Creating the IETF IDWG Intrusion Detection Protocols IDMEF & IDXP
|
|
- Eileen Black
- 5 years ago
- Views:
Transcription
1 Creating the IETF IDWG Intrusion Detection Protocols IDMEF & IDXP Ground System Architectures Workshop GSAW 2002 March 12-15, 2002 Joe Betser Andy Walther The Aerospace Corp Mike Erlinger, Tim Buchheim Ben Feinstein, Greg Matthews Harvey Mudd College
2 Motivation Intrusion detection is becoming widespread Many Proprietary systems Volume of data reported increasing Automation and interoperability are needed Collect information in central repository Collate and filter data Automate response Betser, Erlinger, et al GSAW
3 Motivation Ground Stations are vulnerable COTS Systems (known security vulnerabilities) COTS Networking (known security vulnerabilities Separation not always physical CA power network Need common intrusion message format and common transport protocol Goal --Tool Interoperability Betser, Erlinger, et al GSAW
4 Impact Create global Internet IDS protocols and data structures to enable IDS component communication in global enterprises Ubiquitous global dissemination of usage & interoperability -- a condition for advancement in standards track Rough Consensus and Running Code Betser, Erlinger, et al GSAW
5 The IDS Process IP infrastructure under attack IDS sensors/mgrs communicate using IDWG Protocols IDMEF for Message, IDXP for transport IDS information correlated by managers Detection drives response Betser, Erlinger, et al GSAW
6 Technical Approach Develop widely used IDS Internet protocols IETF IDWG (Intrusion Detection W/G) Message structures and communication protocol Participation of Cisco, NAI, HP, Boeing, IBM, ISS, MITRE, MSFT, etc. 3 IETF meetings per year and interim IDWG meetings, much work done over Betser, Erlinger, et al GSAW
7 The IETF Standards body for the Internet Divided into Working Groups driven by Charter and Milestones Rough Consensus and Running Code Betser, Erlinger, et al GSAW
8 The IDWG Intrusion Detection Working Group Develop a common way to communicate Message Format (XML) IDMEF (Intrusion Detection Message Exchange Format) Transport protocol IAP (Intrusion Alert Protocol) IDXP (Intrusion Detection exchange Protocol) Betser, Erlinger, et al GSAW
9 Requirements Reliable Delivery Mutual Authentication & Assurance of Identity Confidentiality and Integrity Work without compromising Firewalls Proxy-able Betser, Erlinger, et al GSAW
10 Architectures Manager Manager Initial connection Flow of intrusion alerts Manager Betser, Erlinger, et al F I R E W A L L Proxy Active Analyzer Active Analyzer Manager Manager Passive Analyzer GSAW
11 IAP The Basics Similar to HTTP Runs over TCP Uses TLS for security Differences Direction of communication does not depend on who initiated the connect Betser, Erlinger, et al GSAW
12 IDXP Motivation IAP predated BEEP (Blocks Extensible Exchange Protocol - RFC 3080) Generalized application level protocol framework Computers connect through a BEEP session Different protocols implemented as profiles, run over BEEP channels IDXP developed as a BEEP profile Betser, Erlinger, et al GSAW
13 IDXP What It Looks Like IDXP syslog Other profile BEEP TCP IP Ethernet, ATM, etc. Betser, Erlinger, et al GSAW
14 IDXP Advantages Flexibility Other BEEP profiles used to satisfy security and firewall operation requirements Simplicity Using other profiles for security and firewall operation reduces the complexity of IDXP Scalability Many BEEP channels running IDXP Cost of security incurred once for each BEEP session Betser, Erlinger, et al GSAW
15 Achievements IDWG Requirements Internet Draft (ID) IDMEF Message Format ID IDXP Message Transport ID Tunnel Proxy ID Skeleton IDMEF Implementation Skeleton IDXP Implementation Betser, Erlinger, et al GSAW
16 Current Status Feb 2002 IDWG Requirements submitted for Informational RFC status IDMEF Message Format submitted for Proposed RFC Status IDXP Message Transport submitted for Proposed RFC Status TUNNEL Transport Proxy submitted for Proposed RFC Status Betser, Erlinger, et al GSAW
17 Future Work Interoperability testing, standards progress Incident reporting, configurations, vulnerabilities possible standard message formats Correlation and Response protocols Community input continually received! Betser, Erlinger, et al GSAW
18 Lessons Learned Tough to build global consensus Wide spectrum of agendas among participants Strong collaboration with forward momentum Researchers and vendors participate Extraordinary leverage and tech transfer Ground systems are vulnerable and need such tools Betser, Erlinger, et al GSAW
19 Acronyms IETF Internet Engineering Task Force IDWG Intrusion Detection Working Group IAP Intrusion Alert Protocol BEEP Blocks Extensible Exchange Protocol IDXP Intrusion Detection exchange Protocol TLS Transport Layer Security Betser, Erlinger, et al GSAW
