Power Attack Defense: Securing Battery-Backed Data Centers

Size: px
Start display at page:

Download "Power Attack Defense: Securing Battery-Backed Data Centers"

Transcription

1 Power Attack Defense: Securing Battery-Backed Data Centers Presented by Chao Li, PhD Shanghai Jiao Tong University , Seoul, Korea

2 Risk of Power Oversubscription 2

3 3

4 01. Access Control 02. Central Antivirus 03. Network Intrusion Detection 04. Central Malware Protection 05. Application Firewall 06. Centralized Log Aggregation 07. Security Info. & Event Mgnt. 08. Host-Based Firewalls 09. Network Packet Monitoring 10. Host Intrusion Detection 11. Disk Encryption 12. Application Control 13. Data Loss Prevention 14. Antivirus for VM 15. Data at Rest Encryption 16. Host-Based Firewalls 17. Host App. Monitoring 18. Database Firewalls 19. Data Masking/Redaction 20. Per-Server Antivirus 21. Other Techniques 0% 50% 100% Adoption Rate Power-Related Security Issue Security Technologies 4

5 Outlines 1. Background and Motivation 2. Threat Model and Attack Analysis 3. Power Attack Defense 4. Evaluation and Discussion 5

6 Outlines 1. Background and Motivation 2. Threat Model and Attack Analysis 3. Power Attack Defense 4. Evaluation and Discussion 6

7 Power Delivery in Data Center 7

8 Power Infrastructure Oversubscription 8

9 Aggressive Power Oversubscription 9

10 Facebook s Battery Cabinets Facebook Battery Cabinet 10

11 Microsoft s Local Energy Storage 15% PUE improvement and 5X TCO reduction 11

12 Two Sides of the Same Coin Green Low-Cost Low-Power Security Availability Dependability 12

13 Primary Root Causes of Outages Generator Failure IT Equipment Failure Other UPS System Failure (Battery) 29% Battery Failure Weather Related 12% Weather Issue Water, Heat, CRAC Failure Accidental / Human Error 5% IT Equip. Issue 13

14 Unplanned Power Failure Do Happen [1] In the News What if an attacker tries to bring down a data center [1] Source: Ponemon Institute 14

15 Related Work Utility grid power anomaly Data center CB tripping Peak power surge System voltage noises Power Anomaly Security and Reliability Virtualizing power infrastructure (ISCA 13) Software-defined battery system (SOSP 15) Power emergency handling (ASPLOS 12) Heterogeneous battery system (ISCA 15) 15

16 Outlines 1. Background and Motivation 2. Threat Model and Attack Analysis 3. Power Attack Defense 4. Evaluation and Discussion 16

17 Understanding the Vulnerability Software Not Sensitive to Individual Power Peak Each server is allowed to reach its peak power as long as the total rack utilization is within the budget. Infrastructure Coarse-Grained Monitoring Calculate power demand based on the monitored the total energy consumption at coarse-grained intervals Hardware Slow Power Capping Normal power capping mechanisms cannot respond quickly enough to limit the sudden spikes 17

18 Threat Model A sophisticated adversary can manipulate its subscribed nodes to overload a larger cluster Opportunistically look for such a host by monitoring the VM IP Keep rebooting a few VMs until they reach the same desired location Generate simultaneously occurred power surge to overload the system 18

19 A Two-Phase Attack Phase-I: Wide Peak Power Aims at drain the UPS battery system Visible to data centers Phase-II: Narrow Power Spikes Aims at overload the server rack Invisible to data center 19

20 A Two-Phase Attack (Cont d) 20

21 Effective Power Attack Power(W) Budget Normal Load with Malicious Load Failed Attempt Effective Attack Time(s) A single spike may not result in effective attack Depend on the overcurrent and the peak current duration Repeatedly creating hidden power spikes Have good chance to overload the system Power Trace of a Rack with/without Malicious attacker 21

22 What Determines Effective Attack? Peak Height (Node Number) Peak Frequency (Intervals) Peak Width (Runtime) Power Monitor (Granularity) Power Budget (Tight or Not) Other Workloads (Type/Timing) 22

23 Outlines 1. Background and Motivation 2. Threat Model and Attack Analysis 3. PAD: Power Attack Defense 4. Evaluation and Discussion 23

