Peer-to-Peer Secure Update for Heterogeneous Edge Devices
|
|
- Arleen Russell
- 5 years ago
- Views:
Transcription
1 Peer-to-Peer Secure Update for Heterogeneous Edge Devices E. Band, H. Herry, C. Perkins, J. Singer School of Computing Science University of Glasgow 1
2 FRµIT: Federated RaspberryPi µ-infrastructure Testbed ( Massive aggregation of low-cost, low-power, commodity infrastructure can form an efficient and effective compute fabric for key distributed applications Applications: edge-compute, IoT, portable data-center, expendablecompute Traditional: few big data-centers vs FRµIT: many micro data-centers Funded by UK-EPSRC 2
3 Problem: Updating Remote System Update system is critical Security patch Deploy firmware, software, configurations Regular update Limited (or no) physical access Remote locations Mobile Private residential locations Existing tools Requires direct SSH access Needs well-connected server 3
4 Problem: Updating Remote System Heterogeneous Network Some nodes are behind NATs (e.g. residential) or Firewalls (e.g. university) Single-point of failure Scalability Denial of Service attack on update server Linux distributions: dedicated mirror servers Randomized download slot-times [Pollock et.al.] 4
5 Our Approach Decentralized management framework using Peer-to-Peer overlay network A gossip protocol to distribute secured update notifications (torrent-file) STUN-based UDP hole punching to discover and open NAT bindings (NAT-TM) BitTorrent to securely distribute updates (software, management scripts, etc) Contribution: our system assumes partial network connectivity, and works in the presence of NATs or firewalls 5
6 Our Approach Other advantages Bandwidth sharing Updates can reach indirectly connected nodes Resilient to single point of failure and attacks We may not need a dedicated update server 6
7 Architecture P2P Update System Agent STUN Server NAT-TM BTClient (Transmission) Puppet Deployer Chef Shell NAT OS 7
8 Target resource identifier Distinguish different target resources Version (monotonically increasing) Help agent to ignore outdated update existing in the network Digital Signature Admin holds a private-key Each node has a public-key Signature = encrypt(sha512(torrent-file), private-key) sha512(torrent-file) =? decrypt(signature, public-key) Torrent-file (Standard) Tracker/s File-name File-length Piece-length Cryptographic-hashes of file pieces Target resource identifier Version Digital signature 8
9 2 Updated- 9
10 2 Updated- 10
11 IP2:Port2 2 Updated- 11
12 IP2:Port2 2 Updated- 12
13 IP2:Port2 2 Updated- 13
14 IP2:Port2 2 Updated- 14
15 STUN Server Updated- NAT NAT 4 5 IP4:Port4 3 15
16 Updated- NAT (EIP4:EPort4) STUN Server NAT (EIP3:EPort3) 4 5 IP4:Port4 3 16
17 Updated- NAT (EIP4:EPort4) STUN Server NAT (EIP3:EPort3) 4 5 IP4:Port4 3 17
18 Updated- NAT (EIP4:EPort4) STUN Server NAT (EIP3:EPort3) IP5:Port5 4 5 IP4:Port4 3 18
19 Updated- NAT (EIP4:EPort4) STUN Server NAT (EIP3:EPort3) IP5:Port5 4 5 IP4:Port4 3 19
