Wireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada
|
|
- Scot Hodge
- 5 years ago
- Views:
Transcription
1 Wireless Networks Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada More information about this series at
2
3 Sachin Shetty Xuebiao Yuchi Min Song Moving Target Defense for Distributed Systems 123
4 Sachin Shetty Department of Electrical and Computer Engineering Tennessee State University Nashville, TN, USA Xuebiao Yuchi China Internet Network Information Center Chinese Academy of Science Beijing, China Min Song Department of Computer Science Michigan Technological University Houghton, MI, USA ISSN ISSN (electronic) Wireless Networks ISBN ISBN (ebook) DOI / Library of Congress Control Number: Springer International Publishing Switzerland 2016 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer International Publishing AG Switzerland
5 To our families
6
7 Preface Distributed Systems are complex systems, and cyber attacks targeting these systems have devastating consequences. Several cybersecurity solutions have failed to protect distributed systems primarily due to asymmetric warfare with cyber adversaries. Most cybersecurity solutions have to grapple with the tradeoff between detecting one breach vs. blocking all possible breaches. Current cyber threats are sophisticated and comprised of multiple attack vectors caused by organized attackers. Most of the current cyber defenses are blackbox or set-and-forget approaches which can protect against zero-day attacks and are ineffective against dynamic threats. The asymmetric conundrum is to determine which assets (software, embedded devices, routers, back-end infrastructure, dependencies between software components) need to be protected. Recently, Moving Target Defense (MTD) has been proposed as a strategy to protect distributed systems. MTD-based approaches take a leaf out of the adversaries book by not focusing on fortifying every asset and make the systems move to the defender s advantage. MTD is a game-changing capability to protect distributed systems by enabling defenders to change system/network behaviors, policies, or configurations automatically such that potential attack surfaces are moved in an unpredictable manner. MTD is also a cost-effective approach for intrusion detection, active response, and recovery in distributed systems. To realize an effective MTD-based defense, several challenges have to be addressed. This book presents MTD techniques to determine placement of virtual machines in cloud data centers. The techniques focus on secure risk assessment of virtual machines and physical machines in cloud data centers and placement of virtual machines while taking into security risk as a criteria and evaluating cost of MTD. This book is organized as follows: Chapter 1 presents an overview of MTD and the need for research on developing novel MTD schemes at several levels: program (instruction set), host (IP address, memory), cloud computing platform, network, and mobile systems. Chapter 2 presents an approach to perform secure-aware Virtual Machine (VM) migration in cloud data centers. vii
8 viii Preface Chapter 3 presents an approach to develop MTD-based network diversity models. to evaluate the robustness of cloud data centers against potential zero-day attacks. Chapter 4 presents a network-aware VM placement scheme in cloud data centers Chapter 5 presents a cost model to evaluate the cost of MTD in cloud data centers. Nashville, TN, USA Beijing, China Houghton, MI, USA January 2016 Sachin Shetty Xuebiao Yuchi Min Song
9 Acknowledgments First and foremost, we would like to express our warm appreciation to Tennessee State University, Michigan Technological University, and China Internet Network Information Center. Special thanks go to our funding agencies such as the US National Science Foundation, Department of Homeland Security, and Air Force Research Lab. We would also like to express our warm appreciation to Dr. Xuemin Sherman Shen (Professor and University Research Chair in the Department of Electrical and Computer Engineering, University of Waterloo, Ontario, Canada) and the Springer staff who allowed us to publish our work and gave their valuable time to review our book. We would also like to thank the reviewers who provided feedback and suggestions for our book. Finally, we want to thank our families who supported and encouraged us in spite of all the time it took us away from them. Last and not least, we beg forgiveness of all those whose names we have failed to mention. Any suggestions, comments, and feedback for further improvement of the text are welcome. Sachin Shetty, Ph.D. Tennessee State University, USA Xuebiao Yuchi, Ph.D. China Internet Network Information Center, China Min Song, Ph.D. Michigan Technological University, USA ix
