ECIT Institute (Est.2003)

Size: px
Start display at page:

Download "ECIT Institute (Est.2003)"

Transcription

1

2 ECIT Institute (Est.2003) Research Excellence & Innovation 180 people 4 Queen s University Belfast Research Groups - Digital Communications - High Frequency Electronics - Speech, Imaging and Vision Systems - Secure Digital Systems

3 CSIT (Est.2009) A GLOBAL INNOVATION HUB FOR CYBER SECURITY NETWORK SECURITY DATA SECURITY CYBER PHYSICAL SYSTEMS MOBILE SECURITY OPEN INNOVATION TIERED MEMBERSHIP KNOWLEDGE TRANSFER VENTURE CREATION

4 CSIT (Est.2009) A GLOBAL INNOVATION HUB FOR CYBER SECURITY Accelerating Value Creation New Venture Creation Building Capacity

5 CSIT (Est.2009) A GLOBAL INNOVATION HUB FOR CYBER SECURITY Accelerating Value Creation New Venture Creation Building Capacity New Products New Solution

6 CSIT (Est.2009) A GLOBAL INNOVATION HUB FOR CYBER SECURITY Accelerating Value Creation New Venture Creation Building Capacity New Products New Solution Spin-Outs FDI

7 CSIT (Est.2009) A GLOBAL INNOVATION HUB FOR CYBER SECURITY Accelerating Value Creation New Venture Creation Building Capacity New Products New Solution Spin-Outs FDI Go-To Place Spill-over

8 Centre for Secure Information Technologies (CSIT) Est.2009, Based in The ECIT Institute Initial funding over 30M 80 People Researchers Engineers Business Development Largest UK University lab for cyber security technology research GCHQ Academic Centre of Excellence Industry Informed Open Innovation Model Strong international links ETRI, CyLab, GTRI, SRI International Cyber Security Technology Summit

9 Open Innovation - Members Open Innovation / Tiered Membership

10 Network Security Systems Network Security IDS / IPS, DDoS mitigation Cloud Security SDN, Virtualisation SCADA & Smart Grid Security DDoS mitigation Mobile Malware Analysis Reverse engineering Signature extraction Prof. Sakir Sezer Research Director

11 Security in Software-Defined Networking Dr. Sandra Scott-Hayward August 2013

12 Software-Defined Networking (SDN) Platform Security in SDN Security Enhancement using SDN Security Challenges with SDN CSIT SDN Security Contributions Open Areas for Research

13 Traditional Network Control and Data Planes combined in Network Elements: Control Packet Forwarding Hardware Control Packet Forwarding Hardware Control Packet Forwarding Hardware Control Packet Forwarding Hardware

14 SDN Evolution Driven by desire to provide user-controlled management of forwarding in network nodes Software-Defined Networking

15 SDN Separation of Control and Data Planes: Open API APP APP APP Controller Packet Forwarding Hardware Open API Packet Forwarding Hardware Packet Forwarding Hardware Packet Forwarding Hardware

16 SDN Architecture Sezer, S., et al. Are We Ready for SDN? Implementation Challenges for Software-Defined Networks IEEE Communications Magazine, July 2013

17 Network Functions Virtualization Network Functions Virtualization implementation of network functions in software that can run on a range of industry standard server hardware, and that can be moved to, or instantiated in, various locations in the network as required Network Functions Virtualisation Introductory White Paper, October

18 Security Enhancements Using SDN Security Policy Controller Switch Switch Switch Security Service Insertion Controller Security Middlebox e.g. IDS Switch Switch Network Forensics Re-programme Analyze Network Update Policy

19 Security Products - SDN

20 Security Challenges with SDN Central Controller Single Point of ONIX Failure (Distributed State) or Controller Replication Mutual (Controller-Switch) Controller Impersonation Authentication with TLS (Transport Layer Security) Role-based Authorization Conflicting Application e.g. Policies FortNOX Policy Conflict Resolution e.g. VeriFlow, NICE, FlowChecker

21 Security Challenges with SDN Increased potential for Denial of Service: Switch Buffer Flow Table State Table Data Flows/Processes R. Kloti, Openflow: A Security Analysis, Swiss Federal Institute of Technology Zurich, Zurich, Switzerland, 2013.