20 Updated- NAT (EIP4:EPort4) STUN Server NAT (EIP3:EPort3) IP5:Port5 4 5 IP4:Port4 3 20
21 Updated- NAT (EIP4:EPort4) STUN Server NAT (EIP3:EPort3) IP5:Port5 4 5 IP4:Port4 3 21
22 Updated- NAT (EIP4:EPort4) STUN Server NAT (EIP3:EPort3) IP5:Port5 4 5 IP4:Port4 3 22
23 STUN Server Updated- Firewall 6 23
24 STUN Server Updated- Firewall (EIP6:EPort6) (Admin modifies the rules) 6 24
25 STUN Server EIP6:EPort6,IP6:Port6 Updated- Firewall (EIP6:EPort6) (Admin modifies the rules) 6 25
26 EIP6:EPort6,IP6:Port6 STUN Server EIP6:EPort6,IP6:Port6 Updated- Firewall (EIP6:EPort6) (Admin modifies the rules) 6 26
27 EIP6:EPort6,IP6:Port6 STUN Server EIP6:EPort6,IP6:Port6 Updated- Firewall (EIP6:EPort6) (Admin modifies the rules) 6 27
28 EIP6:EPort6,IP6:Port6 STUN Server EIP6:EPort6,IP6:Port6 Updated- Firewall (EIP6:EPort6) (Admin modifies the rules) 6 28
29 EIP6:EPort6,IP6:Port6 STUN Server EIP6:EPort6,IP6:Port6 Updated- Firewall (EIP6:EPort6) (Admin modifies the rules) 6 29
30 EIP6:EPort6,IP6:Port6 STUN Server EIP6:EPort6,IP6:Port6 Updated- Firewall (EIP6:EPort6) (Admin modifies the rules) 6 30
31 Preliminary Experiment 6 Raspberry-Pis 2/3 Residential networks (Home NAT) Sky, BT Firewall Network School of Computing Science (University of Glasgow) STUN Server on Google Compute Engine VM Update: web server with static files Puppet manifest, puppet-modules, software packages, html files Result: successful updates on all-nodes, including behind home NATs and firewall 31
32 Shortcomings Not work with all NAT types e.g. Symmetric NAT 32
33 Conclusion & Future Work Our (prototype) framework can update securely the system with partial network connectivity, and works in the presence of NATs or firewalls Integrate this P2P secure update framework into FRµIT Testbed Large-scale experiments on FRµIT Testbed 33
34 Do you have an unused Raspberry Pi board locked away in a cupboard? Please donate it for scientific research. 34
35 Thank you! 35
Latest Peer-to-Peer Technologies II Artjom Lind 1
Latest Peer-to-Peer Technologies II 25.11.2009 Artjom Lind 1 Outline Last presentation Intro Peer-to-Peer SIP TCP Traversal Conclusions 25.11.2009 Artjom Lind 2 Last Presentation P2P Systems Structured
More informationUDP NAT Traversal. CSCI-4220 Network Programming Spring 2015
UDP NAT Traversal CSCI-4220 Network Programming Spring 2015 What is NAT Traversal? NAT traversal means establishing a connection between two hosts when one or both is behind NAT. Many of today s network
More informationExploring Alternative Routes Using Multipath TCP
Exploring Alternative Routes Using Multipath TCP 1/51 Exploring Alternative Routes Using Multipath TCP Stephen Brennan Case Western Reserve University June 5, 2017 Exploring Alternative Routes Using Multipath
More informationInternet Networking recitation #
recitation # UDP NAT Traversal Winter Semester 2013, Dept. of Computer Science, Technion 1 UDP NAT Traversal problems 2 A sender from the internet can't pass a packet through a NAT to a destination host.
