Research Statement. Amy Babay December 2018
|
|
- Sophie Sandra Anderson
- 5 years ago
- Views:
Transcription
1 Research Statement Amy Babay December 2018 My research focuses on distributed systems and networks, with core goals spanning two domains: enabling new Internet services and building dependable infrastructure. The Internet s incredible reach has made our society increasingly global and connected, but inherent architectural limitations prevent it from natively supporting new applications with demanding performance, processing, or security requirements. I am excited about the potential to extend network programmability to create a new generation of Internet services, and especially about solving fundamental performance challenges to allow new levels of interactivity. At the same time, as networked systems become essential to daily life, with even critical infrastructure like the power grid becoming more connected, their resilience becomes crucial. Therefore, the second major goal of my work is building intrusion-tolerant infrastructure: infrastructure that maintains correct operation and predictable performance even when partially compromised by a sophisticated adversary. I believe that taking research ideas all the way to deployed systems raises interesting new questions that must be addressed for the work to be useful in practice and try to develop my work to that point as much as possible. I implemented my dissertation s low-latency, high-reliability Internet transport service in the Spines overlay network ( validated it in a globespanning deployment over twelve data centers, and am working to transition it to commercial use for high-value video feeds. Spire ( the intrusion-tolerant SCADA system that Tom Tantillo and I created together during our PhDs, successfully withstood a red-team attack at PNNL in 2017, was deployed in a test at the Hawaiian Electric Company in 2018, and was presented to the Army Corps of Engineers in an invited talk; I am investigating opportunities to transition these ideas commercially or through government. 1 Enabling a New Generation of Internet Services While the Internet s ubiquity has created demand for new networked applications, some of its key design choices limit its ability to natively support emerging applications. In particular, the Internet s incredible scale requires its routers core functionality to be very simple: they perform best-effort packet switching and cannot maintain per-flow state. My experience at LTN Global Communications prior to my PhD showed me the power of structured overlay networks to overcome this limitation. At LTN, I was exposed to a global overlay network for live broadcast-quality video transmission. This service requires a 200ms one-way latency guarantee with reliability such that % of packets are delivered on time; it is made possible by strategically placing overlay software routers in data centers around the world and implementing custom overlay routing and recovery protocols. My research aims to leverage the concepts behind structured overlays, namely the ability to put processing power and context into the middle of the network, to go beyond video transmission to support a new generation of highly demanding Internet services at scale. 1.1 Current Research Timely, reliable Internet transport. Compared with live video s 200ms latency requirement, highly interactive remote manipulation applications such as remote surgery bring a new level of timeliness demands, requiring one-way latencies on the order of 65ms for interaction to feel natural. 1
2 To meet these latency requirements (which approach the physical propagation delay for crosscontinent transmission) while still supporting % on-time delivery, I developed a new overlay routing approach that uses dissemination graphs to redundantly send packets over a subgraph of the network [1]. While the problem of selecting an optimal dissemination graph for arbitrary network conditions is challenging to model precisely and is NP-hard even with simplifying assumptions, we provided a highly effective solution by observing the types of problems that occur in practice (collecting data on LTN s commercial infrastructure) and converting this hard optimization problem into a simple classification problem. The dissemination graph for each packet is selected dynamically by classifying current network conditions into just four states: normal, source problem, destination problem, and simultaneous source-destination problem. The approach uses a dissemination graph consisting of two node-disjoint paths in the normal case, and custom dissemination graphs that add targeted redundancy in the problematic areas of the network in the other three cases. We show that this approach can achieve about 99% of the benefit of an optimal but prohibitively expensive scheme, at a cost increase of 2% or less compared with two disjoint paths. In addition to remote manipulation applications with extremely demanding timeliness constraints, this work can support video applications that allow latencies on the order of 200ms but require near-perfect reliability. Part of my current work aims to transition these protocols to commercial use with LTN for high value video feeds (e.g. sports events). Intrusion-tolerant networking. Monitoring and control of large-scale cloud systems faces a major challenge: failures or attacks can render their network infrastructure unusable, but diagnosing and correcting the problem can be impossible without functioning network infrastructure. I was involved in work using structured overlays to create an intrusion-tolerant network service that enables cloud monitoring and control systems to continue to work while under attack [2]. This service leverages redundancy in the overlay s resilient network architecture to overcome attacks in the underlying network and uses new intrusion-tolerant overlay protocols to guarantee ultimate resilience: messages will be delivered even in the presence of compromised overlay nodes, as long as at least one path of correct nodes exists between the source and destination. 