A. Grusho, N. Grusho, E. Timonina, V. Piskovski The Institute of Informatics Problems of the Russian Academy of Sciences, Non-profit Partnership

Similar documents
Network Virtualization for the Enterprise Data Center. Guido Appenzeller Open Networking Summit October 2011

Secure Cloud Computing with FlexCloud

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Restorable Logical Topology using Cross-Layer Optimization

Cloud Computing Architecture

How To Manage A Virtualization Server

Virtual Machine in Data Center Switches Huawei Virtual System

Virtualized Networks based on System Virtualization

InHand Device Cloud Service DN 4.0 Quick Start Guide

Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop

Georgia College & State University

How To Build A Software Defined Data Center

Chapter 1: Introduction

Network/Cyber Security

Unifying the Programmability of Cloud and Carrier Infrastructure

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Making Data Security The Foundation Of Your Virtualization Infrastructure

Appendix G: MAS and MSS reports

Understanding the Business Case of Network Function Virtualization

Saisei and Intel Maximizing WAN Bandwidth

School Information Security and Privacy in the Cloud

Server Scalability and High Availability

Turnkey Technologies- A Closer Look

Virtualizing the SAN with Software Defined Storage Networks

Security & Cloud Services IAN KAYNE

Trademark Notice. General Disclaimer

Cloud Computing Concept, Technology & Architecture

MS 20246C Monitoring and Operating a Private Cloud

Entrust IdentityGuard Comprehensive

SDN: A NEW PARADIGM. Kireeti Kompella CTO, JDI

Parallels Server 4 Bare Metal

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Networking Basics for Automation Engineers

Server Consolidation with SQL Server 2008

PLUMgrid Open Networking Suite Service Insertion Architecture

1 Data Center Infrastructure Remote Monitoring

About this Course This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint 2010.

Module: Sharepoint Administrator

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam

Monitoring and Operating a Private Cloud

Designing a Microsoft SharePoint 2010 Infrastructure

The Complete Performance Solution for Microsoft SQL Server

VMUnify EC2 Gateway Guide

Simplifying the Transition to Virtualization TS17

Monitoring and Operating a Private Cloud

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

The Need to Be Innovative and Agile. Bridging the IT/OT Divide Using Software-defined Solutions

How To Protect A Virtual Desktop From Attack

Oracle Database Cloud Services OGh DBA & Middleware Day

Lecture 02b Cloud Computing II

Securing the Virtualized Data Center With Next-Generation Firewalls

Secure information storage

Software Defined Cloud Security Architectures

SCADA and Monitoring for Solar Energy Plant

OpenFlow/SDN for IaaS Providers

A Look at the New Converged Data Center

Testing ARES on the GTS framework: lesson learned and open issues. Mauro Femminella University of Perugia

In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project

Business Intelligence & Product Analytics

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

The Internet of Everything:

Data Security and Governance with Enterprise Enabler

HOSTED CALL RECORDING SERVICES New Revenue Opportunities for Service Providers

Designing a Microsoft SharePoint 2010 Infrastructure

Monitoring Agent for Citrix Virtual Desktop Infrastructure Version Reference IBM

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Big Drivers for IT Security

Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

Virtualization Technologies (ENCS 691K Chapter 3)

Protecting your Data in a New Generation Virtual and Physical Environment

ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM

Course 20346: Managing Office 365 Identities and Services

ACME Enterprises IT Infrastructure Assessment

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

LICENSING MANAGEMENT SERIES. A Guide to Assessing Windows Server Licensing

How To Create A Cloud Based System For Aaas (Networking)

Course 20246: Monitoring and Operating a Private Cloud

The BIg Picture. Dinsdag 17 september 2013

Applying Cryptography as a Service to Mobile Applications

This presentation provides an overview of the architecture of the IBM Workload Deployer product.

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

Network Virtualization

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

Software Defined Network Application in Hospital

White Paper on NETWORK VIRTUALIZATION

Software Defined Environments

Leveraging Virtualization for Higher Business Continuity within Industrial Facilities

SHAREPOINT ARCHITECTURE FUNDAMENTALS

First experiences using SharePoint 2016 Preview running on Windows 2016 Preview and SQL 2016 Preview.