10
11 Contents 1 Moving Target Defense in Distributed Systems Introduction Background Cloud Data Center Security Moving Target Defense MTD for Distributed Systems Moving Target Defense and VM Migration Research Challenges with MTD-VM Conclusion... 9 References Security-Aware Virtual Machine Placement in Cloud Data Center Introduction Related Work Security Evaluation VM Vulnerability Identification Physical Machine Security Evaluation Secure Aware VM Placement Simulation Results Discussion Conclusion References Scalable Network Diversity Modeling For Assessing Threats in Cloud Networks Introduction Related Work Background Multiple Levels of Abstraction Scalable Network Diversity Modeling xi
12 xii Contents 3.4 System Model Resource Subgraph Abstraction Hierarchical Resource Graph Abstraction Scalability Comparisons Construction Phase Evaluation Phase Modification Phase Simulation Results Discussion Conclusion and Future Work References Optimizing Network-Aware Resource Allocation in Cloud Data Centers Introduction Related Work Problem Description Proposed Approach Problem Formulation Algorithm Example Experiments Conclusions References Towards a Network-Aware VM Migration: Evaluating the Cost of VM Migration in Cloud Data Centers Introduction Background Software Defined Networking Global Environment for Network Innovations Testbed Related work Technical Approach Implementation and Evaluation of Remedy Emulated Data Center in GENI Virtualization in Emulated Data center VM Workload and Network Flows Managing Network Resources and Enforcing QoS Analysis and Evaluation of Remedy Model Parameters Results Conclusion and Future work References Index... 75
13 Acronyms MTD AWS VM PM IP SDN GENI DNS DHCP IaaS NVD CVSS HTTP SSH NARAMINT TOR KVM QoS OVS NFS RUBiS Moving Target Defense Amazon Web Services Virtual Machine Physical Machine Internet Protocol Software Defined Networking Global Environment for Network Innovations Domain Name System Dynamic Host Control Protocol Infrastructure as a Service National Vulnerability Database Common Vulnerability Scoring System Hyper Text Transfer Protocol Secure Shell Host Network-aware Resource Allocation technique based on Minimumheight Tree procedure Top Of Rack Kernel-Based Virtual Machine Quality of Service Open VSwitch Network File System Rice University Bidding System xiii
14
15 List of Figures Fig. 1.1 Example cloud data center... 4 Fig. 1.2 MTD based VM Migration... 8 Fig. 2.1 Example of VM attack graph Fig. 2.2 VM dependency relations example Fig. 2.3 Overview of the VM placement procedure Fig. 2.4 VM placement algorithm Fig. 2.5 Comparison of survivability Fig. 3.1 An example network system Fig. 3.2 AG of the example network system Fig. 3.3 Multiple-level abstraction of the example network system with AGs in both the upper and the lower level abstraction Fig. 3.4 Example of cloud network Fig. 3.5 RG abstraction for the example network system Fig. 3.6 Hierarchical RG abstraction for the example network system Fig. 3.7 A networked system configuration for simulation Fig. 3.8 Fig. 3.9 Fig Fig A comparison of number of edges between RG and hierarchical RG in the construction phase A comparison of construction time between RG and hierarchical RG in the construction phase A comparison of number of nodes computed between RG and hierarchical RG in the evaluation phase A comparison of evaluation time between RG and hierarchical RG in the evaluation phase Fig. 4.1 Typical network topology inside a data center Fig. 4.2 Data center topology Fig. 4.3 Sub-tree height height(t 0 ) for the placement of 100 VMs Fig. 4.4 The number of selected racks for 100 VMs Fig. 4.5 Communication cost of the placement for 100 VMs xv