1.2 Future Research Vision My research aims to use structured overlays to enable a new generation of network services that cannot be supported by the native Internet. Part of this work will involve developing new overlay protocols to support the needs of emerging applications, but the fundamental challenges that remain are scaling the approach and extending it to provide end-to-end guarantees. Immersive multiparty virtual reality. Like remote manipulation, immersive virtual reality for multiplayer online games or multiparty virtual training requires extremely low latency and high reliability. However, these applications add the challenge of multicast communication, as all parties interact in the same virtual space. A dissemination-graph-based routing approach may be a good fit for these applications, but new techniques are needed to construct more complex dissemination graphs that connect multiple participants while meeting the timeliness and reliability requirements. Unlimited programmability at scale. The strength of the structured overlay approach is that overlay routers run as normal user-level programs and offer the unlimited programmability of general purpose computing. However, this limits the scalability of the approach: a single overlay router cannot process packets at line speed. Interestingly, the strengths of Software Defined Networking (SDN) appear complementary to those of overlay networks: SDN switches can process packets at 2
3 line speed but offer a more limited match-action table programming model. I plan to combine structured overlay networks and SDNs to provide unlimited programmability at scale. One promising direction is to run many overlays in parallel and use SDN to classify incoming packets at line speed, with only those packets that require specialized processing being directed to an appropriate overlay. While promising, this approach presents considerable management challenges. My experience with LTN Global Communications shows that manually managing even a moderate number of overlays is a complex and time consuming task. I intend to explore automated flow management techniques to automatically assign flows to overlays while respecting capacity constraints, instantiate new overlays as needed, and install forwarding rules in SDN switches. Over time, I also plan to investigate how certain processing functions may be moved from the overlay level to the network level for increased efficiency. End-to-end guarantees. My work so far has focused on the network core, assuming that endpoints are co-located with overlay nodes or have high quality redundant connections in the underlying network. While this is reasonable for a small number of high-value endpoints, these assumptions will not hold as the framework scales to support a wider range of applications and clients. Most endpoints will connect to the overlay remotely and can have diverse connection quality, including lossy connections or ones with limited bandwidth. I plan to explore techniques for extending overlay protocols to the edge and ensuring end-to-end quality with wireless or mobile clients; emerging 5G technology offers a promising avenue for cellular clients. 2 Building Dependable Infrastructure Our increasing reliance on computerized and networked systems makes it crucial to guarantee that they can, in fact, be relied on to work as expected. This is especially true for critical infrastructure like the power grid as it becomes more connected and more exposed to attacks. 2.1 Current Research Intrusion-tolerant SCADA for the power grid. My work has developed Spire, the first Supervisory Control and Data Acquisition (SCADA) system for the power grid that is resilient to simultaneous system compromises and network attacks [3]. While other work has made SCADA systems resilient to system-level compromises of the SCADA Master (central control server) using Byzantine fault tolerant (BFT) replication, Spire extends this model to additionally consider network-level attacks. Spire combines BFT replication with our intrusion-tolerant network service [2] to overcome a wide range of sophisticated network attacks and introduces a novel architecture for distributing replicas across multiple sites to overcome the complete network isolation of a power grid control center while guaranteeing correct operation and predictable performance. We demonstrated Spire s practical effectiveness in two deployments. The first was conducted at Pacific Northwest National Lab, where a red team from Sandia National Labs attacked both a NIST-compliant commercial SCADA architecture and Spire. While the red team was able to take full control of the commercial system within only a few hours, they were unable to disrupt Spire s operation throughout three days of attacks, including being given source code and root access to one of the replicated SCADA Masters. The second event was a test deployment conducted with the Hawaiian Electric Company (HECO) in a mothballed power plant that had active control systems but was not generating power at the time. Spire managed a small set of real breakers and successfully provided the timely reactions expected by HECO engineers without interfering with other plant control systems, demonstrating its ability to operate in a power plant environment. 3
