Ki-Sung Yu. Supercomputing Center, KISTI. Introduction of KREONET. Security Activities on KREONET CERT-KREONET. S&T-SEC Activities
|
|
- Eleanore Hensley
- 6 years ago
- Views:
Transcription
1 Freedom and Security in Computer s Contents CERT- and S&T- SEC Activities Ki-Sung Yu Supercomputing Center, KISTI Introduction of Security Activities on CERT- 1 2 Overview Korea s national science & research network Funded by MOST since Gbps backbone, 1- access networks 200 connected organizations/ 100,000 users GLORIAD for international connections Two s : KR to US (Transpacific), KR to CN (HK) KREONet2 Hybrid optical and packet switching facility Dark-fiber () and SONET/SDH ring Native IPv4, IPv6 and lightpath provisioning Routed path and lightpath over a single link Mbone IPv6 Gigabit KIX/NCA BIX/NCA DIX/DACOM KTIX/KT 6NGIX/NCA Enterprise Backbone Advanced R&D 20G KOREN USA / Dacom GLORIAD (USA, China) 155M Japan (APAN-JP) Europe (TIEN) 3 4 Hybrid Backbone s Packet Switched s 10 20Gbps Optical Circuit Switched s WDM 120G The first Stage of : , 7 members, regional testbed 1~10 Gbps link(wire) Link (wired) bps 54Mbps Link link(wireless) bps 54Mbps(wireless) ~1.5 Gbps link(fso) Link 10 40Gbps 5 10 Gbps bps (?? ) 54Mbps(wireless) ~1.5 ~1.2 Gbps (FSO) Jeju Jeju 5 6
2 KGN : 30 members (~) 6GN KMA Gyunggi (, ) Chungnam CNU GSR12406 Core OSR 7609 OSR 7609 Cisco 20G GSR12406 China/ CSTNET Gwangju Jeonbuk Gwangju ONS15600 Core KISTI US, Canada/ StarLight, PacWave, CA*net4, Etc. Media Lab 7 8 GLORIAD Participation GLORIAD (GLObal RIng for Advanced Applications Development) Global Ring topology for advanced science applications Started as the Little GLORIAD, funded by US, Russia, China 4 th core member participation on Sept Korean government(most) decided to fund for joining to GLORIAD consortium.. GLORIAD/IRNC was finally awarded by NSF, Jan Essential to support advanced application developments HEP, Astronomy, Atmospheric sciences, Optical network researches, security researches, etc. The Larger GLORIAD : ing (Canada)-US- (Netherlands)-Russia-China-Korea 9 GLORIAD-KR s 10 GLORIAD-KR s US Amsterdam Moscow Hong Kong, CN Russia (Novosibirsk) China (Beijing) (KR-US) KISTI, Korea () (KR-HK) Korea CNIC, China Hong Kong HKLight CSTNET Korea GOLE (KRLight ) 2*E Seattle, US CANARIE, Canada Calgary Toronto NYC Seattle EU Chicago KR/ CANARIE nodes (L1, L2) E StarLight PacificWave GLIF node (CANARIE, PW) Introduction of Security Activities on CERT
3 Security Activities on Security Activities into three levels Promotion of friendly relations - KrCERT, S&T-SEC - Green Sharing a incident information Cooperation with other organization Yellow CERT- Monitoring Detection CERT- Gathering info. Vulnerability info. Red Zpne Full Mesh Measurement Supporting Incident Response System * IRS * Virtual * HoneyNet * Virus info. Access Control * ACL * Inform/Report * E -mail * International ISP Other CERTs Detect & inform & consult Distribute a guide line for securing a system Inform the incident Activities in each level Cooperate with each manager Inform & alert the incident Introduction of Red Access Analyze traffic Gather event data & classify pattern Security Activities on Yellow Green Backbone Detect a anomaly on backbone Apply an ACL policy Secure & Reliable network -? Clean-? CERT- S&T-SEC Activities Overview of CERT- Mission Early Detection of Incidents of member institutes on Prevention of damages through the rapid response Assurance of Cooperative Incidents Response System Countermeasure against Hacking Organization (24 x 365Response System) Incident Response System Detect a trial of intrusion and analyze & report the inciden t Virtual HoneyNet - Access Control List Apply a access policy using access control list Inform & Report use an e- mail or telephone The process that detects & deal with the incident Router 1. Export a Netflow IRS IRS Collect a NetFlow Analyze a data Find a victim 3. Collect statistics 2. Notify the result To member Using or telephone Statistics Recode incident Take the statistics Make a document Notify Find a victim Trace attacker Take action Other ISP CERT-KR 17 18