16 xvi List of Figures Fig. 4.6 Sub-tree height height(t 0 ) for 600 racks Fig. 4.7 Algorithm stability for 600 racks Fig. 5.1 GENI experimentation Fig. 5.2 System architecture Fig. 5.3 Data center topology Fig. 5.4 GENI testbed Fig. 5.5 Predicted migration times for a 2 GB VM in a 2000 MB/s link capacity network. Page dirty rates in pages/second Fig. 5.6 Predicted migration times for a 2 GB VM in a 20 MB/s link capacity network. Page dirty rates in pages/second Fig. 5.7 Significance of user specified progress amount (X) on prediction of migration times. XD50 MB, MD64 MB, and TD0.1s Fig. 5.8 Significance of user specified progress amount (X) on prediction of migration times. XD250 MB, MD64 MB, and TD0.1s Fig. 5.9 Predicted migration times for a 2 GB Ubuntu VM and 1 Gbps link capacity. Page dirty rates in pages/second Fig Effect of VM migration on iperf flows with/without QoS... 73
17 List of Tables Table 2.1 Groups for VM and physical machine with different security levels Table 2.2 Number of physical machines within each group before and after placement Table 3.1 Complexity comparison between the traditional RG abstraction and the hierarchical RG abstraction procedure Table 4.1 Rack computational capacities Table 4.2 VM requirements in CPU and memory Table 4.3 Communication requirements between VM (MBPS) Table 4.4 Sub-trees search process in NARAMINT Table 5.1 Predicted bandwidth for a 1 GB VM at migration deadline of 330 s Table 5.2 Predicted Bandwidth for a 1 GB VM at migration deadline of 80 s Table 5.3 Predicted Bandwidth for a 1 GB VM at migration deadline of 8 s Table 5.4 Range of progress amount (X MB) values to select for different VM memory sizes Table 5.5 Actual migration times and average ping latencies xvii
Mobile Phone Security and Forensics
Mobile Phone Security and Forensics Iosif I. Androulidakis Mobile Phone Security and Forensics A Practical Approach Second Edition Iosif I. Androulidakis Pedini Ioannina Greece ISBN 978-3-319-29741-5
More informationFailure-Modes-Based Software Reading
SPRINGER BRIEFS IN COMPUTER SCIENCE Yang-Ming Zhu Failure-Modes-Based Software Reading SpringerBriefs in Computer Science More information about this series at http://www.springer.com/series/10028 Yang-Ming
More informationSpringerBriefs in Computer Science
SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin (Sherman) Shen Borko Furht V.S. Subrahmanian Martial Hebert
More informationLow Level X Window Programming
Low Level X Window Programming Ross J. Maloney Low Level X Window Programming An Introduction by Examples 123 Dr. Ross J. Maloney Yenolam Corporation Booragoon, WA Australia ISBN 978-3-319-74249-6 ISBN
More informationResearch on Industrial Security Theory
Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3
More informationPhilip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition
FPGA Design Philip Andrew Simpson FPGA Design Best Practices for Team-based Reuse Second Edition Philip Andrew Simpson San Jose, CA, USA ISBN 978-3-319-17923-0 DOI 10.1007/978-3-319-17924-7 ISBN 978-3-319-17924-7
More informationIntroduction to Computer Networking
Introduction to Computer Networking Thomas G. Robertazzi Introduction to Computer Networking 123 Thomas G. Robertazzi Department of Electrical and Computer Engineering Stony Brook University Stony Brook,
More informationSpringerBriefs in Computer Science
SpringerBriefs in Computer Science Series editors Stan Zdonik, Brown University, Providence, Rhode Island, USA Shashi Shekhar, University of Minnesota, Minneapolis, Minnesota, USA Xindong Wu, University
More informationITIL 2011 At a Glance. John O. Long
ITIL 2011 At a Glance John O. Long SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin Shen Borko Furht VS
More informationComputer Communications and Networks. Series editor A.J. Sammes Centre for Forensic Computing Cranfield University, Shrivenham campus Swindon, UK
Computer Communications and Networks Series editor A.J. Sammes Centre for Forensic Computing Cranfield University, Shrivenham campus Swindon, UK The Computer Communications and Networks series is a range
More informationGuide to OSI and TCP/IP Models
SPRINGER BRIEFS IN COMPUTER SCIENCE Mohammed M. Alani Guide to OSI and TCP/IP Models SpringerBriefs in Computer Science Series editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi
More informationWireless Networks. Series Editor: Xuemin (Sherman) Shen University of Waterloo, Waterloo, Ontario, Canada
Wireless Networks Series Editor: Xuemin (Sherman) Shen University of Waterloo, Waterloo, Ontario, Canada More information about this series at http://www.springer.com/series/14180 Rongxing Lu Privacy-Enhancing
More informationThe Dark Side of Silicon
The Dark Side of Silicon Amir M. Rahmani Pasi Liljeberg Ahmed Hemani Axel Jantsch Hannu Tenhunen Editors The Dark Side of Silicon Energy Efficient Computing in the Dark Silicon Era 123 Editors Amir M.