24 PAD: An Overview Slow down Phase-I Attack 24

25 vdeb: Virtual Distributed Energy Backup Rack SeverA Sever Battery BatteryA SeverB BatteryB SeverC BatteryC 25

26 μdeb: Micro Distributed Energy Backup Virtual DEB alone cannot defeat a well-planned power attack Require HW mechanisms to handle the transient power spikes Micro DEB can react to any voltage surge/sags automatically Without any energy and lifetime issue 26

27 Hierarchical Security Levels 27

28 Outlines 1. Background and Motivation 2. Threat Model and Attack Analysis 3. PAD: Power Attack Defense 4. Evaluation and Discussion 28

29 PDU PAD - Evaluation Methodology Network Switch Precision Power Analyzer Charge Controller Mgmt. Node Attacker s Node VM Xen VM Server Node Server Node Server Node Server Node Battery Battery Battery SNMP Card Ethernet Sensor Circuitry 29

30 PAD - Evaluation Methodology 30

31 Attack Effectiveness Results Survival Time: 36,606 Seconds Survival Time: 60,793 Seconds Balancing battery usage could increase survival time Gives operators more time to identify malicious loads and figure out any possible solutions. 31

32 Time (Seconds) Data Center Survival Time The sustained operation duration of the evaluated Google cluster under various power attacks Conv PS PSPC udeb vdeb PAD Dense Attack Sparse Attack Dense Attack Sparse Attack Dense Attack Sparse Attack CPU Intensive Memory Intensive IO Intensive Avg. The impact of vdeb are bigger Visible power peaks dominate in overall attacking period Combing μdeb and vdeb = Better survival time 1.6X compared to the state-of-the-art baseline 32

33 Attack Effectiveness Results A B Load Shedding Ratio (%) Timestamp (x 5min) C PAD never use aggressive server shedding to save battery energy. Shutting down a small amount of servers may eliminate overload 33

34 udeb/ vdeb (%) Normalized Time Cost Impact Cost Ratio Survival Time udeb Capacity (microfarad) 15X more μdeb 40X survival time 34

35 Conclusions Modern data centers that oversubscribe their power infrastructure are prone to power attack Energy storage systems are the last line of protection against power anomaly in data centers SW and HW support are both necessary for successful power attack defense Security-aware power management allows us to safely exploit the benefits of power-constrained data centers 35

36 Thanks! 36

Maximum Security with Minimum Impact : Going Beyond Next Gen

Maximum Security with Minimum Impact : Going Beyond Next Gen SESSION ID: SP03-W10 Maximum Security with Minimum Impact : Going Beyond Next Gen Wendy Moore Director, User Protection Trend Micro @WMBOTT Hyper-competitive Cloud Rapid adoption Social Global Mobile IoT

More information

Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers

Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers Mohammad A. Islam, Shaolei Ren, and Adam Wierman Acknowledgement: NSF under grants CNS-1551661, CNS-1565474, and ECCS-1610471,

More information

IT Level Power Provisioning Business Continuity and Efficiency at NTT

IT Level Power Provisioning Business Continuity and Efficiency at NTT IT Level Power Provisioning Business Continuity and Efficiency at NTT Henry M.L. Wong Intel Eco-Technology Program Office Environment Global CO 2 Emissions ICT 2% 98% Source: The Climate Group Economic

More information

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider

More information

Introduction to Energy-Efficient Software 2 nd life talk

Introduction to Energy-Efficient Software 2 nd life talk Introduction to Energy-Efficient Software 2 nd life talk Intel Software and Solutions Group Bob Steigerwald Nov 8, 2007 Taylor Kidd Nov 15, 2007 Agenda Demand for Mobile Computing Devices What is Energy-Efficient

More information

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture About this Course This course will best position your organization to analyse threats and detect anomalies that could indicate cybercriminal behaviour. The payoff for this new proactive approach would

More information

Security for the Cloud Era

Security for the Cloud Era Security for the Cloud Era Make the Most Out of Your Cloud Journey Fadhly Hassim Sales Engineer South East Asia & Korea Barracuda Networks Current Weather Situation Customer Provisions & Manage On-Premises

