Ki-Sung Yu. Supercomputing Center, KISTI. Introduction of KREONET. Security Activities on KREONET CERT-KREONET. S&T-SEC Activities

Size: px
Start display at page:

Download "Ki-Sung Yu. Supercomputing Center, KISTI. Introduction of KREONET. Security Activities on KREONET CERT-KREONET. S&T-SEC Activities"

Transcription

1 Freedom and Security in Computer s Contents CERT- and S&T- SEC Activities Ki-Sung Yu Supercomputing Center, KISTI Introduction of Security Activities on CERT- 1 2 Overview Korea s national science & research network Funded by MOST since Gbps backbone, 1- access networks 200 connected organizations/ 100,000 users GLORIAD for international connections Two s : KR to US (Transpacific), KR to CN (HK) KREONet2 Hybrid optical and packet switching facility Dark-fiber () and SONET/SDH ring Native IPv4, IPv6 and lightpath provisioning Routed path and lightpath over a single link Mbone IPv6 Gigabit KIX/NCA BIX/NCA DIX/DACOM KTIX/KT 6NGIX/NCA Enterprise Backbone Advanced R&D 20G KOREN USA / Dacom GLORIAD (USA, China) 155M Japan (APAN-JP) Europe (TIEN) 3 4 Hybrid Backbone s Packet Switched s 10 20Gbps Optical Circuit Switched s WDM 120G The first Stage of : , 7 members, regional testbed 1~10 Gbps link(wire) Link (wired) bps 54Mbps Link link(wireless) bps 54Mbps(wireless) ~1.5 Gbps link(fso) Link 10 40Gbps 5 10 Gbps bps (?? ) 54Mbps(wireless) ~1.5 ~1.2 Gbps (FSO) Jeju Jeju 5 6

2 KGN : 30 members (~) 6GN KMA Gyunggi (, ) Chungnam CNU GSR12406 Core OSR 7609 OSR 7609 Cisco 20G GSR12406 China/ CSTNET Gwangju Jeonbuk Gwangju ONS15600 Core KISTI US, Canada/ StarLight, PacWave, CA*net4, Etc. Media Lab 7 8 GLORIAD Participation GLORIAD (GLObal RIng for Advanced Applications Development) Global Ring topology for advanced science applications Started as the Little GLORIAD, funded by US, Russia, China 4 th core member participation on Sept Korean government(most) decided to fund for joining to GLORIAD consortium.. GLORIAD/IRNC was finally awarded by NSF, Jan Essential to support advanced application developments HEP, Astronomy, Atmospheric sciences, Optical network researches, security researches, etc. The Larger GLORIAD : ing (Canada)-US- (Netherlands)-Russia-China-Korea 9 GLORIAD-KR s 10 GLORIAD-KR s US Amsterdam Moscow Hong Kong, CN Russia (Novosibirsk) China (Beijing) (KR-US) KISTI, Korea () (KR-HK) Korea CNIC, China Hong Kong HKLight CSTNET Korea GOLE (KRLight ) 2*E Seattle, US CANARIE, Canada Calgary Toronto NYC Seattle EU Chicago KR/ CANARIE nodes (L1, L2) E StarLight PacificWave GLIF node (CANARIE, PW) Introduction of Security Activities on CERT

3 Security Activities on Security Activities into three levels Promotion of friendly relations - KrCERT, S&T-SEC - Green Sharing a incident information Cooperation with other organization Yellow CERT- Monitoring Detection CERT- Gathering info. Vulnerability info. Red Zpne Full Mesh Measurement Supporting Incident Response System * IRS * Virtual * HoneyNet * Virus info. Access Control * ACL * Inform/Report * E -mail * International ISP Other CERTs Detect & inform & consult Distribute a guide line for securing a system Inform the incident Activities in each level Cooperate with each manager Inform & alert the incident Introduction of Red Access Analyze traffic Gather event data & classify pattern Security Activities on Yellow Green Backbone Detect a anomaly on backbone Apply an ACL policy Secure & Reliable network -? Clean-? CERT- S&T-SEC Activities Overview of CERT- Mission Early Detection of Incidents of member institutes on Prevention of damages through the rapid response Assurance of Cooperative Incidents Response System Countermeasure against Hacking Organization (24 x 365Response System) Incident Response System Detect a trial of intrusion and analyze & report the inciden t Virtual HoneyNet - Access Control List Apply a access policy using access control list Inform & Report use an e- mail or telephone The process that detects & deal with the incident Router 1. Export a Netflow IRS IRS Collect a NetFlow Analyze a data Find a victim 3. Collect statistics 2. Notify the result To member Using or telephone Statistics Recode incident Take the statistics Make a document Notify Find a victim Trace attacker Take action Other ISP CERT-KR 17 18

