Wireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada

Size: px
Start display at page:

Download "Wireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada"

Transcription

1 Wireless Networks Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada More information about this series at

2

3 Sachin Shetty Xuebiao Yuchi Min Song Moving Target Defense for Distributed Systems 123

4 Sachin Shetty Department of Electrical and Computer Engineering Tennessee State University Nashville, TN, USA Xuebiao Yuchi China Internet Network Information Center Chinese Academy of Science Beijing, China Min Song Department of Computer Science Michigan Technological University Houghton, MI, USA ISSN ISSN (electronic) Wireless Networks ISBN ISBN (ebook) DOI / Library of Congress Control Number: Springer International Publishing Switzerland 2016 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer International Publishing AG Switzerland

5 To our families

6

7 Preface Distributed Systems are complex systems, and cyber attacks targeting these systems have devastating consequences. Several cybersecurity solutions have failed to protect distributed systems primarily due to asymmetric warfare with cyber adversaries. Most cybersecurity solutions have to grapple with the tradeoff between detecting one breach vs. blocking all possible breaches. Current cyber threats are sophisticated and comprised of multiple attack vectors caused by organized attackers. Most of the current cyber defenses are blackbox or set-and-forget approaches which can protect against zero-day attacks and are ineffective against dynamic threats. The asymmetric conundrum is to determine which assets (software, embedded devices, routers, back-end infrastructure, dependencies between software components) need to be protected. Recently, Moving Target Defense (MTD) has been proposed as a strategy to protect distributed systems. MTD-based approaches take a leaf out of the adversaries book by not focusing on fortifying every asset and make the systems move to the defender s advantage. MTD is a game-changing capability to protect distributed systems by enabling defenders to change system/network behaviors, policies, or configurations automatically such that potential attack surfaces are moved in an unpredictable manner. MTD is also a cost-effective approach for intrusion detection, active response, and recovery in distributed systems. To realize an effective MTD-based defense, several challenges have to be addressed. This book presents MTD techniques to determine placement of virtual machines in cloud data centers. The techniques focus on secure risk assessment of virtual machines and physical machines in cloud data centers and placement of virtual machines while taking into security risk as a criteria and evaluating cost of MTD. This book is organized as follows: Chapter 1 presents an overview of MTD and the need for research on developing novel MTD schemes at several levels: program (instruction set), host (IP address, memory), cloud computing platform, network, and mobile systems. Chapter 2 presents an approach to perform secure-aware Virtual Machine (VM) migration in cloud data centers. vii

8 viii Preface Chapter 3 presents an approach to develop MTD-based network diversity models. to evaluate the robustness of cloud data centers against potential zero-day attacks. Chapter 4 presents a network-aware VM placement scheme in cloud data centers Chapter 5 presents a cost model to evaluate the cost of MTD in cloud data centers. Nashville, TN, USA Beijing, China Houghton, MI, USA January 2016 Sachin Shetty Xuebiao Yuchi Min Song

9 Acknowledgments First and foremost, we would like to express our warm appreciation to Tennessee State University, Michigan Technological University, and China Internet Network Information Center. Special thanks go to our funding agencies such as the US National Science Foundation, Department of Homeland Security, and Air Force Research Lab. We would also like to express our warm appreciation to Dr. Xuemin Sherman Shen (Professor and University Research Chair in the Department of Electrical and Computer Engineering, University of Waterloo, Ontario, Canada) and the Springer staff who allowed us to publish our work and gave their valuable time to review our book. We would also like to thank the reviewers who provided feedback and suggestions for our book. Finally, we want to thank our families who supported and encouraged us in spite of all the time it took us away from them. Last and not least, we beg forgiveness of all those whose names we have failed to mention. Any suggestions, comments, and feedback for further improvement of the text are welcome. Sachin Shetty, Ph.D. Tennessee State University, USA Xuebiao Yuchi, Ph.D. China Internet Network Information Center, China Min Song, Ph.D. Michigan Technological University, USA ix

10

11 Contents 1 Moving Target Defense in Distributed Systems Introduction Background Cloud Data Center Security Moving Target Defense MTD for Distributed Systems Moving Target Defense and VM Migration Research Challenges with MTD-VM Conclusion... 9 References Security-Aware Virtual Machine Placement in Cloud Data Center Introduction Related Work Security Evaluation VM Vulnerability Identification Physical Machine Security Evaluation Secure Aware VM Placement Simulation Results Discussion Conclusion References Scalable Network Diversity Modeling For Assessing Threats in Cloud Networks Introduction Related Work Background Multiple Levels of Abstraction Scalable Network Diversity Modeling xi