20 Questions/Comments?
21 Acknowledgements Aerospace Alan Foonberg Dave Evans Ranwa Haddad IETF members Stuart Staniford Darren New Marshall Rose John C. C. White Paul Osterwald Betser, Erlinger, et al GSAW
The State of Standardization Efforts to support Data Exchange in the Security Domain
The State of Standardization Efforts to support Data Exchange in the Security Domain Roman Danyliw FloCon 2004: Standards Talk Network Group Software Engineering Institute Carnegie Mellon
More informationIDS Administration Platform
IDS Administration Platform MARCO AURÉLIO BONATO, WALTER GODOY JR. Centro de Pós-Graduação em Engenharia Elétrica e Informática Industrial Centro Federal de Educação Tecnológica do Paraná Av. Sete de Setembro,
More informationRID IETF Draft Update
RID IETF Draft Update Kathleen M. Moriarty INCH Working Group 29 March 2005 This work was sponsored by the Air Force under Air Force Contract Number F19628-00-C-0002. "Opinions, interpretations, conclusions,
More informationPROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL
Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.
More informationNational Cyber Security Operations Center (N-CSOC) Stakeholders' Conference
National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference Benefits to the Stakeholders A Collaborative and Win-Win Strategy Lal Dias Chief Executive Officer Sri Lanka CERT CC Cyber attacks
More informationReal-time DDoS Defense: A collaborative Approach at Internet Scale
Real-time DDoS Defense: A collaborative Approach at Internet Scale Agenda Problem & Goal Insight Overview Challenges Implementation Evaluation Conclusion Discussion 2 Problem & Goal Problem Source: https://www.youtube.com/watch?v=kbbiqkevddo
More informationExtended INCident Handling Working Group (INCH)
Internet Engineering Task Force Extended INCident Handling Working Group (INCH) http://www.cert.org/ietf/inch/inch_interim_2004.html 12:00 16:00 Sunday, June 13 2004 Interim Meeting Budapest, Hungary Roman
More informationCategory: Standards Track March Extensible Provisioning Protocol (EPP) Transport Over TCP
Network Working Group S. Hollenbeck Request for Comments: 3734 VeriSign, Inc. Category: Standards Track March 2004 Extensible Provisioning Protocol (EPP) Transport Over TCP Status of this Memo This document
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationPolycom RealPresence Access Director System
Release Notes Polycom RealPresence Access Director System 4.0 June 2014 3725-78700-001D Polycom announces the release of the Polycom RealPresence Access Director system, version 4.0. This document provides
More informationSecure Delay Tolerant Networking Using SBSP and IPMEIR Enabling Security, Resiliency, and Cost Savings for Space Mission Communications
Secure Delay Tolerant Networking Using SBSP and IPMEIR Enabling Security, Resiliency, and Cost Savings for Space Mission Communications Presented by: Assi Friedman Authored by: Assi Friedman Innoflight,
More informationLayer 2 VPN(L2VPN) Service Model (L2SM)
Layer 2 VPN(L2VPN) Service Model (L2SM) IETF 97, Thursday Nov 17th, 2016 09:30 Chairs Adrian Farrel (adrian@olddog.co.uk) Qin WU (bill.wu@huawei.com) 1 Note Well Any submission to the IETF intended by
More informationSMart esolutions Information Security
Information Security Agenda What are SMart esolutions? What is Information Security? Definitions SMart esolutions Security Features Frequently Asked Questions 12/6/2004 2 What are SMart esolutions? SMart
More informationMicrosoft Privacy Protected Network Access: Virtual Private Networking and Intranet Security
Operating System Microsoft Privacy Protected Network Access: Virtual Private Networking and Intranet Security White Paper Abstract The Microsoft Windows operating system includes technology to secure communications