More informationExam : Implementing Microsoft Azure Infrastructure Solutions
Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service
More informationBitTorrent and CoolStreaming
BitTorrent and CoolStreaming Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen Aalto University P2P Networks BitTorrent
More informationAddressing the P2P Bootstrap Problem for Small Overlay Networks
Addressing the P2P Bootstrap Problem for Small Overlay Networks David Isaac Wolinsky, Pierre St. Juste, P. Oscar Boykin, and Renato Figueiredo Advanced Computing Information Systems Lab University of Florida
More informationP2P content distribution Jukka K. Nurminen
P2P content distribution Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials BitTorrent content downloading Efficient content distribution Bram Cohen, 2001 File divided into pieces Each recipient
More informationP2P content distribution
P2P content distribution T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials Steps of content sharing Share content Find content Transfer
More informationPeer-to-Peer Systems. Internet Computing Workshop Tom Chothia
Peer-to-Peer Systems Internet Computing Workshop Tom Chothia Plagiarism Reminder Plagiarism is a very serious offense. Never submit work by other people without clearly stating who wrote it. If you did
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationCS 470 Spring Distributed Web and File Systems. Mike Lam, Professor. Content taken from the following:
CS 470 Spring 2017 Mike Lam, Professor Distributed Web and File Systems Content taken from the following: "Distributed Systems: Principles and Paradigms" by Andrew S. Tanenbaum and Maarten Van Steen (Chapters
More informationNOAA TICAP. Robert Sears NOAA/OCIO/SDD/N-Wave
NOAA TICAP Robert Sears NOAA/OCIO/SDD/N-Wave N-Wave Program N-Wave is a program of Federal and contract staff that manage the NOAA Enterprise Network known as N-Wave, and also supports/aligns and executes
More informationUNIK Building Mobile and Wireless Networks Maghsoud Morshedi
UNIK4700 - Building Mobile and Wireless Networks Maghsoud Morshedi IoT Market https://iot-analytics.com/iot-market-forecasts-overview/ 21/11/2017 2 IoT Management Advantages Remote provisioning Register
More informationCS 470 Spring Distributed Web and File Systems. Mike Lam, Professor. Content taken from the following:
CS 470 Spring 2018 Mike Lam, Professor Distributed Web and File Systems Content taken from the following: "Distributed Systems: Principles and Paradigms" by Andrew S. Tanenbaum and Maarten Van Steen (Chapters
More informationCisco Nexus 9200 Switch Datasheet
Cisco Nexus 9200 Switch Datasheet CONTENT Content... 1 Overview... 2 Appearance... 2 Key Features and Benefits... 3 NX-OS Software... 4 Nexus 9200 Compare models... 6 Specification of nexus 9200 series
More informationHyperledger Fabric Single Member Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager
Hyperledger Fabric Single Member Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager Overview Over the past year, we have worked diligently to develop an open blockchain ecosystem
More informationLecture 17: Peer-to-Peer System and BitTorrent
CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and
More informationProject JXTA Technology Overview.
Project JXTA Technology Overview www.jxta.org The Time Is Right for P2P and Project JXTA Peer-to-Peer (P2P) is not new. However, the time is now right for the broad P2P applications deployment. The Project
More informationUser-Relative Names for Globally Connected Personal Devices
User-Relative Names for Globally Connected Personal Devices Bryan Ford, Jacob Strauss, Chris Lesniewski-Laas, Sean Rhea, Frans Kaashoek, Robert Morris Massachusetts Institute of Technology IPTPS February
More informationSIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)
security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, 29.03.2006, Atlanta, GA (USA) 2006 SWITCH Content and Firewall and NAT Privacy / Encryption SpIT / Authentication Identity General
More informationPeer-to-Peer Internet Applications: A Review
Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation
More informationPresentation by Brett Meyer
Presentation by Brett Meyer Traditional AV Software Problem 1: Signature generation Signature based detection model Sheer volume of new threats limits number of signatures created by one vendor Not good
More informationNetwork Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example
Contents Network Address Translation (NAT) 13.10.2008 Prof. Sasu Tarkoma Overview Background Basic Network Address Translation Solutions STUN TURN ICE Summary What is NAT Expand IP address space by deploying