22 Implementing OpenFlow Controller First Packet Flow Table 5-tuple SP DP Prot SA DA Hash # Execute Action Subsequent Packets Packet In Hdr Payload Hdr Payload Packet Out

23 Data Store DoS Challenge MEMORY

24 CSIT Contributions - SDN Security Lookup Acceleration for Multi-Gigabit SDN M E M O R Y Real-time traffic monitoring, analytics and forensics tools for SDN Security of SDN Applications

25 Open Areas for Research Advanced Persistent Threats Adaptive CyberSecurity Moving Target Defense Dynamic Defense

26 References R. Kloti, Openflow: A Security Analysis, Swiss Federal Institute of Technology Zurich, Zurich, Switzerland, M. Canini, D. Venzano, P. Perevsíni, D. Kostić, and J. Rexford, A NICE way to test openflow applications, in Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, Berkeley, CA, USA, 2012, pp E. Al-Shaer and S. Al-Haj, FlowChecker: configuration analysis and verification of federated openflow infrastructures, in Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, New York, NY, USA, 2010, pp A. Khurshid, W. Zhou, M. Caesar, and P. B. Godfrey, Veriflow: verifying network-wide invariants in real time, SIGCOMM Comput Commun Rev, vol. 42, no. 4, pp , Sep P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, A security enforcement kernel for OpenFlow networks, in Proceedings of the first workshop on Hot topics in software defined networks, New York, NY, USA, 2012, pp T. Koponen et al., Onix: A Distributed Control Platform for Large-scale Production Networks, in OSDI, 2010.

27 Thank you! Questions?

28 CSIT: A Global Cyber Innovation Hub Thought leader in Secure Information Technology Research Network of Commercial & Research partnerships Portfolio of successful Technology Transfer

SDN An opportunity for security by design?

SDN An opportunity for security by design? SDN An opportunity for security by design? IEEE NetSoft Sec-VirtNet 2016 Sandra Scott-Hayward 10 June 2016 @CSIT_QUB Presenter Bio Dr Sandra Scott-Hayward, CEng CISSP CEH OCSA Senior Research Engineer

More information

OperationCheckpoint: SDN Application Control

OperationCheckpoint: SDN Application Control OperationCheckpoint: SDN Application Control Scott-Hayward, S., Kane, C., & Sezer, S. (2014). OperationCheckpoint: SDN Application Control. In The 22nd IEEE International Conference on Network Protocols

More information

SDN AND NFV SECURITY DR. SANDRA SCOTT-HAYWARD, QUEEN S UNIVERSITY BELFAST COINS SUMMER SCHOOL, 23 JULY 2018

SDN AND NFV SECURITY DR. SANDRA SCOTT-HAYWARD, QUEEN S UNIVERSITY BELFAST COINS SUMMER SCHOOL, 23 JULY 2018 SDN AND NFV SECURITY DR. SANDRA SCOTT-HAYWARD, QUEEN S UNIVERSITY BELFAST COINS SUMMER SCHOOL, 23 JULY 2018 Queen s University Belfast Lanyon Building Est. 1845 Centre for Secure Information Technologies

More information

Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: (2014) ISSN :

Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: (2014) ISSN : 2347 OpenFlow Security Threat Detection and Defense Services Wanqing You Department of Computer Science, Southern Polytechnic State University, Georgia Email: wyou@spsu.edu Kai Qian Department of Computer

More information

SDN Security: A Survey

SDN Security: A Survey SDN Security: A Survey Scott-Hayward, S., O'Callaghan, G., & Sezer, S. (2013). SDN Security: A Survey. In 2013 IEEE SDN for Future Networks and Services (SDN4FNS) (pp. 1-7). Institute of Electrical and

More information

Software-Defined Networking. Daphné Tuncer Department of Computing Imperial College London (UK)

Software-Defined Networking. Daphné Tuncer Department of Computing Imperial College London (UK) Software-Defined Networking Daphné Tuncer Department of Computing Imperial College London (UK) dtuncer@ic.ac.uk 25/10/2018 Agenda Part I: Principles of Software-Defined Networking (SDN) 1. Why a lecture

More information

SDN-GUARD: Protecting SDN Controllers Against SDN Rootkits

SDN-GUARD: Protecting SDN Controllers Against SDN Rootkits SDN-GUARD: Protecting SDN Controllers Against SDN Rootkits Dennis Tatang, Florian Quinkert, Joel Frank, Christian Röpke, and Thorsten Holz Horst Görtz Institute for IT-Security (HGI) Ruhr-University Bochum,

More information

Formal Verification of Computer Switch Networks

Formal Verification of Computer Switch Networks Formal Verification of Computer Switch Networks Sharad Malik; Department of Electrical Engineering; Princeton Univeristy (with Shuyuan Zhang (Princeton), Rick McGeer (HP Labs)) 1 SDN: So what changes for