More informationInformation Technology Information Sharing and Analysis Center. First Symposium Barcelona, Spain Feb. 2, 2011
Information Technology Information Sharing and Analysis Center First Symposium Barcelona, Spain Feb. 2, 2011 About Us Non Profit, US Corporation established in 2000 and operational in 2001 Fully funded
More informationOSSIM Fast Guide
----------------- OSSIM Fast Guide ----------------- February 8, 2004 Julio Casal http://www.ossim.net WHAT IS OSSIM? In three phrases: - VERIFICATION may be OSSIM s most valuable contribution
More informationINFS 766 Internet Security Protocols. Lecture 1 Firewalls. Prof. Ravi Sandhu INTERNET INSECURITY
INFS 766 Internet Security Protocols Lecture 1 Firewalls Prof. Ravi Sandhu INTERNET INSECURITY Internet insecurity spreads at Internet speed Morris worm of 1987 Password sniffing attacks in 1994 IP spoofing
More informationNFS Version 4 Security Update
NFS Version 4 Security Update Mike Eisler Sun Microsystems, Inc. mre@eng.sun.com 45th IETF Oslo July 11-16, 1999 NFS V4 Security 1 of 9 1999-07-08 Contents NFS V2/V3 security draft update Summary of issues
More informationTechnologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc.
Technologies for Securing the Networked Supply Chain Alex Deacon Advanced Products and Research Group VeriSign, Inc. Agenda Introduction Security challenges Security technologies in use today Applying
More informationINFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE
INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE
More informationFrom NetFlow to IPFIX the evolution of IP flow information export
From NetFlow to IPFIX the evolution of IP flow information export Brian Trammell - CERT/NetSA - Pittsburgh, PA, US Elisa Boschi - Hitachi Europe - Zurich, CH NANOG 41 - Albuquerque, NM, US - October 15,
More informationData Collection and Incident Analysis: IT-ISAC Perspective. ENISA Workshop March 17, 2010
Data Collection and Incident Analysis: IT-ISAC Perspective ENISA Workshop March 17, 2010 Agenda IT-ISAC Overview ISAC Model with Case Studies (ISAC Initiatives and Conficker) Building a Joint Capability
More informationThe World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to
1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats
More informationStatistics Clearinghouse function Infrastructure Alert function
ecsirt.net The European CSIRT Network Status Update TF-CSIRT, September 2003 Amsterdam, NL Review of the current results Statistics Clearinghouse function Infrastructure Alert function Slide 2 Participation
More informationMLS BOF. Chair Slides: Nick & Sean IETF 101. Messaging Layer Security
MLS BOF Messaging Layer Security Chair Slides: Nick & Sean IETF 101 1 NOTE WELL This is a reminder of IETF policies in effect on various topics such as patents or code of conduct. It is only meant to point
More information802.1x. ACSAC 2002 Las Vegas
802.1x ACSAC 2002 Las Vegas Jeff.Hayes@alcatel.com 802.1 Projects The IEEE 802.1 Working Group is chartered to concern itself with and develop standards and recommended practices in the following areas:
More informationPolycom RealPresence Access Director System
Release Notes 3.1.1 April 2014 3725-78700-001C1 Polycom RealPresence Access Director System Polycom announces the release of the Polycom RealPresence Access Director system, version 3.1.1. This document
More informationRobust Header Compression (rohc)
Robust Header Compression (rohc) Chairs: Carsten Bormann Mikael Degermark Mailing list: rohc@cdt.luth.se 1 Hello! This is an IETF Working Group We are here to make
More informationReplacing the WHOIS protocol. Tech Day Boungainvillea room 12 March 2012, 16:40-16:55