12 xii Contents 3.4 System Model Resource Subgraph Abstraction Hierarchical Resource Graph Abstraction Scalability Comparisons Construction Phase Evaluation Phase Modification Phase Simulation Results Discussion Conclusion and Future Work References Optimizing Network-Aware Resource Allocation in Cloud Data Centers Introduction Related Work Problem Description Proposed Approach Problem Formulation Algorithm Example Experiments Conclusions References Towards a Network-Aware VM Migration: Evaluating the Cost of VM Migration in Cloud Data Centers Introduction Background Software Defined Networking Global Environment for Network Innovations Testbed Related work Technical Approach Implementation and Evaluation of Remedy Emulated Data Center in GENI Virtualization in Emulated Data center VM Workload and Network Flows Managing Network Resources and Enforcing QoS Analysis and Evaluation of Remedy Model Parameters Results Conclusion and Future work References Index... 75

13 Acronyms MTD AWS VM PM IP SDN GENI DNS DHCP IaaS NVD CVSS HTTP SSH NARAMINT TOR KVM QoS OVS NFS RUBiS Moving Target Defense Amazon Web Services Virtual Machine Physical Machine Internet Protocol Software Defined Networking Global Environment for Network Innovations Domain Name System Dynamic Host Control Protocol Infrastructure as a Service National Vulnerability Database Common Vulnerability Scoring System Hyper Text Transfer Protocol Secure Shell Host Network-aware Resource Allocation technique based on Minimumheight Tree procedure Top Of Rack Kernel-Based Virtual Machine Quality of Service Open VSwitch Network File System Rice University Bidding System xiii

14

15 List of Figures Fig. 1.1 Example cloud data center... 4 Fig. 1.2 MTD based VM Migration... 8 Fig. 2.1 Example of VM attack graph Fig. 2.2 VM dependency relations example Fig. 2.3 Overview of the VM placement procedure Fig. 2.4 VM placement algorithm Fig. 2.5 Comparison of survivability Fig. 3.1 An example network system Fig. 3.2 AG of the example network system Fig. 3.3 Multiple-level abstraction of the example network system with AGs in both the upper and the lower level abstraction Fig. 3.4 Example of cloud network Fig. 3.5 RG abstraction for the example network system Fig. 3.6 Hierarchical RG abstraction for the example network system Fig. 3.7 A networked system configuration for simulation Fig. 3.8 Fig. 3.9 Fig Fig A comparison of number of edges between RG and hierarchical RG in the construction phase A comparison of construction time between RG and hierarchical RG in the construction phase A comparison of number of nodes computed between RG and hierarchical RG in the evaluation phase A comparison of evaluation time between RG and hierarchical RG in the evaluation phase Fig. 4.1 Typical network topology inside a data center Fig. 4.2 Data center topology Fig. 4.3 Sub-tree height height(t 0 ) for the placement of 100 VMs Fig. 4.4 The number of selected racks for 100 VMs Fig. 4.5 Communication cost of the placement for 100 VMs xv

16 xvi List of Figures Fig. 4.6 Sub-tree height height(t 0 ) for 600 racks Fig. 4.7 Algorithm stability for 600 racks Fig. 5.1 GENI experimentation Fig. 5.2 System architecture Fig. 5.3 Data center topology Fig. 5.4 GENI testbed Fig. 5.5 Predicted migration times for a 2 GB VM in a 2000 MB/s link capacity network. Page dirty rates in pages/second Fig. 5.6 Predicted migration times for a 2 GB VM in a 20 MB/s link capacity network. Page dirty rates in pages/second Fig. 5.7 Significance of user specified progress amount (X) on prediction of migration times. XD50 MB, MD64 MB, and TD0.1s Fig. 5.8 Significance of user specified progress amount (X) on prediction of migration times. XD250 MB, MD64 MB, and TD0.1s Fig. 5.9 Predicted migration times for a 2 GB Ubuntu VM and 1 Gbps link capacity. Page dirty rates in pages/second Fig Effect of VM migration on iperf flows with/without QoS... 73