4 Honey Net Virtual network for monitoring & analyzing the cyber attack Access Control Security on IX which is connected other ISP Input the traffic Flow Router DB Switch Interface Unix Wondpws Linu x Analyze an Event Black List ACL Exchange Point which enters initially after applying policy Security Policy Packet duplicate Drop Anomaly Filter Module Intrusion Detection Module Detect Add filtering rule Detect a anomaly Pattern DB Introduction of Security Activities on CERT- S&T-SEC Activities Mission Overview of S&T-SECSEC Early Detection of Incidents of research institutes in science & technology field Prevention of damages through the rapid response Assurance of Cooperative Incidents Response System Countermeasure against Hacking, especially in Science & Technology fields Background of establishing a S&T-SECSEC Increase the threat There were many worm- virus or backdoor Outbreak the important information There were some accident which drained the important information Attacked by international hacking group There were some record which attacked by international hacki ng group Rise a necessary of establishing the organization needs the national center for securing a national information S&T-SEC was officially opened in March, last year S&T-SEC SEC Operation Architecture How to collect a data (1) Detection Analysis Announcement Event Analysis Packet Analysis Report Management Rule definition ISP TMS IDS/Firewall Mails Vendors Monitoring End-Users Abnormal Vuln. Int l Trends Incident Reports MOST MOST S&T-SEC SEC Analysis Discuss Gathering Warning KrCERT Detection Notification Consulting Recovering Maill FAX SMS WEB Secure Messenger TRS Partners & Hot-lined Org. ISP/IDC Research Institutes National Center Vendors The Government Institutes End Users Sensor 1 1 Inform the result of analyzing anomaly traffic TMS server Gathering the pattern of anomaly traffic using sensor Sensor 3 Sensor

5 How to collect a data (2) Cooperation with other org. S&T SEC System security Patch Management Vulnerability Management Gather the traffic info. Log collector (Daemon) info. System log System info. Log Info. System info. - CPU Utilization - Memory Utilization Server Web DNS Mail Sensor S/W update Sensor update Module Vulnerability info. - OS - Application - Backdoor, etc PC Security PC PC Security S/W (PC firewall, vaccine) PC Security Software Research institutes funded by MOST Intrusion detection system Technical support Support the information of system vulnerability info. Vulnerability Info. CISCO Microsoft SUN collect the anomaly data Virus Info. Ahn lab HAUR) McAfee Serve the alarm information Serve the detected info. & guideline * Consult & serve the guideline S&T-SEC * Analyze & Support a trial of intrusion Support virus info. Establish cooperation channel Sharing a domestic & international security information Cooperation org. KrCERT - Korea Internet Security Center NCSC - National Cyber Security Center Consultation for securing The person in charge The representative of org. Consultation with representative Security center activities Expected Results Status Management Connectivity, Line-up Load management CPU, Memory Incident statistic system Secure and reliable R&D 24hrs Monitoring Continual(24 365) Response System Quantitative Objective Qualitative Objective Abnormality Detection within 20 min. with cross -border information sharing Emergency Notification within 10 min. by Hot-line and Others Improvement of judgment accuracy and rapidity based on monitoring results of anomaly indication Accurate estimation of damage statistics Data Analysis Flow, Session Mail filtering Anti-virus, spam Management Utilization, in/out amount Introduction of Security Activities on CERT- Conclusion What is? Korea s national science & research network 20Gbps backbone, 1~ access networks 4th core member participation on GLORIAD project CERT- Incident Response System Access Control List HoneyNet Activity of securing a mail S&T-SEC Activities S&T-SEC was officially opened in March, last year Because of rising a necessary of establishing the organization 29 30

KRLight and GLIF Activities

KRLight and GLIF Activities KRLight and GLIF Activities 6 th Annual Global LambdaGrid Workshop Tokyo, Japan September 11-12, 2006 JongUk Kong Supercomputing Center, KISTI kju@kisti.re.kr Topics > GLORIAD-KR/KRLight Network > Services

More information

Grid-related related Activities around KISTI Tier2 Center for ALICE

Grid-related related Activities around KISTI Tier2 Center for ALICE 2010 APCTP LHC Workshop@ Konkuk Univ. Grid-related related Activities around KISTI Tier2 Center for ALICE August 10, 2010 Soonwook Hwang KISTI 1 Outline Introduction to KISTI KISTI ALICE Tier2 Center Development

More information

CSTNET Security Considerations

CSTNET Security Considerations CSTNET Security Considerations Ling Wang wangling@cstnet.cn Computer Network Information Center Chinese Academy of Sciences Agenda CSTNET topology and applications Current CSTNET Security State The Threaten

More information

The CERT today & tomorrow (KrCERT/CC Frameworks) Arnold S. Yoon KrCERT/CC, KISC, KISA

The CERT today & tomorrow (KrCERT/CC Frameworks) Arnold S. Yoon KrCERT/CC, KISC, KISA The CERT today & tomorrow (KrCERT/CC Frameworks) Arnold S. Yoon KrCERT/CC, KISC, KISA (snyoon@certcc.or.kr) Agenda Overview Status CERT services Big Bang Limitation and Challenges New focus for CERTs Way