More informationOracle s Netra Modular System. A Product Concept Introduction
Oracle s Netra Modular System A Product Concept Introduction Table of Contents Table of Contents 1 Introduction 2 Blades Versus Rackmount Servers 3 Traditional Server Architectures Merged 3 Plug-and-Play
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationOpenScape Business S in hosted/cloud Deployments
OpenScape Business S in hosted/cloud Deployments Frank Wulf, UNIFY Version 1.14 Agenda OpenScape Business S in hosted/cloud Deployments Introduction Scenario Overview Scenarios Multi Instance Data Center
More informationInstalling Cisco APIC-EM on a Virtual Machine
About the Virtual Machine Installation, page 1 System Requirements Virtual Machine, page 2 Pre-Install Checklists, page 4 Cisco APIC-EM Ports Reference, page 7 Verifying the Cisco ISO Image, page 8 Installing
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationChapter 2: Application layer
Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming
More informationNetwork Address Translation (NAT) Background Material for Overlay Networks Course. Jan, 2013
Network Address Translation (NAT) Background Material for Overlay Networks Course Jan, 2013 Prof. Sasu Tarkoma University of Helsinki, Department of Computer Science Contents Overview Background Basic
More informationAruba Instant in AirWave 7.7
Aruba Instant in AirWave 7.7 Deployment Guide About this Document This document describes the Aruba Instant access point and Virtual Controller system as well as the procedure to integrate this system
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationArchitecting Microsoft Azure Solutions (proposed exam 535)
Architecting Microsoft Azure Solutions (proposed exam 535) IMPORTANT: Significant changes are in progress for exam 534 and its content. As a result, we are retiring this exam on December 31, 2017, and
More informationSecurity Considerations for Cloud Readiness
Application Note Zentera Systems CoIP Platform CoIP Defense-in-Depth with Advanced Segmentation Advanced Segmentation is Essential for Defense-in-Depth There is no silver bullet in security a single solution
More informationCS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017
CS 43: Computer Networks BitTorrent & Content Distribution Kevin Webb Swarthmore College September 28, 2017 Agenda BitTorrent Cooperative file transfers Briefly: Distributed Hash Tables Finding things
More information70-532: Developing Microsoft Azure Solutions
70-532: Developing Microsoft Azure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Create and Manage Azure Resource Manager Virtual Machines
More informationEmerging Testbeds for NwGN through Virtualization Technologies. Akihiro NAKAO University of Tokyo NICT
Emerging Testbeds for NwGN through Virtualization Technologies Akihiro NAKAO University of Tokyo NICT Testbeds through Net Virtualization Various ideas under development GENI 5 Clusters PlanetLab Today
More informationCheck Point vsec for Microsoft Azure
Check Point vsec for Microsoft Azure Test Drive User Guide 2017 Check Point Software Technologies Ltd. All rights reserved Page 1 Learn More: checkpoint.com Content 1 INTRODUCTION... 3 2 TEST DRIVE OVERVIEW...
More information70-532: Developing Microsoft Azure Solutions
70-532: Developing Microsoft Azure Solutions Exam Design Target Audience Candidates of this exam are experienced in designing, programming, implementing, automating, and monitoring Microsoft Azure solutions.
More informationCHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING
www.hcltech.com CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING Why Next-Gen Networks? The rapid and large scale adoption of new age disruptive digital technologies has resulted in astronomical growth
More informationIRP - the Identity Registration Protocol L AW R E N C E E. HUGHES CO- F O U N D E R AND C TO S I X S CAPE C O M M U N I C ATIONS, P TE. LTD.
IRP - the Identity Registration Protocol L AW R E N C E E. HUGHES CO- F O U N D E R AND C TO S I X S CAPE C O M M U N I C ATIONS, P TE. LTD. L HUGHES@SIXSC APE.COM The IPv4 Internet is Broken By the mid-1990
More informationMobile Peer-to-Peer Business Models T Network Services Business Models. Mikko Heikkinen
Mobile Peer-to-Peer Business Models T-109.4300 Network Services Business Models Mikko Heikkinen 26.03.2009 Outline Definitions What is peer-to-peer? What is mobile peer-to-peer? Motivation STOF and MP2P
More informationNetwork Requirements
GETTING STARTED GUIDE ALCATEL-LUCENT RAINBOW TM Network Requirements GETTING STARTED GUIDE JANVIER 2017 Author: R&D - Cloud Services Disclaimer This documentation is provided for reference purposes only.