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

Software Defined Exchange (SDX) and Software Defined Infrastructure Exchange (SDIX) Vision and Architecture

White Paper. Next Generation Historians. Improve historical data access and analysis while reducing costs. What s Inside:

Maintaining HMI and SCADA Systems Through Computer Virtualization

CON Software-Defined Networking in a Hybrid, Open Data Center

Hybrid for SharePoint Server Search Reference Architecture

Network Virtualization: A Tutorial

Analysis of Network Segmentation Techniques in Cloud Data Centers

Transcription:

A. Grusho, N. Grusho, E. Timonina, V. Piskovski The Institute of Informatics Problems of the Russian Academy of Sciences, Non-profit Partnership «Applied Research Center for Computer Networks» Moscow, Russia

Traditionally IT infrastructure can be presented as a connected graph GG tt = VV tt, EE tt, where VV tt IT components, EE tt interactions. We also can introduce a two kinds of topology, assigning to every host: a risk, i.e. L 1 is a measure, a kind of a norm reflecting a probability to get unauthorized access a value of data a host processes, similarly we denote it as L 2, a measure of data category

DMZ Back office Sharepoint SCCM Internet Mail Server RDBMS Data Center SCADA HMI HMI Equipment Operational DW segment HMI MES PLM DSC Controllers, sensors, actuators, equipment PLC Sensors

The norm of L 1 representing a scalar risk. A given threshold defines a subset V 1 of components. We can assume those components have got heightened risk of unsafe impact. A threshold applied to V and L 2 defines a subset V 2 of hosts or components containing valuable information needed to be protected.

We determine the system architecture as secure when there are no direct interactions between V 1 and V 2 elements. If there is a need in such interactions then we have to put an interface called SecS (Security Server). The Security Server is both to lower a risk of hazard effect on valuable hosts and to prevent of rising value level for risky hosts. SDN allows to recalculate norms mentioned above and to customize configurations in order to keep the architecture secure

It s really hard and expensive to build absolutely or assured secure architecture. As an example of systems with different levels of security we consider a PC. Also we assume the PC runs under a hypervisor with its manager and two virtual machines. A virtual machine VM1 has connected with Internet, and the other VM2 is not allowed to connect to Internet. A user can work with his confidential data on a VM2 and has to switch to VM1 in order to send these packages. Thus we can state that just described architecture is more secure in comparison of a situation when both virtual machines have been accessed to Internet.

VM1 VM2 Admin.OS Hypervisor

Data (OLAP facts) accompany with markers to estimate a value, i.e. data category BI (OLAP) procedures recalculate aggregated value markers complying with predefined rules Control Plane applications administer an access to aggregated values on-line according to users credentials and his current activity profile These applications can use AI technology to realize such a flexible security policy to guard sensitive data

SDN controller applications solve the problems: To get an access to the object of analysis, i.e. data flow from a web-service to a client, e.g. by men-inthe-middle Applying AI tools to analyze data flow and make a decision on its content during the period defined by technological and business requirements

To protect data with a usage of insecure platforms in control and data planes: 1. Split data (e.g. a text) into fragments 2. Furnish every fragment with two cryptographically protected marks 3. Store crypto keys for these marks in control plane 4. Place fragments into randomly chosen memory slices 5. Controller swiftly restores a full text as a linked list according to requested fragment

... Meta data Data Access Control Controller Service of distributed data storage Request to get data Data Fragment 1... Fragment N-1 Processing data Data Fragment N... Data storage systems Fragment 1 Fragment N Fragment N-1... Private cloud... DropBox SkyDrive

A secure usage of cryptography depends on the quality of isolating domain with cryptographic functions running Applying specialized high performance technical means in control plane to use dissimilar crypto keys in different data flows and to carry out bulk computations at instantiating cryptographic protection of high quality

Thank you Questions