17 List of Tables Table 2.1 Groups for VM and physical machine with different security levels Table 2.2 Number of physical machines within each group before and after placement Table 3.1 Complexity comparison between the traditional RG abstraction and the hierarchical RG abstraction procedure Table 4.1 Rack computational capacities Table 4.2 VM requirements in CPU and memory Table 4.3 Communication requirements between VM (MBPS) Table 4.4 Sub-trees search process in NARAMINT Table 5.1 Predicted bandwidth for a 1 GB VM at migration deadline of 330 s Table 5.2 Predicted Bandwidth for a 1 GB VM at migration deadline of 80 s Table 5.3 Predicted Bandwidth for a 1 GB VM at migration deadline of 8 s Table 5.4 Range of progress amount (X MB) values to select for different VM memory sizes Table 5.5 Actual migration times and average ping latencies xvii

Mobile Phone Security and Forensics

Mobile Phone Security and Forensics Mobile Phone Security and Forensics Iosif I. Androulidakis Mobile Phone Security and Forensics A Practical Approach Second Edition Iosif I. Androulidakis Pedini Ioannina Greece ISBN 978-3-319-29741-5

More information

Failure-Modes-Based Software Reading

Failure-Modes-Based Software Reading SPRINGER BRIEFS IN COMPUTER SCIENCE Yang-Ming Zhu Failure-Modes-Based Software Reading SpringerBriefs in Computer Science More information about this series at http://www.springer.com/series/10028 Yang-Ming

More information

SpringerBriefs in Computer Science

SpringerBriefs in Computer Science SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin (Sherman) Shen Borko Furht V.S. Subrahmanian Martial Hebert

More information

Low Level X Window Programming

Low Level X Window Programming Low Level X Window Programming Ross J. Maloney Low Level X Window Programming An Introduction by Examples 123 Dr. Ross J. Maloney Yenolam Corporation Booragoon, WA Australia ISBN 978-3-319-74249-6 ISBN

More information

Research on Industrial Security Theory

Research on Industrial Security Theory Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3

More information

Philip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition

Philip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition FPGA Design Philip Andrew Simpson FPGA Design Best Practices for Team-based Reuse Second Edition Philip Andrew Simpson San Jose, CA, USA ISBN 978-3-319-17923-0 DOI 10.1007/978-3-319-17924-7 ISBN 978-3-319-17924-7

More information

Introduction to Computer Networking

Introduction to Computer Networking Introduction to Computer Networking Thomas G. Robertazzi Introduction to Computer Networking 123 Thomas G. Robertazzi Department of Electrical and Computer Engineering Stony Brook University Stony Brook,

More information

SpringerBriefs in Computer Science

SpringerBriefs in Computer Science SpringerBriefs in Computer Science Series editors Stan Zdonik, Brown University, Providence, Rhode Island, USA Shashi Shekhar, University of Minnesota, Minneapolis, Minnesota, USA Xindong Wu, University

More information

ITIL 2011 At a Glance. John O. Long

ITIL 2011 At a Glance. John O. Long ITIL 2011 At a Glance John O. Long SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin Shen Borko Furht VS

More information

Computer Communications and Networks. Series editor A.J. Sammes Centre for Forensic Computing Cranfield University, Shrivenham campus Swindon, UK

Computer Communications and Networks. Series editor A.J. Sammes Centre for Forensic Computing Cranfield University, Shrivenham campus Swindon, UK Computer Communications and Networks Series editor A.J. Sammes Centre for Forensic Computing Cranfield University, Shrivenham campus Swindon, UK The Computer Communications and Networks series is a range

More information

Guide to OSI and TCP/IP Models

Guide to OSI and TCP/IP Models SPRINGER BRIEFS IN COMPUTER SCIENCE Mohammed M. Alani Guide to OSI and TCP/IP Models SpringerBriefs in Computer Science Series editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi

More information

Wireless Networks. Series Editor: Xuemin (Sherman) Shen University of Waterloo, Waterloo, Ontario, Canada

Wireless Networks. Series Editor: Xuemin (Sherman) Shen University of Waterloo, Waterloo, Ontario, Canada Wireless Networks Series Editor: Xuemin (Sherman) Shen University of Waterloo, Waterloo, Ontario, Canada More information about this series at http://www.springer.com/series/14180 Rongxing Lu Privacy-Enhancing

More information

The Dark Side of Silicon

The Dark Side of Silicon The Dark Side of Silicon Amir M. Rahmani Pasi Liljeberg Ahmed Hemani Axel Jantsch Hannu Tenhunen Editors The Dark Side of Silicon Energy Efficient Computing in the Dark Silicon Era 123 Editors Amir M.