4 Honey Net Virtual network for monitoring & analyzing the cyber attack Access Control Security on IX which is connected other ISP Input the traffic Flow Router DB Switch Interface Unix Wondpws Linu x Analyze an Event Black List ACL Exchange Point which enters initially after applying policy Security Policy Packet duplicate Drop Anomaly Filter Module Intrusion Detection Module Detect Add filtering rule Detect a anomaly Pattern DB Introduction of Security Activities on CERT- S&T-SEC Activities Mission Overview of S&T-SECSEC Early Detection of Incidents of research institutes in science & technology field Prevention of damages through the rapid response Assurance of Cooperative Incidents Response System Countermeasure against Hacking, especially in Science & Technology fields Background of establishing a S&T-SECSEC Increase the threat There were many worm- virus or backdoor Outbreak the important information There were some accident which drained the important information Attacked by international hacking group There were some record which attacked by international hacki ng group Rise a necessary of establishing the organization needs the national center for securing a national information S&T-SEC was officially opened in March, last year S&T-SEC SEC Operation Architecture How to collect a data (1) Detection Analysis Announcement Event Analysis Packet Analysis Report Management Rule definition ISP TMS IDS/Firewall Mails Vendors Monitoring End-Users Abnormal Vuln. Int l Trends Incident Reports MOST MOST S&T-SEC SEC Analysis Discuss Gathering Warning KrCERT Detection Notification Consulting Recovering Maill FAX SMS WEB Secure Messenger TRS Partners & Hot-lined Org. ISP/IDC Research Institutes National Center Vendors The Government Institutes End Users Sensor 1 1 Inform the result of analyzing anomaly traffic TMS server Gathering the pattern of anomaly traffic using sensor Sensor 3 Sensor
5 How to collect a data (2) Cooperation with other org. S&T SEC System security Patch Management Vulnerability Management Gather the traffic info. Log collector (Daemon) info. System log System info. Log Info. System info. - CPU Utilization - Memory Utilization Server Web DNS Mail Sensor S/W update Sensor update Module Vulnerability info. - OS - Application - Backdoor, etc PC Security PC PC Security S/W (PC firewall, vaccine) PC Security Software Research institutes funded by MOST Intrusion detection system Technical support Support the information of system vulnerability info. Vulnerability Info. CISCO Microsoft SUN collect the anomaly data Virus Info. Ahn lab HAUR) McAfee Serve the alarm information Serve the detected info. & guideline * Consult & serve the guideline S&T-SEC * Analyze & Support a trial of intrusion Support virus info. Establish cooperation channel Sharing a domestic & international security information Cooperation org. KrCERT - Korea Internet Security Center NCSC - National Cyber Security Center Consultation for securing The person in charge The representative of org. Consultation with representative Security center activities Expected Results Status Management Connectivity, Line-up Load management CPU, Memory Incident statistic system Secure and reliable R&D 24hrs Monitoring Continual(24 365) Response System Quantitative Objective Qualitative Objective Abnormality Detection within 20 min. with cross -border information sharing Emergency Notification within 10 min. by Hot-line and Others Improvement of judgment accuracy and rapidity based on monitoring results of anomaly indication Accurate estimation of damage statistics Data Analysis Flow, Session Mail filtering Anti-virus, spam Management Utilization, in/out amount Introduction of Security Activities on CERT- Conclusion What is? Korea s national science & research network 20Gbps backbone, 1~ access networks 4th core member participation on GLORIAD project CERT- Incident Response System Access Control List HoneyNet Activity of securing a mail S&T-SEC Activities S&T-SEC was officially opened in March, last year Because of rising a necessary of establishing the organization 29 30
KRLight and GLIF Activities
KRLight and GLIF Activities 6 th Annual Global LambdaGrid Workshop Tokyo, Japan September 11-12, 2006 JongUk Kong Supercomputing Center, KISTI kju@kisti.re.kr Topics > GLORIAD-KR/KRLight Network > Services
More informationGrid-related related Activities around KISTI Tier2 Center for ALICE
2010 APCTP LHC Workshop@ Konkuk Univ. Grid-related related Activities around KISTI Tier2 Center for ALICE August 10, 2010 Soonwook Hwang KISTI 1 Outline Introduction to KISTI KISTI ALICE Tier2 Center Development
More informationCSTNET Security Considerations
