BareCloud: Bare-metal Analysis-based Evasive Malware Detection

Size: px
Start display at page:

Download "BareCloud: Bare-metal Analysis-based Evasive Malware Detection"

Transcription

1 BareCloud: Bare-metal Analysis-based Evasive Malware Detection Dhilung Kirat, Giovanni Vigna, Christopher Kruegel UC Santa Barbara USENIX Security 2014 San Diego, CA

2 Dynamic Malware Analysis Execute s Reports

3 Dynamic Malware Analysis Execute s Reports

4 Dynamic Malware Analysis Virtualization/Emulation Execute s Reports

5 Evasive Malware Dynamic Malware Analysis Virtualization/Emulation Execute s Reports

6 Evasive Malware Dynamic Malware Analysis Virtualization/Emulation Execute

7 Detect Analysis Environment Disk HKLM\Hardware\DeviceMap\Scsi HKLM\System\CurrentControlSet\Services\Disk\Enum Bios HKLM\Hardware\Description\System\SystemBiosVersion Keyboard/Mouse Presence of mouse, keyboard layout User Username, Windows Product ID Active user

8 Detect Analysis Environment CPU SIDT instruction CPU Emulation bug (including MMX instruction set) Vulnerability CVE VirtualBox Timing attack The virtualization and emulation systems add some level of overhead

9 Fully Undetectable (FUD)

10 Solutions? Dynamic Malware Analysis Execute s Reports

11 Transparent Analysis Dynamic Malware Analysis Execute s Reports

12 Transparent Analysis Execution Environment Monitoring Components

13 Dynamic Malware Analysis Transparency Visibility

14 Can we automatically identify evasive malware under reduced visibility?

15 BareCloud Dynamic Malware Analysis Bare-metal system Execute s Reports

16 BareCloud Dynamic Malware Analysis Bare-metal system Execute s Reports No in-guest monitoring component

17 BareCloud IPMI Dynamic Malware Analysis Bare-metal system Network Packets Network Activities iscsi LVM Snapshot SleuthKit File Activities

18 BareCloud IPMI Dynamic Malware Analysis Bare-metal system Network Packets Network Activities iscsi LVM Snapshot SleuthKit File Activities

19 BareCloud Baremetal

20 BareCloud Baremetal Ether

21 BareCloud Baremetal Ether Anubis

22 BareCloud Baremetal Ether Anubis VBox

23 BareCloud Baremetal Ether Anubis VBox

24 BareCloud Baremetal Ether Anubis VBox

25 Transient vs. Persistent All Ac>vi>es Normaliza>on Persistent Changes

26 Deviation Malware Analysis System Evasion Internal SoIware Environment Iden>cal setup Programed Randomiza>on Normalize behavior Hierarchical Similarity External Network Environment Simultaneous Execu>on Iden>cal External Network Consistent Reply

27 Comparison A B

28 Comparison A B JaccardSimilarity = A B A B

29 Comparison A B C Create file X Create file X Create file X Create file Y Create file Z Create file Y Modify file Z Create file Y Connect to C&C

30 Comparison A B C Create file X Create file X Create file X Create file Y Create file Z Create file Y Modify file Z Create file Y Connect to C&C

31 Comparison A B C Create file X Create file Y Create file Z Create file X Create file Y Modify file Z Create file X Create file Y Connect to C&C JaccardSimilarity(A, B) = 2/4 = JaccardSimilarity(A, C)

32 Comparison A B

33 Comparison A B What type of events? Filesystem? Network? Are events related to the same object? Same file? Same network endpoint? What type of opera>ons? Create? Delete? HTTP?