Replacing the WHOIS protocol Tech Day Boungainvillea room 12 March 2012, 16:40-16:55 The Need to Replace WHOIS 2 Problems with WHOIS protocol Lack of: 1. Support for Internationalized Registration Data
More informationAdministration of Symantec Cyber Security Services (July 2015) Sample Exam
Administration of Symantec Cyber Security Services (July 2015) Sample Exam Contents SAMPLE QUESTIONS... 1 ANSWERS... 6 Sample Questions 1. Which DeepSight Intelligence Datafeed can be used to create a
More informationRID IETF Draft Update
RID IETF Draft Update Kathleen M. Moriarty INCH Working Group 5 August 2004 This work was sponsored by the Air Force under Air Force Contract Number F19628-00-C-0002. "Opinions, interpretations, conclusions,
More informationIntroduction and IETF 86 Orlando, FL 11 March Brian Adamson NRL Victor Firoiu BAE Systems
Introduction and Overview @ IETF 86 Orlando, FL 11 March 2013 Brian Adamson NRL Victor Firoiu BAE Systems Agenda 1. NWCRG Overview (Victor / Brian) Provide brief overview of motivation, charter, history.
More informationENHANCING PUBLIC WIFI SECURITY
ENHANCING PUBLIC WIFI SECURITY A Technical Paper prepared for SCTE/ISBE by Ivan Ong Principal Engineer Comcast 1701 John F Kennedy Blvd Philadelphia, PA 19103 215-286-2493 Ivan_Ong@comcast.com 2017 SCTE-ISBE
More informationNIAC Vulnerability Disclosure Working Group. Status Report & Update
NIAC Vulnerability Disclosure Working Group Status Report & Update The North American Network Operators Group (NANOG28) 2003 June 02 2003 June 02 NIAC Working Paper: VDWG Update for NANOG28 2 Organization
More informationSoftware Updates for Internet of Things (SUIT) WG. IETF 101, Monday, March 19, 2018 Chairs: Dave Thaler David Waltermire Russ Housley
Software Updates for Internet of Things (SUIT) WG IETF 101, Monday, March 19, 2018 Chairs: Dave Thaler David Waltermire Russ Housley 1 Note Well This is a reminder of IETF policies in effect on various
More informationRESTCONF Protocol. draft-ietf-netconf-restconf-03 NETCONF WG IETF #91 Honolulu, HI, USA
RESTCONF Protocol draft-ietf-netconf-restconf-03 NETCONF WG IETF #91 Honolulu, HI, USA Andy Bierman Martin Björklund Kent Watsen v0.3 1 Agenda
More informationRTCWEB Working Group. Media Security: A chat about RTP, SRTP, Security Descriptions, DTLS-SRTP, EKT, the past and the future
RTCWEB Working Group Media Security: A chat about RTP, SRTP, Security Descriptions, DTLS-SRTP, EKT, the past and the future Dan Wing dwing@cisco.com IETF83 - March 2012 v2 1 Agenda Scope Upcoming Questions
More informationGSAW2001 Breakout Session 2 Outbrief. Standards and interoperability: space missions in the Internet era
GSAW2001 Breakout Session 2 Outbrief Standards and interoperability: space missions in the Internet era Adrian J. Hooke Jet Propulsion Laboratory California Institute of Technology 23 February 2001 Standardization
More informationilight/gigapop eduroam Discussion Campus Network Engineering
ilight/gigapop eduroam Discussion Campus Network Engineering By: James W. Dickerson Jr. May 10, 2017 What is eduroam?» eduroam (education roaming) is an international roaming service for users in research,
More informationAn Architecture for. Interface Modernization GSAW Dr. Lance Williams SMC/LAAFB UNCLASSIFIED
An Architecture for AFSCN Ground Interface Modernization Dr. Bharathi Devi SMC/LAAFB Dr. Lance Williams The Aerospace 2012 by SMC/LAAFB. Published by The Aerospace Corporation with permission. Overview
More informationiscsi Technology: A Convergence of Networking and Storage
HP Industry Standard Servers April 2003 iscsi Technology: A Convergence of Networking and Storage technology brief TC030402TB Table of Contents Abstract... 2 Introduction... 2 The Changing Storage Environment...
