Power Attack Defense: Securing Battery-Backed Data Centers
|
|
- Gabriel Allison
- 5 years ago
- Views:
Transcription
1 Power Attack Defense: Securing Battery-Backed Data Centers Presented by Chao Li, PhD Shanghai Jiao Tong University , Seoul, Korea
2 Risk of Power Oversubscription 2
3 3
4 01. Access Control 02. Central Antivirus 03. Network Intrusion Detection 04. Central Malware Protection 05. Application Firewall 06. Centralized Log Aggregation 07. Security Info. & Event Mgnt. 08. Host-Based Firewalls 09. Network Packet Monitoring 10. Host Intrusion Detection 11. Disk Encryption 12. Application Control 13. Data Loss Prevention 14. Antivirus for VM 15. Data at Rest Encryption 16. Host-Based Firewalls 17. Host App. Monitoring 18. Database Firewalls 19. Data Masking/Redaction 20. Per-Server Antivirus 21. Other Techniques 0% 50% 100% Adoption Rate Power-Related Security Issue Security Technologies 4
5 Outlines 1. Background and Motivation 2. Threat Model and Attack Analysis 3. Power Attack Defense 4. Evaluation and Discussion 5
6 Outlines 1. Background and Motivation 2. Threat Model and Attack Analysis 3. Power Attack Defense 4. Evaluation and Discussion 6
7 Power Delivery in Data Center 7
8 Power Infrastructure Oversubscription 8
9 Aggressive Power Oversubscription 9
10 Facebook s Battery Cabinets Facebook Battery Cabinet 10
11 Microsoft s Local Energy Storage 15% PUE improvement and 5X TCO reduction 11
12 Two Sides of the Same Coin Green Low-Cost Low-Power Security Availability Dependability 12
13 Primary Root Causes of Outages Generator Failure IT Equipment Failure Other UPS System Failure (Battery) 29% Battery Failure Weather Related 12% Weather Issue Water, Heat, CRAC Failure Accidental / Human Error 5% IT Equip. Issue 13
14 Unplanned Power Failure Do Happen [1] In the News What if an attacker tries to bring down a data center [1] Source: Ponemon Institute 14
15 Related Work Utility grid power anomaly Data center CB tripping Peak power surge System voltage noises Power Anomaly Security and Reliability Virtualizing power infrastructure (ISCA 13) Software-defined battery system (SOSP 15) Power emergency handling (ASPLOS 12) Heterogeneous battery system (ISCA 15) 15
16 Outlines 1. Background and Motivation 2. Threat Model and Attack Analysis 3. Power Attack Defense 4. Evaluation and Discussion 16
17 Understanding the Vulnerability Software Not Sensitive to Individual Power Peak Each server is allowed to reach its peak power as long as the total rack utilization is within the budget. Infrastructure Coarse-Grained Monitoring Calculate power demand based on the monitored the total energy consumption at coarse-grained intervals Hardware Slow Power Capping Normal power capping mechanisms cannot respond quickly enough to limit the sudden spikes 17
18 Threat Model A sophisticated adversary can manipulate its subscribed nodes to overload a larger cluster Opportunistically look for such a host by monitoring the VM IP Keep rebooting a few VMs until they reach the same desired location Generate simultaneously occurred power surge to overload the system 18
19 A Two-Phase Attack Phase-I: Wide Peak Power Aims at drain the UPS battery system Visible to data centers Phase-II: Narrow Power Spikes Aims at overload the server rack Invisible to data center 19
20 A Two-Phase Attack (Cont d) 20
21 Effective Power Attack Power(W) Budget Normal Load with Malicious Load Failed Attempt Effective Attack Time(s) A single spike may not result in effective attack Depend on the overcurrent and the peak current duration Repeatedly creating hidden power spikes Have good chance to overload the system Power Trace of a Rack with/without Malicious attacker 21
22 What Determines Effective Attack? Peak Height (Node Number) Peak Frequency (Intervals) Peak Width (Runtime) Power Monitor (Granularity) Power Budget (Tight or Not) Other Workloads (Type/Timing) 22
23 Outlines 1. Background and Motivation 2. Threat Model and Attack Analysis 3. PAD: Power Attack Defense 4. Evaluation and Discussion 23
24 PAD: An Overview Slow down Phase-I Attack 24
25 vdeb: Virtual Distributed Energy Backup Rack SeverA Sever Battery BatteryA SeverB BatteryB SeverC BatteryC 25
26 μdeb: Micro Distributed Energy Backup Virtual DEB alone cannot defeat a well-planned power attack Require HW mechanisms to handle the transient power spikes Micro DEB can react to any voltage surge/sags automatically Without any energy and lifetime issue 26
27 Hierarchical Security Levels 27