More information

Intelligent Systems Reference Library

Intelligent Systems Reference Library Intelligent Systems Reference Library Volume 145 Series editors Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland e-mail: kacprzyk@ibspan.waw.pl Lakhmi C. Jain, University of Canberra, Canberra,

More information

Whitestein Series in software Agent Technologies. About whitestein Technologies

Whitestein Series in software Agent Technologies. About whitestein Technologies Whitestein Series in software Agent Technologies Series Editors: Marius Walliser Stefan Brantschen Monique Calisti Thomas Hempfling This series reports new developments in agent-based software technologies

More information

George Grätzer. Practical L A TEX

George Grätzer. Practical L A TEX Practical L A TEX George Grätzer Practical L A TEX 123 George Grätzer Toronto, ON, Canada Additional material to this book can be downloaded from http://extras.springer.com ISBN 978-3-319-06424-6 ISBN

More information

Windows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla

Windows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla Windows 10 Revealed The Universal Windows Operating System for PC, Tablets, and Windows Phone Kinnary Jangla Windows 10 Revealed Kinnary Jangla Bing Maps San Francisco, California, USA ISBN-13 (pbk): 978-1-4842-0687-4

More information

Essential Angular for ASP.NET Core MVC

Essential Angular for ASP.NET Core MVC Essential Angular for ASP.NET Core MVC Adam Freeman Essential Angular for ASP.NET Core MVC Adam Freeman London, UK ISBN-13 (pbk): 978-1-4842-2915-6 ISBN-13 (electronic): 978-1-4842-2916-3 DOI 10.1007/978-1-4842-2916-3

More information

Polymeric Biomaterials for Tissue Regeneration

Polymeric Biomaterials for Tissue Regeneration Polymeric Biomaterials for Tissue Regeneration Changyou Gao Editor Polymeric Biomaterials for Tissue Regeneration From Surface/Interface Design to 3D Constructs Editor Changyou Gao Department of Polymer

More information

Functional Programming in R

Functional Programming in R Functional Programming in R Advanced Statistical Programming for Data Science, Analysis and Finance Thomas Mailund Functional Programming in R: Advanced Statistical Programming for Data Science, Analysis

More information

Wide Area 2D/3D Imaging

Wide Area 2D/3D Imaging Wide Area 2D/3D Imaging Benjamin Langmann Wide Area 2D/3D Imaging Development, Analysis and Applications Benjamin Langmann Hannover, Germany Also PhD Thesis, University of Siegen, 2013 ISBN 978-3-658-06456-3

More information

Fundamentals of Java Programming

Fundamentals of Java Programming Fundamentals of Java Programming Mitsunori Ogihara Fundamentals of Java Programming 123 Mitsunori Ogihara Department of Computer Science University of Miami Miami, FL, USA ISBN 978-3-319-89490-4 ISBN 978-3-319-89491-1

More information

Pro MERN Stack. Full Stack Web App Development with Mongo, Express, React, and Node. Vasan Subramanian

Pro MERN Stack. Full Stack Web App Development with Mongo, Express, React, and Node. Vasan Subramanian Pro MERN Stack Full Stack Web App Development with Mongo, Express, React, and Node Vasan Subramanian Pro MERN Stack Vasan Subramanian Bangalore, Karnataka, India ISBN-13 (pbk): 978-1-4842-2652-0 ISBN-13

More information

Robust SRAM Designs and Analysis

Robust SRAM Designs and Analysis Robust SRAM Designs and Analysis Jawar Singh Saraju P. Mohanty Dhiraj K. Pradhan Robust SRAM Designs and Analysis 123 Jawar Singh Indian Institute of Information Technology Design and Manufacturing Dumna

More information

English for Academic Research. Series editor Adrian Wallwork Pisa Italy

English for Academic Research. Series editor Adrian Wallwork Pisa Italy English for Academic Research Series editor Adrian Wallwork Pisa Italy This series aims to help non-native, English-speaking researchers communicate in English. The books in this series are designed like

More information

SpringerBriefs in Computer Science

SpringerBriefs in Computer Science SpringerBriefs in Computer Science More information about this series at http://www.springer.com/series/10028 Atle Refsdal Bjørnar Solhaug Ketil Stølen Cyber-Risk Management 123 Atle Refsdal SINTEF ICT

More information

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018 Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your

More information

Stefan Waldmann. Topology. An Introduction

Stefan Waldmann. Topology. An Introduction Topology Stefan Waldmann Topology An Introduction 123 Stefan Waldmann Julius Maximilian University of Würzburg Würzburg Germany ISBN 978-3-319-09679-7 ISBN 978-3-319-09680-3 (ebook) DOI 10.1007/978-3-319-09680-3