More information

HD Video Activities in Korea

HD Video Activities in Korea HD Video Activities in Korea JongWon Kim, Ph.D. APAN HDTV WG Meeting @ Taipei, Taiwan Mar. 29 th, 2005 Networked Media Laboratory Dept. of Information & Communications Gwangju Institute of Science & Technology

More information

SURFnet6 Integrating the IP and Optical worlds Erik-Jan Bos Director of Network Services SURFnet, The Netherlands TrefPunkt Kiruna, mars 2004

SURFnet6 Integrating the IP and Optical worlds Erik-Jan Bos Director of Network Services SURFnet, The Netherlands TrefPunkt Kiruna, mars 2004 SURFnet6 Integrating the IP and Optical worlds Erik-Jan Bos Director of Network Services SURFnet, The Netherlands TrefPunkt Kiruna, 30-31 mars 2004 Presentation contents SURFnet and GigaPort: The environment

More information

Distributed Virtual Network Operations Center (DVNOC) - Towards Federated & Customer-focused Cyberinfrastructure

Distributed Virtual Network Operations Center (DVNOC) - Towards Federated & Customer-focused Cyberinfrastructure Distributed Virtual Network Operations Center (DVNOC) - Towards Federated & Customer-focused Cyberinfrastructure Harika Tandra, Software Engineer GLORIAD (presentation based on slides prepared by Greg

More information

The Information Security Guideline for SMEs in Korea

The Information Security Guideline for SMEs in Korea The Information Security Guideline for SMEs in Korea Ho-Seong Kim Mi-Hyun Ahn Gang Shin Lee Jae-il Lee Abstract To address current difficulties of SMEs that are reluctant to invest in information security

More information

GLIF September 2017 Sydney, Australia Gerben van Malenstein, SURFnet & John Hess, Pacific Wave

GLIF September 2017 Sydney, Australia Gerben van Malenstein, SURFnet & John Hess, Pacific Wave AutoGOLE MEICAN Pilot plans for next 5 years SURFnet network upgrade GLIF 2017 25 27 September 2017 Sydney, Australia Gerben van Malenstein, SURFnet & John Hess, Pacific Wave National Research & Education

More information

New International Connectivities of SINET5

New International Connectivities of SINET5 Mar 28 th, 2018 at APAN45 New International Connectivities of SINET5 SINET 100G Global Ring Motonori Nakamura National Institute of Informatics (NII), Japan Academic Infrastructure operated by NII Our

More information

Cyber Security Management System of NIRS in Korea

Cyber Security Management System of NIRS in Korea Cyber Security Management System of NIRS in Korea October 29, 2018 (Mon) * NIRS : National Information Resources Service Contents 1 2 3 Data Communication Infrastructure Cyber Crisis Response System NIRS

More information

IPv6 Transition ``Status in Korea

IPv6 Transition ``Status in Korea IPv6 Transition ``Status in Korea 21 July 2009 28 th APAN IPv6 session - Kuala Lumpur Malaysia Joonhyung Lim (jhlim@nida.or.kr) Seung-Joon Seok (sjseok@kyungnam.ac.kr) National Internet Development Agency

More information

6GN Activities & KOREAv6 project

6GN Activities & KOREAv6 project 20 th APAN 2005 6GN Activities & KOREAv6 project Wang-Cheol Song < Cheju National Univ./ANF > Contents IPv6 Network Deployment Status in Korea Gigabit IPv6 Infrastructure Current Activities on 6GN KOREAv6

More information

JGN2plus. Presenter: Munhwan Choi

JGN2plus. Presenter: Munhwan Choi JGN2plus Presenter: Munhwan Choi JGN2plus Type of Services Network Structure R&D with SPARC Status of Utilization Overview JGN2plus JGN2plus looks for the visions of the future ICT society through activities

More information

Dave McGaugh, Pacific Northwest Gigapop NANOG 39 Toronto, Canada

Dave McGaugh, Pacific Northwest Gigapop NANOG 39 Toronto, Canada Supporting Hybrid Services at an International Exchange Facility: The Experience of Pacific Wave Dave McGaugh, Pacific Northwest Gigapop NANOG 39 Toronto, Canada About Pacific Wave A joint project between

More information

Benefits. Centrally managed protection of corporate networks

Benefits. Centrally managed protection of corporate networks Defend what you create Centrally managed protection of corporate networks Benefits Centrally managed protection of Windows workstations, Windows file servers and Unix mail servers High scalability Grouping

More information

Abstract 1.1 GLORIAD. GLORIAD aims to better integrate, with its advanced network infrastructure, the research and education communities of the

Abstract 1.1 GLORIAD. GLORIAD aims to better integrate, with its advanced network infrastructure, the research and education communities of the GLORIAD: A Ring Around the Northern Hemisphere for Science and Education connecting North America, Russia, China, Korea and Netherlands with Advanced Network Services Greg Cole (Research Director, Joint

More information

Building 10-Gbps Networks: A few observations on the national and regional scales in the U.S.