34 Similarity Hierarchy root Object Type Object Name Name AWribute

35 Similarity Hierarchy A Object Type root file Create file X Object Name C:\X C:\Y C:\Z Create file Y Create file Z Name AWribute

36 Similarity Hierarchy B Object Type root file Create file X Object Name C:\X C:\Y C:\Z Create file Y Modify file Z Name AWribute modify

37 Similarity Hierarchy C Object Type file root network Create file X Create file Y Connect to C&C Object Name Name AWribute C:\X C:\Y C&C Address hwp

38 Hierarchical Similarity A C root root Object Type file Object Type file network Object Name C:\X C:\Y C:\Z Object Name C:\X C:\Y C&C Address Name Name hwp AWribute AWribute

39 Hierarchical Similarity A C Candidate Sets root root Object Type file Object Type file network Object Name C:\X C:\Y C:\Z Object Name C:\X C:\Y C&C Address Name Name hwp AWribute AWribute

40 Hierarchical Similarity A C Candidate Sets root root Object Type file Object Type file network Object Name C:\X C:\Y C:\Z Object Name C:\X C:\Y C&C Address Name Name hwp AWribute AWribute

41 Hierarchical Similarity A C Candidate Sets root root Object Type file Sim 1 = 1/2 Object Type file network Object Name C:\X C:\Y C:\Z Object Name C:\X C:\Y C&C Address Name Name hwp AWribute AWribute

42 Hierarchical Similarity A C Candidate Sets root root Object Type file Sim 1 = 1/2 Object Type file network Object Name C:\X C:\Y C:\Z Object Name C:\X C:\Y C&C Address Name Name hwp AWribute AWribute

43 Hierarchical Similarity A C root root Object Type file Sim 1 = 1/2 Object Type file network Object Name C:\X C:\Y C:\Z Sim 2 = 2/3 Object Name C:\X C:\Y C&C Address Name Name hwp AWribute AWribute

44 Hierarchical Similarity A C root root Object Type file Sim 1 = 1/2 Object Type file network Object Name C:\X C:\Y C:\Z Sim 2 = 2/3 Object Name C:\X C:\Y C&C Address Name Sim 3 = 1 Name hwp AWribute Sim 4 = 1 AWribute

45 Hierarchical Similarity A C root root Object Type file Sim 1 = 1/2 Object Type file network Object Name C:\X C:\Y C:\Z Sim 2 = 2/3 Object Name C:\X C:\Y C&C Address Name Sim 3 = 1 Name hwp AWribute Sim 4 = 1 AWribute Sim(A, C) = AVG(Sim 1 Sim 4 ) = 0.79

46 Hierarchical Similarity A B root root Object Type file Sim 1 = 1 Object Type file Object Name C:\X C:\Y C:\Z Sim 2 = 1 Object Name C:\X C:\Y C:\Z Name Sim 3 = 1/2 Name modify AWribute Sim 4 = 1 AWribute Sim(A, B) = AVG(Sim 1 Sim 4 ) = 0.87

47 Comparison A Create file X Create file Y Create file Z B Create file X Create file Y Modify file Z C Create file X Create file Y Connect to C&C JaccardSimilarity(A, B) == JaccardSimilarity(A, C) HierarchicalSim(A, B) > HierarchicalSim(A, C) 0.87 > 0.79

48 Deviation Score Distance Distance(A, B) = 1 - Sim(A, B) Baremetal Ether Deviation Score D Quadratic mean of the behavior distances with respect to the baremetal analysis Deviation Threshold t Evasive if D > t Anubis VBox

49 Evaluation Ground truth 111 evasive samples (29 families) 119 non-evasive samples (49 families) Calculated behavior Deviation score D Calculate Jaccard distance-based deviation JD Maximum Jaccard-distance among different behavior profiles of a malware Precision-recall analysis by varying the deviation threshold t

50 Evaluation Precision Hierarchical similarity Jaccard similarity Recall

51 Evaluation Precision Precision Recall t= Threshold (t)

52 Large-scale Evaluation Recent real-world malware feed observed by Anubis Randomly select samples with low system and low network activity high system and high network activity high system but low network activity Low system but high network activity 110,005 samples 4 months period beginning from July 2013

53 Large-scale Evaluation Environment Detection Count Percentage Anubis Ether VirtualBox All ,835 evasive malware out of 110,005 recent samples

54 Limitations Hardware vs software iscsi initiator Stalling code Wait for user input Advanced waiting Decoy reconnaissance Real hardware ID not randomized

55 Conclusions Evasive Malware is a real threat to the new wave of dynamic analysis based malware detection systems We presented a system that can detect these evasive malware automatically