More information

Iterative Design of Teaching-Learning Sequences

Iterative Design of Teaching-Learning Sequences Iterative Design of Teaching-Learning Sequences Dimitris Psillos Petros Kariotoglou Editors Iterative Design of Teaching- Learning Sequences Introducing the Science of Materials in European Schools Editors

More information

Microsoft Computer Vision APIs Distilled

Microsoft Computer Vision APIs Distilled Microsoft Computer Vision APIs Distilled Getting Started with Cognitive Services Alessandro Del Sole Microsoft Computer Vision APIs Distilled Alessandro Del Sole Cremona, Italy ISBN-13 (pbk): 978-1-4842-3341-2

More information

Android Continuous Integration

Android Continuous Integration Android Continuous Integration Build-Deploy-Test Automation for Android Mobile Apps Pradeep Macharla Android Continuous Integration Pradeep Macharla North Carolina, USA ISBN-13 (pbk): 978-1-4842-2795-4

More information

Java Quick Syntax Reference. Second Edition. Mikael Olsson

Java Quick Syntax Reference. Second Edition. Mikael Olsson Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Mikael Olsson Hammarland, Länsi-Suomi, Finland ISBN-13 (pbk):

More information

Heavy Vehicle Cyber Security Bulletin

Heavy Vehicle Cyber Security Bulletin Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin

More information

FISMAand the Risk Management Framework

FISMAand the Risk Management Framework FISMAand the Risk Management Framework The New Practice of Federal Cyber Security Stephen D. Gantz Daniel R. Phi I pott Darren Windham, Technical Editor ^jm* ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON

More information

"Charting the Course... MOC 6435 B Designing a Windows Server 2008 Network Infrastructure Course Summary

Charting the Course... MOC 6435 B Designing a Windows Server 2008 Network Infrastructure Course Summary MOC 6435 B Designing a Windows Network Infrastructure Course Summary Description This five-day course will provide students with an understanding of how to design a Windows Network Infrastructure that

More information

Security and networks

Security and networks Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,

More information

The Windows 10 Productivity Handbook

The Windows 10 Productivity Handbook The Windows 10 Productivity Handbook Discover Expert Tips, Tricks, and Hidden Features in Windows 10 Mike Halsey The Windows 10 Productivity Handbook Mike Halsey Sheffield, Yorkshire, UK ISBN-13 (pbk):

More information

Computer Communications and Networks. Editor A.J. Sammes Centre for Forensic Computing Cranfield University Shrivenham Campus Swindon, UK

Computer Communications and Networks. Editor A.J. Sammes Centre for Forensic Computing Cranfield University Shrivenham Campus Swindon, UK Computer Communications and Networks Editor A.J. Sammes Centre for Forensic Computing Cranfield University Shrivenham Campus Swindon, UK The Computer Communications and Networks series is a range of textbooks,

More information

Ronny L. Bull & Dr. Jeanna Matthews. DerbyCon 4.0. Sept 27th, 2014

Ronny L. Bull & Dr. Jeanna Matthews. DerbyCon 4.0. Sept 27th, 2014 Layer 2 Network Security in Virtualized Environments Ronny L. Bull & Dr. Jeanna Matthews DerbyCon 4.0 Sept 27th, 2014 The Researchers Ronny Bull Computer Science Ph.D. Graduate Student at Clarkson University

More information

Multidimensional Queueing Models in Telecommunication Networks

Multidimensional Queueing Models in Telecommunication Networks Multidimensional Queueing Models in Telecommunication Networks ThiS is a FM Blank Page Agassi Melikov Leonid Ponomarenko Multidimensional Queueing Models in Telecommunication Networks Agassi Melikov Department

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

Sachin Shetty Old Dominion University April 10, Cyber Risk Scoring and Mitigation(CRISM)

Sachin Shetty Old Dominion University April 10, Cyber Risk Scoring and Mitigation(CRISM) Sachin Shetty Old Dominion University sshetty@odu.edu April 10, 2019 Cyber Risk Scoring and Mitigation(CRISM) Customer Need - Life in the Security Operation Center Intrusion Detection System alerts Prioritized

More information

Building Custom Tasks for SQL Server Integration Services

Building Custom Tasks for SQL Server Integration Services Building Custom Tasks for SQL Server Integration Services Andy Leonard Building Custom Tasks for SQL Server Integration Services Andy Leonard Farmville, Virginia, USA ISBN-13 (pbk): 978-1-4842-2939-2 ISBN-13