More informationPeer-to-peer systems and overlay networks
Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems
More informationWindows. Not just for houses
Windows Not just for houses Windows 110 Windows Server Essentially a jacked up windows 8 box Still GUI based Still makes no sense No start menu :( (Install classic shell)... trust me... Windows Server
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationDeliverable D3.4 5G-PPP Security Enablers Documentation (v1.0) Enabler Micro-Segmentation
Deliverable D3.4 5G-PPP Security Enablers Documentation (v1.0) Enabler Micro-Segmentation Project name 5G Enablers for Network and System Security and Resilience Short name 5G-ENSURE Grant agreement 671562
More informationSmart City, Internet of Things, Security and Privacy
Smart City, Internet of Things, Security and Privacy Peter Waher Abstract. This course contains a series of lectures and practical laboratory assignments spanning four days that provide the participants
More informationP2P technologies, PlanetLab, and their relevance to Grid work. Matei Ripeanu The University of Chicago
P2P technologies, PlanetLab, and their relevance to Grid work Matei Ripeanu The University of Chicago Why don t we build a huge supercomputer? Top500 supercomputer list over -0.70 time: -0.72 Zipf distribution:
More informationManaging & Accelerating Innovation with Open Source at the Edge
Managing & Accelerating Innovation with Open Source at the Edge Bill Hunt, CTO - Dianomic Welcome! The IIoT Opportunity Resolve Complexity & Fragmentation with FogLAMP Use case: Defense Contractor Aircraft
More informationRealizing the Promise of SANs
Business without interruption. Realizing the Promise of SANs Bill North Director, Storage Network Programs Strategic Initiatives Group VERITAS Software Education Committee Chairman Storage Network Industry
More informationThe Windows Azure Platform: A Perspective
The Windows Azure Platform: A Perspective David Chappell Chappell & Associates Copyright 2009 David Chappell Goals Describe the Windows Azure platform Look at some typical scenarios for using the Windows
More informationUnit 8 Peer-to-Peer Networking
Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System
More informationepldt Web Builder Security March 2017
epldt Web Builder Security March 2017 TABLE OF CONTENTS Overview... 4 Application Security... 5 Security Elements... 5 User & Role Management... 5 User / Reseller Hierarchy Management... 5 User Authentication
More informationPatching and Updating your VM SUSE Manager. Donald Vosburg, Sales Engineer, SUSE
Patching and Updating your VM SUSE Manager Donald Vosburg, Sales Engineer, SUSE dvosburg@suse.com Why should I care? I just clone my base VM image, and after that it is not my problem... Understand the
More informationNetwork Administrator s Guide
Overview Network Administrator s Guide Beam is a comprehensive Smart Presence system that couples high-end video, high-end audio, and the freedom of mobility for a crisp and immersive, video experience
More informationWelcome to your IPv6 enabled transit network.
Welcome to your IPv6 enabled transit network. Whether you like it, or not. - Rob Issac, August 2008 IPv6 s killer app We ve long said that we haven t had one But we had one all along: End to end communication;
More informationCustomization and Provisioning of Complex Event Processing using TOSCA IAAS & IPVS
Customization and Provisioning of Complex Event Processing using TOSCA IAAS & IPVS Ana C. Franco da Silva, Pascal Hirmer, Uwe Breitenbücher, Oliver Kopp, Bernhard Mitschang franco-da-silva@informatik.uni-stuttgart.de
More informationMcAfee Virtual Network Security Platform 8.4 Revision A
8.4.7.101-8.3.7.18 Manager-Virtual IPS Release Notes McAfee Virtual Network Security Platform 8.4 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions
More informationCybersecurity with Automated Certificate and Password Management for Surveillance
Cybersecurity with Automated Certificate and Password Management for Surveillance October 2017 ABSTRACT This reference architecture guide describes the reference architecture of a validated solution to
More informationIndustry-leading Application PaaS Platform
Industry-leading Application PaaS Platform Solutions Transactional Apps Digital Marketing LoB App Modernization Services Web Apps Web App for Containers API Apps Mobile Apps IDE Enterprise Integration