28 Outlines 1. Background and Motivation 2. Threat Model and Attack Analysis 3. PAD: Power Attack Defense 4. Evaluation and Discussion 28
29 PDU PAD - Evaluation Methodology Network Switch Precision Power Analyzer Charge Controller Mgmt. Node Attacker s Node VM Xen VM Server Node Server Node Server Node Server Node Battery Battery Battery SNMP Card Ethernet Sensor Circuitry 29
30 PAD - Evaluation Methodology 30
31 Attack Effectiveness Results Survival Time: 36,606 Seconds Survival Time: 60,793 Seconds Balancing battery usage could increase survival time Gives operators more time to identify malicious loads and figure out any possible solutions. 31
32 Time (Seconds) Data Center Survival Time The sustained operation duration of the evaluated Google cluster under various power attacks Conv PS PSPC udeb vdeb PAD Dense Attack Sparse Attack Dense Attack Sparse Attack Dense Attack Sparse Attack CPU Intensive Memory Intensive IO Intensive Avg. The impact of vdeb are bigger Visible power peaks dominate in overall attacking period Combing μdeb and vdeb = Better survival time 1.6X compared to the state-of-the-art baseline 32
33 Attack Effectiveness Results A B Load Shedding Ratio (%) Timestamp (x 5min) C PAD never use aggressive server shedding to save battery energy. Shutting down a small amount of servers may eliminate overload 33
34 udeb/ vdeb (%) Normalized Time Cost Impact Cost Ratio Survival Time udeb Capacity (microfarad) 15X more μdeb 40X survival time 34
35 Conclusions Modern data centers that oversubscribe their power infrastructure are prone to power attack Energy storage systems are the last line of protection against power anomaly in data centers SW and HW support are both necessary for successful power attack defense Security-aware power management allows us to safely exploit the benefits of power-constrained data centers 35
36 Thanks! 36
Maximum Security with Minimum Impact : Going Beyond Next Gen
SESSION ID: SP03-W10 Maximum Security with Minimum Impact : Going Beyond Next Gen Wendy Moore Director, User Protection Trend Micro @WMBOTT Hyper-competitive Cloud Rapid adoption Social Global Mobile IoT
More informationExploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers
Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers Mohammad A. Islam, Shaolei Ren, and Adam Wierman Acknowledgement: NSF under grants CNS-1551661, CNS-1565474, and ECCS-1610471,
More informationIT Level Power Provisioning Business Continuity and Efficiency at NTT
IT Level Power Provisioning Business Continuity and Efficiency at NTT Henry M.L. Wong Intel Eco-Technology Program Office Environment Global CO 2 Emissions ICT 2% 98% Source: The Climate Group Economic
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationIntroduction to Energy-Efficient Software 2 nd life talk
Introduction to Energy-Efficient Software 2 nd life talk Intel Software and Solutions Group Bob Steigerwald Nov 8, 2007 Taylor Kidd Nov 15, 2007 Agenda Demand for Mobile Computing Devices What is Energy-Efficient
More informationCourse Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture
About this Course This course will best position your organization to analyse threats and detect anomalies that could indicate cybercriminal behaviour. The payoff for this new proactive approach would
More informationSecurity for the Cloud Era
Security for the Cloud Era Make the Most Out of Your Cloud Journey Fadhly Hassim Sales Engineer South East Asia & Korea Barracuda Networks Current Weather Situation Customer Provisions & Manage On-Premises
More informationA Network-aware Scheduler in Data-parallel Clusters for High Performance
A Network-aware Scheduler in Data-parallel Clusters for High Performance Zhuozhao Li, Haiying Shen and Ankur Sarker Department of Computer Science University of Virginia May, 2018 1/61 Data-parallel clusters
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationData Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle
Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government
More informationAn Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)
An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University
More informationCA ecometer. Overview. Benefits. agility made possible. Improve data center uptime and availability through better energy management
PRODUCT SHEET: CA ecometer CA ecometer Improve data center uptime and availability through better energy management agility made possible CA ecometer helps you to visualize, monitor, and better manage