CSTNET Security Considerations Ling Wang wangling@cstnet.cn Computer Network Information Center Chinese Academy of Sciences Agenda CSTNET topology and applications Current CSTNET Security State The Threaten
More informationThe CERT today & tomorrow (KrCERT/CC Frameworks) Arnold S. Yoon KrCERT/CC, KISC, KISA
The CERT today & tomorrow (KrCERT/CC Frameworks) Arnold S. Yoon KrCERT/CC, KISC, KISA (snyoon@certcc.or.kr) Agenda Overview Status CERT services Big Bang Limitation and Challenges New focus for CERTs Way
More informationHD Video Activities in Korea
HD Video Activities in Korea JongWon Kim, Ph.D. APAN HDTV WG Meeting @ Taipei, Taiwan Mar. 29 th, 2005 Networked Media Laboratory Dept. of Information & Communications Gwangju Institute of Science & Technology
More informationSURFnet6 Integrating the IP and Optical worlds Erik-Jan Bos Director of Network Services SURFnet, The Netherlands TrefPunkt Kiruna, mars 2004
SURFnet6 Integrating the IP and Optical worlds Erik-Jan Bos Director of Network Services SURFnet, The Netherlands TrefPunkt Kiruna, 30-31 mars 2004 Presentation contents SURFnet and GigaPort: The environment
More informationDistributed Virtual Network Operations Center (DVNOC) - Towards Federated & Customer-focused Cyberinfrastructure
Distributed Virtual Network Operations Center (DVNOC) - Towards Federated & Customer-focused Cyberinfrastructure Harika Tandra, Software Engineer GLORIAD (presentation based on slides prepared by Greg
More informationThe Information Security Guideline for SMEs in Korea
The Information Security Guideline for SMEs in Korea Ho-Seong Kim Mi-Hyun Ahn Gang Shin Lee Jae-il Lee Abstract To address current difficulties of SMEs that are reluctant to invest in information security
More informationGLIF September 2017 Sydney, Australia Gerben van Malenstein, SURFnet & John Hess, Pacific Wave
AutoGOLE MEICAN Pilot plans for next 5 years SURFnet network upgrade GLIF 2017 25 27 September 2017 Sydney, Australia Gerben van Malenstein, SURFnet & John Hess, Pacific Wave National Research & Education
More informationNew International Connectivities of SINET5
Mar 28 th, 2018 at APAN45 New International Connectivities of SINET5 SINET 100G Global Ring Motonori Nakamura National Institute of Informatics (NII), Japan Academic Infrastructure operated by NII Our
More informationCyber Security Management System of NIRS in Korea
Cyber Security Management System of NIRS in Korea October 29, 2018 (Mon) * NIRS : National Information Resources Service Contents 1 2 3 Data Communication Infrastructure Cyber Crisis Response System NIRS
More informationIPv6 Transition ``Status in Korea
IPv6 Transition ``Status in Korea 21 July 2009 28 th APAN IPv6 session - Kuala Lumpur Malaysia Joonhyung Lim (jhlim@nida.or.kr) Seung-Joon Seok (sjseok@kyungnam.ac.kr) National Internet Development Agency
More information6GN Activities & KOREAv6 project
20 th APAN 2005 6GN Activities & KOREAv6 project Wang-Cheol Song < Cheju National Univ./ANF > Contents IPv6 Network Deployment Status in Korea Gigabit IPv6 Infrastructure Current Activities on 6GN KOREAv6
More informationJGN2plus. Presenter: Munhwan Choi
JGN2plus Presenter: Munhwan Choi JGN2plus Type of Services Network Structure R&D with SPARC Status of Utilization Overview JGN2plus JGN2plus looks for the visions of the future ICT society through activities
More informationDave McGaugh, Pacific Northwest Gigapop NANOG 39 Toronto, Canada
Supporting Hybrid Services at an International Exchange Facility: The Experience of Pacific Wave Dave McGaugh, Pacific Northwest Gigapop NANOG 39 Toronto, Canada About Pacific Wave A joint project between
More informationBenefits. Centrally managed protection of corporate networks
Defend what you create Centrally managed protection of corporate networks Benefits Centrally managed protection of Windows workstations, Windows file servers and Unix mail servers High scalability Grouping
More informationAbstract 1.1 GLORIAD. GLORIAD aims to better integrate, with its advanced network infrastructure, the research and education communities of the
GLORIAD: A Ring Around the Northern Hemisphere for Science and Education connecting North America, Russia, China, Korea and Netherlands with Advanced Network Services Greg Cole (Research Director, Joint
More informationBuilding 10-Gbps Networks: A few observations on the national and regional scales in the U.S.