More information

Design and deployment of secure, robust, and resilient SDN Controllers

Design and deployment of secure, robust, and resilient SDN Controllers Design and deployment of secure, robust, and resilient SDN Controllers Sandra Scott-Hayward Centre for Secure Information Technology (CSIT), Queen s University Belfast, Belfast, BT3 9DT, N. Ireland Email:

More information

Security Research for Software Defined Network

Security Research for Software Defined Network , pp.87-93 http://dx.doi.org/10.14257/astl.2016.134.15 Security Research for Software Defined Network 1 Jianfei Zhou, 2 Na Liu 1 Admission and Employment Office, Chongqing Industry Polytechnic College

More information

Future of DDoS Attacks Mitigation in Software Defined Networks

Future of DDoS Attacks Mitigation in Software Defined Networks Future of DDoS Attacks Mitigation in Software Defined Networks Martin Vizváry, Jan Vykopal To cite this version: Martin Vizváry, Jan Vykopal. Future of DDoS Attacks Mitigation in Software Defined Networks.

More information

Strengthening Network Security: An SDN (Software Defined Networking) Approach

Strengthening Network Security: An SDN (Software Defined Networking) Approach Strengthening Network Security: An SDN (Software Defined Networking) Approach Pradeep Kumar Sharma 1, Dr. S. S. Tyagi 2 1 Ph.D Research Scholar, Computer Science & Engineering, MRIU, Faridabad, Haryana,

More information

Vulnerabilities of network OS and mitigation with state-based permission system

Vulnerabilities of network OS and mitigation with state-based permission system SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:1971 1982 Published online 26 October 2015 in Wiley Online Library (wileyonlinelibrary.com)..1369 RESEARCH ARTICLE Vulnerabilities of

More information

FlowRanger: A Request Prioritizing Algorithm for Controller DoS Attacks in Software Defined Networks

FlowRanger: A Request Prioritizing Algorithm for Controller DoS Attacks in Software Defined Networks FlowRanger: A Request Prioritizing Algorithm for Controller DoS Attacks in Software Defined Networks Lei Wei School of Computer Engineering Nanyang Technological University Singapore Carol Fung Dept. of

More information

NCCoE TRUSTED CLOUD: A SECURE SOLUTION

NCCoE TRUSTED CLOUD: A SECURE SOLUTION SESSION ID: SPO1-W14 NCCoE TRUSTED CLOUD: A SECURE SOLUTION Donna Dodson Associate Director Chief Cyber Security Advisor of the Information Technology Laboratory, Chief Cybersecurity Advisor for the National

More information

Building Security Services on top of SDN

Building Security Services on top of SDN Building Security Services on top of SDN Gregory Blanc Télécom SudParis, IMT 3rd FR-JP Meeting on Cybersecurity WG7 April 25th, 2017 Keio University Mita Campus, Tokyo Table of Contents 1 SDN and NFV as

More information

SDPMN: Privacy Preserving MapReduce Network Using SDN

SDPMN: Privacy Preserving MapReduce Network Using SDN 1 SDPMN: Privacy Preserving MapReduce Network Using SDN He Li, Hai Jin arxiv:1803.04277v1 [cs.dc] 12 Mar 2018 Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer

More information

What makes a hot topic hot? An NSF Perspective

What makes a hot topic hot? An NSF Perspective What makes a hot topic hot? An NSF Perspective August 2015 Jeremy Epstein Program Officer National Science Foundation SRI International NSF Mission Mission: promote the progress of science; to advance

More information

ControllerSEPA: A Security-Enhancing SDN Controller Plug-in for OpenFlow Applications

ControllerSEPA: A Security-Enhancing SDN Controller Plug-in for OpenFlow Applications 2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies ControllerSEPA: A Security-Enhancing SDN Controller Plug-in for OpenFlow Applications Yuchia Tseng

More information

SMART. Investing in urban innovation

SMART. Investing in urban innovation SMART Investing in urban innovation What Smart Belfast? Belfast has ambitious plans for the future. Building on our economic revival, we want to make our city an outstanding place to live, work and invest.