More information

A Network-aware Scheduler in Data-parallel Clusters for High Performance

A Network-aware Scheduler in Data-parallel Clusters for High Performance A Network-aware Scheduler in Data-parallel Clusters for High Performance Zhuozhao Li, Haiying Shen and Ankur Sarker Department of Computer Science University of Virginia May, 2018 1/61 Data-parallel clusters

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government

More information

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University

More information

CA ecometer. Overview. Benefits. agility made possible. Improve data center uptime and availability through better energy management

CA ecometer. Overview. Benefits. agility made possible. Improve data center uptime and availability through better energy management PRODUCT SHEET: CA ecometer CA ecometer Improve data center uptime and availability through better energy management agility made possible CA ecometer helps you to visualize, monitor, and better manage

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Intrusion Detection by Combining and Clustering Diverse Monitor Data

Intrusion Detection by Combining and Clustering Diverse Monitor Data Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC Seminar April 5, 26 Atul Bohara and Uttam Thakore PI: Bill Sanders Outline Motivation Overview of the approach Feature extraction

More information

MULTITHERMAN: Out-of-band High-Resolution HPC Power and Performance Monitoring Support for Big-Data Analysis

MULTITHERMAN: Out-of-band High-Resolution HPC Power and Performance Monitoring Support for Big-Data Analysis MULTITHERMAN: Out-of-band High-Resolution HPC Power and Performance Monitoring Support for Big-Data Analysis EU H2020 FETHPC project ANTAREX (g.a. 671623) EU FP7 ERC Project MULTITHERMAN (g.a.291125) HPC

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.7.6 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security EMERGING THREATS & STRATEGIES FOR DEFENSE Paul Fletcher Cyber Security Evangelist @_PaulFletcher Threats by Customer Environment Cloud Environment On Premise Environment 1.96% 0.13% 0.02% application-attack

More information

Introduction Challenges with using ML Guidelines for using ML Conclusions

Introduction Challenges with using ML Guidelines for using ML Conclusions Introduction Challenges with using ML Guidelines for using ML Conclusions Misuse detection Exact descriptions of known bad behavior Anomaly detection Deviations from profiles of normal behavior First proposed

More information

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

MULTITHERMAN: Out-of-band High-Resolution HPC Power and Performance Monitoring Support for Big-Data Analysis

MULTITHERMAN: Out-of-band High-Resolution HPC Power and Performance Monitoring Support for Big-Data Analysis MULTITHERMAN: Out-of-band High-Resolution HPC Power and Performance Monitoring Support for Big-Data Analysis EU H2020 FETHPC project ANTAREX (g.a. 671623) EU FP7 ERC Project MULTITHERMAN (g.a.291125) EETHPC,

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content

More information

Stopping Advanced Persistent Threats In Cloud and DataCenters

Stopping Advanced Persistent Threats In Cloud and DataCenters Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data

More information

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data Trend Micro Deep Discovery for Education Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data 1 Computers, the Internet, and portable devices are now

More information

Managing Power in Cisco UCS

Managing Power in Cisco UCS Managing Power in Cisco UCS This chapter includes the following sections: Power Management in Cisco UCS, page 1 Configuring the Power Policy, page 1 Configuring the Global Cap Policy, page 2 Configuring

More information

Systems and Technology Group. IBM Technology and Solutions Jan Janick IBM Vice President Modular Systems and Storage Development

Systems and Technology Group. IBM Technology and Solutions Jan Janick IBM Vice President Modular Systems and Storage Development Systems and Technology Group IBM Technology and Solutions Jan Janick IBM Vice President Modular Systems and Storage Development Power and cooling are complex issues There is no single fix. IBM is working

More information

A Guide to Closing All Potential VDI Security Gaps

A Guide to Closing All Potential VDI Security Gaps Brought to you by A Guide to Closing All Potential VDI Security Gaps IT and security leaders are embracing virtual desktop infrastructure (VDI) as a way to improve security for an increasingly diverse

More information

Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia

Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia Presenter: Harsha Patibandla Submitted in Partial Fulfillment of the Course Requirements

More information

Securing the future of mobility

Securing the future of mobility Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need