More information

Embedded and Real-Time Operating Systems

Embedded and Real-Time Operating Systems Embedded and Real-Time Operating Systems K.C. Wang Embedded and Real-Time Operating Systems 123 K.C. Wang School of Electrical Engineering and Computer Science Washington State University Pullman, WA USA

More information

Jinkun Liu Xinhua Wang. Advanced Sliding Mode Control for Mechanical Systems. Design, Analysis and MATLAB Simulation

Jinkun Liu Xinhua Wang. Advanced Sliding Mode Control for Mechanical Systems. Design, Analysis and MATLAB Simulation Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis and MATLAB Simulation Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis

More information

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS HOLY ANGEL UNIVERSITY LLEGE OF INFORMATION AND MMUNICATIONS TECHNOLOGY CYBER SECURITY URSE SYLLABUS Course Code : 6CSEC Prerequisite : 6MPRO2L Course Credit : 3 Units (2 hours LEC,3 hours LAB) Year Level:

More information

Agile Swift. Swift Programming Using Agile Tools and Techniques. Godfrey Nolan

Agile Swift. Swift Programming Using Agile Tools and Techniques. Godfrey Nolan Agile Swift Swift Programming Using Agile Tools and Techniques Godfrey Nolan Agile Swift: Swift Programming Using Agile Tools and Techniques Godfrey Nolan Huntington Woods, Michigan, USA ISBN-13 (pbk):

More information

Computing with Memory for Energy-Efficient Robust Systems

Computing with Memory for Energy-Efficient Robust Systems Computing with Memory for Energy-Efficient Robust Systems Somnath Paul Swarup Bhunia Computing with Memory for Energy-Efficient Robust Systems 123 Somnath Paul Intel Labs Hillsboro, OR, USA Swarup Bhunia

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

Software Defined Networking enabled Resilience for IEC based Substation Communication Systems

Software Defined Networking enabled Resilience for IEC based Substation Communication Systems Author copy. Accepted for publication. Do not redistribute. Software Defined Networking enabled Resilience for IEC 61850-based Substation Communication Systems Hellen Maziku College of Engineering Tennessee

More information

Practical Amazon EC2, SQS, Kinesis, and S3

Practical Amazon EC2, SQS, Kinesis, and S3 Practical Amazon EC2, SQS, Kinesis, and S3 A Hands-On Approach to AWS Sunil Gulabani Practical Amazon EC2, SQS, Kinesis, and S3: A Hands-On Approach to AWS Sunil Gulabani Ahmedabad, Gujarat, India ISBN-13

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management

CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management Instructor: Dr. Kun Sun Outline 1. Risk management 2. Standards on Evaluating Secure System 3. Security Analysis using Security Metrics

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

Enabling Technologies for Wireless E-Business

Enabling Technologies for Wireless E-Business Enabling Technologies for Wireless E-Business Weidong Kou Yelena Yesha (Eds.) Enabling Technologies for Wireless E-Business With 141 Figures and 15 Tables ABC Editors Weidong Kou Chinese State Key Laboratory

More information

Cyber Security CRA Overview

Cyber Security CRA Overview Cyber Security CRA Overview Patrick McDaniel (PM, PSU) & Edward Colbert (CAM, ARL) cra.psu.edu Approved for public release; distribution is unlimited. Cyber Security Collaborative Research Alliance A Collaborative

More information

CCNA Cybersecurity Operations. Program Overview

CCNA Cybersecurity Operations. Program Overview Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System

More information

Information and Network Technology Revised Date 07/26/2012 Implementation Date 08/01/2012

Information and Network Technology Revised Date 07/26/2012 Implementation Date 08/01/2012 Information and Network Technology Ben Eckart Revised Date 07/26/2012 Implementation Date 08/01/2012 COURSE OUTLINE CRT 286 LAN/WAN Implementation and Support 3 Credit Hours Course Description The focus

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Advanced Data Mining Techniques

Advanced Data Mining Techniques Advanced Data Mining Techniques David L. Olson Dursun Delen Advanced Data Mining Techniques Dr. David L. Olson Department of Management Science University of Nebraska Lincoln, NE 68588-0491 USA dolson3@unl.edu

More information

Simulation of Cloud Computing Environments with CloudSim

Simulation of Cloud Computing Environments with CloudSim Simulation of Cloud Computing Environments with CloudSim Print ISSN: 1312-2622; Online ISSN: 2367-5357 DOI: 10.1515/itc-2016-0001 Key Words: Cloud computing; datacenter; simulation; resource management.