4 2.2 Future Research Vision Holistic intrusion tolerance. The two events described above underscored the need for a holistic approach to intrusion tolerance that goes beyond BFT replication to consider the system as a whole. Spire takes a significant step in this direction by extending intrusion tolerance to the network level, but a principled approach to making systems truly resilient to dedicated attackers is needed. For example, it has become generally accepted that BFT replication must be augmented with proactive recovery, a technique for periodically removing intrusions and restoring compromised nodes to a correct state. However, most BFT protocols introduced after PBFT [4] have not specified their own proactive recovery protocols. My experience implementing proactive recovery in Prime [5] showed that design choices made to prove latency guarantees under attack (which are necessary for systems like SCADA that require timely reactions) make proactive recovery much more complex. I am interested in analyzing BFT protocols to determine the key requirements for simple and effective proactive recovery and designing replication and recovery protocols together to support strong latency guarantees under attack and proactive recovery that is fast and easy to reason about. Beyond proactive recovery, I am interested in safely combining intrusion tolerance with intrusion detection (i.e. compromised components must not be able to deny service by suspecting correct components), adding domain-specific resilience (e.g. ensuring that malicious commands issued by a rogue power grid operator are not simply replicated and consistently executed by the control servers), and recovering from temporary assumption breaches (e.g. the simultaneous failure of more than f replicas in a BFT replicated system). I also intend to investigate approaches for incrementally transitioning legacy systems to resilient architectures, as my experience with HECO showed this to be the most feasible path to creating a practical impact. As a first step, I am developing a proxy-based approach to deploying Spire s intrusion-tolerant network component in legacy systems. 3 Future Plans: Funding, Collaboration The technical aspects of my future research vision are described above, but this plan also involves securing resources to fund it and leveraging expertise from other domains. During my Masters and PhD, my work was funded by DARPA and DoD, and I believe this format is especially appropriate for the resilience side of my work with its direct relevance to national defense. My dissertation work was also funded by an NSF Algorithms in the Field proposal that I helped write, and I see the NSF CNS Core, Secure and Trustworthy Cyberspace (SaTC), and Faculty Early Career Development Program (CAREER) as avenues for funding both sides of my research vision. Beyond that, I plan to explore industry funding; our work on structured overlays attracted interest and gift funding from AT&T labs, and I plan to continue close industry collaboration in my research. I also plan to collaborate with other researchers in Computer Science and Electrical Engineering, especially including theory, security, networking, robotics, and power systems. My work on timely, reliable Internet transport has already included theory collaboration with Michael Dinitz on constructing dissemination graphs and robotics collaboration on a proof-of-concept for transatlantic robotic manipulation. My future work will continue to seek collaborations in these areas and expand them to include networking researchers in SDN (to realize unlimited network programmability at scale) and wireless (to extend overlay capabilities to the edge) as well as application domains like gaming. In the resilience domain, collaboration with security researchers is especially important; Cristina Nita-Rotaru and her group contributed crucial expertise in specifying threat models and automatically verifying implementations to our work on intrusion-tolerant networking. As I extend my power grid work to include domain-specific solutions for malicious input, it will also include Electrical Engineering researchers and industry practitioners like the HECO engineers. 4
5 References [1] A. Babay, E. Wagner, M. Dinitz, and Y. Amir, Timely, reliable, and cost-effective internet transport service using dissemination graphs, in Proceedings of the 37th International Conference on Distributed Computing Systems (ICDCS), June 2017, pp [2] D. Obenshain, T. Tantillo, A. Babay, J. Schultz, A. Newell, M. E. Hoque, Y. Amir, and C. Nita- Rotaru, Practical intrusion-tolerant networks, in Proceedings of the 36th International Conference on Distributed Computing Systems (ICDCS), June 2016, pp [3] A. Babay, T. Tantillo, T. Aron, M. Platania, and Y. Amir, Network-attack-resilient intrusiontolerant SCADA for the power grid, in Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2018, pp [4] M. Castro and B. Liskov, Practical byzantine fault tolerance and proactive recovery, ACM Transactions on Computer Systems, vol. 20, no. 4, pp , November [5] Y. Amir, B. Coan, J. Kirsch, and J. Lane, Prime: Byzantine replication under attack, IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 4, pp , July