Building 10-Gbps Networks: A few observations on the national and regional scales in the U.S. Building 10-Gbps Networks: A few observations on the national and regional scales in the U.S. Steve Corbató corbato@internet2.edu Director, Network Initiatives, Internet2 & Visiting Fellow, Center for

More information

Internet : Next Steps

Internet : Next Steps Softbank Internet : Next Steps 2001. 3. 23 chon@cosmos.kaist.ac.kr http://cosmos.kaist.ac.kr The Internet will almost certainly have a stronger impact than PC... a reasonable guess might put it ahead of

More information

IPv6 Activities for National Deployment in Korea. Yong-Jin Kim IPv6 Forum Korea, President

IPv6 Activities for National Deployment in Korea. Yong-Jin Kim IPv6 Forum Korea, President IPv6 Activities for National Deployment in Korea Yong-Jin Kim IPv6 Forum Korea, President Outline 2 Why IPv6? Internet status of Korea Difficulties in IPv6 Deployment IPv6 activities Government Policy

More information

International Research Networking GÉANT2, ORIENT and TEIN2: Projects Connecting China and Europe

International Research Networking GÉANT2, ORIENT and TEIN2: Projects Connecting China and Europe GÉANT2, ORIENT and TEIN2: Projects Connecting China and Europe John Chevers ORIENT Project Manager, DANTE EuChinaGrid Meeting, Beijing 30 th January 2007 GÉANT2 Network Status Update GÉANT2 connects 34

More information

9th CEF Networks Workshop KREONET optical network and quantum communication testbed

9th CEF Networks Workshop KREONET optical network and quantum communication testbed 9th CEF Networks Workshop 2017 KREONET optical network and quantum communication testbed Contents 1. KREONET and Optical Footprint 2. Quantum Key Distribution in KREONET 3. KREONET s Flexgrid Network Plan

More information

International Research Network. Connections (IRNC)

International Research Network. Connections (IRNC) International Research Network Goals: Connections (IRNC) Provide network connections linking U.S. research with peer networks in other parts of the world Stimulate the deployment and operational understanding

More information

APII/TEIN4 (APII) Asia Pacific Information Infrastructure (KR-JP)

APII/TEIN4 (APII) Asia Pacific Information Infrastructure (KR-JP) 1 NIA overview Founded in 1987 Support ICT Enablement of National Agencies Local Autonomies and Development of Policies for the Information Society (Framework Act on Informatization Promotion) Public Agency

More information

N-Dimension n-platform 340S Unified Threat Management System

N-Dimension n-platform 340S Unified Threat Management System N-Dimension n-platform 340S Unified Threat Management System Firewall Router Site-to-Site VPN Remote-Access VPN Serial SCADA VPN Proxy Anti-virus SCADA IDS Port Scanner Vulnerability Scanner System & Service

More information

IPv6 Deployment Experience Sharing and Current Strategy in Korea

IPv6 Deployment Experience Sharing and Current Strategy in Korea 2010/TEL41/DSG/WKSP2/010 Agenda Item: Panel Discussion 2 IPv6 Deployment Experience Sharing and Current Strategy in Korea Submitted by: Korea Workshop for IPv6: Transforming the Internet Chinese Taipei

More information

Integration of Network Services Interface version 2 with the JUNOS Space SDK

Integration of Network Services Interface version 2 with the JUNOS Space SDK Integration of Network Services Interface version 2 with the JUNOS Space SDK Radosław Krzywania, Michał Balcerkiewicz, Bartosz Belter Poznan Supercomputing and Networking Center, ul. Z. Noskowskiego 12/14,

More information

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF

More information

Public Cloud Connection for R&E Network. Jin Tanaka APAN-JP/KDDI

Public Cloud Connection for R&E Network. Jin Tanaka APAN-JP/KDDI Public Cloud Connection for R&E Network Jin Tanaka APAN-JP/KDDI 45th APAN Meeting in Singapore 28th March 2018 Hyper Scale Public cloud and research & science data NASA EOSDIS(Earth Observing System Data

More information

International Exchanges Current and Future

International Exchanges Current and Future International Exchanges Current and Future Jim Dolgonas President and Chief Operating Officer CENIC April 4, 2006 CENIC Originally formed in 1997 to bring high speed networking to all higher education

More information

StarLight Connects Global Research Community Using Force10 TeraScale E-Series

StarLight Connects Global Research Community Using Force10 TeraScale E-Series Starlight Networks Industry Scientific Research Applications Optical Network Exchange Highlights Starlight chooses the Force10 TeraScale E-Series as the foundation of their large scale network that interconnects

More information

Requirements for the Operations & Management of 4G Networks

Requirements for the Operations & Management of 4G Networks Requirements for the Operations & Management of 4G Networks Prof. James Won-Ki Hong Dept. of Computer Science and Engineering, Korea & Prof. Alberto Leon-Garcia Dept. of Electrical and Computer Engineering