More informationCommon Event Expression. Larry Shields William Heinbockel
Common Event Expression Larry Shields [lshields@mitre.org] William Heinbockel [heinbockel@mitre.org] Organization The Situation The Problem The Goals The Solution The Standard: CEE Common Event Expression
More informationJ2EE APIs and Emerging Web Services Standards
J2EE APIs and Emerging Web Services Standards Session #4 Speaker Title Corporation 1 Agenda J2EE APIs for Web Services J2EE JAX-RPC APIs for Web Services JAX-RPC Emerging Web Services Standards Introduction
More informationApril 24, 1998 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this memo
HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 00:24:41 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Mon, 27 Apr 1998 14:31:00 GMT ETag: "2e9b64-31dd-354496a4" Accept-Ranges: bytes Content-Length: 12765 Connection:
More informationIETF Working Groups. https://datatracker.ietf.org/wg/ 127 Working Groups in:
IETF Working Groups https://datatracker.ietf.org/wg/ 127 Working Groups in: Applications Transport Internet Operations and Management Real-time Applications and Infrastructure Routing Security tcpinc,
More informationICS Security. Trends, Issues, and New Standards. Speaker: David Mattes CTO, Asguard Networks
ICS Security Trends, Issues, and New Standards Standards Certification Education & Training Publishing Conferences & Exhibits Speaker: David Mattes CTO, Asguard Networks 2013 ISA Water / Wastewater and
More informationCYBER ANALYTICS. Architecture Overview. Technical Brief. May 2016 novetta.com 2016, Novetta
CYBER ANALYTICS Architecture Overview Technical Brief May 2016 novetta.com 2016, Novetta Novetta Cyber Analytics: Technical Architecture Overview 1 INTRODUCTION 2 CAPTURE AND PROCESS ALL NETWORK TRAFFIC
More information802.1X: Background, Theory & Implementation
Customized for NCET Conference 2007 802.1X: Background, Theory & Implementation March 16, 2007 Presented by: Jennifer Jabbusch, CISSP, HP MASE, CAD Mike McPherson, HP ProCurve Neal Hamilton, HP ProCurve
More informationreview of the potential methods
Mandatory iscsi Security review of the potential methods IPS Interim Meeting Nashua NH, May 01 2001 Ofer Biran Thanks to: IBM Research Lab in Haifa Bernard Aboba, David Black, Julian Satran, Steve Senum
More informationData Transport. Publisher's Note
Data Transport Publisher's Note This document should be considered a draft until the message formats have been tested using the latest release of the Apache Foundation's SOAP code. When those tests are
More informationCisco Cyber Range. Paul Qiu Senior Solutions Architect
Cisco Cyber Range Paul Qiu Senior Solutions Architect Cyber Range Service A platform to experience the intelligent Cyber Security for the real world What I hear, I forget What I see, I remember What I
More informationTheory of Operations for TSN-Based Industrial Systems and Applications. Paul Didier Cisco Systems
Theory of Operations for TSN-Based Industrial Systems and Applications Paul Didier Cisco Systems Agenda Why TSN? Value and Benefits TSN Standards a brief Overview How TSN works an Operational Model The
More informationLecture #8: Correlation. Matthijs Koot / SNE-IDS college 07-08
Lecture #8: Correlation Faculteit van Natuurwetenschappen, Wiskunde en Informatica Universiteit van Amsterdam 2008-04-24 / SNE-IDS college 07-08 Outline Common problems with point-solution IDSs. Common
More informationSNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp
SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7 IP storage: A review of iscsi, FCIP, ifcp SNIA IP Storage Forum With the advent of new IP storage products and transport protocol standards iscsi, FCIP,
More informationSECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE
SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 8 9 10 11 12 14 15 16 INTRODUCTION THREATS RISK MITIGATION REFERENCE ARCHITECTURE
More informationNETCONF WG. IETF 96 Berlin, Germany WEDNESDAY, July 20, Hours. Mehmet Ersue Mahesh Jethanandani
NETCONF WG IETF 96 Berlin, Germany WEDNESDAY, July 20, 2016 1000-1230 Hours Mehmet Ersue Mahesh Jethanandani 1 Before we can start... We need: 2 minute takers 1 Jabber scribe http://etherpad.tools.ietf.org:9000/p/notes-ietf-96-netco
More informationOctober 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo
Internet Draft draft-hoffman-rfc2487bis-04.txt October 4, 2000 Expires in six months Paul Hoffman Internet Mail Consortium Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document
More informationP2PSIP Draft Charter. Dean Willis March 2006
P2PSIP Draft Charter Dean Willis March 2006 Purpose The purpose of the Peer-to-Peer (P2P) Session Initiation Protocol working group (P2PSIP WG) is to develop guidelines and mechanisms for the use of the
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More informationData Sheet NCP Secure Enterprise Management
Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Administration and license management system for NCP Exclusive Remote Access Clients Enables easy rollout and
More informationDynamic Network Segmentation
Dynamic Network Segmentation Innovative network security protection to stop cyber attacks and meet compliance. 1 Isolate and flexibly segment your networks Introduction As organizational structures and
More informationSecurity and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California
Security and Lawful Intercept In VoIP Networks Manohar Mahavadi Centillium Communications Inc. Fremont, California Agenda VoIP: Packet switched network VoIP devices VoIP protocols Security and issues in
More informationWireless Community Networks: Evolution and Technical Challenges
Wireless Community Networks: Evolution and Technical Challenges Luiz A. DaSilva Bradley Department of Electrical and Computer Engineering Workshop on Nationwide Internet Access and Online Applications
More informationIEEE YANG Data Model(s) Study Group Closing Report
IEEE 802.3 YANG Data Model(s) Study Group Closing Report Yan Zhuang Huawei Technologies San Diego, CA, US 28 July, 2016 Page 1 IEEE 802.3 YANG Data Model(s) Study Group information Study Group Organization
More informationIntroduction to the DANE Protocol
Introduction to the DANE Protocol ICANN 46 April 10, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC and other Internet technologies: Case Studies Tutorials
More informationSecurity Metrics Establishing unambiguous and logically defensible security metrics. Steven Piliero CSO The Center for Internet Security
Security Metrics Establishing unambiguous and logically defensible security metrics Steven Piliero CSO The Center for Internet Security The Center for Internet Security (CIS) Formed - October 2000 As a
More informationESAW (European ground System Architecture Workshop) Overview
ESAW (European ground System Architecture Workshop) Overview Nestor Peccia ESA/ ESOC 15/03/2017 2017 by ESA, Published by the Aerospace Corporation with permission. Background 1. Inspired by GSAW 2. Inefficiencies