Amy Babay April 2018
Amy Babay www.dsn.jhu.edu/~babay 814-528-4205 babay@cs.jhu.edu Education PhD in Computer Science April 2018 PhD Research: Structured overlay networks for a new generation of Internet services, dependable
More informationNetwork-Attack-Resilient Intrusion- Tolerant SCADA for the Power Grid
Network-Attack-Resilient Intrusion- Tolerant SCADA for the Power Grid Amy Babay, Thomas Tantillo, Trevor Aron, Marco Platania, and Yair Amir Johns Hopkins University, AT&T Labs, Spread Concepts LLC Distributed
More informationAmy Babay November Doctor of Philosophy in Computer Science September 2018
Amy Babay www.dsn.jhu.edu/~babay 814-528-4205 babay@cs.jhu.edu Education November 2018 Doctor of Philosophy in Computer Science September 2018 Thesis: Timely, Reliable, and Cost-Effective Internet Transport
More informationToward Intrusion Tolerant Clouds
Toward Intrusion Tolerant Clouds Prof. Yair Amir, Prof. Vladimir Braverman Daniel Obenshain, Tom Tantillo Department of Computer Science Johns Hopkins University Prof. Cristina Nita-Rotaru, Prof. Jennifer
More informationSpire: Intrusion-Tolerant SCADA for the Power Grid
Distributed Systems and Networks Lab Spire: Intrusion-Tolerant for the Power Grid Amy Babay*, Thomas Tantillo*, Trevor Aron, Yair Amir June 25, 2017 Distributed Systems and Networks Lab Department of Computer
More informationSpire: Intrusion-Tolerant SCADA for the Power Grid
Distributed Systems and Networks Lab Spire: Intrusion-Tolerant for the Power Grid Amy Babay*, Thomas Tantillo*, Trevor Aron, Yair Amir June 25, 2017 Distributed Systems and Networks Lab Department of Computer
More informationToward Intrusion Tolerant Cloud Infrastructure
Toward Intrusion Tolerant Cloud Infrastructure Daniel Obenshain, Tom Tantillo, Yair Amir Department of Computer Science Johns Hopkins University Andrew Newell, Cristina Nita-Rotaru Department of Computer
More informationToward Open Source Intrusion Tolerant SCADA. Trevor Aron JR Charles Akshay Srivatsan Mentor: Marco Platania
Toward Open Source Intrusion Tolerant SCADA Trevor Aron JR Charles Akshay Srivatsan Mentor: Marco Platania Outline What is SCADA? SCADA Vulnerabilities What is Intrusion Tolerance? Prime PvBrowser Our
More informationTimely, Reliable, and Cost-Effective Internet Transport. Service using Structured Overlay Networks. Amy Babay
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks by Amy Babay A dissertation submitted to The Johns Hopkins University in conformity with the requirements
More informationNetwork-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid Amy Babay, Thomas Tantillo, Trevor Aron, Marco Platania, and Yair Amir Johns Hopkins University {babay, tantillo, taron1, yairamir}@cs.jhu.edu
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationEvaluating BFT Protocols for Spire
Evaluating BFT Protocols for Spire Henry Schuh & Sam Beckley 600.667 Advanced Distributed Systems & Networks SCADA & Spire Overview High-Performance, Scalable Spire Trusted Platform Module Known Network
More informationW H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud
W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...
More informationSimple and Secure Micro-Segmentation for Internet of Things (IoT)
Solution Brief Simple and Secure Micro-Segmentation for Internet of Things (IoT) A hardened network architecture for securely connecting any device, anywhere in the world Tempered Networks believes you
More informationFigure Potential 5G applications
6. 5G Key Concept 6.1 Key Concepts of 5G End-to-end (E2E) quality required by applications and/or users will be far more diversified in the 5G era than what we have seen in the preceding generations. For
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More information5G Enables Enterprise
Enables Enterprise Shirley Hsieh Marketing & Corporate Affairs 1 2017 Nokia Megatrends are changing the world, and the ways we connect with it Network, compute & storage Internet of Things Augmented intelligence
More informationA FAULT- AND INTRUSION-TOLERANT ARCHITECTURE FOR THE PORTUGUESE POWER DISTRIBUTION SCADA
A FAULT- AND INTRUSION-TOLERANT ARCHITECTURE FOR THE PORTUGUESE POWER DISTRIBUTION SCADA Nuno Medeiros Alysson Bessani 1 Context: EDP Distribuição EDP Distribuição is the utility responsible for the distribution
More informationMASERGY S MANAGED SD-WAN
MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way
More informationDistributed Systems Intrusion-Tolerant Networks. First, Some Context
Distributed Systems 600.437 Intrusion-Tolerant Networks Department of Computer Science The Johns Hopkins University 1 First, Some Context You ve just heard about Intrusion-Tolerant State Machine Replication
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Backup Two
More informationSeamless Overlays for Application Use
1. Overview Seamless Overlays for Application Use Graduate Independent Study, 600.810.12 Edmund Duhaime Advisors: Dr. Yair Amir, Amy Babay May 18, 2017 This project focuses on methods for allowing unmodified
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationUNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior Years
More informationNokia 5G FIRST ushers in the next era of telecommunications
Nokia 5G FIRST ushers in the next era of telecommunications Executive Summary 5G is one of the most important technological shifts that will drive a fundamental change in our communications infrastructure.