More information

CS 4226: Internet Architecture

CS 4226: Internet Architecture Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:

More information

Using SDN and NFV to Realize a Scalable and Resilient Omni-Present Firewall

Using SDN and NFV to Realize a Scalable and Resilient Omni-Present Firewall Institute of Computer Science Chair of Communication Networks Prof. Dr.-Ing. P. Tran-Gia Using SDN and NFV to Realize a Scalable and Resilient Omni-Present Firewall comnet.informatik.uni-wuerzburg.de SarDiNe

More information

SDN-based Defending against ARP Poisoning Attack

SDN-based Defending against ARP Poisoning Attack Journal of Advances in Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sari Branch, Islamic Azad University, Sari, I.R.Iran (Vol. 8, No. 2, May 2017), Pages: 95- www.jacr.iausari.ac.ir SDN-based

More information

The Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b

The Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) The Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b

More information

Enabling a Cyber-Resilient and Secure Energy Infrastructure with Software-Defined Networking

Enabling a Cyber-Resilient and Secure Energy Infrastructure with Software-Defined Networking Enabling a Cyber-Resilient and Secure Energy Infrastructure with Software-Defined Networking 1 Dong (Kevin) Jin Department of Computer Science Illinois Institute of Technology SoS Lablet/R2 Monthly Meeting,

More information

HK ASTRI FinTech Initiative

HK ASTRI FinTech Initiative HK ASTRI FinTech Initiative October 2016 HK Financial Services Industry (FSI) FSI: one of HK s four pillar industries HK ranked third in the Global Financial Centres Index (GFCI) by London released in

More information

OPENFLOW CONTROLLER-BASED SDN:SECURITY ISSUES AND COUNTERMEASURES

OPENFLOW CONTROLLER-BASED SDN:SECURITY ISSUES AND COUNTERMEASURES DOI: http://dx.doi.org/10.26483/ijarcs.v9i1.5498 ISSN No. 0976-5697 Volume 9, No. 1, January-February 2018 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online

More information

Data Plane Verification and Anteater

Data Plane Verification and Anteater Data Plane Verification and Anteater Brighten Godfrey University of Illinois Work with Haohui Mai, Ahmed Khurshid, Rachit Agarwal, Matthew Caesar, and Sam King Summer School on Formal Methods and Networks

More information

5 Steps to Government IT Modernization

5 Steps to Government IT Modernization 5 Steps to Government IT Modernization 1 WHY MODERNIZE? IT modernization is intimidating, but it s necessary. What are the advantages of modernization? Enhance citizen experience and service delivery Lower

More information

Advanced Computer Networks. Network Virtualization

Advanced Computer Networks. Network Virtualization Advanced Computer Networks 263 3501 00 Network Virtualization Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Outline Last week: Portland VL2 Today Network

More information

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric

More information

Are We Ready for SDN? Implementation Challenges for Software- Defined Networks

Are We Ready for SDN? Implementation Challenges for Software- Defined Networks Are We Ready for SDN? Implementation Challenges for Software- Defined Networks Sezer, S., Scott-Hayward, S., Chouhan, P. K., Fraser, B., Lake, D., Finnegan, J.,... Rao, N. (2013). Are We Ready for SDN?

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

Security improvement in IOT based on Software

Security improvement in IOT based on Software International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 122 Security improvement in IOT based on Software Raghavendra Reddy, Manoj Kumar, Dr K K Sharma Abstract With the

More information

On the State of the Inter-domain and Intra-domain Routing Security

On the State of the Inter-domain and Intra-domain Routing Security On the State of the Inter-domain and Intra-domain Routing Security Mingwei Zhang April 19, 2016 Mingwei Zhang Internet Routing Security 1 / 54 Section Internet Routing Security Background Internet Routing

More information

OSIsoft Technologies for the Industrial IoT and Industry 4.0

OSIsoft Technologies for the Industrial IoT and Industry 4.0 OSIsoft Technologies for the Industrial IoT and Industry 4. Dan Lopez, Senior Systems Engineer Wednesday November 27 Industry 4. and Industrial IoT The Development of Industry 4. Industry. Industry 2.

More information

Towards Management of Software-Driven Networks

Towards Management of Software-Driven Networks Towards Management of Software-Driven Networks 3rd ETSI Future Networks Workshop Sophia Antipolis 9 th April 2013 Prof. Alex Galis University College London a.galis@ucl.ac.uk Content List SDN Context and

More information

Innovations in Softwaredefined

Innovations in Softwaredefined Innovations in Softwaredefined Networking (SDN) The SDN Journey Jacob Rapp, Sr. Manager SDN Marketing, HP Networking Vision for the future of networking Focus less on managing infrastructure and more on

More information

OSIsoft Technologies for the Industrial IoT and Industry 4.0 Chris Felts, Sr. Product Manager Houston Regional Seminar, October 4, 2017

OSIsoft Technologies for the Industrial IoT and Industry 4.0 Chris Felts, Sr. Product Manager Houston Regional Seminar, October 4, 2017 OSIsoft Technologies for the Industrial IoT and Industry 4. Chris Felts, Sr. Product Manager Houston Regional Seminar, October 4, 27 Copyright 27 OSIsoft, LLC Introduction Copyright 27 OSIsoft, LLC 2 Industry