Building 10-Gbps Networks: A few observations on the national and regional scales in the U.S. Steve Corbató corbato@internet2.edu Director, Network Initiatives, Internet2 & Visiting Fellow, Center for
More informationInternet : Next Steps
Softbank Internet : Next Steps 2001. 3. 23 chon@cosmos.kaist.ac.kr http://cosmos.kaist.ac.kr The Internet will almost certainly have a stronger impact than PC... a reasonable guess might put it ahead of
More informationIPv6 Activities for National Deployment in Korea. Yong-Jin Kim IPv6 Forum Korea, President
IPv6 Activities for National Deployment in Korea Yong-Jin Kim IPv6 Forum Korea, President Outline 2 Why IPv6? Internet status of Korea Difficulties in IPv6 Deployment IPv6 activities Government Policy
More informationInternational Research Networking GÉANT2, ORIENT and TEIN2: Projects Connecting China and Europe
GÉANT2, ORIENT and TEIN2: Projects Connecting China and Europe John Chevers ORIENT Project Manager, DANTE EuChinaGrid Meeting, Beijing 30 th January 2007 GÉANT2 Network Status Update GÉANT2 connects 34
More information9th CEF Networks Workshop KREONET optical network and quantum communication testbed
9th CEF Networks Workshop 2017 KREONET optical network and quantum communication testbed Contents 1. KREONET and Optical Footprint 2. Quantum Key Distribution in KREONET 3. KREONET s Flexgrid Network Plan
More informationInternational Research Network. Connections (IRNC)
International Research Network Goals: Connections (IRNC) Provide network connections linking U.S. research with peer networks in other parts of the world Stimulate the deployment and operational understanding
More informationAPII/TEIN4 (APII) Asia Pacific Information Infrastructure (KR-JP)
1 NIA overview Founded in 1987 Support ICT Enablement of National Agencies Local Autonomies and Development of Policies for the Information Society (Framework Act on Informatization Promotion) Public Agency
More informationN-Dimension n-platform 340S Unified Threat Management System
N-Dimension n-platform 340S Unified Threat Management System Firewall Router Site-to-Site VPN Remote-Access VPN Serial SCADA VPN Proxy Anti-virus SCADA IDS Port Scanner Vulnerability Scanner System & Service
More informationIPv6 Deployment Experience Sharing and Current Strategy in Korea
2010/TEL41/DSG/WKSP2/010 Agenda Item: Panel Discussion 2 IPv6 Deployment Experience Sharing and Current Strategy in Korea Submitted by: Korea Workshop for IPv6: Transforming the Internet Chinese Taipei
More informationIntegration of Network Services Interface version 2 with the JUNOS Space SDK
Integration of Network Services Interface version 2 with the JUNOS Space SDK Radosław Krzywania, Michał Balcerkiewicz, Bartosz Belter Poznan Supercomputing and Networking Center, ul. Z. Noskowskiego 12/14,
More informationCSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague
Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF
More informationPublic Cloud Connection for R&E Network. Jin Tanaka APAN-JP/KDDI
Public Cloud Connection for R&E Network Jin Tanaka APAN-JP/KDDI 45th APAN Meeting in Singapore 28th March 2018 Hyper Scale Public cloud and research & science data NASA EOSDIS(Earth Observing System Data
More informationInternational Exchanges Current and Future
International Exchanges Current and Future Jim Dolgonas President and Chief Operating Officer CENIC April 4, 2006 CENIC Originally formed in 1997 to bring high speed networking to all higher education
More informationStarLight Connects Global Research Community Using Force10 TeraScale E-Series
Starlight Networks Industry Scientific Research Applications Optical Network Exchange Highlights Starlight chooses the Force10 TeraScale E-Series as the foundation of their large scale network that interconnects