More information

TCEP: Traffic Consolidation for Energy-Proportional High-Radix Networks

TCEP: Traffic Consolidation for Energy-Proportional High-Radix Networks TCEP: Traffic Consolidation for Energy-Proportional High-Radix Networks Gwangsun Kim Arm Research Hayoung Choi, John Kim KAIST High-radix Networks Dragonfly network in Cray XC30 system 1D Flattened butterfly

More information

Streaming Prevention in Cb Defense. Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV

Streaming Prevention in Cb Defense. Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV Streaming Prevention in Cb Defense Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV 2 STREAMING PREVENTION IN Cb DEFENSE OVERVIEW Over the past three years, cyberattackers

More information

FP7 NEMESYS Project: Advances on Mobile Network Security

FP7 NEMESYS Project: Advances on Mobile Network Security Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem FP7 NEMESYS Project: Advances on Mobile Network Security Elina Theodoropoulou R&D Projects Section Manager etheodorop@cosmote.gr

More information

Enhancing cloud energy models for optimizing datacenters efficiency.

Enhancing cloud energy models for optimizing datacenters efficiency. Outin, Edouard, et al. "Enhancing cloud energy models for optimizing datacenters efficiency." Cloud and Autonomic Computing (ICCAC), 2015 International Conference on. IEEE, 2015. Reviewed by Cristopher

More information

Charles Lefurgy IBM Research, Austin

Charles Lefurgy IBM Research, Austin Super-Dense Servers: An Energy-efficient Approach to Large-scale Server Clusters Outline Problem Internet data centers use a lot of energy Opportunity Load-varying applications Servers can be power-managed

More information

Some Joules Are More Precious Than Others: Managing Renewable Energy in the Datacenter

Some Joules Are More Precious Than Others: Managing Renewable Energy in the Datacenter Some Joules Are More Precious Than Others: Managing Renewable Energy in the Datacenter Christopher Stewart The Ohio State University cstewart@cse.ohio-state.edu Kai Shen University of Rochester kshen@cs.rochester.edu

More information

Virtual Melting Temperature: Managing Server Load to Minimize Cooling Overhead with Phase Change Materials

Virtual Melting Temperature: Managing Server Load to Minimize Cooling Overhead with Phase Change Materials Virtual Melting Temperature: Managing Server Load to Minimize Cooling Overhead with Phase Change Materials Matt Skach1, Manish Arora2,3, Dean Tullsen3, Lingjia Tang1, Jason Mars1 University of Michigan1

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large

More information

Tripp Lite PDUs POWER DISTRIBUTION UNITS. Reliable rack power distribution for high-density IT environments. Introduction 2-3.

Tripp Lite PDUs POWER DISTRIBUTION UNITS. Reliable rack power distribution for high-density IT environments. Introduction 2-3. POWER DISTRIBUTION UNITS Tripp Lite rack power distribution for high-density IT environments. Introduction 2-3 Basic 4 Metered 5 Monitored 6 Switched 7 ATS 8 Hot-Swap 8 INTRODUCTION Tripp Lite Rack increase

More information

White Paper Power and Its Connection to Network Reliability

White Paper Power and Its Connection to Network Reliability White Paper Power and Its Connection to Network Reliability ALPHA TECHNOLOGIES Power and Its Connection to Network Reliability By Eric Wentz from Alpha Technologies, Inc. Reliability continues to be the

More information

Energy-centric DVFS Controlling Method for Multi-core Platforms

Energy-centric DVFS Controlling Method for Multi-core Platforms Energy-centric DVFS Controlling Method for Multi-core Platforms Shin-gyu Kim, Chanho Choi, Hyeonsang Eom, Heon Y. Yeom Seoul National University, Korea MuCoCoS 2012 Salt Lake City, Utah Abstract Goal To

More information

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING. NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING. The old mantra of trust but verify just is not working. Never trust and verify is how we must apply security in this era of sophisticated breaches.