More information

The DETER Testbed: Overview 25 August 2004

The DETER Testbed: Overview 25 August 2004 The DETER Testbed: Overview 25 August 2004 1. INTRODUCTION The DETER (Cyber Defense Technology Experimental Research testbed is a computer facility to support experiments in a broad range of cyber-security

More information

End-to-End Trust, Segmentation and Segregation in the IIoT

End-to-End Trust, Segmentation and Segregation in the IIoT End-to-End Trust, Segmentation and Segregation in the IIoT www.blackridge.us Michael Murray - SVP & GM Cyber Physical Systems www.blackridge.us Company Origin BlackRidge technology originated from a Department

More information

RIAL: Resource Intensity Aware Load Balancing in Clouds

RIAL: Resource Intensity Aware Load Balancing in Clouds RIAL: Resource Intensity Aware Load Balancing in Clouds Liuhua Chen and Haiying Shen and Karan Sapra Dept. of Electrical and Computer Engineering Clemson University, SC, USA 1 Outline Introduction System

More information

Android Continuous Integration

Android Continuous Integration Android Continuous Integration Build-Deploy-Test Automation for Android Mobile Apps Pradeep Macharla Android Continuous Integration Build-Deploy-Test Automation for Android Mobile Apps Pradeep Macharla

More information

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network

More information

Vulnerability Assessments and Penetration Testing

Vulnerability Assessments and Penetration Testing CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze

More information

CND Exam Blueprint v2.0

CND Exam Blueprint v2.0 EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding

More information

Summary of Contents LIST OF FIGURES LIST OF TABLES

Summary of Contents LIST OF FIGURES LIST OF TABLES Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter

More information

Symmetric Cryptographic Protocols

Symmetric Cryptographic Protocols Symmetric Cryptographic Protocols Mahalingam Ramkumar Symmetric Cryptographic Protocols 2123 Mahalingam Ramkumar Mississippi State University Mississippi State Mississippi USA ISBN 978-3-319-07583-9 ISBN

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)

More information

Performance investigation and comparison between virtual networks and physical networks based on Sea-Cloud Innovation Environment

Performance investigation and comparison between virtual networks and physical networks based on Sea-Cloud Innovation Environment Performance investigation and comparison between virtual networks and physical networks based on Sea-Cloud Innovation Environment Website: http://scie.ac.cn E-mail: scie@cstnet.cn CANS 2015, Chengdu, Sep

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Data ONTAP Version 7.2.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme

More information

Training Guide: Administering Windows Server 2012 Orin Thomas

Training Guide: Administering Windows Server 2012 Orin Thomas Training Guide: Administering Windows Server 2012 Orin Thomas Published with the authorization of Microsoft Corporation by: O Reilly Media, Inc. 1005 Gravenstein Highway North Sebastopol, California 95472

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

PASSAIC COUNTY TECHNICAL INSTITUTE 45 Reinhardt Rd. Wayne, NJ. Information Technology & Network Security III (ITNS III) Course # 1025 Developed 2018

PASSAIC COUNTY TECHNICAL INSTITUTE 45 Reinhardt Rd. Wayne, NJ. Information Technology & Network Security III (ITNS III) Course # 1025 Developed 2018 PASSAIC COUNTY TECHNICAL INSTITUTE 45 Reinhardt Rd. Wayne, NJ Information Technology & Network Security III (ITNS III) Course # 1025 Developed 2018 I. Course Description: This course builds on the experience

More information

Smart Grid Communications and Networking

Smart Grid Communications and Networking Smart Grid Communications and Networking EKRAM HOSSAIN University of Manitoba, Canada ZHU HAN University of Houston, Texas H. VINCENT POOR Princeton University, New Jersey CAMBRIDGE UNIVERSITY PRESS Contents

More information

SYLLABUS. Departmental Syllabus. Applied Networking I. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus. Applied Networking I. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 1/30/2015 CIP CODE: 11.1006 SEMESTER: COURSE TITLE: COURSE NUMBER: Applied Networking I CRTE0115 CREDIT HOURS: 2 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE: EMAIL:

More information

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Designing and Building a Cybersecurity Program

Designing and Building a Cybersecurity Program Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity

More information

Data center interconnect for the enterprise hybrid cloud

Data center interconnect for the enterprise hybrid cloud WHITEPAPER Data center interconnect for the enterprise hybrid cloud The world is moving to the cloud. Everything from entertainment and consumer mobile applications to enterprise software and government