56 Thank You!

57 Questions

CIT 480: Securing Computer Systems. Operating System Concepts

CIT 480: Securing Computer Systems. Operating System Concepts CIT 480: Securing Computer Systems Operating System Concepts Topics 1. What is an OS? 2. Processes 3. Memory management 4. Filesystems 5. Virtual machines A Computer Model An operating system has to deal

More information

Spring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand

Spring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,

More information

Cody Miller, Dae Glendowne, Henry Cook, DeMarcus Thomas, Chris Lanclos, Patrick Pape Mississippi State University

Cody Miller, Dae Glendowne, Henry Cook, DeMarcus Thomas, Chris Lanclos, Patrick Pape Mississippi State University Insights Gained From Constructing a Large Scale Dynamic Analysis Platform DFRWS 2017 Austin,TX Aug 7, 2017 Cody Miller, Dae Glendowne, Henry Cook, DeMarcus Thomas, Chris Lanclos, Patrick Pape Mississippi

More information

Indicators of Compromise Ransomware TeslaCrypt Malware

Indicators of Compromise Ransomware TeslaCrypt Malware Indicators of Compromise Ransomware TeslaCrypt Malware Kevin Kelly April 2017 GIAC GCIH, GCED, GCIA SANS Technology Institute - Candidate for Master of Science Degree 1 1 Objective Indicators of Compromise

More information

Virtualization Overview NSRC

Virtualization Overview NSRC Virtualization Overview NSRC Terminology Virtualization: dividing available resources into smaller independent units Emulation: using software to simulate hardware which you do not have The two often come

More information

Hypervisor security. Evgeny Yakovlev, DEFCON NN, 2017

Hypervisor security. Evgeny Yakovlev, DEFCON NN, 2017 Hypervisor security Evgeny Yakovlev, DEFCON NN, 2017 whoami Low-level development in C and C++ on x86 UEFI, virtualization, security Jetico, Kaspersky Lab QEMU/KVM developer at Virtuozzo 2 Agenda Why hypervisor

More information

UCS C-Series Server: Bare metal, Storage Appliance, Host-OS Hardware and Software Interoperability Matrix

UCS C-Series Server: Bare metal, Storage Appliance, Host-OS Hardware and Software Interoperability Matrix UCS C-Series Server: Bare metal, Storage Appliance, Host-OS Hardware and Software Interoperability Matrix First Published: September 23, 2015 Last Modified: September 29, 2015 Americas Headquarters Cisco

More information

n Explain penetration testing concepts n Explain vulnerability scanning concepts n Reconnaissance is the first step of performing a pen test

n Explain penetration testing concepts n Explain vulnerability scanning concepts n Reconnaissance is the first step of performing a pen test Chapter Objectives n Explain penetration testing concepts n Explain vulnerability scanning concepts Chapter #4: Threats, Attacks, and Vulnerabilities Vulnerability Scanning and Penetration Testing 2 Penetration

More information

First Look Showcase. Expanding our prevention, detection and response solutions. Marco Rottigni Chief Technical Security Officer, Qualys, Inc.

First Look Showcase. Expanding our prevention, detection and response solutions. Marco Rottigni Chief Technical Security Officer, Qualys, Inc. 18 QUALYS SECURITY CONFERENCE 2018 First Look Showcase Expanding our prevention, detection and response solutions Marco Rottigni Chief Technical Security Officer, Qualys, Inc. Secure Enterprise Mobility

More information

Prospex: Protocol Specification Extraction

Prospex: Protocol Specification Extraction Prospex: Protocol Specification Extraction Paolo Milani Comparetti paolo@iseclab.org, Vienna University of Technology Gilbert Wondracek gilbert@iseclab.org, Vienna University of Technology Christopher

More information

Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage

Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage Kevin Leach 1, Fengwei Zhang 2, and Westley Weimer 1 1 University of Michigan, 2 Wayne State University

More information

Prevent and Detect Malware with Symantec Advanced Threat Protection: Network

Prevent and Detect Malware with Symantec Advanced Threat Protection: Network WHITE PAPER: SYMANTEC ADVANCED THREAT PROTECTION........................................ Prevent and Detect Malware with Symantec Advanced Threat Protection: Network Who should read this paper This white