More information

Uninterruptible Power Supplies

Uninterruptible Power Supplies Uninterruptible Power Supplies Contents 650VA Line Interactive Tower UPS - 360W UPS650VA...2 1500VA Line Interactive Tower UPS - 900W UPS1500VA...4 2000VA Line Interactive Tower UPS - 1200W UPS2000VA...6

More information

Silent Shredder: Zero-Cost Shredding For Secure Non-Volatile Main Memory Controllers

Silent Shredder: Zero-Cost Shredding For Secure Non-Volatile Main Memory Controllers Silent Shredder: Zero-Cost Shredding For Secure Non-Volatile Main Memory Controllers 1 ASPLOS 2016 2-6 th April Amro Awad (NC State University) Pratyusa Manadhata (Hewlett Packard Labs) Yan Solihin (NC

More information

Emerging Connected Vehicle based

Emerging Connected Vehicle based Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu Presented by Sezana Fahmida Outline Introduction

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Business Strategy Theatre

Business Strategy Theatre Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:

More information

Simplify PCI Compliance

Simplify PCI Compliance WHITE PAPER Simplify PCI Compliance An Affordable, Easy-to-Implement Approach Using Secure SD-WAN For most retailers, the technology burden of maintaining PCI compliance can be overwhelming. Hundreds of

More information

MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach

MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach Nhat Pham, Kiwoong Kwon, Daeyoung Kim School of Computing, Korea Advanced Institute

More information

ICS Security Monitoring

ICS Security Monitoring ICS Security Monitoring INFRASTRUCTURE MINING & METALS NUCLEAR, SECURITY & ENVIRONMENTAL OIL, GAS & CHEMICALS Moses Schwartz Security Engineer Computer Incident Response Team Bechtel Corporation State

More information

Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data

Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data Anurag Srivastava, Bo Cui, P. Banerjee Washington State University NASPI March 2017 Outline

More information

March 10 11, 2015 San Jose

March 10 11, 2015 San Jose March 10 11, 2015 San Jose Health monitoring & predictive analytics To lower the TCO in a datacenter Christian B. Madsen & Andrei Khurshudov Engineering Manager & Sr. Director Seagate Technology christian.b.madsen@seagate.com

More information

PALANTIR CYBERMESH INTRODUCTION

PALANTIR CYBERMESH INTRODUCTION 100 Hamilton Avenue Palo Alto, California 94301 PALANTIR CYBERMESH INTRODUCTION Cyber attacks expose organizations to significant security, regulatory, and reputational risks, including the potential for

More information

Don t Run out of Power: Use Smart Grid and Cloud Technology

Don t Run out of Power: Use Smart Grid and Cloud Technology Don t Run out of Power: Use Smart Grid and Cloud Technology Bruce Naegel Sr. Product Manager Symantec Corp. Presentation Overview Overview of IT Power Challenges SMART Grid as Part of the Solution Cloud

More information

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing IoT Week 2014, 2014 06 17 Ignacio García Wellness Telecom Outline Welcome Motivation Objectives TRESCCA client platform SW framework for

More information

SONICWALL SECURITY HEALTH CHECK SERVICE

SONICWALL SECURITY HEALTH CHECK SERVICE SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service

More information

A Simple Guide to Understanding EDR

A Simple Guide to Understanding EDR 2018. 08. 22 A Simple Guide to Understanding EDR Proposition for Adopting Next-generation Endpoint Security Technology 220, Pangyoyeok-ro, Bundang-gu, Seongnam-si, Gyeonggi-do, South Korea Tel: +82-31-722-8000

More information

Power Management in Cisco UCS

Power Management in Cisco UCS Power Capping in Cisco UCS, page 2 Power Policy Configuration, page 3 Power Policy for Cisco UCS Servers, page 3 Configuring the Power Policy, page 3 Power Supply for Redundancy Method, page 4 Configuring

More information

An Experimental Study of Rapidly Alternating Bottleneck in n-tier Applications

An Experimental Study of Rapidly Alternating Bottleneck in n-tier Applications An Experimental Study of Rapidly Alternating Bottleneck in n-tier Applications Qingyang Wang, Yasuhiko Kanemasa, Jack Li, Deepal Jayasinghe, Toshihiro Shimizu, Masazumi Matsubara, Motoyuki Kawaba, Calton

More information

Title DC Automation: It s a MARVEL!