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationIntrusion Detection by Combining and Clustering Diverse Monitor Data
Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC Seminar April 5, 26 Atul Bohara and Uttam Thakore PI: Bill Sanders Outline Motivation Overview of the approach Feature extraction
More informationMULTITHERMAN: Out-of-band High-Resolution HPC Power and Performance Monitoring Support for Big-Data Analysis
MULTITHERMAN: Out-of-band High-Resolution HPC Power and Performance Monitoring Support for Big-Data Analysis EU H2020 FETHPC project ANTAREX (g.a. 671623) EU FP7 ERC Project MULTITHERMAN (g.a.291125) HPC
More informationMcAfee Network Security Platform 8.3
8.3.7.28-8.3.7.6 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationEMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security
EMERGING THREATS & STRATEGIES FOR DEFENSE Paul Fletcher Cyber Security Evangelist @_PaulFletcher Threats by Customer Environment Cloud Environment On Premise Environment 1.96% 0.13% 0.02% application-attack
More informationIntroduction Challenges with using ML Guidelines for using ML Conclusions
Introduction Challenges with using ML Guidelines for using ML Conclusions Misuse detection Exact descriptions of known bad behavior Anomaly detection Deviations from profiles of normal behavior First proposed
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationCS 356 Operating System Security. Fall 2013
CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database
More informationMcAfee Network Security Platform 8.3
8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationMULTITHERMAN: Out-of-band High-Resolution HPC Power and Performance Monitoring Support for Big-Data Analysis
MULTITHERMAN: Out-of-band High-Resolution HPC Power and Performance Monitoring Support for Big-Data Analysis EU H2020 FETHPC project ANTAREX (g.a. 671623) EU FP7 ERC Project MULTITHERMAN (g.a.291125) EETHPC,
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content
More informationStopping Advanced Persistent Threats In Cloud and DataCenters
Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data
More informationTrend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data
Trend Micro Deep Discovery for Education Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data 1 Computers, the Internet, and portable devices are now
More informationManaging Power in Cisco UCS
Managing Power in Cisco UCS This chapter includes the following sections: Power Management in Cisco UCS, page 1 Configuring the Power Policy, page 1 Configuring the Global Cap Policy, page 2 Configuring
More informationSystems and Technology Group. IBM Technology and Solutions Jan Janick IBM Vice President Modular Systems and Storage Development
Systems and Technology Group IBM Technology and Solutions Jan Janick IBM Vice President Modular Systems and Storage Development Power and cooling are complex issues There is no single fix. IBM is working
More informationA Guide to Closing All Potential VDI Security Gaps
Brought to you by A Guide to Closing All Potential VDI Security Gaps IT and security leaders are embracing virtual desktop infrastructure (VDI) as a way to improve security for an increasingly diverse
More informationDistributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia
Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia Presenter: Harsha Patibandla Submitted in Partial Fulfillment of the Course Requirements
More informationSecuring the future of mobility
Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need
More informationTCEP: Traffic Consolidation for Energy-Proportional High-Radix Networks
TCEP: Traffic Consolidation for Energy-Proportional High-Radix Networks Gwangsun Kim Arm Research Hayoung Choi, John Kim KAIST High-radix Networks Dragonfly network in Cray XC30 system 1D Flattened butterfly
More informationStreaming Prevention in Cb Defense. Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV
Streaming Prevention in Cb Defense Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV 2 STREAMING PREVENTION IN Cb DEFENSE OVERVIEW Over the past three years, cyberattackers
More informationFP7 NEMESYS Project: Advances on Mobile Network Security
Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem FP7 NEMESYS Project: Advances on Mobile Network Security Elina Theodoropoulou R&D Projects Section Manager etheodorop@cosmote.gr
More informationEnhancing cloud energy models for optimizing datacenters efficiency.