More information

You are Who You Know and How You Behave: Attribute Inference Attacks via Users Social Friends and Behaviors

You are Who You Know and How You Behave: Attribute Inference Attacks via Users Social Friends and Behaviors You are Who You Know and How You Behave: Attribute Inference Attacks via Users Social Friends and Behaviors Neil Zhenqiang Gong Iowa State University Bin Liu Rutgers University 25 th USENIX Security Symposium,

More information

Operating system hardening

Operating system hardening Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications

More information

Compute Summit January 28 29, 2014 San Jose. Engineering Workshop

Compute Summit January 28 29, 2014 San Jose. Engineering Workshop Compute Summit January 28 29, 2014 San Jose Compute Summit Type A IPM Controller Hank Bruning JBlade hank@jblade.com The Goal #1 Increase the raw data describing the hardware Inventory data on DDR3/DDR4

More information

Deception: Deceiving the Attackers Step by Step

Deception: Deceiving the Attackers Step by Step Deception: Deceiving the Attackers Step by Step TrapX Security, Inc. February, 2018 In 2017, Gartner emphasized how companies are transforming their security spending strategy and moving away from prevention-only

More information

Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption

Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption White Paper October, 2018 Introduction Consumers and enterprises are becoming increasingly concerned about the security of their digital

More information

Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0

Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0 Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0 April 9, 2012 Introduction One of the earliest indicators of an impending network attack is the presence of network reconnaissance.

More information

McAfee Endpoint Threat Defense and Response Family

McAfee Endpoint Threat Defense and Response Family Defense and Family Detect zero-day malware, secure patient-zero, and combat advanced attacks The escalating sophistication of cyberthreats requires a new generation of protection for endpoints. Advancing

More information

Detect Cyber Threats with Securonix Proxy Traffic Analyzer

Detect Cyber Threats with Securonix Proxy Traffic Analyzer Detect Cyber Threats with Securonix Proxy Traffic Analyzer Introduction Many organizations encounter an extremely high volume of proxy data on a daily basis. The volume of proxy data can range from 100

More information

Automated Identification of Installed Malicious Android Applications

Automated Identification of Installed Malicious Android Applications DIGITAL FORENSIC RESEARCH CONFERENCE Automated Identification of Installed Malicious Android Applications By Mark Guido, Justin Grover, Jared Ondricek, Dave Wilburn, Drew Hunt and Thanh Nguyen Presented

More information

Production Installation and Configuration. Openfiler NSA

Production Installation and Configuration. Openfiler NSA Production Installation and Configuration Openfiler NSA Table of Content 1. INTRODUCTION... 3 1.1. PURPOSE OF DOCUMENT... 3 1.2. INTENDED AUDIENCE... 3 1.3. SCOPE OF THIS GUIDE... 3 2. OPENFILER INSTALLATION...

More information

Threat Centric Vulnerability Management

Threat Centric Vulnerability Management Threat Centric Vulnerability Management Q. Which vulnerabilities should I address first? A. Your EXPOSED vulnerabilities AND the ones criminals are using. Agenda Understanding exploited vulnerabilities

More information

Advanced Systems Security: New Threats

Advanced Systems Security: New Threats Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

AMP for Endpoints & Threat Grid

AMP for Endpoints & Threat Grid AMP for Endpoints & Threat Grid Response & Prevention Dean De Beer & Eric Hulse BRKSEC-2029 AMP Threat Grid Malware Analysis Engines & Techniques A little background Malware Analysis & Threat Intelligence

More information

Starting the KVM Console

Starting the KVM Console Starting the KVM Console This chapter includes the following sections: KVM Console, page 1 Starting the KVM Console from a Server, page 5 Starting the KVM Console from a Service Profiles, page 5 Starting

More information

Cisco Advanced Malware Protection (AMP) for Endpoints

Cisco Advanced Malware Protection (AMP) for Endpoints Cisco Advanced Malware Protection (AMP) for Endpoints Endpoints continue to be the primary point of entry for attacks! 70% of breaches start on endpoint devices WHY? Gaps in protection Gaps in visibility

More information

Knut Omang Ifi/Oracle 20 Oct, Introduction to virtualization (Virtual machines) Aspects of network virtualization:

Knut Omang Ifi/Oracle 20 Oct, Introduction to virtualization (Virtual machines) Aspects of network virtualization: Software and hardware support for Network Virtualization part 2 Knut Omang Ifi/Oracle 20 Oct, 2015 32 Overview Introduction to virtualization (Virtual machines) Aspects of network virtualization: Virtual

More information

Operating Systems 4/27/2015

Operating Systems 4/27/2015 Virtualization inside the OS Operating Systems 24. Virtualization Memory virtualization Process feels like it has its own address space Created by MMU, configured by OS Storage virtualization Logical view

More information

Qualys Indication of Compromise

Qualys Indication of Compromise 18 QUALYS SECURITY CONFERENCE 2018 Qualys Indication of Compromise Bringing IOC to the Next Level Chris Carlson VP, Product Management, Qualys, Inc. Adversary TTPs are Changing Early 2010s Zero-day Vulnerabilities

More information

UCS-E160DP Double-wide E-Series Server, 6 core CPU, with PCIe

UCS-E160DP Double-wide E-Series Server, 6 core CPU, with PCIe Overview This chapter includes the following sections: Cisco UCS E-Series Servers Overview, page 1 Server Software, page 2 CIMC Overview, page 3 CIMC GUI, page 3 Cisco UCS E-Series Servers Overview The

More information

The threat landscape is constantly

The threat landscape is constantly A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions

More information

Symantec Ransomware Protection

Symantec Ransomware Protection Symantec Ransomware Protection Protection Against Ransomware Defense in depth across all control points is required to stop ransomware @ Email Symantec Email Security.cloud, Symantec Messaging Gateway

More information

CCNA Cybersecurity Operations. Program Overview

CCNA Cybersecurity Operations. Program Overview Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System

More information

CLOUD STRIFE. Mitigating the Security Risks of Domain-Validated Certificates

CLOUD STRIFE. Mitigating the Security Risks of Domain-Validated Certificates CLOUD STRIFE Mitigating the Security Risks of Domain-Validated Certificates Kevin Borgolte Tobias Fiebig Shuang Hao Christopher Kruegel Giovanni Vigna kevinbo@cs.ucsb.edu t.fiebig@tudelft.nl shao@utdallas.edu

More information

ANATOMY OF A SPEAR PHISHING ATTACK. A Menlo Security Research Report

ANATOMY OF A SPEAR PHISHING ATTACK. A Menlo Security Research Report ANATOMY OF A SPEAR PHISHING ATTACK A Menlo Security Research Report Overview Today s CISOs are trying unsuccessfully to mitigate the threat of malware and credential theft, the two greatest risks associated

More information

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY OUTLINE Advanced Threat Landscape (genv) Why is endpoint protection essential? Types of attacks and how to prevent them

More information

Amazon EC2 Deep Dive. Michael #awssummit

Amazon EC2 Deep Dive. Michael #awssummit Berlin Amazon EC2 Deep Dive Michael Hanisch @hanimic #awssummit Let s get started Amazon EC2 instances AMIs & Virtualization Types EBS-backed AMIs AMI instance Physical host server New root volume snapshot

More information

What s new? Continuous development of Emu10, Emu28, Emu42, Emu48, Emu71 and Virtual HP-IL devices. Allschwil Meeting 2018 Christoph Gießelink 1

What s new? Continuous development of Emu10, Emu28, Emu42, Emu48, Emu71 and Virtual HP-IL devices. Allschwil Meeting 2018 Christoph Gießelink 1 What s new? Continuous development of Emu10, Emu28, Emu42, Emu48, Emu71 and Virtual HP-IL devices Allschwil Meeting 2018 Christoph Gießelink 1 What's new at Emu10, 28, 42, 48, 71 All Emulators: PNG background

More information

Monitoring Hypervisor Integrity at Runtime. Student: Cuong Pham PIs: Prof. Zbigniew Kalbarczyk, Prof. Ravi K. Iyer ACC Meeting, Oct 2015