More informationSystem Models for Distributed Systems
System Models for Distributed Systems INF5040/9040 Autumn 2015 Lecturer: Amir Taherkordi (ifi/uio) August 31, 2015 Outline 1. Introduction 2. Physical Models 4. Fundamental Models 2 INF5040 1 System Models
More informationATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK
PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK INTRODUCTION Attivo Networks has partnered with Cisco Systems to provide advanced real-time inside-the-network
More informationM&Ms: CS Freshmen Experience Networks. Department of Computer Science The Johns Hopkins University. Yair Amir Spring 2017 / Week 3 1.
M&Ms: CS Freshmen Experience 600.105 Networks Department of Computer Science The Johns Hopkins University 1 Networks Reading: https://en.wikipedia.org/wiki/history_of_the_internet https://en.wikipedia.org/wiki/routing
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationGujarat Forensic Sciences University
Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat
More informationPractical Byzantine Fault Tolerance Consensus and A Simple Distributed Ledger Application Hao Xu Muyun Chen Xin Li
Practical Byzantine Fault Tolerance Consensus and A Simple Distributed Ledger Application Hao Xu Muyun Chen Xin Li Abstract Along with cryptocurrencies become a great success known to the world, how to
More informationControl Systems Cyber Security Awareness
Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security
More informationSecure Networking. Dr. Douglas Maughan DARPA / ITO
Secure Networking Dr. Douglas Maughan DARPA / ITO dmaughan@darpa.mil 1 Network Reliance is Pervasive 10 DoD depends on networking technology for information dominance at all levels of command hierarchy,
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationRobust BFT Protocols
Robust BFT Protocols Sonia Ben Mokhtar, LIRIS, CNRS, Lyon Joint work with Pierre Louis Aublin, Grenoble university Vivien Quéma, Grenoble INP 18/10/2013 Who am I? CNRS reseacher, LIRIS lab, DRIM research
More informationRSA NetWitness Suite Respond in Minutes, Not Months
RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations
More informationBYZANTINE FAULT TOLERANT SOFTWARE- DEFINED NETWORKING (SDN) CONTROLLERS
BYZANTINE FAULT TOLERANT SOFTWARE- DEFINED NETWORKING (SDN) CONTROLLERS KARIM ELDEFRAWY* AND TYLER KACZMAREK** * INFORMATION AND SYSTEMS SCIENCES LAB (ISSL), HRL LABORATORIES ** UNIVERSITY OF CALIFORNIA
More informationSOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM
RSA NETWITNESS EVOLVED SIEM OVERVIEW A SIEM is technology originally intended for compliance and log management. Later, as SIEMs became the aggregation points for security alerts, they began to be more
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationChapter 8 Fault Tolerance
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 8 Fault Tolerance 1 Fault Tolerance Basic Concepts Being fault tolerant is strongly related to
More information5G networks use-cases in 4G networks
5G networks use-cases in 4G networks 5G Networks offering superior performance are just around the corner! Wait! Are applications that maximize the benefits of these networks ready? Contents 5G networks
More informationIntroduction and Statement of the Problem
Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network
More informationNetworking for a dynamic infrastructure: getting it right.