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

Reporting Status of Vulnerability-related Information about Software Products and Websites - 1 st Quarter of 2012 (January March) -

Reporting Status of Vulnerability-related Information about Software Products and Websites - 1 st Quarter of 2012 (January March) - Reporting Status of Vulnerability- Information about Software Products and Websites - 1 st Quarter of 212 (January March) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

More information

18th WRNP Workshop RNP May Belém, Brasil Gerben van Malenstein

18th WRNP Workshop RNP May Belém, Brasil Gerben van Malenstein AutoGOLE MEICAN Pilot plans for next 5 years SURFnet network upgrade 18th WRNP Workshop RNP 15-16 May Belém, Brasil Gerben van Malenstein National Research & Education Network of the Netherlands Connecting

More information

the world with light

the world with light the world with light What does GLIF do? GLIF stands for Global Lambda Integrated Facility. GLIF promotes the paradigm of lambda networking to support demanding scientifi c applications. GLIF makes lambdas

More information

Progress Report for APII IPv6 Testbed Project

Progress Report for APII IPv6 Testbed Project 2009/TEL39/DSG/008rev2 Agenda Item: 4.1. Progress Report for APII IPv6 Testbed Project Purpose: Information Submitted by: Japan ICT Development Steering Group Meeting Singapore 16 17 April 2009 Page 1

More information

GÉANT IP Service Description. High Performance IP Services to Support Advanced Research

GÉANT IP Service Description. High Performance IP Services to Support Advanced Research GÉANT IP Service Description High Performance IP Services to Support Advanced Research Issue Date: 1 November 2017 GÉANT IP Overview The GÉANT IP service provides high-bandwidth, international Internet

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

Exam: : VPN/Security. Ver :

Exam: : VPN/Security. Ver : Exam: Title : VPN/Security Ver : 03.20.04 QUESTION 1 A customer needs to connect smaller branch office locations to its central site and desires a more which solution should you recommend? A. V3PN solution

More information

Experience of the RISE Testbed Deployment

Experience of the RISE Testbed Deployment Internet2 FTW: International OpenFlow/SDN Testbeds Experience of the RISE Testbed Deployment Eiji Kawai Director, Network Testbed R&D Lab NICT JGN-X JGN-X is a wide-area network testbed operated by NICT

More information

Global IP Network (GIN) Connects You to the World

Global IP Network (GIN) Connects You to the World Global IP (GIN) Connects You to the World Delivering your Business Vision with the World s Tier 1 leading IP network NTT Communications (NTT Com) Global IP network (GIN) 100GigE service is the fastest

More information

CIRT: Requirements and implementation

CIRT: Requirements and implementation CIRT: Requirements and implementation By : Muataz Elsadig Sudan CERT Joint ITU-ATU Workshop on Cyber-security Strategy in African Countries Khartoum, Republic of Sudan, 24 26 July 2016 There is no globally

More information

INDONESIA S PERSPECTIVE ON CYBER TERRORISM

INDONESIA S PERSPECTIVE ON CYBER TERRORISM INDONESIA S PERSPECTIVE ON CYBER TERRORISM CYBER TERRORISM No generally acceptable definition Cyber terrorism is one form of terrorism that use computer resources to launch terror attacks on critical infrastructures

More information

Gbps-range High-definition Visual Sharing

Gbps-range High-definition Visual Sharing Gbps-range High-definition Visual Sharing Update on GLORIAD-KR Uncompressed HD System Jinyong Jo jiny92@kisti.re.kr HPcN Dev. Team, HPcN Project Div. Korea Institute of Science and Technology Information

More information

Security: Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration

Security: Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration Security: A Driving Force Behind Moving to the Cloud Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration 2017, Amazon Web Services, Inc. or its affiliates.

More information

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT Presentation to the ITU on the Q-CERT Incident Management Team Ian M Dowdeswell Incident Manager, Q-CERT 2 Q-CERT Mission The Mission of Q-CERT is to be a world-class center of excellence providing expert

More information

PacificWave Update and Future Directions

PacificWave Update and Future Directions PacificWave Update and Future Directions John Silvester University of Southern California Chair, CENIC APAN20, Taipei, 2005.08.24 Overview Introduction to Pacific Wave Current Status including recent additions

More information

GÉANT L3VPN Service Description. Multi-point, VPN services for NRENs

GÉANT L3VPN Service Description. Multi-point, VPN services for NRENs GÉANT L3VPN Service Description Multi-point, VPN services for NRENs Issue Date: 1 November 2017 GÉANT L3VPN Overview The GÉANT L3VPN service offers the National Research and Education Networks (NRENs)

More information

Next Generation Broadband Networks

Next Generation Broadband Networks Next Generation Broadband Networks John Harper Vice President, IOS Routing Apricot 2005 1 Next Generation Broadband Networks The broadband opportunity, in Asia and worldwide Cisco R&D for the broadband

More information

Intruduction of KOREN (KOrea advanced REsearch Network)

Intruduction of KOREN (KOrea advanced REsearch Network) Intruduction of KOREN (KOrea advanced REsearch Network) 2015.10. KIM SE JIN KOREN NOC noc@koren.kr National Information Society Agency Contents Ⅰ KOREN in Brief Ⅱ III Ⅳ KOREN Network TEIN collaboration

More information

Symantec Network Security 7100 Series

Symantec Network Security 7100 Series Symantec Network Security 7100 Series Proactive intrusion prevention device protects against known and unknown attacks to secure critical networks transition can be accomplished transparent to any network

More information

Korea Phishing Activity Trends Report

Korea Phishing Activity Trends Report Korea Phishing Activity Trends Report June, 2006 Issued by KrCERT/CC, Korea Internet Security Center Korea Phishing Activity Trends Report analyzes phishing attacks reported to KrCERT/CC via the organization

More information

Reporting Status of Vulnerability-related Information about Software Products and Websites

Reporting Status of Vulnerability-related Information about Software Products and Websites Reporting Status of Vulnerability- Information about Software Products and Websites - 3 rd Quarter of 218 (July - September) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

More information

Information Security Policies in Japan

Information Security Policies in Japan Information Security Policies in Japan Towards a safe and secure network infrastructure Fumiaki TAKAHASHI Director, ICT Security Office, Information and Communications Policy Bureau, Ministry of Internal

More information

Venusense UTM Introduction

Venusense UTM Introduction Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,

More information

GARR-CERT. Update. Simona Venuti TF-CSIRT, Rome,

GARR-CERT. Update. Simona Venuti TF-CSIRT, Rome, GARR-CERT Update OLD GARR-CERT Presentation... I do not know who was the first to present GARR-CERT... And I do not have that presentation, nor any presentation at all Since my duty is to make an «update»...

More information

Croatian National CERT ACDC project Darko Perhoc, Head of National CERT CISSP, CEH, CCNP Security R&S,CCDP

Croatian National CERT ACDC project Darko Perhoc, Head of National CERT CISSP, CEH, CCNP Security R&S,CCDP Croatian National CERT ACDC project Darko Perhoc, Head of National CERT CISSP, CEH, CCNP Security R&S,CCDP Croatian National CERT (HR-CERT) mission: Promoting and preserving information security of public

More information

Administration of Symantec Cyber Security Services (July 2015) Sample Exam

Administration of Symantec Cyber Security Services (July 2015) Sample Exam Administration of Symantec Cyber Security Services (July 2015) Sample Exam Contents SAMPLE QUESTIONS... 1 ANSWERS... 6 Sample Questions 1. Which DeepSight Intelligence Datafeed can be used to create a

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

CERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University

CERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University CERT Overview Jeffrey J. Carpenter 2008 Carnegie Mellon University Software Engineering Institute Department of Defense R&D Laboratory FFRDC Created in 1984 Administered by Carnegie Mellon

More information

Proposal for Deployment of International Multi-Layer Network

Proposal for Deployment of International Multi-Layer Network Proposal for Deployment of International Multi-Layer Network - TransPAC2 Update - Jin Tanaka APAN-JP/KDDI/NICT tanaka@kddnet.ad.jp Network Engineering Workshop APAN26 New Zealand Meeting 7th Aug. 2008

More information

Research Network Challenges and Opportunities. Matt Zekauskas, Senior Engineer, Internet

Research Network Challenges and Opportunities. Matt Zekauskas, Senior Engineer, Internet Research Network Challenges and Opportunities Matt Zekauskas, matt@internet2.edu Senior Engineer, Internet2 2006-06-29 Outline Internet2? Current network issues Abilene, a 10Gbps IP backbone New network

More information

Network Services Interface. OGF NSI standards development progress:

Network Services Interface. OGF NSI standards development progress: Network Services Interface OGF NSI standards development progress: NSI Framework Doc (spr 11) NSI CS v1.0draft (Aug 11) Feed initial implementation NSI CS v1.0 final (Dec 11) NSI CS v2.0draft, NSI Topology

More information

Brent Sweeny GRNOC at Indiana University APAN 32 (Delhi), 25 August 2011

Brent Sweeny GRNOC at Indiana University APAN 32 (Delhi), 25 August 2011 Brent Sweeny GRNOC at Indiana University APAN 32 (Delhi), 25 August 2011 A high-performance connection between the North American research & education networks to the Asia- Pacific research & education

More information

Swedish IT Incident Centre

Swedish IT Incident Centre Swedish IT Incident Centre Establishing a Government CERT from scratch the Swedish experience Establishment phase 2003 2004 CERTs in Europe Lessons Learned and Good Practices, Brussels 2005-12-13 Presentation

More information

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services Major Trends of 2014 And relevant changes in Threat Scenario Most Target Countries and Sectors