Monitoring Hypervisor Integrity at Runtime. Student: Cuong Pham PIs: Prof. Zbigniew Kalbarczyk, Prof. Ravi K. Iyer ACC Meeting, Oct 2015 Monitoring Hypervisor Integrity at Runtime Student: Cuong Pham PIs: Prof. Zbigniew Kalbarczyk, Prof. Ravi K. Iyer ACC Meeting, Oct 2015 Motivation - Server Virtualization Trend x86 servers were virtualized

More information

On Limitations of Designing LRPS: Attacks, Principles and Usability

On Limitations of Designing LRPS: Attacks, Principles and Usability CAP6135 Malware & Software Vulnerability On Limitations of Designing LRPS: Attacks, Principles and Usability By Sagar Patel 04/21/2014 EECS Department Agenda Introduction Leakage-Resilient Password System

More information

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016 Abstract The Mirai botnet struck the security industry in three massive attacks that shook traditional DDoS protection paradigms, proving that the Internet of Things (IoT) threat is real and the grounds

More information

Cisco UCS Director Tech Module IBM Storage Arrays. June 2016

Cisco UCS Director Tech Module IBM Storage Arrays. June 2016 Cisco UCS Director Tech Module IBM Storage Arrays June 2016 Agenda Overview & Architecture Hardware & Software Compatibility Licensing Orchestration Capabilities Example Use-Cases Reports Architecture

More information

Positive Security Model for Web Applications, Challenges. Ofer Shezaf OWASP IL Chapter leader CTO, Breach Security

Positive Security Model for Web Applications, Challenges. Ofer Shezaf OWASP IL Chapter leader CTO, Breach Security Positive Security Model for Web Applications, Challenges and Promise Ofer Shezaf OWASP IL Chapter leader CTO, Breach Security Introduction Breach Security, Inc. Breach Security is the market leader in

More information

PUBCRAWL: Protecting Users and Businesses from CRAWLers

PUBCRAWL: Protecting Users and Businesses from CRAWLers PUBCRAWL: Protecting Users and Businesses from CRAWLers Grégoire Jacob 1,3, Engin Kirda 2, Christopher Kruegel 1, Giovanni Vigna 1 1 University of California, Santa Barbara / 2 Northeastern University

More information

Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits

Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits Carl Sabottke Octavian Suciu Tudor Dumitraș University of Maryland 2 Problem Increasing number

More information

VMware vsphere Clusters in Security Zones

VMware vsphere Clusters in Security Zones SOLUTION OVERVIEW VMware vsan VMware vsphere Clusters in Security Zones A security zone, also referred to as a DMZ," is a sub-network that is designed to provide tightly controlled connectivity to an organization

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become

More information

Configuring Service Profiles

Configuring Service Profiles Configuring Service Profiles This chapter includes the following sections: Service Profiles that Override Server Identity, page 1 Service Profiles that Inherit Server Identity, page 2 Service Profile Templates,

More information

Deep Instinct v2.1 Extension for QRadar

Deep Instinct v2.1 Extension for QRadar Deep Instinct v2.1 Extension for QRadar This scalable joint solution enables the seamless ingestion of Deep Instinct events into IBM QRadar platform, this results in higher visibility of security breaches

More information

Monitoring and Reporting for an ONTAP Account

Monitoring and Reporting for an ONTAP Account This chapter contains the following sections: About, page 1 About Disks, page 2 Managing Filers, page 3 Managing Virtual Machines, page 3 Managing Interfaces, page 6 Managing IP Spaces, page 7 Managing

More information

vsan Security Zone Deployment First Published On: Last Updated On:

vsan Security Zone Deployment First Published On: Last Updated On: First Published On: 06-14-2017 Last Updated On: 11-20-2017 1 1. vsan Security Zone Deployment 1.1.Solution Overview Table of Contents 2 1. vsan Security Zone Deployment 3 1.1 Solution Overview VMware vsphere

More information

RUNNING VTSERVER IN A VIRTUAL MACHINE ENVIRONMENT

RUNNING VTSERVER IN A VIRTUAL MACHINE ENVIRONMENT RUNNING VTSERVER IN A VIRTUAL MACHINE ENVIRONMENT TECHNICAL NOTE BN-0001-04 AVT/Vere Technical Note: Running vtserver in a Virtual Machine Environment BN-0001-04 (October, 2016) 2016 Vere Technologies