Title DC Automation: It s a MARVEL! Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

SONICWALL SECURITY HEALTH CHECK SERVICE

SONICWALL SECURITY HEALTH CHECK SERVICE SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service

More information

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service

More information

Live Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation

Live Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation Live Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation Walter Cerroni, Franco Callegati DEI University of Bologna, Italy Outline Motivations Virtualized edge networks

More information

A Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models

A Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models A Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models Marc Ph. Stoecklin Jean-Yves Le Boudec Andreas Kind

More information

A Dell Technical White Paper Dell

A Dell Technical White Paper Dell Which UPS is Right for the Job? A Dell Technical White Paper Dell THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Energy efficient mapping of virtual machines

Energy efficient mapping of virtual machines GreenDays@Lille Energy efficient mapping of virtual machines Violaine Villebonnet Thursday 28th November 2013 Supervisor : Georges DA COSTA 2 Current approaches for energy savings in cloud Several actions

More information

Meet the Increased Demands on Your Infrastructure with Dell and Intel. ServerWatchTM Executive Brief

Meet the Increased Demands on Your Infrastructure with Dell and Intel. ServerWatchTM Executive Brief Meet the Increased Demands on Your Infrastructure with Dell and Intel ServerWatchTM Executive Brief a QuinStreet Excutive Brief. 2012 Doing more with less is the mantra that sums up much of the past decade,

More information

Symantec Endpoint Protection

Symantec Endpoint Protection Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,

More information

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1. Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change

More information

2. INTRUDER DETECTION SYSTEMS

2. INTRUDER DETECTION SYSTEMS 1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding

More information

Green Lights Forever: Analyzing the Security of Traffic Infrastructure

Green Lights Forever: Analyzing the Security of Traffic Infrastructure Green Lights Forever: Analyzing the Security of Traffic Infrastructure RAJSHAKHAR PAUL Outline Introduction Anatomy of a Traffic Infrastructure Case Study Threat Model Types of Attack Recommendation Broader

More information

High-resolution Measurement of Data Center Microbursts

High-resolution Measurement of Data Center Microbursts High-resolution Measurement of Data Center Microbursts Qiao Zhang (University of Washington) Vincent Liu (University of Pennsylvania) Hongyi Zeng (Facebook) Arvind Krishnamurthy (University of Washington)

More information

Warehouse-Scale Computers to Exploit Request-Level and Data-Level Parallelism

Warehouse-Scale Computers to Exploit Request-Level and Data-Level Parallelism Warehouse-Scale Computers to Exploit Request-Level and Data-Level Parallelism The datacenter is the computer Luiz Andre Barroso, Google (2007) Outline Introduction to WSCs Programming Models and Workloads

More information

Diffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading

Diffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading Diffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading Mario Almeida, Liang Wang*, Jeremy Blackburn, Konstantina Papagiannaki, Jon Crowcroft* Telefonica

More information

Survey of Cyber Moving Targets. Presented By Sharani Sankaran

Survey of Cyber Moving Targets. Presented By Sharani Sankaran Survey of Cyber Moving Targets Presented By Sharani Sankaran Moving Target Defense A cyber moving target technique refers to any technique that attempts to defend a system and increase the complexity of

More information

02 Why Does My IT Infrastructure Need a UPS?

02 Why Does My IT Infrastructure Need a UPS? UPS Buyer s Guide TABLE OF CONTENTS 01 What is a UPS? 02 Why Does My IT Infrastructure Need a UPS? 03 Common Features of UPS Systems ENERGY STORAGE SYSTEMS BATTERIES POWER PROTECTION MONITORING SOLUTIONS

More information

Virtualization. Application Application Application. MCSN - N. Tonellotto - Distributed Enabling Platforms OPERATING SYSTEM OPERATING SYSTEM

Virtualization. Application Application Application. MCSN - N. Tonellotto - Distributed Enabling Platforms OPERATING SYSTEM OPERATING SYSTEM Virtualization lication lication lication lication lication lication OPERATING SYSTEM OPERATING SYSTEM VIRTUALIZATION 1 Basic Idea Observation Hardware resources are typically under-utilized Hardware resources

More information

Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security

Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security Sungmin Hong, Robert Baykov, Lei Xu, Srinath Nadimpalli, Guofei Gu SUCCESS Lab Texas A&M University Outline Introduction & Motivation

More information

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Cisco Cloud Security. How to Protect Business to Support Digital Transformation Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,