IBM Global Technology Services Networking for a dynamic infrastructure: getting it right. A guide for realizing the full potential of virtualization June 2009 Executive summary June 2009 Networking for
More informationWHITEPAPER. How to secure your Post-perimeter world
How to secure your Post-perimeter world WHAT IS THE POST-PERIMETER WORLD? In an increasingly cloud and mobile focused world, there are three key realities enterprises must consider in order to move forward
More informationSTRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government
ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents
More informationHyper-Converged Infrastructure: Providing New Opportunities for Improved Availability
Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability IT teams in companies of all sizes face constant pressure to meet the Availability requirements of today s Always-On
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationSmart Grid Information Management
Smart Grid Information Management Applying Advanced Communication and Distributed System Technologies Partha Pal, Rick Schantz, Kurt Rohloff BBN Technologies CMU Electricity Conference Outline Introduction
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($ in Millions)
More informationExternal Supplier Control Obligations. Cyber Security
External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More informationHeavy Vehicle Cyber Security Bulletin
Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin
More informationLive Broadcast: Video Services from AT&T
Delivering your content through the power of the cloud Live Broadcast: Video Services from AT&T Getting your content to your audience is becoming increasingly diverse and complex. Today, people want to
More informationSwitched Network Latency Problems Solved
1 Switched Network Latency Problems Solved A Lightfleet Whitepaper by the Lightfleet Technical Staff Overview The biggest limiter to network performance is the control plane the array of processors and
More informationTowards a Practical Survivable Intrusion Tolerant Replication System
Towards a Practical Survivable Intrusion Tolerant Replication System Marco Platania, Daniel Obenshain, Thomas Tantillo, Ricky Sharma, Yair Amir Department of Computer Science at Johns Hopkins University
More informationChapter X Security Performance Metrics
Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical
More informationeguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments
eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments Today s PCI compliance landscape is one of continuing change and scrutiny. Given the number
More informationScaling Byzantine Fault-tolerant Replication to Wide Area Networks
Scaling Byzantine Fault-tolerant Replication to Wide Area Networks Cristina Nita-Rotaru Dependable and Secure Distributed Systems Lab Department of Computer Science and CERIAS Purdue University Department
More informationFuture Grid Initiative Technology Challenges in Designing the Future Grid to Enable Sustainable Energy Systems
Future Grid Initiative Technology Challenges in Designing the Future Grid to Enable Sustainable Energy Systems Vijay Vittal Director, Power Systems Engineering Research Center Ira A. Fulton Chair Professor,
More informationThe Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization
The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization May 2014 Prepared by: Zeus Kerravala The Top Five Reasons to Deploy Software-Defined Networks and Network Functions
More informationSystem models for distributed systems
System models for distributed systems INF5040/9040 autumn 2010 lecturer: Frank Eliassen INF5040 H2010, Frank Eliassen 1 System models Purpose illustrate/describe common properties and design choices for
More informationABSTRACT. Web Service Atomic Transaction (WS-AT) is a standard used to implement distributed
ABSTRACT Web Service Atomic Transaction (WS-AT) is a standard used to implement distributed processing over the internet. Trustworthy coordination of transactions is essential to ensure proper running
More informationExtend Your Reach. with. Signature Core Fiber Optic Cabling System
Extend Your Reach with Signature Core Fiber Optic Cabling System What Signature Core System Can Do For You Saves capital expenditures Allows using multimode fiber in some applications that may have required
More informationSOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM
SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.
More informationNovember 2017 WebRTC for Live Media and Broadcast Second screen and CDN traffic optimization. Author: Jesús Oliva Founder & Media Lead Architect
November 2017 WebRTC for Live Media and Broadcast Second screen and CDN traffic optimization Author: Jesús Oliva Founder & Media Lead Architect Introduction It is not a surprise if we say browsers are
More informationThe Perfect Storm Cyber RDT&E
The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare
More informationIndustrial Network Trends & Technologies
Industrial Network Trends & Technologies EtherNet/IP on the Plant Floor PUBLIC INFORMATION 5058-CO900F IHS Technology Industrial Internet of Things 2014, April 2014 PUBLIC INFORMATION Forecasts tremendous
More information5 reasons why choosing Apache Cassandra is planning for a multi-cloud future
White Paper 5 reasons why choosing Apache Cassandra is planning for a multi-cloud future Abstract We have been hearing for several years now that multi-cloud deployment is something that is highly desirable,
More informationData center interconnect for the enterprise hybrid cloud
WHITEPAPER Data center interconnect for the enterprise hybrid cloud The world is moving to the cloud. Everything from entertainment and consumer mobile applications to enterprise software and government
More informationCYBERBIT P r o t e c t i n g a n e w D i m e n s i o n
CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBETBIT in a Nutshell A leader in the development and integration of Cyber Security Solutions A main provider of Cyber Security solutions for the
More informationAn Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)
An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University
More informationBayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination
Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination By Shelley Zhuang,Ben Zhao,Anthony Joseph, Randy Katz,John Kubiatowicz Introduction Multimedia Streaming typically involves
More informationPrivileged Account Security: A Balanced Approach to Securing Unix Environments
Privileged Account Security: A Balanced Approach to Securing Unix Environments Table of Contents Introduction 3 Every User is a Privileged User 3 Privileged Account Security: A Balanced Approach 3 Privileged
More informationWhy the Threat of Downtime Should Be Keeping You Up at Night
Why the Threat of Downtime Should Be Keeping You Up at Night White Paper 2 Your Plan B Just Isn t Good Enough. Learn Why and What to Do About It. Server downtime is an issue that many organizations struggle
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More informationWHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight
Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications White paper by Net Insight Net Insight AB, Sweden September 2012 WHITE PAPER ABSTRACT Today s society is becoming increasingly
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationGuide to SDN, SD-WAN, NFV, and VNF
Evalu- ation Guide Technical Brief SD-WAN, NFV, and With so many acronyms and each one building on another, it can be confusing about how they work together. This guide describes the difference. 006180206
More informationThe Modern Manufacturer s Guide to. Industrial Wireless Cisco and/or its affiliates. All rights reserved.
