internet Security

ICTN Enterprise Database Security Issues and Solutions

Effective Methods to Detect Current Security Threats

InfoSec Academy Pen Testing & Hacking Track

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Using Entrust certificates with VPN

Software that provides secure access to technology, everywhere.

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Building A Secure Microsoft Exchange Continuity Appliance

IxLoad-Attack: Network Security Testing

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, AlertLogic_ACID

IINS Implementing Cisco Network Security 3.0 (IINS)

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner IAIK

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

Network Security: Introduction

Cloud Computing Governance & Security. Security Risks in the Cloud

Logging In: Auditing Cybersecurity in an Unsecure World

How To Manage Web Content Management System (Wcm)

BYPASSING THE ios GATEKEEPER

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Network Attacks. Common Network Attacks and Exploits

A HELPING HAND TO PROTECT YOUR REPUTATION

Ethical Hacking as a Professional Penetration Testing Technique

SANS Security 528 CASP Practice Exam

Targeted attacks: Tools and techniques

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants

Implementing Cisco IOS Network Security

How To Protect Your Network From Attack

Potential Targets - Field Devices

Topics in Network Security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Evaluation Report. Office of Inspector General

Wireless Security: Secure and Public Networks Kory Kirk

UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION. Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny

A Case for Managed Security

Presented by Evan Sylvester, CISSP

ARP Storm Detection and Prevention Measures

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Cybersecurity: What CFO s Need to Know

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING

SANS Security 528 CASP Practice Exam

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Penetration Testing. ISACA - Atlanta

Introduction to Cyber Security / Information Security

WRITTEN TESTIMONY OF

Reference Architecture: Enterprise Security For The Cloud

Villains and Voice Over IP

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Lab VI Capturing and monitoring the network traffic

Transcription:

Storage Cloud Infrastructures Detection and Mitigation of MITM Attacks Presenter: Jaqueline Carmilema CyberSecurity for the Next Generation South American Round, Quito 31 January 1 February, 2013 PAGE 1

Agenda INTRODUCTION CONCEPTS AND ISSUES EXPERIMENTAL MODEL PAGE 2

INTRODUCTION Risk Management and vulnerability analysis. MITM attacks, using ARP Spoofing in order to discuss the importance of protecting information stored in the Cloud PAGE 3

INTRODUCTION CONCEPTS AND ISSUES EXPERIMENTAL MODEL PAGE 4

Cloud Computing: Concepts and Issues Cloud Computing, gives the user many benefits with minimal management effort: Is not necessary to buy licensing contract Costs are reduced significantly Is not necessary the technical support Issues - Is not suitable to guarantee information s integrity, availability, and confidentiality of information - Even inside companies PAGE 5

Cloud Computing: Concepts and Issues Issues: - The information cannot be considered fully private - The lack of commitment of Cloud providers (SLA) - Cloud services are exposed to traditional threats PAGE 6

Providers cannot ensure Issues: - Cloud services are exposed to traditional threats ARP Spoofing - Either employees and customers can compromise IT security Man-In-The-Middle attacks PAGE 7

Agenda INTRODUCTION CONCEPTS AND ISSUES EXPERIMENTAL MODEL PAGE 8

Our research is focused on understanding the impact of ARP Spoofing, via a Man-I n-the-middle Attacks (MITM) as we propose that this vulnerability represents an important issue to consider within Cloud Infrastructures which can compromise information s integrity, availability, and confidentiality. PAGE 9

MITM Attack against a Experimental Storage Cloud PAGE 10

Performing MITM Attack against a Storage Cloud Service The intrusive machine (attacker) has installed Ettercap, DETECT Figure 2. Connection Request Reconnaissance with Ettercap Figure 3. Capturing FTP User Credentials with Ettercap and Embedded Wireshark PAGE 11 The MITM attack can start, and begin sniffing the connections in order to get the user credentials sent to the server. FTP storage cloud service is not protected and the connection requests can be intercepted through ARP Spoofing.

Mitigating MITM Attacks in Storage Cloud Infrastructures using arpon To mitigate this attack on the FTP Server 1, arpon runs as a service. Figure 4. Running arpon in the FTP Server 1 FTP Server 1 - arpon Installed FTP Server 2 - arpon not Installed Figure 5. Shielding the Storage Cloud form ARP Spoofing with arpon The connections made from the client to the server cannot be intercepted by Ettercap. However, on the FTP Server 2, there is no protection installed, was targeted again by Ettercap. PAGE 12

Conclusions and Recommendations This experimental Storage Cloud configuration allowed evaluating tools and simulating MITM attacks in order to propose a simple strategy for monitoring and mitigating ARP Spoofing in FTP Storage Cloud Services. This research made evident the importance of ensuring secure access, and a complete compliance with legal, governance and technical requirements that customers need to consider before moving to the Cloud. Cloud Computing involves risks and challenges around security which are not assessed until data breaches come out ->Cloud strategy: IT policies and establish response plans. In the cloud (public or private), implementation of intrusion detection and prevention solutions so that evasive vulnerabilities like ARP Spoofing can be detected. Also, implementing SSL through VPN channels PAGE 13

Thank You Presenter: Jaqueline Carmilema CyberSecurity for the Next Generation South American Round, Quito 31January 1 February, 2013 PAGE 14