More informationIntelligent Systems Reference Library
Intelligent Systems Reference Library Volume 145 Series editors Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland e-mail: kacprzyk@ibspan.waw.pl Lakhmi C. Jain, University of Canberra, Canberra,
More informationWhitestein Series in software Agent Technologies. About whitestein Technologies
Whitestein Series in software Agent Technologies Series Editors: Marius Walliser Stefan Brantschen Monique Calisti Thomas Hempfling This series reports new developments in agent-based software technologies
More informationGeorge Grätzer. Practical L A TEX
Practical L A TEX George Grätzer Practical L A TEX 123 George Grätzer Toronto, ON, Canada Additional material to this book can be downloaded from http://extras.springer.com ISBN 978-3-319-06424-6 ISBN
More informationWindows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla
Windows 10 Revealed The Universal Windows Operating System for PC, Tablets, and Windows Phone Kinnary Jangla Windows 10 Revealed Kinnary Jangla Bing Maps San Francisco, California, USA ISBN-13 (pbk): 978-1-4842-0687-4
More informationEssential Angular for ASP.NET Core MVC
Essential Angular for ASP.NET Core MVC Adam Freeman Essential Angular for ASP.NET Core MVC Adam Freeman London, UK ISBN-13 (pbk): 978-1-4842-2915-6 ISBN-13 (electronic): 978-1-4842-2916-3 DOI 10.1007/978-1-4842-2916-3
More informationPolymeric Biomaterials for Tissue Regeneration
Polymeric Biomaterials for Tissue Regeneration Changyou Gao Editor Polymeric Biomaterials for Tissue Regeneration From Surface/Interface Design to 3D Constructs Editor Changyou Gao Department of Polymer
More informationFunctional Programming in R
Functional Programming in R Advanced Statistical Programming for Data Science, Analysis and Finance Thomas Mailund Functional Programming in R: Advanced Statistical Programming for Data Science, Analysis
More informationWide Area 2D/3D Imaging
Wide Area 2D/3D Imaging Benjamin Langmann Wide Area 2D/3D Imaging Development, Analysis and Applications Benjamin Langmann Hannover, Germany Also PhD Thesis, University of Siegen, 2013 ISBN 978-3-658-06456-3
More informationFundamentals of Java Programming
Fundamentals of Java Programming Mitsunori Ogihara Fundamentals of Java Programming 123 Mitsunori Ogihara Department of Computer Science University of Miami Miami, FL, USA ISBN 978-3-319-89490-4 ISBN 978-3-319-89491-1
More informationPro MERN Stack. Full Stack Web App Development with Mongo, Express, React, and Node. Vasan Subramanian
Pro MERN Stack Full Stack Web App Development with Mongo, Express, React, and Node Vasan Subramanian Pro MERN Stack Vasan Subramanian Bangalore, Karnataka, India ISBN-13 (pbk): 978-1-4842-2652-0 ISBN-13
More informationRobust SRAM Designs and Analysis
Robust SRAM Designs and Analysis Jawar Singh Saraju P. Mohanty Dhiraj K. Pradhan Robust SRAM Designs and Analysis 123 Jawar Singh Indian Institute of Information Technology Design and Manufacturing Dumna
More informationEnglish for Academic Research. Series editor Adrian Wallwork Pisa Italy
English for Academic Research Series editor Adrian Wallwork Pisa Italy This series aims to help non-native, English-speaking researchers communicate in English. The books in this series are designed like
More informationSpringerBriefs in Computer Science
SpringerBriefs in Computer Science More information about this series at http://www.springer.com/series/10028 Atle Refsdal Bjørnar Solhaug Ketil Stølen Cyber-Risk Management 123 Atle Refsdal SINTEF ICT
More informationBoston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018
Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your
More informationStefan Waldmann. Topology. An Introduction