More informationRequirements for the Operations & Management of 4G Networks
Requirements for the Operations & Management of 4G Networks Prof. James Won-Ki Hong Dept. of Computer Science and Engineering, Korea & Prof. Alberto Leon-Garcia Dept. of Electrical and Computer Engineering
More information1 Data Center Requirements
1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider
More informationReporting Status of Vulnerability-related Information about Software Products and Websites - 1 st Quarter of 2012 (January March) -
Reporting Status of Vulnerability- Information about Software Products and Websites - 1 st Quarter of 212 (January March) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency
More information18th WRNP Workshop RNP May Belém, Brasil Gerben van Malenstein
AutoGOLE MEICAN Pilot plans for next 5 years SURFnet network upgrade 18th WRNP Workshop RNP 15-16 May Belém, Brasil Gerben van Malenstein National Research & Education Network of the Netherlands Connecting
More informationthe world with light
the world with light What does GLIF do? GLIF stands for Global Lambda Integrated Facility. GLIF promotes the paradigm of lambda networking to support demanding scientifi c applications. GLIF makes lambdas
More informationProgress Report for APII IPv6 Testbed Project
2009/TEL39/DSG/008rev2 Agenda Item: 4.1. Progress Report for APII IPv6 Testbed Project Purpose: Information Submitted by: Japan ICT Development Steering Group Meeting Singapore 16 17 April 2009 Page 1
More informationGÉANT IP Service Description. High Performance IP Services to Support Advanced Research
GÉANT IP Service Description High Performance IP Services to Support Advanced Research Issue Date: 1 November 2017 GÉANT IP Overview The GÉANT IP service provides high-bandwidth, international Internet
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationExam: : VPN/Security. Ver :
Exam: Title : VPN/Security Ver : 03.20.04 QUESTION 1 A customer needs to connect smaller branch office locations to its central site and desires a more which solution should you recommend? A. V3PN solution
More informationExperience of the RISE Testbed Deployment
Internet2 FTW: International OpenFlow/SDN Testbeds Experience of the RISE Testbed Deployment Eiji Kawai Director, Network Testbed R&D Lab NICT JGN-X JGN-X is a wide-area network testbed operated by NICT
More informationGlobal IP Network (GIN) Connects You to the World
Global IP (GIN) Connects You to the World Delivering your Business Vision with the World s Tier 1 leading IP network NTT Communications (NTT Com) Global IP network (GIN) 100GigE service is the fastest
More informationCIRT: Requirements and implementation
CIRT: Requirements and implementation By : Muataz Elsadig Sudan CERT Joint ITU-ATU Workshop on Cyber-security Strategy in African Countries Khartoum, Republic of Sudan, 24 26 July 2016 There is no globally
More informationINDONESIA S PERSPECTIVE ON CYBER TERRORISM
INDONESIA S PERSPECTIVE ON CYBER TERRORISM CYBER TERRORISM No generally acceptable definition Cyber terrorism is one form of terrorism that use computer resources to launch terror attacks on critical infrastructures
More informationGbps-range High-definition Visual Sharing
Gbps-range High-definition Visual Sharing Update on GLORIAD-KR Uncompressed HD System Jinyong Jo jiny92@kisti.re.kr HPcN Dev. Team, HPcN Project Div. Korea Institute of Science and Technology Information
More informationSecurity: Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration
Security: A Driving Force Behind Moving to the Cloud Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration 2017, Amazon Web Services, Inc. or its affiliates.
More informationPresentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT
Presentation to the ITU on the Q-CERT Incident Management Team Ian M Dowdeswell Incident Manager, Q-CERT 2 Q-CERT Mission The Mission of Q-CERT is to be a world-class center of excellence providing expert
More informationPacificWave Update and Future Directions
PacificWave Update and Future Directions John Silvester University of Southern California Chair, CENIC APAN20, Taipei, 2005.08.24 Overview Introduction to Pacific Wave Current Status including recent additions
More informationGÉANT L3VPN Service Description. Multi-point, VPN services for NRENs
GÉANT L3VPN Service Description Multi-point, VPN services for NRENs Issue Date: 1 November 2017 GÉANT L3VPN Overview The GÉANT L3VPN service offers the National Research and Education Networks (NRENs)
More informationNext Generation Broadband Networks
Next Generation Broadband Networks John Harper Vice President, IOS Routing Apricot 2005 1 Next Generation Broadband Networks The broadband opportunity, in Asia and worldwide Cisco R&D for the broadband
More informationIntruduction of KOREN (KOrea advanced REsearch Network)
Intruduction of KOREN (KOrea advanced REsearch Network) 2015.10. KIM SE JIN KOREN NOC noc@koren.kr National Information Society Agency Contents Ⅰ KOREN in Brief Ⅱ III Ⅳ KOREN Network TEIN collaboration
More informationSymantec Network Security 7100 Series
Symantec Network Security 7100 Series Proactive intrusion prevention device protects against known and unknown attacks to secure critical networks transition can be accomplished transparent to any network
More informationKorea Phishing Activity Trends Report
Korea Phishing Activity Trends Report June, 2006 Issued by KrCERT/CC, Korea Internet Security Center Korea Phishing Activity Trends Report analyzes phishing attacks reported to KrCERT/CC via the organization
More informationReporting Status of Vulnerability-related Information about Software Products and Websites
Reporting Status of Vulnerability- Information about Software Products and Websites - 3 rd Quarter of 218 (July - September) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency
More informationInformation Security Policies in Japan
Information Security Policies in Japan Towards a safe and secure network infrastructure Fumiaki TAKAHASHI Director, ICT Security Office, Information and Communications Policy Bureau, Ministry of Internal
More informationVenusense UTM Introduction
Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,
More informationGARR-CERT. Update. Simona Venuti TF-CSIRT, Rome,
GARR-CERT Update OLD GARR-CERT Presentation... I do not know who was the first to present GARR-CERT... And I do not have that presentation, nor any presentation at all Since my duty is to make an «update»...
More informationCroatian National CERT ACDC project Darko Perhoc, Head of National CERT CISSP, CEH, CCNP Security R&S,CCDP
Croatian National CERT ACDC project Darko Perhoc, Head of National CERT CISSP, CEH, CCNP Security R&S,CCDP Croatian National CERT (HR-CERT) mission: Promoting and preserving information security of public
More informationAdministration of Symantec Cyber Security Services (July 2015) Sample Exam
Administration of Symantec Cyber Security Services (July 2015) Sample Exam Contents SAMPLE QUESTIONS... 1 ANSWERS... 6 Sample Questions 1. Which DeepSight Intelligence Datafeed can be used to create a
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationCERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University
CERT Overview Jeffrey J. Carpenter 2008 Carnegie Mellon University Software Engineering Institute Department of Defense R&D Laboratory FFRDC Created in 1984 Administered by Carnegie Mellon
More informationProposal for Deployment of International Multi-Layer Network
Proposal for Deployment of International Multi-Layer Network - TransPAC2 Update - Jin Tanaka APAN-JP/KDDI/NICT tanaka@kddnet.ad.jp Network Engineering Workshop APAN26 New Zealand Meeting 7th Aug. 2008
More informationResearch Network Challenges and Opportunities. Matt Zekauskas, Senior Engineer, Internet
Research Network Challenges and Opportunities Matt Zekauskas, matt@internet2.edu Senior Engineer, Internet2 2006-06-29 Outline Internet2? Current network issues Abilene, a 10Gbps IP backbone New network
More informationNetwork Services Interface. OGF NSI standards development progress:
Network Services Interface OGF NSI standards development progress: NSI Framework Doc (spr 11) NSI CS v1.0draft (Aug 11) Feed initial implementation NSI CS v1.0 final (Dec 11) NSI CS v2.0draft, NSI Topology