Outin, Edouard, et al. "Enhancing cloud energy models for optimizing datacenters efficiency." Cloud and Autonomic Computing (ICCAC), 2015 International Conference on. IEEE, 2015. Reviewed by Cristopher
More informationCharles Lefurgy IBM Research, Austin
Super-Dense Servers: An Energy-efficient Approach to Large-scale Server Clusters Outline Problem Internet data centers use a lot of energy Opportunity Load-varying applications Servers can be power-managed
More informationSome Joules Are More Precious Than Others: Managing Renewable Energy in the Datacenter
Some Joules Are More Precious Than Others: Managing Renewable Energy in the Datacenter Christopher Stewart The Ohio State University cstewart@cse.ohio-state.edu Kai Shen University of Rochester kshen@cs.rochester.edu
More informationVirtual Melting Temperature: Managing Server Load to Minimize Cooling Overhead with Phase Change Materials
Virtual Melting Temperature: Managing Server Load to Minimize Cooling Overhead with Phase Change Materials Matt Skach1, Manish Arora2,3, Dean Tullsen3, Lingjia Tang1, Jason Mars1 University of Michigan1
More informationChapter 11: Networks
Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationTripp Lite PDUs POWER DISTRIBUTION UNITS. Reliable rack power distribution for high-density IT environments. Introduction 2-3.
POWER DISTRIBUTION UNITS Tripp Lite rack power distribution for high-density IT environments. Introduction 2-3 Basic 4 Metered 5 Monitored 6 Switched 7 ATS 8 Hot-Swap 8 INTRODUCTION Tripp Lite Rack increase
More informationWhite Paper Power and Its Connection to Network Reliability
White Paper Power and Its Connection to Network Reliability ALPHA TECHNOLOGIES Power and Its Connection to Network Reliability By Eric Wentz from Alpha Technologies, Inc. Reliability continues to be the
More informationEnergy-centric DVFS Controlling Method for Multi-core Platforms
Energy-centric DVFS Controlling Method for Multi-core Platforms Shin-gyu Kim, Chanho Choi, Hyeonsang Eom, Heon Y. Yeom Seoul National University, Korea MuCoCoS 2012 Salt Lake City, Utah Abstract Goal To
More informationNETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.
NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING. The old mantra of trust but verify just is not working. Never trust and verify is how we must apply security in this era of sophisticated breaches.
More informationUninterruptible Power Supplies
Uninterruptible Power Supplies Contents 650VA Line Interactive Tower UPS - 360W UPS650VA...2 1500VA Line Interactive Tower UPS - 900W UPS1500VA...4 2000VA Line Interactive Tower UPS - 1200W UPS2000VA...6
More informationSilent Shredder: Zero-Cost Shredding For Secure Non-Volatile Main Memory Controllers
Silent Shredder: Zero-Cost Shredding For Secure Non-Volatile Main Memory Controllers 1 ASPLOS 2016 2-6 th April Amro Awad (NC State University) Pratyusa Manadhata (Hewlett Packard Labs) Yan Solihin (NC
More informationEmerging Connected Vehicle based
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu Presented by Sezana Fahmida Outline Introduction
More informationChapter 11: It s a Network. Introduction to Networking
Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting
More informationBusiness Strategy Theatre
Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:
More informationSimplify PCI Compliance
WHITE PAPER Simplify PCI Compliance An Affordable, Easy-to-Implement Approach Using Secure SD-WAN For most retailers, the technology burden of maintaining PCI compliance can be overwhelming. Hundreds of
More informationMSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach
MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach Nhat Pham, Kiwoong Kwon, Daeyoung Kim School of Computing, Korea Advanced Institute
More informationICS Security Monitoring
ICS Security Monitoring INFRASTRUCTURE MINING & METALS NUCLEAR, SECURITY & ENVIRONMENTAL OIL, GAS & CHEMICALS Moses Schwartz Security Engineer Computer Incident Response Team Bechtel Corporation State
More informationFailure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data
Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data Anurag Srivastava, Bo Cui, P. Banerjee Washington State University NASPI March 2017 Outline
More informationMarch 10 11, 2015 San Jose
March 10 11, 2015 San Jose Health monitoring & predictive analytics To lower the TCO in a datacenter Christian B. Madsen & Andrei Khurshudov Engineering Manager & Sr. Director Seagate Technology christian.b.madsen@seagate.com
More informationPALANTIR CYBERMESH INTRODUCTION
100 Hamilton Avenue Palo Alto, California 94301 PALANTIR CYBERMESH INTRODUCTION Cyber attacks expose organizations to significant security, regulatory, and reputational risks, including the potential for