Topology Stefan Waldmann Topology An Introduction 123 Stefan Waldmann Julius Maximilian University of Würzburg Würzburg Germany ISBN 978-3-319-09679-7 ISBN 978-3-319-09680-3 (ebook) DOI 10.1007/978-3-319-09680-3
More informationIterative Design of Teaching-Learning Sequences
Iterative Design of Teaching-Learning Sequences Dimitris Psillos Petros Kariotoglou Editors Iterative Design of Teaching- Learning Sequences Introducing the Science of Materials in European Schools Editors
More informationMicrosoft Computer Vision APIs Distilled
Microsoft Computer Vision APIs Distilled Getting Started with Cognitive Services Alessandro Del Sole Microsoft Computer Vision APIs Distilled Alessandro Del Sole Cremona, Italy ISBN-13 (pbk): 978-1-4842-3341-2
More informationAndroid Continuous Integration
Android Continuous Integration Build-Deploy-Test Automation for Android Mobile Apps Pradeep Macharla Android Continuous Integration Pradeep Macharla North Carolina, USA ISBN-13 (pbk): 978-1-4842-2795-4
More informationJava Quick Syntax Reference. Second Edition. Mikael Olsson
Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Mikael Olsson Hammarland, Länsi-Suomi, Finland ISBN-13 (pbk):
More informationHeavy Vehicle Cyber Security Bulletin
Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin
More informationFISMAand the Risk Management Framework
FISMAand the Risk Management Framework The New Practice of Federal Cyber Security Stephen D. Gantz Daniel R. Phi I pott Darren Windham, Technical Editor ^jm* ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON
More information"Charting the Course... MOC 6435 B Designing a Windows Server 2008 Network Infrastructure Course Summary
MOC 6435 B Designing a Windows Network Infrastructure Course Summary Description This five-day course will provide students with an understanding of how to design a Windows Network Infrastructure that
More informationSecurity and networks
Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,
More informationThe Windows 10 Productivity Handbook
The Windows 10 Productivity Handbook Discover Expert Tips, Tricks, and Hidden Features in Windows 10 Mike Halsey The Windows 10 Productivity Handbook Mike Halsey Sheffield, Yorkshire, UK ISBN-13 (pbk):
More informationComputer Communications and Networks. Editor A.J. Sammes Centre for Forensic Computing Cranfield University Shrivenham Campus Swindon, UK
Computer Communications and Networks Editor A.J. Sammes Centre for Forensic Computing Cranfield University Shrivenham Campus Swindon, UK The Computer Communications and Networks series is a range of textbooks,
More informationRonny L. Bull & Dr. Jeanna Matthews. DerbyCon 4.0. Sept 27th, 2014
Layer 2 Network Security in Virtualized Environments Ronny L. Bull & Dr. Jeanna Matthews DerbyCon 4.0 Sept 27th, 2014 The Researchers Ronny Bull Computer Science Ph.D. Graduate Student at Clarkson University
More informationMultidimensional Queueing Models in Telecommunication Networks
Multidimensional Queueing Models in Telecommunication Networks ThiS is a FM Blank Page Agassi Melikov Leonid Ponomarenko Multidimensional Queueing Models in Telecommunication Networks Agassi Melikov Department
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationSachin Shetty Old Dominion University April 10, Cyber Risk Scoring and Mitigation(CRISM)
Sachin Shetty Old Dominion University sshetty@odu.edu April 10, 2019 Cyber Risk Scoring and Mitigation(CRISM) Customer Need - Life in the Security Operation Center Intrusion Detection System alerts Prioritized
More informationBuilding Custom Tasks for SQL Server Integration Services
Building Custom Tasks for SQL Server Integration Services Andy Leonard Building Custom Tasks for SQL Server Integration Services Andy Leonard Farmville, Virginia, USA ISBN-13 (pbk): 978-1-4842-2939-2 ISBN-13