More informationBrent Sweeny GRNOC at Indiana University APAN 32 (Delhi), 25 August 2011
Brent Sweeny GRNOC at Indiana University APAN 32 (Delhi), 25 August 2011 A high-performance connection between the North American research & education networks to the Asia- Pacific research & education
More informationSwedish IT Incident Centre
Swedish IT Incident Centre Establishing a Government CERT from scratch the Swedish experience Establishment phase 2003 2004 CERTs in Europe Lessons Learned and Good Practices, Brussels 2005-12-13 Presentation
More informationThe rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services
The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services Major Trends of 2014 And relevant changes in Threat Scenario Most Target Countries and Sectors
More informationHD Video Streaming Services & Network Requirements
HD Video Streaming Services & Network Requirements JongWon Kim, Ph.D. HSN 2006 WS @ Daegu February 22 nd, 2006 Networked Media Laboratory Dept. of Information & Communications Gwangju Institute of Science
More informationTransPAC3- Asia US High Performance International Networking (Award # ) Quarterly Report 1-March-2014 through 31-May-2014
Summary TransPAC3- Asia US High Performance International Networking (Award #0962968) Quarterly Report 1-March-2014 through 31-May-2014 Jennifer Schopf Principal Investigator (Prepared by Alice Jackson,
More informationThe DETER Testbed: Overview 25 August 2004
The DETER Testbed: Overview 25 August 2004 1. INTRODUCTION The DETER (Cyber Defense Technology Experimental Research testbed is a computer facility to support experiments in a broad range of cyber-security
More informationHKIX Updates at APAN 44
HKIX Updates at APAN 44 Kenneth CHAN Team Lead, HKIX www.hkix.net 31 Aug 2017 What is HKIX? Established in Apr 1995, Hong Kong Internet exchange (HKIX) is the main layer-2 Internet exchange Point (IXP)
More informationScrutinizer Flow Analytics
Scrutinizer Flow Analytics TM Scrutinizer Flow Analytics Scrutinizer Flow Analytics is an expert system that highlights characteristics about the network. It uses flow data across dozens or several hundred
More informationOptical Networking Activities in NetherLight
Optical Networking Activities in NetherLight TERENA Networking Conference 2003 Zagreb, May 19-22, 2003 Erik Radius Manager Network Services, SURFnet Outline NetherLight What is it Why: the rationale From
More informationThe Abilene Observatory and Measurement Opportunities
The Abilene Observatory and Measurement Opportunities Rick Summerhill, Director Network Research, Architecture, and Technology, Internet2 CONMI Workshop / PAM 2005 Boston, MA March 30, 05 Outline History
More informationOFELIA. Intercontinental Cooperation
OFELIA Intercontinental Cooperation OFELIA and Intercontinental Cooperation OpenFlow based research activities Ongoing initiatives: FIBRE (Brazil), JGN-X (Japan), FIRST (Korea) A layer 2 loop around the
More informationPacificWave Update for APAN-23. John Silvester Professor of Electrical Engineering, USC PI TransLight/PacificWave Project (NSF) Board Member, CENIC
PacificWave Update for APAN-23 John Silvester Professor of Electrical Engineering, USC PI TransLight/PacificWave Project (NSF) Board Member, CENIC International Connectivity and Exchanges 2 Visualization
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationMeasurement and Monitoring. Yasuichi Kitmaura Takatoshi Ikeda
Measurement and Monitoring Yasuichi Kitmaura (kita@jp.apan.net) Takatoshi Ikeda (ikeda@kddnet.ad.jp) Who are we? Yasuichi Kitamura researcher of National Institute of Information and Communications Technology
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationGÉANT Plus Service Description. High Performance Cost-effective Connectivity
GÉANT Plus Service Description High Performance Cost-effective Connectivity Issue Date: 1 November 2017 GÉANT Plus Overview The GÉANT Plus service is offered on the GÉANT network to all GÉANT National
More informationAn Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)
An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University
More informationComputer Security Trend 2008 from Japan. SQL Injection, DNS cache poisoning, Phishing, Key logger Malware and Targeted Attacks
Computer Security Trend 2008 from Japan SQL Injection, DNS cache poisoning, Phishing, Key logger Malware and Targeted Attacks JPCERT Coordination Center, Japan Manager of Watch and Warning Group Keisuke
More informationWhat is Grid? ? R VO C VO A VO B. Ref. Paul Avery
I II III IV V VI VII ef. Paul Avery What is Grid? VO A? VO C?? VO B? Korea e-science Project Innovation of &D environment and international competitive power in Science apid changes in paradigm of S&T