More information

HD Video Streaming Services & Network Requirements

HD Video Streaming Services & Network Requirements HD Video Streaming Services & Network Requirements JongWon Kim, Ph.D. HSN 2006 WS @ Daegu February 22 nd, 2006 Networked Media Laboratory Dept. of Information & Communications Gwangju Institute of Science

More information

TransPAC3- Asia US High Performance International Networking (Award # ) Quarterly Report 1-March-2014 through 31-May-2014

TransPAC3- Asia US High Performance International Networking (Award # ) Quarterly Report 1-March-2014 through 31-May-2014 Summary TransPAC3- Asia US High Performance International Networking (Award #0962968) Quarterly Report 1-March-2014 through 31-May-2014 Jennifer Schopf Principal Investigator (Prepared by Alice Jackson,

More information

The DETER Testbed: Overview 25 August 2004

The DETER Testbed: Overview 25 August 2004 The DETER Testbed: Overview 25 August 2004 1. INTRODUCTION The DETER (Cyber Defense Technology Experimental Research testbed is a computer facility to support experiments in a broad range of cyber-security

More information

HKIX Updates at APAN 44

HKIX Updates at APAN 44 HKIX Updates at APAN 44 Kenneth CHAN Team Lead, HKIX www.hkix.net 31 Aug 2017 What is HKIX? Established in Apr 1995, Hong Kong Internet exchange (HKIX) is the main layer-2 Internet exchange Point (IXP)

More information

Scrutinizer Flow Analytics

Scrutinizer Flow Analytics Scrutinizer Flow Analytics TM Scrutinizer Flow Analytics Scrutinizer Flow Analytics is an expert system that highlights characteristics about the network. It uses flow data across dozens or several hundred

More information

Optical Networking Activities in NetherLight

Optical Networking Activities in NetherLight Optical Networking Activities in NetherLight TERENA Networking Conference 2003 Zagreb, May 19-22, 2003 Erik Radius Manager Network Services, SURFnet Outline NetherLight What is it Why: the rationale From

More information

The Abilene Observatory and Measurement Opportunities

The Abilene Observatory and Measurement Opportunities The Abilene Observatory and Measurement Opportunities Rick Summerhill, Director Network Research, Architecture, and Technology, Internet2 CONMI Workshop / PAM 2005 Boston, MA March 30, 05 Outline History

More information

OFELIA. Intercontinental Cooperation

OFELIA. Intercontinental Cooperation OFELIA Intercontinental Cooperation OFELIA and Intercontinental Cooperation OpenFlow based research activities Ongoing initiatives: FIBRE (Brazil), JGN-X (Japan), FIRST (Korea) A layer 2 loop around the

More information

PacificWave Update for APAN-23. John Silvester Professor of Electrical Engineering, USC PI TransLight/PacificWave Project (NSF) Board Member, CENIC

PacificWave Update for APAN-23. John Silvester Professor of Electrical Engineering, USC PI TransLight/PacificWave Project (NSF) Board Member, CENIC PacificWave Update for APAN-23 John Silvester Professor of Electrical Engineering, USC PI TransLight/PacificWave Project (NSF) Board Member, CENIC International Connectivity and Exchanges 2 Visualization

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information

Measurement and Monitoring. Yasuichi Kitmaura Takatoshi Ikeda

Measurement and Monitoring. Yasuichi Kitmaura Takatoshi Ikeda Measurement and Monitoring Yasuichi Kitmaura (kita@jp.apan.net) Takatoshi Ikeda (ikeda@kddnet.ad.jp) Who are we? Yasuichi Kitamura researcher of National Institute of Information and Communications Technology

More information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats

More information

GÉANT Plus Service Description. High Performance Cost-effective Connectivity

GÉANT Plus Service Description. High Performance Cost-effective Connectivity GÉANT Plus Service Description High Performance Cost-effective Connectivity Issue Date: 1 November 2017 GÉANT Plus Overview The GÉANT Plus service is offered on the GÉANT network to all GÉANT National

More information

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University

More information

Computer Security Trend 2008 from Japan. SQL Injection, DNS cache poisoning, Phishing, Key logger Malware and Targeted Attacks

Computer Security Trend 2008 from Japan. SQL Injection, DNS cache poisoning, Phishing, Key logger Malware and Targeted Attacks Computer Security Trend 2008 from Japan SQL Injection, DNS cache poisoning, Phishing, Key logger Malware and Targeted Attacks JPCERT Coordination Center, Japan Manager of Watch and Warning Group Keisuke

More information

What is Grid? ? R VO C VO A VO B. Ref. Paul Avery

What is Grid? ? R VO C VO A VO B. Ref. Paul Avery I II III IV V VI VII ef. Paul Avery What is Grid? VO A? VO C?? VO B? Korea e-science Project Innovation of &D environment and international competitive power in Science apid changes in paradigm of S&T

More information

Cisco Cyber Range. Paul Qiu Senior Solutions Architect June 2016

Cisco Cyber Range. Paul Qiu Senior Solutions Architect June 2016 Cisco Cyber Range Paul Qiu Senior Solutions Architect June 2016 What I hear, I forget What I see, I remember What I do, I understand ~ Confucius Agenda Agenda Cyber Range Highlights Cyber Range Overview