More information

Security versus Energy Tradeoffs in Host-Based Mobile Malware Detection

Security versus Energy Tradeoffs in Host-Based Mobile Malware Detection Security versus Energy Tradeoffs in Host-Based Mobile Malware Detection Jeffrey Bickford *, H. Andrés Lagar-Cavilla #, Alexander Varshavsky #, Vinod Ganapathy *, and Liviu Iftode * * Rutgers University

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by machine learning and intelligent automation. By rethinking

More information

CSE543 - Computer and Network Security Module: Virtualization

CSE543 - Computer and Network Security Module: Virtualization CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 1 Operating System Quandary Q: What is the primary goal of

More information

CSE543 - Computer and Network Security Module: Virtualization

CSE543 - Computer and Network Security Module: Virtualization CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 Operating System Quandary Q: What is the primary goal of system

More information

ANATOMY OF AN ATTACK!

ANATOMY OF AN ATTACK! ANATOMY OF AN ATTACK! Are Your Crown Jewels Safe? Dom Kapac, Security Evangelist WHAT DO WE MEAN BY CROWN JEWELS? Crown jewels for most organizations are critical infrastructure and data Data is a valuable

More information

Un SOC avanzato per una efficace risposta al cybercrime

Un SOC avanzato per una efficace risposta al cybercrime Un SOC avanzato per una efficace risposta al cybercrime Identificazione e conferma di un incidente @RSAEMEA #RSAEMEASummit @masiste75 Mauro Costantini - Presales Consultant Agenda A look into the threat

More information

Density in the Data Center

Density in the Data Center Density in the Data Center INDUSTRY BRIEF Aug 2014 Density in the datacenter refers to the electric power consumed per square foot of floor space (or unit volume of space), number of servers, and the cooling

More information

Data centers control: challenges and opportunities

Data centers control: challenges and opportunities 1 Data centers control: challenges and opportunities Damiano Varagnolo Luleå University of Technology Aug. 24th, 2015 First part: what is a datacenter and what is its importance in our society Data centers

More information

TREND MICRO SMART PROTECTION SUITES

TREND MICRO SMART PROTECTION SUITES SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum endpoint security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly changing,

More information

Toward All-Hazards Security and Resilience for the Power Grid

Toward All-Hazards Security and Resilience for the Power Grid Toward All-Hazards Security and Resilience for the Power Grid Juan Torres Associate Laboratory Director, Energy Systems Integration National Renewable Energy Laboratory December 6, 2017 1 Grid Modernization

More information

CloudAV. Malware Analysis in the Network Cloud. Jon Oberheide. University of Michigan. June 12, 2008 MMC '08

CloudAV. Malware Analysis in the Network Cloud. Jon Oberheide. University of Michigan. June 12, 2008 MMC '08 - CloudAV Malware Analysis in the Network Cloud Jon Oberheide University of Michigan June 12, 2008 MMC '08 Introduction Jon Oberheide Advisor: Farnam Jahanian 2nd year PhD at U of M (BS, MS) Research Slide

More information

Resilient Smart Grids

Resilient Smart Grids Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main

More information

Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies

Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies lwihl@scalable-networks.com 2 The Need OT security particularly in the

More information

Resilience for Installations and Communities

Resilience for Installations and Communities Resilience for Installations and Communities Threats to Power Systems FY 18 NDAA Definition Resilience: The ability to avoid or prepare for, minimize, adapt to, and recover from anticipated and unanticipated

More information

EP Series II UPS 230 V

EP Series II UPS 230 V EP Series II UPS 230 V 1000/2000/3000 VA Uninterruptible Power Supply (UPS) geindustrial.com Non-stop pure power Today s 24/7 business world depends on 24/7 power availability and demands zero down time.

More information

Understanding Reduced-Voltage Operation in Modern DRAM Devices

Understanding Reduced-Voltage Operation in Modern DRAM Devices Understanding Reduced-Voltage Operation in Modern DRAM Devices Experimental Characterization, Analysis, and Mechanisms Kevin Chang A. Giray Yaglikci, Saugata Ghose,Aditya Agrawal *, Niladrish Chatterjee

More information

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1 The Cyber Threat Bob Gourley, Partner, Cognitio June 22, 2016 How we think. 1 About This Presentation Based on decades of experience in cyber conflict Including cyber defense, cyber intelligence, cyber

More information