More information

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales The Industrialization of Hacking Sophisticated Attacks, Complex Landscape Hacking Becomes an Industry Phishing,

More information

VeriFlow: Verifying Network-Wide Invariants in Real Time

VeriFlow: Verifying Network-Wide Invariants in Real Time VeriFlow: Verifying Network-Wide Invariants in Real Time Ahmed Khurshid, Wenxuan Zhou, Matthew Caesar, P. Brighten Godfrey Department of Computer Science University of Illinois at Urbana-Champaign 201

More information

Securing the Software-Defined Network Control Layer

Securing the Software-Defined Network Control Layer Securing the Software-Defined Network Control Layer Speaker: Yuyan Lin 2017/5/9 P. Porras, S. Cheung, M. Fong, K. Skinner, and V. Yegneswaran, Securing the Software Defined Network Control Layer, In NDSS,

More information

Software Defined Networking Data centre perspective: Open Flow

Software Defined Networking Data centre perspective: Open Flow Software Defined Networking Data centre perspective: Open Flow Seminar: Prof. Timothy Roscoe & Dr. Desislava Dimitrova D. Dimitrova, T. Roscoe 04.03.2016 1 OpenFlow Specification, protocol, architecture

More information

DDoS Detection in SDN Switches using Support Vector Machine Classifier

DDoS Detection in SDN Switches using Support Vector Machine Classifier Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) DDoS Detection in SDN Switches using Support Vector Machine Classifier Xue Li1, a *, Dongming Yuan2,b, Hefei

More information

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure

More information

Verasys Enterprise Security and IT Guide

Verasys Enterprise Security and IT Guide Verasys Enterprise Johnson Controls Milwaukee WI, USA www.verasyscontrols.com LIT-12013026 March 2018 Contents Introduction... 3 Microsoft Azure security and privacy... 5 Security... 5 Privacy...5 Compliance...5

More information

Cyber Defense Operations Center

Cyber Defense Operations Center Cyber Defense Operations Center Providing world-class security protection, detection, and response Marek Jedrzejewicz Principal Security Engineering Manager Microsoft Corporation 1 Cybersecurity. In the

More information

National Cybersecurity Center of Excellence

National Cybersecurity Center of Excellence The 3rd Annual Intelligence and National Security Forum Jim McCarthy NIST / NCCoE 05/11/2018 This presentation is unclassified in its entirety Foundations Collaborative Hub The NCCoE assembles experts

More information

Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN

Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN Pedro Heleno Isolani Juliano Araujo Wickboldt Cristiano Bonato Both Lisandro Zambenedetti Granville Juergen Rochol July 16,

More information

Security Considerations in M2M Communications

Security Considerations in M2M Communications Security Considerations in M2M Communications Applied Research Issues & Projects in the Austrian Institute of Technology (AIT) Dr. Markus Tauber Project Manager, ICT Security, Future Networks and Services,

More information

Modeling Analysis of Intelligent Manufacturing System Based on Software Defined Networks

Modeling Analysis of Intelligent Manufacturing System Based on Software Defined Networks Modeling Analysis of Intelligent Manufacturing System Based on Software Defined Networks Yun Bai Department of Information & Telecommunication Engineering Beijing Key Laboratory of Network System Architecture

More information

Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS

Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS 1 REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 Public reporting burden for this collection of information

More information

Improving SCADA System Security

Improving SCADA System Security Improving SCADA System Security NPCC 2004 General Meeting Robert W. Hoffman Manager, Cyber Security Research Department Infrastructure Assurance and Defense Systems National Security Division, INEEL September

More information

A MULTI PLANE NETWORK MONITORING AND DEFENSE FRAMEWORK FOR SDNOPERATIONAL SECURITY

A MULTI PLANE NETWORK MONITORING AND DEFENSE FRAMEWORK FOR SDNOPERATIONAL SECURITY A MULTI PLANE NETWORK MONITORING AND DEFENSE FRAMEWORK FOR SDNOPERATIONAL SECURITY Prabhakar Krishnan and Jisha S Najeem Amrita Center for Cyber security Systems and Networks Amrita School of Engineering,

More information

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect

More information

A Hypothesis Testing Framework for Network Security

A Hypothesis Testing Framework for Network Security A Hypothesis Testing Framework for Network Security P. Brighten Godfrey University of Illinois at Urbana-Champaign TSS Seminar, September 15, 2015 Part of the SoS Lablet with David Nicol Kevin Jin Matthew

More information

Botnets: A Survey. Rangadurai Karthick R [CS10S009] Guide: Dr. B Ravindran

Botnets: A Survey. Rangadurai Karthick R [CS10S009] Guide: Dr. B Ravindran 08-08-2011 Guide: Dr. B Ravindran Outline 1 Introduction 2 3 4 5 6 2 Big Picture Recent Incidents Reasons for Study Internet Scenario Major Threats Flooding attacks Spamming Phishing Identity theft, etc.