More information

VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN

VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN-000213-01 VMware vcenter AppSpeed User s Guide You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

Cisco VDS Service Broker Software Installation Guide for UCS Platforms

Cisco VDS Service Broker Software Installation Guide for UCS Platforms Cisco VDS Service Broker 1.0.1 Software Installation Guide for UCS Platforms Revised: May 2013 This document provides detailed instructions for installing the Cisco Videoscape Distribution Suite Service

More information

LOWELL WEEKLY JOURNAL

LOWELL WEEKLY JOURNAL C C ; Z) C C C ) & C C \ C < 8) 6 7 $ ; < < 6 & q ; $ 6 8 \ q C q 5 6 8 C C 5 5 \ 8 5 3 CC C q ; Q ; & q < C C C < 53 \ C C C C C C C C C C C C 8 C 8 C zz 8 ; C C _ < C 8 Q C C C 6 X 9 C Q C C C C C C

More information

Introduction to Virtualization. From NDG In partnership with VMware IT Academy

Introduction to Virtualization. From NDG In partnership with VMware IT Academy Introduction to Virtualization From NDG In partnership with VMware IT Academy www.vmware.com/go/academy Why learn virtualization? Modern computing is more efficient due to virtualization Virtualization

More information

McAfee Product Entitlement Definitions

McAfee Product Entitlement Definitions McAfee Product Entitlement Definitions Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA Application Server CPU CPU Core Database Database Instance Entity File Submission Daily

More information

Flash vs. Disk Storage: Testing Workloads is Key

Flash vs. Disk Storage: Testing Workloads is Key Flash vs. Disk Storage: Testing Workloads is Key Len Rosenthal VP of Marketing Flash Memory Summit 2013 Santa Clara, CA 1 Overview The leader in Storage Performance Validation. Our Mission: To provide

More information

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /

More information

Whitepaper. Advanced Threat Hunting with Carbon Black Enterprise Response

Whitepaper. Advanced Threat Hunting with Carbon Black Enterprise Response Advanced Threat Hunting with Carbon Black Enterprise Response TABLE OF CONTENTS Overview Threat Hunting Defined Existing Challenges and Solutions Prioritize Endpoint Data Collection Over Detection Leverage

More information

First Look Showcase. Expanding our prevention, detection and response solutions. Sumedh Thakar Chief Product Officer, Qualys, Inc.

First Look Showcase. Expanding our prevention, detection and response solutions. Sumedh Thakar Chief Product Officer, Qualys, Inc. 18 QUALYS SECURITY CONFERENCE 2018 First Look Showcase Expanding our prevention, detection and response solutions Sumedh Thakar Chief Product Officer, Qualys, Inc. Secure Enterprise Mobility Identity (X.509,

More information

vtserver Running vtserver on Hypervisors

vtserver Running vtserver on Hypervisors vtserver vtalpha/vtvax Bare Metal Version 4.0.0 Running vtserver on Hypervisors TECHNICAL NOTE BN-0001-09 Running vtserver on Hypervisors Technical Note BN-0001-09 (February 26, 2019) 2019 AVTware / Vere

More information

Copyright 2015

Copyright 2015 This video will look at the differences between 1 st and 2 nd generation virtual machines in Hyper-V. First generation has better operating system support, however 2 nd generation offers some speed and

More information

Build Cloud like Rackspace with OpenStack Ansible

Build Cloud like Rackspace with OpenStack Ansible Build Cloud like Rackspace with OpenStack Ansible https://etherpad.openstack.org/p/osa-workshop-01 Jirayut Nimsaeng DevOps & Cloud Architect 2nd Cloud OpenStack-Container Conference and Workshop 2016 Grand

More information

Question No: 2 Which identifier is used to describe the application or process that submitted a log message?

Question No: 2 Which identifier is used to describe the application or process that submitted a log message? Volume: 65 Questions Question No: 1 Which definition of a fork in Linux is true? A. daemon to execute scheduled commands B. parent directory name of a file pathname C. macros for manipulating CPU sets

More information

predefined elements (CI)

predefined elements (CI) 1 VMware Name 1.1 VMware Scans Scan Date, API Type, API Version, