New Project Proposal Status Report Final Report

Size: px
Start display at page:

Download "New Project Proposal Status Report Final Report"

Transcription

1 Title: Models and Software Tools for Managing Network Complexity Date: May 16, 2018 Researcher Name(s): Xin Sun University: Ball State University Long Term Goal(s) New Project Proposal Status Report Final Report This project seeks to develop quantitative models for measuring network management complexity, and a set of software tools for managing such complexity. Our long term goals are the following: Goal 1: We will develop a suite of objective models that can accurately quantify the management complexity of a given network, by measuring the amount of effort required from the operators to understand and reason about the behavior of a network. Our key insight here is that such effort is directly dependent on the various characteristics in the design and configuration of the network, including the number of moving parts, their interplay, and how they together implement networkwide policies or requirements. Thus our models will be based on such design/configuration characteristics. Goal 2: Capitalizing on the complexity models, we will develop a set of software tools for managing the complexity. More specifically, we envision the tools will be able to: - Perform what-if analysis of how a proposed design change to an existing network may impact its management complexity, and thus help operators to avoid costly quick fixes ; - Compare multiple design proposals for a new network, and enable operators to select the simplest alternative. - Diagnose an existing network to find the root cause of its high complexity, and allow operators to quickly get to the bottom of the complexity problem. Background for Long Term Goals Operator interviews and anecdotal evidence suggest that networks with higher degrees of complexity in their design generally require more manual intervention to manage, are more difficult to reason about, predict and troubleshoot, and are more prone to human errors. For many complex enterprise networks, the amount of management effort required has become the dominant cost of operation [1]. Despite this investment, design mistakes and configuration errors account for more than half of network outages [1][2], 80% of Air Force network vulnerabilities [3], and 65% of all successful cyber-attacks [4]. In a recent white paper titled "What's behind network downtime" by Juniper Networks, it is noted that "Human error is blamed for 50 to 80 percent of network outages. But in this era of complex systems, the cause is probably not incompetence. Human error should be seen not as the direct cause of the problem but as a symptom of complexity. [R]educing and managing network complexity will have the biggest potential impact on network downtime. "[2]

2 Part of the complexity is inherent, given the wide range of operational objectives that these networks must support, to include security (e.g., implementing reachability policy), resiliency (e.g., tolerating up to two component failures), safety (e.g., free of forwarding loops), and performance. There is also evidence, however, to suggest that some of the network design complexity may have resulted from a semantic gap between the high-level design objectives, and the diverse set of routing protocols and lowlevel router primitives for the operators to choose from [4]. Operators generally agree that for the same target network, multiple designs often exist to meet the same operational objectives (e.g., security and resiliency requirements), and some designs are significantly easier to implement and manage than others. However, operators' reasoning about complexity remains qualitative and objective, and essentially a black-art. Despite being an intrinsic and critically important property of a network, complexity remains the least understood one. Unlike other network properties such as performance and resiliency that have all been extensively studied and for which models and algorithms have been successfully developed, complexity has received little systematic treatment from the networking community. This project seeks to bridge this gap, by creating quantitative models for measuring network complexity, and software tools for managing network complexity. The proposed research will be facilitated by the large configuration dataset the PI has obtained, which includes complete device configuration snapshots from five operational enterprise networks. This valuable dataset will be used to guide and validate the design of the complexity metrics and models and the development of the software tools. The PI has worked extensively in the field of network management [5][6][7][8][9][10][11][12][13][14][15], and have gained valuable insights, theoretical techniques, and software tools from the past experience, which will ensure the success of this project. The proposed research will also be strengthened by the extensive interactions the PI has with the operators community. Intermediate Term Objectives - Characterize the design and configuration of operational enterprise networks, and distill common design/configuration patterns. - Analyze the management complexity of the distilled patterns, and abstract the findings into mathematical models. - Create an algorithm for automatically applying the models and compute the complexity of a given network; - Develop software tools for what-if analysis and for complexity root-cause diagnose. Schedule of Major Steps We expect the project to starts on August 1 st, 2018, and below is the estimated timeline of the major steps:

3 Task Timeline Design of preliminary complexity models August December 31, 2018 Development of software tool for what-if analysis Development of software tool for complexity root-cause diagnose Write up the final project report July, 2019 January March 31, 2019 April June 30, 2019 Dependencies The design and validation of the complexity models depend on the availability of configuration data from operational networks. The PI has successfully secured such data from six networks, and they will be used in every step of the research project. Major Risks None. Budget One graduate research assistant, for one semester (stipend and tuition): $7,930 Two-week summer pay for the PI: %5,964 Fringe benefits: $1,083 Travel to future S2ERC meetings (both PI and student): $3,380 Indirect cost (10%): $1,643 Total: $20,000 Staffing PI: Dr. Xin Sun One graduate student Category of Current Stage New proposal

4 Contacts with Affiliates None. Publications and Other Research Products (actual or potential) We expect multiple publications from this project in peer-reviewed conferences and journals. References [1] Z. Kerravala. "As the value of enterprise networks escalates, so does the need for configuration management." The Yankee Group Report, [2] Juniper Networks. "What is behind network downtime?". White paper. Available at ibm.com/services/tw/gts/ pdf/ pdf, 2008 [3] Center for Strategic and International Studies. "Securing cyberspace for the 44th presidency." Available at http: //csis.org/files/media/csis/pubs/081208_securingcyberspace_44.pdf, [4] J. Pescatore. Taxonomy of software vulnerabilities. The Gartner Group Report, [5] Xin Sun and Geoffrey Xie. An Integrated Systematic Approach to Designing Enterprise Access Control. IEEE/ACM Transactions on Networking. Accepted for publication, [6] Xin Sun. A top-down framework for modeling routing design complexity. Chapter in book Redesigning the Future of Internet Architectures. IGI Global. ISBN13: May 2015 [7] Dennis Volpano, Xin Sun and Geoffrey Xie. Towards Systematic Detection and Resolution of Network Control Conflicts, In Proceedings of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Chicago, IL, August pp [8] Xin Sun and Geoffrey Xie. Minimizing Network Complexity through Integrated Top-down Design. In proceedings of ACM CoNEXT, Santa Barbara, CA, December pp [9] Xin Sun, Sanjay Rao and Geoffrey Xie. Modeling Complexity of Enterprise Routing Design. In proceedings of ACM CoNEXT, Nice, France, December pp [10] Minlan Yu, Xin Sun, Nick Feamster, Sanjay Rao, Jennifer Rexford. A Survey of Virtual LAN Usage in Campus Networks, IEEE Communications Magazine. Volume 49, issue 7, pp , July [11] Yu-Wei Sung, Xin Sun, Sanjay Rao, Geoffery Xie and David Maltz. Towards Systematic Design of Enterprise Networks. IEEE/ACM Transactions on Networking, Volume 1,9 Issue 3, pp , June [12] Xin Sun, Jinliang Wei, Sanjay Rao and Geoffrey Xie. A Software Toolkit for Visualizing Enterprise Routing Design. In Proceedings of IEEE Symposium on Configuration Analytics and Automation (SafeConfig), Arlington, VA. October pp [13] Xin Sun and Sanjay Rao. A Cost-Benefit Framework for Judicious Enterprise Network Redesign. IEEE INFOCOM (mini-conference), Shanghai, China, April. 2011

5 [14] Mohammad Hajjat, Xin Sun, Yu-Wei Sung, David Maltz, Sanjay Rao, Kunwadee Sripanidkulchai, and Mohit Tawarmalani. Cloudward Bound: Planning for Beneficial Migration of Enterprise Applications to the Cloud. In Proceedings of ACM SIGCOMM, New Delhi, India, pp [15] Mohammad Hajjat, Xin Sun, Yu-Wei Sung, David Maltz, Sanjay Rao, Kunwadee Sripanidkulchai, and Mohit Tawarmalani. Cloudward Bound: Planning for Beneficial Migration of Enterprise Applications to the Cloud. In Proceedings of ACM SIGCOMM, New Delhi, India, pp

VITA B. PROFESSIONAL EMPLOYMENT PRIOR TO ARRIVAL AT BALL STATE

VITA B. PROFESSIONAL EMPLOYMENT PRIOR TO ARRIVAL AT BALL STATE VITA PART I. PERSONAL DATA Name Current Rank Department Xin Sun Assistant Professor Computer Science A. EDUCATION Degree Date University Major Minor Doctor of Philosophy 08/2012 Purdue University, West

More information

Columbia University COMS W Virtual Machine Migration

Columbia University COMS W Virtual Machine Migration E-Migrate RESEARCH Columbia University COMS W6998-6 Virtual Machine Migration Kay Sripanidkulchai, IBM T.J. Watson Research Center October 13, 2010 Migration Technologies and Process Steps Virtualization

More information

Modeling the Complexity of Enterprise Routing Design

Modeling the Complexity of Enterprise Routing Design Modeling the Complexity of Enterprise Routing Design Xin Sun (Florida International U.), Sanjay G. Rao (Purdue U.) and Geoffrey G. Xie (Naval Postgraduate School) 1 The costs of complexity We propose that

More information

A Software Toolkit for Visualizing Enterprise Routing Design

A Software Toolkit for Visualizing Enterprise Routing Design A Software Toolkit for Visualizing Enterprise Routing Design Xin Sun, Jinliang Wei, Sanjay G. Rao, and Geoffrey G. Xie School of Electrical and Computer Engineering, Purdue University Department of Computer

More information

Towards Systematic Design of Enterprise Networks

Towards Systematic Design of Enterprise Networks Towards Systematic Design of Enterprise Networks Geoffrey Xie Naval Postgraduate School In collaboration with: Eric Sung, Xin Sun, and Sanjay Rao (Purdue Univ.) David Maltz (MSR) Copyright 2008 AT&T. All

More information

A Cost-Benefit Framework for Judicious Enterprise Network Redesign

A Cost-Benefit Framework for Judicious Enterprise Network Redesign This paper was presented as part of the Mini-Conference at IEEE INFOCOM 2011 A Cost-Benefit Framework for Judicious Enterprise Network Redesign Xin Sun and Sanjay G. Rao Purdue University Abstract Recent

More information

Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School

Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School xie@nps.edu It started in 2004 A sabbatical at CMU Joined a collaborative project with AT&T

More information

Jun Li, Ph.D. School of Computing and Information Sciences Phone:

Jun Li, Ph.D. School of Computing and Information Sciences Phone: Jun Li, Ph.D. School of Computing and Information Sciences Phone: + 1-305-348-4964 Florida International University Email: junli @ cs. fiu. edu 11200 SW 8th St, ECS 380, Miami, FL 33199 Web: http://users.cs.fiu.edu/

More information

Towards Systematic Design of Enterprise Networks

Towards Systematic Design of Enterprise Networks Towards Systematic Design of Enterprise Networks Yu-Wei Eric Sung 1, Sanjay G. Rao 1, Geoffrey G. Xie 2, David A. Maltz 3 1 Purdue University 2 Naval Postgraduate School 3 Microsoft Research Copyright

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

The goal of this project is to enhance the identification of code duplication which can result in high cost reductions for a minimal price.

The goal of this project is to enhance the identification of code duplication which can result in high cost reductions for a minimal price. Code Duplication New Proposal Dolores Zage, Wayne Zage Ball State University June 1, 2017 July 31, 2018 Long Term Goals The goal of this project is to enhance the identification of code duplication which

More information

ConfigSynth: A Formal Framework for Network Security Design Synthesis

ConfigSynth: A Formal Framework for Network Security Design Synthesis ConfigSynth: A Formal Framework for Network Security Design Synthesis Mohammad Ashiqur Rahman and Ehab Al-Shaer CyberDNA Research Center, UNC Charlotte Motivation Complexity of Security Configuration is

More information

white paper Rocket Rocket U2 High Availability / Disaster Recovery Best Practices

white paper Rocket Rocket U2 High Availability / Disaster Recovery Best Practices white paper Rocket Rocket U2 High Availability / Disaster Recovery Best Practices Rocket U2 High Availability /Disaster Recovery Best Practices Revised October 2014 Rocket Software, Inc. or its affiliates

More information

CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC

CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION Alan Stuart, Managing Director National Science Foundation s New Headquarters in Alexandria, Virginia 1. Introduction to the National

More information

CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management

CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management Instructor: Dr. Kun Sun Outline 1. Risk management 2. Standards on Evaluating Secure System 3. Security Analysis using Security Metrics

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

Video Streaming Over the Internet

Video Streaming Over the Internet Video Streaming Over the Internet 1. Research Team Project Leader: Graduate Students: Prof. Leana Golubchik, Computer Science Department Bassem Abdouni, Adam W.-J. Lee 2. Statement of Project Goals Quality

More information

How to Become a CMA (Certified Management Accountant) May 10, 2017

How to Become a CMA (Certified Management Accountant) May 10, 2017 How to Become a CMA (Certified Management Accountant) May 10, 2017 Today s Moderator Featured Presenter Agenda The CMA Designation Institute of Management Accountants (IMA) Why get a CMA? CMA Requirements

More information

UIUC. Application of Game Theory to High Assurance Cloud Computing. 20 September 2016

UIUC. Application of Game Theory to High Assurance Cloud Computing. 20 September 2016 UIUC Application of Game Theory to High Assurance Cloud Computing 20 September 2016 Integrity Service Excellence Charles Kamhoua, Ph.D. Research Electronics Engineer Air Force Research Laboratory Cyber

More information

Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN

Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN Pedro Heleno Isolani Juliano Araujo Wickboldt Cristiano Bonato Both Lisandro Zambenedetti Granville Juergen Rochol July 16,

More information

Towards Validated Network Configurations with NCGuard

Towards Validated Network Configurations with NCGuard Towards Validated Network Configurations with NCGuard Laurent VANBEVER, Grégory PARDOEN, Olivier BONAVENTURE INL: IP Networking Lab (http://inl.info.ucl.ac.be,laurent.vanbever@uclouvain.be) Université

More information

Splitting of traffic to maximize the data transmission in mobile ad hoc network under different constraints

Splitting of traffic to maximize the data transmission in mobile ad hoc network under different constraints www.ijcsi.org 558 Splitting of traffic to maximize the data transmission in mobile ad hoc network under different constraints Sushil Chandra Dimri 1, Kamlesh Chandra Purohit 2 and Durgesh Pant 1 Graphic

More information

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial

More information

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for

More information

The Start of Websites for Bhagavan Sri Sathya Sai Baba

The Start of Websites for Bhagavan Sri Sathya Sai Baba Om Sai Ram Om Sai Ram The Start of Websites for Bhagavan Sri Sathya Sai Baba After discussing the start of a website for the International Sai Organization with Michael Goldstein and others, in an interview

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington

Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington email: sevilla@cs.washington.edu Research Interests Computer networks, Host mobility, Web technology, Content caching Education University

More information

Western States Power Crisis EPRI White Paper - An Overview -

Western States Power Crisis EPRI White Paper - An Overview - Western States Power Crisis EPRI White Paper - An Overview - Dejan J. Sobajic July, 2001 Western States Power Crisis.1 Origins of the White Paper The roots of the document go back to several discussions

More information

CMMI Version 1.2. Josh Silverman Northrop Grumman

CMMI Version 1.2. Josh Silverman Northrop Grumman CMMI Version 1.2 Josh Silverman Northrop Grumman Topics The Concept of Maturity: Why CMMI? CMMI Overview/Aspects Version 1.2 Changes Sunsetting of Version 1.1 Training Summary The Concept of Maturity:

More information

Toward an Automated Future

Toward an Automated Future 2017 State of the Network Engineer: Toward an Automated Future netbraintech.com Executive Summary Today s enterprises have reached a tipping point when it comes to network management. Networks are growing

More information

Cyber Risk A Corporate Directors' Briefing Webcast Q&A Summary

Cyber Risk A Corporate Directors' Briefing Webcast Q&A Summary Cyber Risk A Corporate Directors' Briefing Webcast Q&A Summary Cyber experts from Marsh & McLennan Companies and WomenCorporateDirectors hosted an engaging webcast on August 16 th entitled Cyber Risk A

More information

Keynote Speech Keys to Resilience for SMEs

Keynote Speech Keys to Resilience for SMEs 2014/EPWG-SMEWG/HLPD/003 Session 2 Keynote Speech Keys to Resilience for SMEs Submitted by: IBM High Level Policy Dialogue on Resilient SMEs for Better Global Supply Chains Taichung, Chinese Taipei 24

More information

Information Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017

Information Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017 Information Technology Services Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017 Information Technology Services TABLE OF CONTENTS UPDATE ON PROJECTS &

More information

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION CONTENTS: Enterprise Mobility Strategy and BYOD Policies Endpoint Vulnerabilities and Challenges Conclusion For several decades,

More information

NETWORK SECURITY PROVISION BY MEANS OF ACCESS CONTROL LIST

NETWORK SECURITY PROVISION BY MEANS OF ACCESS CONTROL LIST INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE NETWORK SECURITY PROVISION BY MEANS OF ACCESS CONTROL LIST Chate A.B 1, Chirchi V.R 2 1 PG Student, Dept of CNE, M.B.E.S College

More information

Reducing Cybersecurity Costs & Risk through Automation Technologies

Reducing Cybersecurity Costs & Risk through Automation Technologies Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research

More information

Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET

Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET 1 st National Meeting on Improving Education and Training For Chinese Nuclear Power Industry Personnel

More information

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results Operationalizing Cybersecurity in Healthcare - - 2017 IT Security & Risk Management Study Quantitative and Qualitative Research Program Results David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec

More information

How Your Organization Can Drive Success in the Age of Digital Disruption

How Your Organization Can Drive Success in the Age of Digital Disruption How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

Data Plane Verification and Anteater

Data Plane Verification and Anteater Data Plane Verification and Anteater Brighten Godfrey University of Illinois Work with Haohui Mai, Ahmed Khurshid, Rachit Agarwal, Matthew Caesar, and Sam King Summer School on Formal Methods and Networks

More information

Machine-Based Penetration Testing

Machine-Based Penetration Testing Always in Control CyBot Suite Machine-Based Penetration Testing www.cronus-cyber.com - April 2016 CyBot PRODUCT SUITE Unique, patented Machine-based Penetration Testing Software with Global Attack Path

More information

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and

More information

Strengthening Surveillance: The TB Surveillance Checklist of Standards and Benchmarks Rationale and Development

Strengthening Surveillance: The TB Surveillance Checklist of Standards and Benchmarks Rationale and Development Strengthening Surveillance: The TB Surveillance Checklist of Standards and Benchmarks Rationale and Development Emily Bloss, PhD Division of Tuberculosis Elimination Centers for Disease Control and Prevention

More information

APPLYING DATA CENTER INFRASTRUCTURE MANAGEMENT IN COLOCATION DATA CENTERS

APPLYING DATA CENTER INFRASTRUCTURE MANAGEMENT IN COLOCATION DATA CENTERS APPLYING DATA CENTER INFRASTRUCTURE MANAGEMENT IN COLOCATION DATA CENTERS Table of Contents Executive Summary 3 The Colocation Market 4 An Introduction to DCIM 5 The Value of DCIM for Colocation Providers

More information

Middleware for Ubiquitous Computing

Middleware for Ubiquitous Computing Middleware for Ubiquitous Computing Software Testing for Mobile Computing National Institute of Informatics Ichiro Satoh Abstract When a portable computing device is moved into and attached to a new local

More information

HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018

HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018 HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018 Table of Contents A short technology overview 3 How micro-segmentation

More information

Bicycle Access & Parking Plan Project List Review

Bicycle Access & Parking Plan Project List Review Bicycle Access & Parking Plan Project List Review Bicycle Advisory Committee September 19th, 2013 Strategy Overview New Bicycle Issues and Ideas (BAC, staff, public) Funding External Agency Lead BAPP s

More information

Sanjay Gopinatha Rao October 2017

Sanjay Gopinatha Rao October 2017 1 Sanjay Gopinatha Rao October 2017 Education: B.Tech, Computer Science and Engineering, May 1997, Indian Institute of Technology, Madras M.S. in Computer Science, Dec 2000, Carnegie Mellon University

More information

IT Progress Report. Presented by: Owen Brady Director of Information Technology. Board. 19 th March 2015

IT Progress Report. Presented by: Owen Brady Director of Information Technology. Board. 19 th March 2015 Item 6 IT Progress Report Presented by: Owen Brady Director of Information Technology Board 19 th March 2015 Action for Board: For information For consideration For decision Table of Contents 1. Executive

More information

Interactive Campaign Planning for Marketing Analysts

Interactive Campaign Planning for Marketing Analysts Interactive Campaign Planning for Marketing Analysts Fan Du University of Maryland College Park, MD, USA fan@cs.umd.edu Sana Malik Adobe Research San Jose, CA, USA sana.malik@adobe.com Eunyee Koh Adobe

More information

MILLENNIUM PROJECT PROPOSAL

MILLENNIUM PROJECT PROPOSAL MILLENNIUM PROJECT PROPOSAL WANDERING VALLEY COMMUNITY COLLEGE Network Administrators: Ciprich, Mora, & Saidi ISM 6231 Fall 2000 Dr. Judy Wynekoop MILLENNIUM PROJECT PROPOSAL TABLE OF CONTENTS BACKGROUND

More information

International Journal of Advance Engineering and Research Development. Simulation Based Improvement Study of Overprovisioned IP Backbone Network

International Journal of Advance Engineering and Research Development. Simulation Based Improvement Study of Overprovisioned IP Backbone Network Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 8, August -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Simulation

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

Flooding Attacks by Exploiting Persistent Forwarding Loops

Flooding Attacks by Exploiting Persistent Forwarding Loops Flooding Attacks by Exploiting Persistent Forwarding Jianhong Xia, Lixin Gao, Teng Fei University of Massachusetts at Amherst {jxia, lgao, tfei}@ecs.umass.edu ABSTRACT In this paper, we present flooding

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

Southeast Florida Regional Climate Change Compact Update. Broward Climate Change Task Force February 16, 2017

Southeast Florida Regional Climate Change Compact Update. Broward Climate Change Task Force February 16, 2017 Southeast Florida Regional Climate Change Compact Update Broward Climate Change Task Force February 16, 2017 Overview Recent Activities RCAP Update Forthcoming Efforts Regional Resilience Projects Summit

More information

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required

More information

Operationalizing Cyber Security Risk Assessments for the Dams Sector

Operationalizing Cyber Security Risk Assessments for the Dams Sector Operationalizing Cyber Security Risk Assessments for the Dams Sector Kevin Burns, Jason Dechant, Darrell Morgeson, and Reginald Meeson, Jr. The Problem To evaluate vulnerability to the postulated threat,

More information

ERO Enterprise IT Projects Update

ERO Enterprise IT Projects Update ERO Enterprise IT Projects Update Stan Hoptroff, Vice President, Chief Technology Officer and Director of Information Technology Technology and Security Committee Meeting November 6, 2018 Agenda ERO IT

More information

Redefining Networking with Network Virtualization

Redefining Networking with Network Virtualization WHITE PAPER Redefining Networking with Network ization Why Networking Is Ripe for a Change Table of Contents Overcoming the Obstacle Blocking the Benefits of a Hybrid Cloud... 3 What Is Network ization?...4

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

Proposal Title: Developing the Planetarium as a Center for Public Outreach, Content!! Production, and Student Involvement. Amount Req.

Proposal Title: Developing the Planetarium as a Center for Public Outreach, Content!! Production, and Student Involvement. Amount Req. Proposal Title: Developing the Planetarium as a Center for Public Outreach, Content!! Production, and Student Involvement Point Person: Department: Dr. Joshua Nollenberg Physics and Astronomy Amount Req.:

More information

ENGINEERING AND TECHNOLOGY MANAGEMENT

ENGINEERING AND TECHNOLOGY MANAGEMENT Engineering and Technology Management 1 ENGINEERING AND TECHNOLOGY MANAGEMENT Master of Science in Engineering Technology Management Tim Hardin, PhD Director Brenda L. Johnson, MS Assistant Director OSU

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust SECURING THE DIGITAL ECONOMY Reinventing the Internet for Trust The Internet Just Can t Keep Up Companies Are Increasingly Dependent on the Internet for Business Growth 90% 76% 18% 35% to rank business

More information

COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBRID CLOUDS

COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBRID CLOUDS COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBRID CLOUDS M.Angel Jasmine Shirley 1, Dr.Suneel Kumar 2 1Research Scholar, 2 Asst. Professor, Maharishi University Lucknow ------------------------------------------------------------------------------***--------------------------------------------------------------------------------

More information

DoD Strategy for Cyber Resilient Weapon Systems

DoD Strategy for Cyber Resilient Weapon Systems DoD Strategy for Cyber Resilient Weapon Systems Melinda K. Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Systems Engineering Conference October 2016 10/24/2016 Page-1

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Disaster Recovery Is A Business Strategy

Disaster Recovery Is A Business Strategy Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...

More information

D DAVID PUBLISHING. Big Data; Definition and Challenges. 1. Introduction. Shirin Abbasi

D DAVID PUBLISHING. Big Data; Definition and Challenges. 1. Introduction. Shirin Abbasi Journal of Energy and Power Engineering 10 (2016) 405-410 doi: 10.17265/1934-8975/2016.07.004 D DAVID PUBLISHING Shirin Abbasi Computer Department, Islamic Azad University-Tehran Center Branch, Tehran

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

OUR VISION To be a global leader of computing research in identified areas that will bring positive impact to the lives of citizens and society.

OUR VISION To be a global leader of computing research in identified areas that will bring positive impact to the lives of citizens and society. Join the Innovation Qatar Computing Research Institute (QCRI) is a national research institute established in 2010 by Qatar Foundation for Education, Science and Community Development. As a primary constituent

More information

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About

More information

Composite Software Data Virtualization The Five Most Popular Uses of Data Virtualization

Composite Software Data Virtualization The Five Most Popular Uses of Data Virtualization Composite Software Data Virtualization The Five Most Popular Uses of Data Virtualization Composite Software, Inc. June 2011 TABLE OF CONTENTS INTRODUCTION... 3 DATA FEDERATION... 4 PROBLEM DATA CONSOLIDATION

More information

Menggang Li. Research on Industrial. Security Theory. Springer

Menggang Li. Research on Industrial. Security Theory. Springer Menggang Li Research on Industrial Security Theory Springer Contents 1 Introduction 1 1.1 Significance of Studying Theories of Industrial Security 1 1.1.1 Theoretical Significance of Studying Industrial

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

Interim Report Technical Support for Integrated Library Systems Comparison of Open Source and Proprietary Software

Interim Report Technical Support for Integrated Library Systems Comparison of Open Source and Proprietary Software Interim Report Technical Support for Integrated Library Systems Comparison of Open Source and Proprietary Software Vandana Singh Assistant Professor, School of Information Science, University of Tennessee,

More information

Fine-grained Software Version Control Based on a Program s Abstract Syntax Tree

Fine-grained Software Version Control Based on a Program s Abstract Syntax Tree Master Thesis Description and Schedule Fine-grained Software Version Control Based on a Program s Abstract Syntax Tree Martin Otth Supervisors: Prof. Dr. Peter Müller Dimitar Asenov Chair of Programming

More information

Healthcare HIPAA and Cybersecurity Update

Healthcare HIPAA and Cybersecurity Update Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Healthcare HIPAA and Cybersecurity Update Agenda > Introductions > Cybersecurity

More information

THE CYBERSECURITY LITERACY CONFIDENCE GAP

THE CYBERSECURITY LITERACY CONFIDENCE GAP CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks

More information

Douglas Hoffman. BACS, MSEE, MBA, ASQ Fellow, ASQ-CSQE, ASQ-CMQ/OE

Douglas Hoffman. BACS, MSEE, MBA, ASQ Fellow, ASQ-CSQE, ASQ-CMQ/OE Douglas Hoffman BACS, MSEE, MBA, ASQ Fellow, ASQ-CSQE, ASQ-CMQ/OE Publications 1, 2 Kaner, Cem, and Hoffman, Douglas, The Domain Testing Workbook Context Driven Press, 2013 Graham, Dorothy, and Fewster,

More information

INTRODUCING CISCO SECURITY FOR AWS

INTRODUCING CISCO SECURITY FOR AWS SESSION ID: SPO1-T08 INTRODUCING CISCO SECURITY FOR AWS Patrick Crowley CTO Cisco, Stealthwatch Cloud @p_crowley Three Main Points Use VPC Flow logs to make sure nothing is happening behind your back Use

More information

Stavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987

Stavros Nikolaou. 413 Gates Hall URL:  Ithaca, NY, 14853, USA Date of Birth: December, 1987 413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education

More information

Welcome to Maastricht University. School of Business and Economics

Welcome to Maastricht University. School of Business and Economics Welcome to Maastricht University School of Business and Economics MSc Business Intelligence and Smart Services (BISS) Service design and development in cyber-society Dr. Alexander Grigoriev Why should

More information

Client Services Procedure Manual

Client Services Procedure Manual Procedure: 85.00 Subject: Administration and Promotion of the Health and Safety Learning Series The Health and Safety Learning Series is a program designed and delivered by staff at WorkplaceNL to increase

More information

Undergraduate Admission File

Undergraduate Admission File Undergraduate Admission File June 13, 2007 Information Resources and Communications Office of the President University of California Overview Population The Undergraduate Admission File contains data on

More information

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations

More information

IT Services Performance Report

IT Services Performance Report UCD IT Services IT Services Performance Report January December 2010 Prepared by: UCD IT Services Date: 9 th February 2011 Ms. Mary Crowe Chief Information and Technology Officer Contents Background 1

More information

Syllabus Revised 03/05/2015

Syllabus Revised 03/05/2015 The Department of Applied Information Technology The Volgenau School of Engineering George Mason University 4400 University Drive Fairfax. VA 22030-4444 IT 341 Data Communications and Networking Principles

More information

New Products & Innovation

New Products & Innovation New Products & Innovation MTAC May 20, 2015 Gary Reblin V.P., New Products & Innovation 1 2015 Promotion Calendar As of: 5/7/15 JAN FEB - MARCH APRIL MAY - JUNE JULY AUG - SEPT OCT NOV - DEC FIRST-CLASS

More information

Modeling and Simulating STP vs RSTP on Ring and Mesh Network Topologies

Modeling and Simulating STP vs RSTP on Ring and Mesh Network Topologies Modeling and Simulating STP vs RSTP on Ring and Mesh Network Topologies ENSC 835: Communication Networks Spring 2011 Final Project Presentation www.sfu.ca/~mmkhan Group 6: Simran Sarai (sks17@sfu.ca, 301058482)

More information

Featured Archive. Saturday, February 28, :50:18 PM RSS. Home Interviews Reports Essays Upcoming Transcripts About Black and White Contact

Featured Archive. Saturday, February 28, :50:18 PM RSS. Home Interviews Reports Essays Upcoming Transcripts About Black and White Contact Saturday, February 28, 2009 03:50:18 PM To search, type and hit ente SEARCH RSS Home Interviews Reports Essays Upcoming Transcripts About Black and White Contact SUBSCRIBE TO OUR MAILING LIST First Name:

More information

Cost Reduction in Hybrid Clouds for Enterprise Computing

Cost Reduction in Hybrid Clouds for Enterprise Computing Cost Reduction in Hybrid Clouds for Enterprise Computing Biyu Zhou, Fa Zhang, Jie Wu, and Zhiyong Liu Beijing Key Laboratory of Mobile Computing and Pervasive Device, ICT, CAS, Beijing, China University

More information

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 5, ISSUE 2 2ND QUARTER 2018 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q2 2018 4 DDoS

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

Ensuring Business Resilience Jim Neumann, Vice President of Marketing, Power Analytics Corp.

Ensuring Business Resilience Jim Neumann, Vice President of Marketing, Power Analytics Corp. Ensuring Business Resilience Jim Neumann, Vice President of Marketing, Power Analytics Corp. In today s digital economy, the importance of taking a bottom-line view of your organization s electrical power

More information

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security 1. SIGMM Workshop on Social Media SIGMM Workshop on Social Media is a workshop in conjunction with ACM Multimedia 2009. With the growing of user-centric multimedia applications in the recent years, this

More information

Demonstration of Software for Optimizing Machine Critical Programs by Call Graph Generator

Demonstration of Software for Optimizing Machine Critical Programs by Call Graph Generator International Journal of Computer (IJC) ISSN 2307-4531 http://gssrr.org/index.php?journal=internationaljournalofcomputer&page=index Demonstration of Software for Optimizing Machine Critical Programs by

More information