More information

Using libnetvirt to control the virtual network

Using libnetvirt to control the virtual network Using libnetvirt to control the virtual network Daniel Turull, Markus Hidell, Peter Sjödin KTH Royal Institute of Technology, School of ICT Kista, Sweden Email: {danieltt,mahidell,psj}@kth.se Abstract

More information

A fast method of verifying network routing with back-trace header space analysis

A fast method of verifying network routing with back-trace header space analysis A fast method of verifying network routing with back-trace header space analysis Toshio Tonouchi Satoshi Yamazaki Yutaka Yakuwa Nobuyuki Tomizawa Knowledge Discovery Laboratories, NEC Kanagawa, Japan Abstract

More information

Software Defined Networking Security: Security for SDN and Security with SDN. Seungwon Shin Texas A&M University

Software Defined Networking Security: Security for SDN and Security with SDN. Seungwon Shin Texas A&M University Software Defined Networking Security: Security for SDN and Security with SDN Seungwon Shin Texas A&M University Contents SDN Basic Operation SDN Security Issues SDN Operation L2 Forwarding application

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

ARC BRIEF. Software-defined Industrial Networks Deliver Cybersecurity Breakthroughs. Keywords. Summary. By Harry Forbes

ARC BRIEF. Software-defined Industrial Networks Deliver Cybersecurity Breakthroughs. Keywords. Summary. By Harry Forbes ARC BRIEF JUNE 8, 2017 Software-defined Industrial Networks Deliver Cybersecurity Breakthroughs By Harry Forbes Keywords Critical Infrastructure, Cybersecurity, OpenFlow, SDN, Security, SEL, Software-defined

More information

lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00

lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00 lecture 18: network virtualization platform (NVP) 5590: software defined networking anduo wang, Temple University TTLMAN 401B, R 17:30-20:00 Network Virtualization in multi-tenant Datacenters Teemu Koponen.,

More information

A Software-Defined Networking Security Controller Architecture. Fengjun Shang, Qiang Fu

A Software-Defined Networking Security Controller Architecture. Fengjun Shang, Qiang Fu 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Software-Defined Networking Security Controller Architecture Fengjun Shang, Qiang Fu College of Computer Science

More information

National Cybersecurity Center of Excellence

National Cybersecurity Center of Excellence National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Briefing to ITEA Cyber Workshop 29 March 2017 STRATEGY VISION ADVANCE CYBERSECURITY

More information

Green California Summit. Paul Clanon Executive Director California Public Utilities Commission April 19, 2011

Green California Summit. Paul Clanon Executive Director California Public Utilities Commission April 19, 2011 Green California Summit Paul Clanon Executive Director California Public Utilities Commission April 19, 2011 1 Presentation Overview What is Smart Grid Why Smart Grid California s Commitment to Smart Grid

More information

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges Do You Have A Firewall Around Your Cloud? California Cybersecurity Education Summit 2018 Tyson Moler Oracle Security, North America Public Sector Conquering The Big Threats & Challenges Real Life Threats

More information

Sofware Defined Networking Architecture and Openflow Network Topologies

Sofware Defined Networking Architecture and Openflow Network Topologies Sofware Defined Networking Architecture and Openflow Network Topologies Fahad Kameez, M.Tech.(VLSI and ES) Department of Electronics and Communication Rashtreeya Vidyalaya College of Engineering Bengaluru,

More information

Towards Policy Enforcement Point as a Service (PEPS)

Towards Policy Enforcement Point as a Service (PEPS) Towards Policy Enforcement Point as a Service (PEPS) Shaghaghi, A., Kaafar, M. A.. D., Scott-Hayward, S., Kanhere, S. S., & Jha, S. (2017). Towards Policy Enforcement Point as a Service (PEPS). In Proceedings

More information

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline PRESENTED BY: RICH BIBLE, EMEA SILVERLINE SA November 22, 2018 1 2018 F5 NETWORKS DDoS and Application Attack

More information

Self-driving Datacenter: Analytics

Self-driving Datacenter: Analytics Self-driving Datacenter: Analytics George Boulescu Consulting Systems Engineer 19/10/2016 Alvin Toffler is a former associate editor of Fortune magazine, known for his works discussing the digital revolution,