More informationEmbedded and Real-Time Operating Systems
Embedded and Real-Time Operating Systems K.C. Wang Embedded and Real-Time Operating Systems 123 K.C. Wang School of Electrical Engineering and Computer Science Washington State University Pullman, WA USA
More informationJinkun Liu Xinhua Wang. Advanced Sliding Mode Control for Mechanical Systems. Design, Analysis and MATLAB Simulation
Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis and MATLAB Simulation Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis
More informationHOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS
HOLY ANGEL UNIVERSITY LLEGE OF INFORMATION AND MMUNICATIONS TECHNOLOGY CYBER SECURITY URSE SYLLABUS Course Code : 6CSEC Prerequisite : 6MPRO2L Course Credit : 3 Units (2 hours LEC,3 hours LAB) Year Level:
More informationAgile Swift. Swift Programming Using Agile Tools and Techniques. Godfrey Nolan
Agile Swift Swift Programming Using Agile Tools and Techniques Godfrey Nolan Agile Swift: Swift Programming Using Agile Tools and Techniques Godfrey Nolan Huntington Woods, Michigan, USA ISBN-13 (pbk):
More informationComputing with Memory for Energy-Efficient Robust Systems
Computing with Memory for Energy-Efficient Robust Systems Somnath Paul Swarup Bhunia Computing with Memory for Energy-Efficient Robust Systems 123 Somnath Paul Intel Labs Hillsboro, OR, USA Swarup Bhunia
More informationThe GenCyber Program. By Chris Ralph
The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest
More informationSoftware Defined Networking enabled Resilience for IEC based Substation Communication Systems
Author copy. Accepted for publication. Do not redistribute. Software Defined Networking enabled Resilience for IEC 61850-based Substation Communication Systems Hellen Maziku College of Engineering Tennessee
More informationPractical Amazon EC2, SQS, Kinesis, and S3
Practical Amazon EC2, SQS, Kinesis, and S3 A Hands-On Approach to AWS Sunil Gulabani Practical Amazon EC2, SQS, Kinesis, and S3: A Hands-On Approach to AWS Sunil Gulabani Ahmedabad, Gujarat, India ISBN-13
More informationEnterprise Cybersecurity Best Practices Part Number MAN Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationCYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management
CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management Instructor: Dr. Kun Sun Outline 1. Risk management 2. Standards on Evaluating Secure System 3. Security Analysis using Security Metrics
More informationCCNA Cybersecurity Operations 1.1 Scope and Sequence
CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding
More informationEnabling Technologies for Wireless E-Business
Enabling Technologies for Wireless E-Business Weidong Kou Yelena Yesha (Eds.) Enabling Technologies for Wireless E-Business With 141 Figures and 15 Tables ABC Editors Weidong Kou Chinese State Key Laboratory
More informationCyber Security CRA Overview
Cyber Security CRA Overview Patrick McDaniel (PM, PSU) & Edward Colbert (CAM, ARL) cra.psu.edu Approved for public release; distribution is unlimited. Cyber Security Collaborative Research Alliance A Collaborative
More informationCCNA Cybersecurity Operations. Program Overview
Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System
More informationInformation and Network Technology Revised Date 07/26/2012 Implementation Date 08/01/2012
Information and Network Technology Ben Eckart Revised Date 07/26/2012 Implementation Date 08/01/2012 COURSE OUTLINE CRT 286 LAN/WAN Implementation and Support 3 Credit Hours Course Description The focus
More informationJAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).
JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An
More informationAdvanced Data Mining Techniques
Advanced Data Mining Techniques David L. Olson Dursun Delen Advanced Data Mining Techniques Dr. David L. Olson Department of Management Science University of Nebraska Lincoln, NE 68588-0491 USA dolson3@unl.edu
More informationSimulation of Cloud Computing Environments with CloudSim
Simulation of Cloud Computing Environments with CloudSim Print ISSN: 1312-2622; Online ISSN: 2367-5357 DOI: 10.1515/itc-2016-0001 Key Words: Cloud computing; datacenter; simulation; resource management.
More informationThe DETER Testbed: Overview 25 August 2004
The DETER Testbed: Overview 25 August 2004 1. INTRODUCTION The DETER (Cyber Defense Technology Experimental Research testbed is a computer facility to support experiments in a broad range of cyber-security
More informationEnd-to-End Trust, Segmentation and Segregation in the IIoT
End-to-End Trust, Segmentation and Segregation in the IIoT www.blackridge.us Michael Murray - SVP & GM Cyber Physical Systems www.blackridge.us Company Origin BlackRidge technology originated from a Department
More informationRIAL: Resource Intensity Aware Load Balancing in Clouds
RIAL: Resource Intensity Aware Load Balancing in Clouds Liuhua Chen and Haiying Shen and Karan Sapra Dept. of Electrical and Computer Engineering Clemson University, SC, USA 1 Outline Introduction System
More informationAndroid Continuous Integration
Android Continuous Integration Build-Deploy-Test Automation for Android Mobile Apps Pradeep Macharla Android Continuous Integration Build-Deploy-Test Automation for Android Mobile Apps Pradeep Macharla
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More informationVulnerability Assessments and Penetration Testing
CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze
More informationCND Exam Blueprint v2.0
EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding
More informationSummary of Contents LIST OF FIGURES LIST OF TABLES
Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter
More informationSymmetric Cryptographic Protocols
Symmetric Cryptographic Protocols Mahalingam Ramkumar Symmetric Cryptographic Protocols 2123 Mahalingam Ramkumar Mississippi State University Mississippi State Mississippi USA ISBN 978-3-319-07583-9 ISBN
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationPerformance investigation and comparison between virtual networks and physical networks based on Sea-Cloud Innovation Environment
Performance investigation and comparison between virtual networks and physical networks based on Sea-Cloud Innovation Environment Website: http://scie.ac.cn E-mail: scie@cstnet.cn CANS 2015, Chengdu, Sep
More informationCertification Report
Certification Report EAL 2+ Evaluation of Data ONTAP Version 7.2.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme
More informationTraining Guide: Administering Windows Server 2012 Orin Thomas
Training Guide: Administering Windows Server 2012 Orin Thomas Published with the authorization of Microsoft Corporation by: O Reilly Media, Inc. 1005 Gravenstein Highway North Sebastopol, California 95472
More informationEducation Network Security
Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or
More informationPASSAIC COUNTY TECHNICAL INSTITUTE 45 Reinhardt Rd. Wayne, NJ. Information Technology & Network Security III (ITNS III) Course # 1025 Developed 2018
PASSAIC COUNTY TECHNICAL INSTITUTE 45 Reinhardt Rd. Wayne, NJ Information Technology & Network Security III (ITNS III) Course # 1025 Developed 2018 I. Course Description: This course builds on the experience
More informationSmart Grid Communications and Networking
Smart Grid Communications and Networking EKRAM HOSSAIN University of Manitoba, Canada ZHU HAN University of Houston, Texas H. VINCENT POOR Princeton University, New Jersey CAMBRIDGE UNIVERSITY PRESS Contents
More informationSYLLABUS. Departmental Syllabus. Applied Networking I. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus
SYLLABUS DATE OF LAST REVIEW: 1/30/2015 CIP CODE: 11.1006 SEMESTER: COURSE TITLE: COURSE NUMBER: Applied Networking I CRTE0115 CREDIT HOURS: 2 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE: EMAIL:
More informationAn Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)
An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationDesigning and Building a Cybersecurity Program
Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity
More informationData center interconnect for the enterprise hybrid cloud