More information

The Development of Modeling, Simulation and Visualization Services for the Earth Sciences in the National Supercomputing Center of Korea

The Development of Modeling, Simulation and Visualization Services for the Earth Sciences in the National Supercomputing Center of Korea icas2013 (September 9~12, Annecy/France) The Development of Modeling, Simulation and Visualization Services for the Earth Sciences in the National Supercomputing Center of Korea Min-Su Joh, Joon-Eun Ahn,

More information

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 Global Response Centre (GRC) & CIRT Lite Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 IMPACT Service offerings Global Response Centre CIRT Lite Need for GRC Access

More information

Grid Tutorial Networking

Grid Tutorial Networking Grid Tutorial Networking Laukik Chitnis Sanjay Ranka Outline Motivation Key Issues and Challenges Emerging protocols DWDM MPLS, GMPLS Network Infrastructure Internet2 Abilene and HOPI NLR and FLR Gloriad

More information

ProCurve Network Immunity

ProCurve Network Immunity ProCurve Network Immunity Hans-Jörg Elias Key Account Manager hans-joerg.elias@hp.com 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

II. Information Security Infrastructure and Environment 2. III. Information Security Incident Prevention 6. Ⅳ. Security Incidents Responses 13

II. Information Security Infrastructure and Environment 2. III. Information Security Incident Prevention 6. Ⅳ. Security Incidents Responses 13 I. Introduction 1 II. Information Security Infrastructure and Environment 2 1. Information Security Policy 2 2. Information Security Organizations and Officers 3 3. Information Security Education 4 4.

More information

Reporting Status of Vulnerability-related Information about Software Products and Websites - 3 rd Quarter of 2015 (July September) -

Reporting Status of Vulnerability-related Information about Software Products and Websites - 3 rd Quarter of 2015 (July September) - Reporting Status of Vulnerability- Information about Software Products and Websites - 3 rd Quarter of 215 (July September) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

More information

TransPAC3- Asia US High Performance International Networking (Award # ) Quarterly Report 1-September-2014 through 30-November-2014

TransPAC3- Asia US High Performance International Networking (Award # ) Quarterly Report 1-September-2014 through 30-November-2014 TransPAC3- Asia US High Performance International Networking (Award #0962968) Quarterly Report 1-September-2014 through 30-November-2014 Summary Jennifer Schopf Principal Investigator (Prepared by Jennifer

More information

NETWORK THREATS DEMAN

NETWORK THREATS DEMAN SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments

More information

Real-time Cyber Situational Awareness for Satellite Ground Networks. March 2015 Presenter: Ted Vera

Real-time Cyber Situational Awareness for Satellite Ground Networks. March 2015 Presenter: Ted Vera Real-time Cyber Situational Awareness for Satellite Ground Networks March 2015 Presenter: Ted Vera Colorado Springs, CO (719) 598 2801 Denver, CO (303) 703 3834 http://www.rtlogic.com Recent Attacks NOAA

More information

Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone

Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone Thomas Dübendorfer, Arno Wagner, Theus Hossmann, Bernhard Plattner ETH Zurich, Switzerland duebendorfer@tik.ee.ethz.ch

More information

Data Gathering in Optical Networks with the TL1 Toolkit

Data Gathering in Optical Networks with the TL1 Toolkit Data Gathering in Optical Networks with the TL1 Toolkit Ronald van der Pol 1 and Andree Toonk 2 1 SARA Computing & Networking Services, Kruislaan 415, 1098 SJ Amsterdam, The Netherlands rvdp@sara.nl http://nrg.sara.nl/

More information

Cisco Security Monitoring, Analysis and Response System 4.2

Cisco Security Monitoring, Analysis and Response System 4.2 Q&A Cisco Security Monitoring, Analysis and Response System 4.2 GENERAL Q. What is the Cisco Security Monitoring, Analysis and Response System? A. The Cisco Security Monitoring, Analysis and Response System

More information

Endpoint Protection : Last line of defense?

Endpoint Protection : Last line of defense? Endpoint Protection : Last line of defense? First TC Noumea, New Caledonia 10 Sept 2018 Independent Information Security Advisor OVERVIEW UNDERSTANDING ENDPOINT SECURITY AND THE BIG PICTURE Rapid development

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Security activities in Japan towards the future standardization. Cybersecurity

Security activities in Japan towards the future standardization. Cybersecurity Security activities in Japan towards the future standardization Side Event Cybersecurity Koji NAKAO KDDI, Japan Content Current threats - Internet User in Japan - However, observation of many scans (by

More information

The Evolution of Exchange Points

The Evolution of Exchange Points The Evolution of Exchange Points John Silvester Professor and Executive Director of the Center for Scholarly Technology, USC Chair, CENIC APAN21, January 24, 2006, Tokyo, Japan In the beginning Things

More information