More informationNetwork Working Group Request for Comments: 1679 Category: Informational K. O Donoghue NSWC-DD August 1994
Network Working Group Request for Comments: 1679 Category: Informational D. Green P. Irey D. Marlow K. O Donoghue NSWC-DD August 1994 HPN Working Group Input to the IPng Requirements Solicitation Status
More informationStop Threats Before They Stop You
Stop Threats Before They Stop You Gain visibility and control as you speed time to containment of infected endpoints Andrew Peters, Sr. Manager, Security Technology Group Agenda Situation System Parts
More informationthe SWIFT Customer Security
TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This
More informationWireless LAN Security. Gabriel Clothier
Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group
More informationRequest for Comments: J. Salowey, Ed. Cisco Systems, Inc. March Transport Layer Security (TLS) Transport Mapping for Syslog
Network Working Group Request for Comments: 5425 Category: Standards Track F. Miao, Ed. Y. Ma, Ed. Huawei Technologies J. Salowey, Ed. Cisco Systems, Inc. March 2009 Transport Layer Security (TLS) Transport
More informationAuthentication, Authorization and Accounting Requirements for the Session Initiation Protocol
Internet Engineering Task Force INTERNET-DRAFT draft-ietf-sipping-aaa-req-02.ps SIP WG J. Loughney, G. Camarillo Nokia, Ericsson February 5, 2003 Expires: August, 2003 Authentication, Authorization and
More informationVPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist
VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More informationTECHNICAL SPECIFICATION
TECHNICAL SPECIFICATION IEC/TS 62351-8 Edition 1.0 2011-09 colour inside Power systems management and associated information exchange Data and communications security Part 8: Role-based access control
More informationFunctional Requirements 10/20/2003. IEEE Working Group on Mobile Broadband Wireless Access <
Project IEEE 802.20 Working Group on Mobile Broadband Wireless Access Title France Telecom Service Provider Requirements for 802.20 Date Submitted Source(s) Re:
More informationImproving SCADA System Security
Improving SCADA System Security NPCC 2004 General Meeting Robert W. Hoffman Manager, Cyber Security Research Department Infrastructure Assurance and Defense Systems National Security Division, INEEL September
More informationSUIT BoF. Software Updates for Internet of Things
SUIT BoF Software Updates for Internet of Things Co-Chairs: Dave Waltermire, Russ Housley and Dave Thaler Monday, November 13, 2017 IETF 100 Singapore 1 Note Well Any submission to the IETF intended by
More informationAdvanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018
Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 The Homeland Security Systems Engineering and Development Institute (HSSEDI ) is a trademark of the U.S. Department of Homeland
More informationState of the Industry and Councils Reports. Access Control Council
State of the Industry and Councils Reports Access Control Council Chairman: Lars R. Suneborn, Sr. Manager, Technical Marketing, Government ID, Oberthur Technologies Property of the Smart Card Alliance
More informationExecutive Summary...1 Chapter 1: Introduction...1
Table of Contents Executive Summary...1 Chapter 1: Introduction...1 SSA Organization... 1 IRM Strategic Plan Purpose... 3 IRM Strategic Plan Objectives... 4 Relationship to Other Strategic Planning Documents...