More information

J. Haadi Jafarian CV June J. Haadi Jafarian

J. Haadi Jafarian CV June J. Haadi Jafarian J. Haadi Jafarian Assistant Professor Dept. of Computer Science and Engineering University of Colorado Denver 704-408-3264 haadi.jafarian@ucdenver.edu EDUCATION Ph.D. 2017 University of North Carolina

More information

Sherenaz Waleed Al-Haj Baddar

Sherenaz Waleed Al-Haj Baddar Sherenaz Waleed Al-Haj Baddar s.alhajbaddar@gmail.coms.baddar@ju.edu.jo Personal Information Nationality: Jordanian Current Employer: King Abdullah II School for Information Technology, The University

More information

Software Defined Networking

Software Defined Networking Software Defined Networking 1 2 Software Defined Networking Middlebox Switch Controller Switch Switch Server Server Server Server Standardization: switches support a vendor-agnostic, open API Off-device

More information

SANS Vendor Offerings Detail

SANS Vendor Offerings Detail SANS Vendor Offerings Detail After working with SANS for a few years now, the audience at SANS events and webinars continues to represent some of the most forward thinking IT security practitioners looking

More information

Introduction to SDN (Soft ware Defined Net working)

Introduction to SDN (Soft ware Defined Net working) Introduction to SDN (Soft ware Defined Net working) Outline Traditional net workings Net work planes rethought Associate Prof Dr Chaodit Aswakul Net work Research Group Department of Electrical Engineering

More information

Federal Mobility: A Year in Review

Federal Mobility: A Year in Review Federal Mobility: A Year in Review Link: https://www.dhs.gov/csd-mobile Link: https://www.dhs.gov/publication/csd-mobile-device-security-study Vincent Sritapan Cyber Security Division Science and Technology

More information

Altice Labs 5G activities

Altice Labs 5G activities Altice Labs 5G activities IEEE 5G Summit Portugal, Lisbon, ISCTE Luis Miguel Silva 19 January 2017 Altice labs is an Information and Communications Technology company belonging to the Altice Group, a multinational

More information

Executive Order & Presidential Policy Directive 21. Ed Goff, Duke Energy Melanie Seader, EEI

Executive Order & Presidential Policy Directive 21. Ed Goff, Duke Energy Melanie Seader, EEI Executive Order 13636 & Presidential Policy Directive 21 Ed Goff, Duke Energy Melanie Seader, EEI Agenda Executive Order 13636 Presidential Policy Directive 21 Nation Infrastructure Protection Plan Cybersecurity

More information

Insert Title Here. Middleware Architecture for Cloud Based Services 11/18/2014

Insert Title Here.  Middleware Architecture for Cloud Based Services 11/18/2014 Insert Title Here Middleware Architecture for Cloud Based Services 11/18/2014 1 Team Prof. Mohammed Samaka Qatar University Dr. Subharthi Paul Washington Univ in STL Prof. Raj Jain Washington Univ in STL

More information

SDN (Software-Defined Networking) Enabling Network Innovation from Edge

SDN (Software-Defined Networking) Enabling Network Innovation from Edge SDN (Software-Defined Networking) Enabling Network Innovation from Edge Gaogang XIE http://www.fnii.cn http://www.ict.ac.cn Internet 20 Year in China April 20, 1994, NCFC (The National Computing and Networking

More information

Vodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC.

Vodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC. How smart networks are changing the corporate WAN Vodafone keynote Peter Terry Brown Director of Connectivity & UC 17 October 2017 About Vodafone Enterprise Connectivity & UC IoT Cloud & Security Our vision:

More information

UCD Centre for Cybersecurity & Cybercrime Investigation

UCD Centre for Cybersecurity & Cybercrime Investigation UCD Centre for Cybersecurity & Cybercrime Investigation Formally established in 2006 Assist in the fight against cybercrime Capacity Building with international organisations Extensive global stakeholder

More information

OpenADN: A Case for Open Application Delivery Networking

OpenADN: A Case for Open Application Delivery Networking OpenADN: A Case for Open Application Delivery Networking Subharthi Paul, Raj Jain, Jianli Pan Washington University in Saint Louis {Pauls, jain, jp10}@cse.wustl.edu International Conference on Computer

More information

Leveraging SDN & NFV to Achieve Software-Defined Security

Leveraging SDN & NFV to Achieve Software-Defined Security Leveraging SDN & NFV to Achieve Software-Defined Security Zonghua Zhang @imt-lille-douai.fr NEPS: NEtwork Performance and Security Group 2 Topics Anomaly detection, root cause analysis Security evaluation