WHITEPAPER Data center interconnect for the enterprise hybrid cloud The world is moving to the cloud. Everything from entertainment and consumer mobile applications to enterprise software and government
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationSecurity Access in Wireless Local Area Networks
Jianfeng Ma Zhuo Ma Changguang Wang et al. Security Access in Wireless Local Area Networks From Architecture and Protocols to Realization Jianfeng Ma Zhuo Ma Changguang Wang et al. Security Access in Wireless
More informationCyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016
Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception
More informationTree Rule Firewall. A Thesis Submitted for the Degree of. Doctor of Philosophy. Thawatchai Chomsiri. Faculty of Engineering and Information Technology
Tree Rule Firewall A Thesis Submitted for the Degree of Doctor of Philosophy By Thawatchai Chomsiri in Faculty of Engineering and Information Technology UNIVERSITY OF TECHNOLOGY, SYDNEY 17 th November
More information"Charting the Course... MOC D Configuring Windows 8.1 Course Summary
Course Summary Description Get expert instruction and hands-on practice administering and configuring Windows in this 5-day Microsoft Official Course. This course is designed for experienced IT professionals
More informationSCALABLE. Network modeling software for: Development Analysis Testing Cyber Assessment DATASHEET NETWORK TECHNOLOGIES. Virtual Network Model
SCALABLE NETWORK TECHNOLOGIES DATASHEET Network modeling software for: Development Analysis Testing Cyber Assessment EXata software (EXata) is a tool for scientists, engineers, IT technicians and communications
More informationAUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs
AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs WITH PALO ALTO NETWORKS AND REAN CLOUD 1 INTRODUCTION EXECUTIVE SUMMARY Organizations looking to provide developers with a free-range development environment
More informationCSci530 Final Exam. Fall 2014
CSci530 Final Exam Fall 2014 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 120 minutes to complete the exam. Please prepare your answers on
More informationStar: Sla-Aware Autonomic Management of Cloud Resources
Star: Sla-Aware Autonomic Management of Cloud Resources Sakshi Patil 1, Meghana N Rathod 2, S. A Madival 3, Vivekanand M Bonal 4 1, 2 Fourth Sem M. Tech Appa Institute of Engineering and Technology Karnataka,
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationMAX POWER Check Point Firewall Performance Optimization
MAX POWER Check Point Firewall Performance Optimization TABLE OF CONTENTS List of Figures List of Tables Foreword by Dameon D. Welch-Abernathy Preface Why was this book created? How to use this book Conventions
More informationComputer Science Workbench. Editor: Tosiyasu L. Kunii
Computer Science Workbench Editor: Tosiyasu L. Kunii H. Kitagawa T.L. Kunii The U nnortnalized Relational Data Model F or Office Form Processor Design With 78 Figures Springer-Verlag Tokyo Berlin Heidelberg
More informationATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK
PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK INTRODUCTION Attivo Networks has partnered with Cisco Systems to provide advanced real-time inside-the-network
More informationK12 Cybersecurity Roadmap
K12 Cybersecurity Roadmap Introduction Jason Brown, CISSP Chief Information Security Officer Merit Network, Inc jbrown@merit.edu @jasonbrown17 https://linkedin.com/in/jasonbrown17 2 Agenda 3 Why Use the
More informationSYLLABUS. Departmental Syllabus
SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0801 SEMESTER: COURSE TITLE: Networking I COURSE NUMBER: CIST- 0117 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE: EMAIL: PREREQUISITE(S):
More informationMICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY TECHNICAL WHITE PAPER
TECHNICAL WHITE PAPER MICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY Abstract Organizations are in search of ways to more efficiently and securely use IT resources to increase innovation and minimize cost.
More informationStandard Course Outline IS 656 Information Systems Security and Assurance
Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:
More informationIASM Support for FISMA
Introduction Most U.S. civilian government agencies, and commercial enterprises processing electronic data on behalf of those agencies, are concerned about whether and how Information Assurance products
More information