More informationSpectrum Enterprise SIP Trunking Service IPitomy IP1100, IP1200, IP2000, IP5000 v5.0.5 to IP PBX Configuration Guide
Spectrum Enterprise SIP Trunking Service IPitomy IP1100, IP1200, IP2000, IP5000 v5.0.5 to 5.1.3 About Spectrum Enterprise: IP PBX Configuration Guide Spectrum Enterprise is a division of Charter Communications
More informationDistributed Denial of Service
Distributed Denial of Service Vimercate 17 Maggio 2005 anegroni@cisco.com DDoS 1 Agenda PREFACE EXAMPLE: TCP EXAMPLE: DDoS CISCO S DDoS SOLUTION COMPONENTS MODES OF PROTECTION DETAILS 2 Distributed Denial
More informationInstructions for WMPG Workshop Attendees Aug 2, D. Raychaudhuri and Mario Gerla
Instructions for WMPG Workshop Attendees Aug 2,3 2005 D. Raychaudhuri and Mario Gerla ray@winlab.rutgers.edu; gerla@cs.ucla.edu 1 WMPG Workshop: High-Level Goals WMPG workshop aimed at: Identify emerging
More informationVoice over IP. What You Don t Know Can Hurt You. by Darren Bilby
Voice over IP What You Don t Know Can Hurt You by Darren Bilby What is VoIP? Voice over Internet Protocol A method for taking analog audio signals, like the kind you hear when you talk on the phone, and
More informationTCP Maintenance and Minor Extensions (TCPM) Working Group Status. IETF 83 - Paris March 2012
TCP Maintenance and Minor Extensions (TCPM) Working Group Status IETF 83 - Paris March 2012 Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationA Protocol for Secure Public Instant Messaging
Financial Cryptography - Feb 27, 2006 A Protocol for Secure Public Instant Messaging Mohammad Mannan and Paul C. van Oorschot Digital Security Group Carleton University, Canada Mohammad Mannan Feb 27,
More informationS Series Portfolio Status 20 June 2012
S Series Portfolio Status 20 June 2012 Patresha Breiy S Series Project Lead S1000D User Forum 2012 June 18-21, 2012 Why Are we doing the S Series Specification Project? Project Infrastructure Leveraged
More informationAn IETF view of ENUM
An IETF view of ENUM Geoff Huston Executive Director, Internet Architecture Board Presented at ICANN, Rio de Janiero,, 2003 by Richard Stastny Who is the IETF? Internet Engineering Task Force The organization
More informationTransport Layer Security
Transport Layer Security TRANSPORT LAYER SECURITY PERFORMANCE TESTING OVERVIEW Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL), are the most popular cryptographic protocols
More informationMedical Device Vulnerability Management
Medical Device Vulnerability Management MDISS / NH-ISAC Process Draft Dale Nordenberg, MD June 2015 Market-based public health: collaborative acceleration Objectives Define a trusted and repeatable process
More informationPolycom RealPresence Access Director System
RELEASE NOTES Version 4.0.1 August 2014 3725-78700-001D1 Polycom RealPresence Access Director System Polycom, Inc. 1 Document Title Version What s New in Release 4.0.1 The RealPresence Access Director
More informationCreating VPN s with IPsec
2014 Creating VPN s with IPsec SPRING ENTERPRISE INFO SECURITY 4040/601 WILSON CHANCE HINCHMAN This paper will define the term VPN, explain for what and why VPNs are used. IPsec, which is vital to the
More informationSpace Cyber: An Aerospace Perspective
Space Cyber: An Aerospace Perspective USAF Cyber Vision 2025 AFSPC 19-21 March 2012 Frank Belz and Joe Betser The Aerospace Corporation Computers and Software Division 20 March 2012 frank.belz@aero.org
More informationJXTA TM Technology for XML Messaging
JXTA TM Technology for XML Messaging OASIS Symposium New Orleans, LA 27-April-2004 Richard Manning Senior Software Architect Advanced Technology & Edge Computing Center Sun Microsystems Inc. www.jxta.org
More informationCategory: Standards Track January 1999
Network Working Group P. Hoffman Request for Comments: 2487 Internet Mail Consortium Category: Standards Track January 1999 Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document
More informationSession 3: Lawful Interception
Session 3: Lawful Interception Secure, verifiable and intelligible audit logs to support computer forensics in lawful interception 3 rd ETSI Security Workshop Elena de la Calle Vian Ministry of Industry
More informationCurrent Research and Standards for Security Automation An overview of US Government efforts to support and promote security automation
Automation An overview of US Government efforts to support and promote security automation Charles Schmidt About Me Current Research and Standards for Security Charles Schmidt 18 years at MITRE supporting
More information