More informationDon t Run out of Power: Use Smart Grid and Cloud Technology
Don t Run out of Power: Use Smart Grid and Cloud Technology Bruce Naegel Sr. Product Manager Symantec Corp. Presentation Overview Overview of IT Power Challenges SMART Grid as Part of the Solution Cloud
More informationTRESCCA Trustworthy Embedded Systems for Secure Cloud Computing
TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing IoT Week 2014, 2014 06 17 Ignacio García Wellness Telecom Outline Welcome Motivation Objectives TRESCCA client platform SW framework for
More informationSONICWALL SECURITY HEALTH CHECK SERVICE
SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service
More informationA Simple Guide to Understanding EDR
2018. 08. 22 A Simple Guide to Understanding EDR Proposition for Adopting Next-generation Endpoint Security Technology 220, Pangyoyeok-ro, Bundang-gu, Seongnam-si, Gyeonggi-do, South Korea Tel: +82-31-722-8000
More informationPower Management in Cisco UCS
Power Capping in Cisco UCS, page 2 Power Policy Configuration, page 3 Power Policy for Cisco UCS Servers, page 3 Configuring the Power Policy, page 3 Power Supply for Redundancy Method, page 4 Configuring
More informationAn Experimental Study of Rapidly Alternating Bottleneck in n-tier Applications
An Experimental Study of Rapidly Alternating Bottleneck in n-tier Applications Qingyang Wang, Yasuhiko Kanemasa, Jack Li, Deepal Jayasinghe, Toshihiro Shimizu, Masazumi Matsubara, Motoyuki Kawaba, Calton
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationCCNA Cybersecurity Operations 1.1 Scope and Sequence
CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding
More informationSONICWALL SECURITY HEALTH CHECK SERVICE
SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service
More informationSecuring Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &
Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service
More informationLive Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation
Live Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation Walter Cerroni, Franco Callegati DEI University of Bologna, Italy Outline Motivations Virtualized edge networks
More informationA Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models
A Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models Marc Ph. Stoecklin Jean-Yves Le Boudec Andreas Kind
More informationA Dell Technical White Paper Dell
Which UPS is Right for the Job? A Dell Technical White Paper Dell THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationEnergy efficient mapping of virtual machines
GreenDays@Lille Energy efficient mapping of virtual machines Violaine Villebonnet Thursday 28th November 2013 Supervisor : Georges DA COSTA 2 Current approaches for energy savings in cloud Several actions
More informationMeet the Increased Demands on Your Infrastructure with Dell and Intel. ServerWatchTM Executive Brief
Meet the Increased Demands on Your Infrastructure with Dell and Intel ServerWatchTM Executive Brief a QuinStreet Excutive Brief. 2012 Doing more with less is the mantra that sums up much of the past decade,
More informationSymantec Endpoint Protection
Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More information2. INTRUDER DETECTION SYSTEMS
1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding
More informationGreen Lights Forever: Analyzing the Security of Traffic Infrastructure
Green Lights Forever: Analyzing the Security of Traffic Infrastructure RAJSHAKHAR PAUL Outline Introduction Anatomy of a Traffic Infrastructure Case Study Threat Model Types of Attack Recommendation Broader
More informationHigh-resolution Measurement of Data Center Microbursts
High-resolution Measurement of Data Center Microbursts Qiao Zhang (University of Washington) Vincent Liu (University of Pennsylvania) Hongyi Zeng (Facebook) Arvind Krishnamurthy (University of Washington)
More informationWarehouse-Scale Computers to Exploit Request-Level and Data-Level Parallelism
Warehouse-Scale Computers to Exploit Request-Level and Data-Level Parallelism The datacenter is the computer Luiz Andre Barroso, Google (2007) Outline Introduction to WSCs Programming Models and Workloads
More informationDiffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading
Diffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading Mario Almeida, Liang Wang*, Jeremy Blackburn, Konstantina Papagiannaki, Jon Crowcroft* Telefonica
More informationSurvey of Cyber Moving Targets. Presented By Sharani Sankaran
Survey of Cyber Moving Targets Presented By Sharani Sankaran Moving Target Defense A cyber moving target technique refers to any technique that attempts to defend a system and increase the complexity of
More information02 Why Does My IT Infrastructure Need a UPS?