More informationIBM Tivoli Provisioning Manager V7.1.1 Implementation. Download Full Version :
IBM 000-009 Tivoli Provisioning Manager V7.1.1 Implementation Download Full Version : https://killexams.com/pass4sure/exam-detail/000-009 C. only for 64-bit AMD64 D. only for Intel processors Answer: B
More informationA Proposal for a NAT Traversal System that Does Not Require Additional Functions at Terminals
A Proposal for a NAT Traversal System that Does Not Require Additional Functions at Terminals Yutaka Miyazaki, Hidekazu Suzuki, Akira Watanabe Graduate School of Science and Technology, Meijo University
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More information[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions
[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open
More informationP a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection
P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:
More informationSUSE Linux Enterprise 15. #MultimodalOS
SUSE Linux Enterprise 15 #MultimodalOS SUSE is Redefining What it Means to be Open Open Source Community Customers & Partners Committed to open source Being a leader and contributor within the open source
More informationDiscovering ZENworks 11
ZENworks Take Advantage of One Unified Management Console and Agent with ZENworks 11 Since ZENworks 7 launched in 2006, the Micro Focus ZENworks family of products has provided thousands of businesses
More informationNetwork Access Transla0on - NAT
Network Access Transla0on - NAT Foreword Those slides have been done by gathering a lot of informa0on on the net Ø Cisco tutorial Ø Lectures from other ins0tu0ons University of Princeton University of
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationIPM Secure Hardening Guidelines
IPM Secure Hardening Guidelines Introduction Due to rapidly increasing Cyber Threats and cyber warfare on Industrial Control System Devices and applications, Eaton recommends following best practices for
More informationEBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud
EBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud Contents Introduction... 3 What is VMware Cloud on AWS?... 5 Customer Benefits of Adopting VMware Cloud on AWS... 6 VMware Cloud
More informationNetwork Services, Cloud Computing and Virtualization
Network Services, Cloud Computing and Virtualization Client Side Virtualization Purpose of virtual machines Resource requirements Emulator requirements Security requirements Network requirements Hypervisor
More informationCisco Security Monitoring, Analysis and Response System 4.2
Q&A Cisco Security Monitoring, Analysis and Response System 4.2 GENERAL Q. What is the Cisco Security Monitoring, Analysis and Response System? A. The Cisco Security Monitoring, Analysis and Response System
More informationShuffling with a Croupier: Nat Aware Peer Sampling
Shuffling with a Croupier: Nat Aware Peer Sampling Jim Dowling Amir H. Payberah {jdowling,amir}@sics.se 1 Introduction 2 Gossip based Protocols Gossip based protocols have been widely used in large scale
More informationGossip Peer Sampling in Real World
Gossip Peer Sampling in Real World Amir H. Payberah (amir@sics.se) 1/55 Gossip Peer Sampling 2/55 Peer Sampling Service The peer sampling service provides each node with a list of nodes in the system.
More informationSCHOOL OF PHYSICAL, CHEMICAL AND APPLIED SCIENCES
PONDICHERRY DEPARTMENT UNIVERSITY OF PHYSICS SCHOOL OF PHYSICAL, CHEMICAL AND APPLIED SCIENCES QUOTATION INVITATION FOR THE PURCHASE OF PROCESSOR SERVER Ref: DST Project "Solitons and Modulational Systems"
More informationVirtualization Overview. Joel Jaeggli AFNOG SS-E 2013
Virtualization Overview Joel Jaeggli AFNOG SS-E 2013 1 What are we using this Year? Mac-mini servers Intel core i7 quad core 8 hyperthreads 16GB of ram 2 x 256GB SATA SSD A pretty hefty server Less than
More informationEMC VPLEX with Quantum Stornext
White Paper Application Enabled Collaboration Abstract The EMC VPLEX storage federation solution together with Quantum StorNext file system enables a stretched cluster solution where hosts has simultaneous
More informationForeScout App for IBM QRadar
How-to Guide Version 2.0.0 Table of Contents About IBM QRadar Integration... 3 Use Cases... 3 Visualization of CounterACT Endpoint Compliance Status & Connectivity... 3 Agent Health and Compliance for