The Modern Manufacturer s Guide to Industrial Wireless 2017 Cisco and/or its affiliates. All rights reserved. The Modern Manufacturer s Guide to Industrial Wireless Page 2 It s hard to imagine an effective
More informationToward All-Hazards Security and Resilience for the Power Grid
Toward All-Hazards Security and Resilience for the Power Grid Juan Torres Associate Laboratory Director, Energy Systems Integration National Renewable Energy Laboratory December 6, 2017 1 Grid Modernization
More informationThe Best Protocol for Real-time Data Transport
The Definitive Guide to: The Best Protocol for Real-time Data Transport Assessing the most common protocols on 6 important categories Identifying the Best Protocol For strategic applications using real-time
More informationData Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More informationChapter X Security Performance Metrics
Chapter X Security Performance Metrics Page 1 of 9 Chapter X Security Performance Metrics Background For the past two years, the State of Reliability report has included a chapter for security performance
More informationSoftware-Defined Networking from Serro Solutions Enables Global Communication Services in Near Real-Time
A CONNECTED A CONNECTED Software-Defined Networking from Serro Solutions Enables Global Communication Services in Near Real-Time Service providers gain a competitive advantage by responding to customer
More informationSecurity and Privacy Issues In Smart Grid
Security and Privacy Issues In Smart Grid J. Liu and Y. Xiao, S. Li, W. Liang, C. Chen IEEE COMMUNICATIONS SURVEYS & TUTORIALS, to appear Wednesday, September 26, 2012 Mohamed M. E. A. Mahmoud PhD, PDF,
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationAutomating the Top 20 CIS Critical Security Controls
20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises
More informationSleep/Wake Aware Local Monitoring (SLAM)
Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and
More informationSecurity Standards for Electric Market Participants
Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system
More informationSummary of Cyber Security Issues in the Electric Power Sector
Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov
More informationNEXT GENERATION SECURITY OPERATIONS CENTER
DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting
More informationMultilevel Fault-tolerance for Designing Dependable Wireless Networks
Multilevel Fault-tolerance for Designing Dependable Wireless Networks Upkar Varshney Department of Computer Information Systems Georgia State University Atlanta, Georgia 30302-4015 E-mail: uvarshney@gsu.edu
More informationMicrosoft IT Leverages its Compute Service to Virtualize SharePoint 2010
Microsoft IT Leverages its Compute Service to Virtualize SharePoint 2010 Published: June 2011 The following content may no longer reflect Microsoft s current position or infrastructure. This content should
More informationSecurity Issues In Mobile Ad hoc Network Routing Protocols
Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be
More informationUNCLASSIFIED FY 2016 OCO. FY 2016 Base
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationAcalvio Deception and the NIST Cybersecurity Framework 1.1
Acalvio Deception and the NIST Cybersecurity Framework 1.1 June 2018 The Framework enables organizations regardless of size, degree of cybersecurity risk, or cybersecurity sophistication to apply the principles
More informationWHITE PAPER. Vericlave The Kemuri Water Company Hack
WHITE PAPER Vericlave The Kemuri Water Company Hack INTRODUCTION This case study analyzes the findings of Verizon Security Solutions security assessment of the Kemuri Water Company security breach. The
More information