UPS Buyer s Guide TABLE OF CONTENTS 01 What is a UPS? 02 Why Does My IT Infrastructure Need a UPS? 03 Common Features of UPS Systems ENERGY STORAGE SYSTEMS BATTERIES POWER PROTECTION MONITORING SOLUTIONS
More informationVirtualization. Application Application Application. MCSN - N. Tonellotto - Distributed Enabling Platforms OPERATING SYSTEM OPERATING SYSTEM
Virtualization lication lication lication lication lication lication OPERATING SYSTEM OPERATING SYSTEM VIRTUALIZATION 1 Basic Idea Observation Hardware resources are typically under-utilized Hardware resources
More informationTowards SDN-Defined Programmable BYOD (Bring Your Own Device) Security
Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security Sungmin Hong, Robert Baykov, Lei Xu, Srinath Nadimpalli, Guofei Gu SUCCESS Lab Texas A&M University Outline Introduction & Motivation
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More informationSecurity versus Energy Tradeoffs in Host-Based Mobile Malware Detection
Security versus Energy Tradeoffs in Host-Based Mobile Malware Detection Jeffrey Bickford *, H. Andrés Lagar-Cavilla #, Alexander Varshavsky #, Vinod Ganapathy *, and Liviu Iftode * * Rutgers University
More informationSentinelOne Technical Brief
SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by machine learning and intelligent automation. By rethinking
More informationCSE543 - Computer and Network Security Module: Virtualization
CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 1 Operating System Quandary Q: What is the primary goal of
More informationCSE543 - Computer and Network Security Module: Virtualization
CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 Operating System Quandary Q: What is the primary goal of system
More informationANATOMY OF AN ATTACK!
ANATOMY OF AN ATTACK! Are Your Crown Jewels Safe? Dom Kapac, Security Evangelist WHAT DO WE MEAN BY CROWN JEWELS? Crown jewels for most organizations are critical infrastructure and data Data is a valuable
More informationUn SOC avanzato per una efficace risposta al cybercrime
Un SOC avanzato per una efficace risposta al cybercrime Identificazione e conferma di un incidente @RSAEMEA #RSAEMEASummit @masiste75 Mauro Costantini - Presales Consultant Agenda A look into the threat
More informationDensity in the Data Center
Density in the Data Center INDUSTRY BRIEF Aug 2014 Density in the datacenter refers to the electric power consumed per square foot of floor space (or unit volume of space), number of servers, and the cooling
More informationData centers control: challenges and opportunities
1 Data centers control: challenges and opportunities Damiano Varagnolo Luleå University of Technology Aug. 24th, 2015 First part: what is a datacenter and what is its importance in our society Data centers
More informationTREND MICRO SMART PROTECTION SUITES
SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum endpoint security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly changing,
More informationToward All-Hazards Security and Resilience for the Power Grid
Toward All-Hazards Security and Resilience for the Power Grid Juan Torres Associate Laboratory Director, Energy Systems Integration National Renewable Energy Laboratory December 6, 2017 1 Grid Modernization
More informationCloudAV. Malware Analysis in the Network Cloud. Jon Oberheide. University of Michigan. June 12, 2008 MMC '08
- CloudAV Malware Analysis in the Network Cloud Jon Oberheide University of Michigan June 12, 2008 MMC '08 Introduction Jon Oberheide Advisor: Farnam Jahanian 2nd year PhD at U of M (BS, MS) Research Slide
More informationResilient Smart Grids
Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main
More informationCyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies
Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies lwihl@scalable-networks.com 2 The Need OT security particularly in the
More informationResilience for Installations and Communities
Resilience for Installations and Communities Threats to Power Systems FY 18 NDAA Definition Resilience: The ability to avoid or prepare for, minimize, adapt to, and recover from anticipated and unanticipated
More informationEP Series II UPS 230 V
EP Series II UPS 230 V 1000/2000/3000 VA Uninterruptible Power Supply (UPS) geindustrial.com Non-stop pure power Today s 24/7 business world depends on 24/7 power availability and demands zero down time.
More informationUnderstanding Reduced-Voltage Operation in Modern DRAM Devices
Understanding Reduced-Voltage Operation in Modern DRAM Devices Experimental Characterization, Analysis, and Mechanisms Kevin Chang A. Giray Yaglikci, Saugata Ghose,Aditya Agrawal *, Niladrish Chatterjee
More informationThe Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1
The Cyber Threat Bob Gourley, Partner, Cognitio June 22, 2016 How we think. 1 About This Presentation Based on decades of experience in cyber conflict Including cyber defense, cyber intelligence, cyber
More information