More informationAdvanced Computer Networks. Mobility Support
Advanced Computer Networks 263 3501 00 Mobility Support Patrick Stuedi Spring Semester 2013 Oriana Riva, Department of Computer Science ETH Zürich Last Week WLAN/802.11 Architecture (Infrastructure / Ad
More informationAutomated Deployment of Private Cloud (EasyCloud)
Automated Deployment of Private Cloud (EasyCloud) Mohammed Kazim Musab Al-Zahrani Mohannad Mostafa Moath Al-Solea Hassan Al-Salam Advisor: Dr.Ahmed Khayyat 1 Table of Contents Introduction Requirements
More informationESET Remote Administrator 6. Version 6.0 Product Details
ESET Remote Administrator 6 Version 6.0 Product Details ESET Remote Administrator 6.0 is a successor to ESET Remote Administrator V5.x, however represents a major step forward, completely new generation
More informationBrocade Virtual Traffic Manager and Parallels Remote Application Server
White Paper Parallels Brocade Virtual Traffic Manager and Parallels Deployment Guide 01 Contents Preface...4 About This Guide...4 Audience...4 Contacting Brocade...4 Internet...4 Technical Support...4
More informationNetwork Platform for Creating Services over Virtualized Networks
Network Platform for Creating Services over Virtualized Networks August 24, 2012 Toru Hasegawa KDDI R&D Labs. Outline Introduction Toy Programming Environment Network Platform Example Service Conclusion
More informationSecureFactors. Copyright SecureFactors Corp ver 1.0a
SecureFactors Copyright SecureFactors Corp. 2018 ver 1.0a Table of Contents Introduction... How to Use... Run SF Connector to access systems... SF Console... 1 2 3 10 11 SecureFactors(SF) is a new generation
More informationResilient, crowd-sourced LPWAN infrastructure using blockchain
Resilient, crowd-sourced LPWAN infrastructure using blockchain CryBlock 18, Munich, Germany Arnaud Durand Pascal Gremaud Jacques Pasquier
More informationNetwork Behavior Analysis
N E T W O R K O P E R AT I O N S. S I M P L I F I E D. FORWARD ENTERPRISE HIGHLIGHTS Forward Networks is the leader in Intent-based Networking and network assurance to automate the analysis and verification
More informationABC SBC: Secure Peering. FRAFOS GmbH
ABC SBC: Secure Peering FRAFOS GmbH Introduction While an increasing number of operators have already replaced their SS7 based telecommunication core network with a SIP based solution, the interconnection
More informationLoosely Coupled Actor Systems
Loosely Coupled Actor Systems for the Internet of Things Raphael Hiesgen Internet Technologies Group Hamburg University of Applied Sciences Agenda Introduction Where We Are Next Steps Risks and Conclusion
More informationSystem Requirements. Network Administrator Guide
System Requirements Network Administrator Guide 1 Beam Network Administrator Guide Suitable Technologies, Inc. May 2018 Beam is a comprehensive Presence System that couples high-end video, high-end audio,
More informationBarracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215
More informationA Cloud in Every Home. Host servers at home with zero sysadmin skills
A Cloud in Every Home Host servers at home with zero sysadmin skills $ whoami Nolan Leake Linux user/developer since 1995 Hosted my own email/web/etc since 2001. Cumulus Linux Linux for network switches
More informationManual Ftp Windows Server 2008 R2 Firewall Login Failed
Manual Ftp Windows Server 2008 R2 Firewall Login Failed Server are registered trademarks of Microsoft Corporation in the United States and/or other countries. Case File: Custom FTP command response. 101
More informationRequest for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )
Appendix 1 1st Tier Firewall The Solution shall be rack-mountable into standard 19-inch (482.6-mm) EIA rack. The firewall shall minimally support the following technologies and features: (a) Stateful inspection;
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 25 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer peer-to-peer systems overview
More informationNetwork Security Protection Alternatives for the Cloud
A Trend Micro White Paper May 2016 Network Security Protection Alternatives for the Cloud» A technical brief summarizing the deployment options that can be used to deploy IDS/IPS protection for cloud instances
More informationIJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology
ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud
More information