More informationCisco Cyber Range. Paul Qiu Senior Solutions Architect June 2016
Cisco Cyber Range Paul Qiu Senior Solutions Architect June 2016 What I hear, I forget What I see, I remember What I do, I understand ~ Confucius Agenda Agenda Cyber Range Highlights Cyber Range Overview
More informationThe Development of Modeling, Simulation and Visualization Services for the Earth Sciences in the National Supercomputing Center of Korea
icas2013 (September 9~12, Annecy/France) The Development of Modeling, Simulation and Visualization Services for the Earth Sciences in the National Supercomputing Center of Korea Min-Su Joh, Joon-Eun Ahn,
More informationGlobal Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009
Global Response Centre (GRC) & CIRT Lite Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 IMPACT Service offerings Global Response Centre CIRT Lite Need for GRC Access
More informationGrid Tutorial Networking
Grid Tutorial Networking Laukik Chitnis Sanjay Ranka Outline Motivation Key Issues and Challenges Emerging protocols DWDM MPLS, GMPLS Network Infrastructure Internet2 Abilene and HOPI NLR and FLR Gloriad
More informationProCurve Network Immunity
ProCurve Network Immunity Hans-Jörg Elias Key Account Manager hans-joerg.elias@hp.com 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
More informationII. Information Security Infrastructure and Environment 2. III. Information Security Incident Prevention 6. Ⅳ. Security Incidents Responses 13
I. Introduction 1 II. Information Security Infrastructure and Environment 2 1. Information Security Policy 2 2. Information Security Organizations and Officers 3 3. Information Security Education 4 4.
More informationReporting Status of Vulnerability-related Information about Software Products and Websites - 3 rd Quarter of 2015 (July September) -
Reporting Status of Vulnerability- Information about Software Products and Websites - 3 rd Quarter of 215 (July September) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency
More informationTransPAC3- Asia US High Performance International Networking (Award # ) Quarterly Report 1-September-2014 through 30-November-2014
TransPAC3- Asia US High Performance International Networking (Award #0962968) Quarterly Report 1-September-2014 through 30-November-2014 Summary Jennifer Schopf Principal Investigator (Prepared by Jennifer
More informationNETWORK THREATS DEMAN
SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments
More informationReal-time Cyber Situational Awareness for Satellite Ground Networks. March 2015 Presenter: Ted Vera
Real-time Cyber Situational Awareness for Satellite Ground Networks March 2015 Presenter: Ted Vera Colorado Springs, CO (719) 598 2801 Denver, CO (303) 703 3834 http://www.rtlogic.com Recent Attacks NOAA
More informationFlow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone
Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone Thomas Dübendorfer, Arno Wagner, Theus Hossmann, Bernhard Plattner ETH Zurich, Switzerland duebendorfer@tik.ee.ethz.ch
More informationData Gathering in Optical Networks with the TL1 Toolkit
Data Gathering in Optical Networks with the TL1 Toolkit Ronald van der Pol 1 and Andree Toonk 2 1 SARA Computing & Networking Services, Kruislaan 415, 1098 SJ Amsterdam, The Netherlands rvdp@sara.nl http://nrg.sara.nl/
More informationCisco Security Monitoring, Analysis and Response System 4.2
Q&A Cisco Security Monitoring, Analysis and Response System 4.2 GENERAL Q. What is the Cisco Security Monitoring, Analysis and Response System? A. The Cisco Security Monitoring, Analysis and Response System
More informationEndpoint Protection : Last line of defense?
Endpoint Protection : Last line of defense? First TC Noumea, New Caledonia 10 Sept 2018 Independent Information Security Advisor OVERVIEW UNDERSTANDING ENDPOINT SECURITY AND THE BIG PICTURE Rapid development
More informationSymantec Endpoint Protection Integration Component User's Guide. Version 7.0
Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationSecurity activities in Japan towards the future standardization. Cybersecurity
Security activities in Japan towards the future standardization Side Event Cybersecurity Koji NAKAO KDDI, Japan Content Current threats - Internet User in Japan - However, observation of many scans (by
More informationThe Evolution of Exchange Points
The Evolution of Exchange Points John Silvester Professor and Executive Director of the Center for Scholarly Technology, USC Chair, CENIC APAN21, January 24, 2006, Tokyo, Japan In the beginning Things
More information