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

Security Access in Wireless Local Area Networks

Security Access in Wireless Local Area Networks Jianfeng Ma Zhuo Ma Changguang Wang et al. Security Access in Wireless Local Area Networks From Architecture and Protocols to Realization Jianfeng Ma Zhuo Ma Changguang Wang et al. Security Access in Wireless

More information

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016 Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception

More information

Tree Rule Firewall. A Thesis Submitted for the Degree of. Doctor of Philosophy. Thawatchai Chomsiri. Faculty of Engineering and Information Technology

Tree Rule Firewall. A Thesis Submitted for the Degree of. Doctor of Philosophy. Thawatchai Chomsiri. Faculty of Engineering and Information Technology Tree Rule Firewall A Thesis Submitted for the Degree of Doctor of Philosophy By Thawatchai Chomsiri in Faculty of Engineering and Information Technology UNIVERSITY OF TECHNOLOGY, SYDNEY 17 th November

More information

"Charting the Course... MOC D Configuring Windows 8.1 Course Summary

Charting the Course... MOC D Configuring Windows 8.1 Course Summary Course Summary Description Get expert instruction and hands-on practice administering and configuring Windows in this 5-day Microsoft Official Course. This course is designed for experienced IT professionals

More information

SCALABLE. Network modeling software for: Development Analysis Testing Cyber Assessment DATASHEET NETWORK TECHNOLOGIES. Virtual Network Model

SCALABLE. Network modeling software for: Development Analysis Testing Cyber Assessment DATASHEET NETWORK TECHNOLOGIES. Virtual Network Model SCALABLE NETWORK TECHNOLOGIES DATASHEET Network modeling software for: Development Analysis Testing Cyber Assessment EXata software (EXata) is a tool for scientists, engineers, IT technicians and communications

More information

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs WITH PALO ALTO NETWORKS AND REAN CLOUD 1 INTRODUCTION EXECUTIVE SUMMARY Organizations looking to provide developers with a free-range development environment

More information

CSci530 Final Exam. Fall 2014

CSci530 Final Exam. Fall 2014 CSci530 Final Exam Fall 2014 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 120 minutes to complete the exam. Please prepare your answers on

More information

Star: Sla-Aware Autonomic Management of Cloud Resources

Star: Sla-Aware Autonomic Management of Cloud Resources Star: Sla-Aware Autonomic Management of Cloud Resources Sakshi Patil 1, Meghana N Rathod 2, S. A Madival 3, Vivekanand M Bonal 4 1, 2 Fourth Sem M. Tech Appa Institute of Engineering and Technology Karnataka,

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

MAX POWER Check Point Firewall Performance Optimization

MAX POWER Check Point Firewall Performance Optimization MAX POWER Check Point Firewall Performance Optimization TABLE OF CONTENTS List of Figures List of Tables Foreword by Dameon D. Welch-Abernathy Preface Why was this book created? How to use this book Conventions

More information

Computer Science Workbench. Editor: Tosiyasu L. Kunii

Computer Science Workbench. Editor: Tosiyasu L. Kunii Computer Science Workbench Editor: Tosiyasu L. Kunii H. Kitagawa T.L. Kunii The U nnortnalized Relational Data Model F or Office Form Processor Design With 78 Figures Springer-Verlag Tokyo Berlin Heidelberg

More information

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK INTRODUCTION Attivo Networks has partnered with Cisco Systems to provide advanced real-time inside-the-network

More information

K12 Cybersecurity Roadmap

K12 Cybersecurity Roadmap K12 Cybersecurity Roadmap Introduction Jason Brown, CISSP Chief Information Security Officer Merit Network, Inc jbrown@merit.edu @jasonbrown17 https://linkedin.com/in/jasonbrown17 2 Agenda 3 Why Use the

More information

SYLLABUS. Departmental Syllabus

SYLLABUS. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0801 SEMESTER: COURSE TITLE: Networking I COURSE NUMBER: CIST- 0117 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE: EMAIL: PREREQUISITE(S):

More information

MICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY TECHNICAL WHITE PAPER

MICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY TECHNICAL WHITE PAPER TECHNICAL WHITE PAPER MICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY Abstract Organizations are in search of ways to more efficiently and securely use IT resources to increase innovation and minimize cost.

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

IASM Support for FISMA

IASM Support for FISMA Introduction Most U.S. civilian government agencies, and commercial enterprises processing electronic data on behalf of those agencies, are concerned about whether and how Information Assurance products

More information