More information

Bristol Is Open. Dimitra Simeonidou Prof. of High Performance Networks CTO, Bristol Is Open 17/03/15

Bristol Is Open. Dimitra Simeonidou Prof. of High Performance Networks CTO, Bristol Is Open 17/03/15 Bristol Is Open Dimitra Simeonidou Prof. of High Performance Networks CTO, Bristol Is Open 17/03/15 The first Joint Venture between the Council & the University Why are we doing this? How are we doing

More information

En partenariat avec CA Technologies. Genève, Hôtel Warwick,

En partenariat avec CA Technologies. Genève, Hôtel Warwick, SIGS Afterwork Event in Geneva API Security as Part of Digital Transformation Projects The role of API security in digital transformation Nagib Aouini, Head of Cyber Security Services Defense & Cyber Security

More information

Identity-Based Cyber Defense. March 2017

Identity-Based Cyber Defense. March 2017 Identity-Based Cyber Defense March 2017 Attackers Continue to Have Success Current security products are necessary but not sufficient Assumption is you are or will be breached Focus on monitoring, detecting

More information

National Cybersecurity Challenges and NIST. Matthew Scholl Chief Computer Security Division

National Cybersecurity Challenges and NIST. Matthew Scholl Chief Computer Security Division National Cybersecurity Challenges and NIST Matthew Scholl Chief Computer Security Division National Archives The Importance of Standards Article I, Section 8: The Congress shall have the power to fix the

More information

Slicing a Network. Software-Defined Network (SDN) FlowVisor. Advanced! Computer Networks. Centralized Network Control (NC)

Slicing a Network. Software-Defined Network (SDN) FlowVisor. Advanced! Computer Networks. Centralized Network Control (NC) Slicing a Network Advanced! Computer Networks Sherwood, R., et al., Can the Production Network Be the Testbed? Proc. of the 9 th USENIX Symposium on OSDI, 2010 Reference: [C+07] Cascado et al., Ethane:

More information

McAfee MVISION Cloud. Data Security for the Cloud Era

McAfee MVISION Cloud. Data Security for the Cloud Era McAfee MVISION Cloud Data Security for the Cloud Era McAfee MVISION Cloud protects data where it lives today, with a solution that was built natively in the cloud, for the cloud. It s cloud-native data

More information

The SPARKS Project Motivation, Objectives and Results

The SPARKS Project Motivation, Objectives and Results The SPARKS Project Motivation, Objectives and Results Paul Smith paul.smith@ait.ac.at AIT Austrian Institute of Technology SEGRID Project Workshop 14 th November, 2016, Barcelona, Spain The SPARKS Project

More information

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018 Building Partnerships to meet Global Security Challenges Dr. Taylor Eighmy August 14, 2018 Charting Our Cybersecurity Future Cyber UTSA A leader in cyber education since 1999 Undergraduate Masters Doctoral

More information

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience

More information

A Balance of Power: Expressive, Analyzable Controller Programming

A Balance of Power: Expressive, Analyzable Controller Programming A Balance of Power: Expressive, Analyzable Controller Programming Daniel J. Dougherty Worcester Polytechnic Institute dd@cs.wpi.edu Tim Nelson Worcester Polytechnic Institute tn@cs.wpi.edu Kathi Fisler

More information

Orange: Cisco & Orange: a human touch for a digital experience

Orange: Cisco & Orange: a human touch for a digital experience BRKPAR-4667 Orange: Cisco & Orange: a human touch for a digital experience Pierre louis Biaggi, SVP Head of Connectivity Business Unit, Orange Business Services Eric Masseboeuf, Collaboration Head of Business

More information

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013 Trustworthy ICT FP7-ICT-2013-10 Objective 1.5 WP 2013 1 General Overview Focused in a limited number of technologies in emerging application of high economic impact in the security area, Cloud Computing

More information

15-744: Computer Networking. Middleboxes and NFV

15-744: Computer Networking. Middleboxes and NFV 15-744: Computer Networking Middleboxes and NFV Middleboxes and NFV Overview of NFV Challenge of middleboxes Middlebox consolidation Outsourcing middlebox functionality Readings: Network Functions Virtualization

More information

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile Business devices and Continuity data collection. & Cybersecurity Anna Chan, Marketing Director,

More information

Software-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017

Software-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017 Software-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017 Traditional Ethernet Challenges Plug-and-play Allow all ROOT D D D D Nondeterministic Reactive failover Difficult

More information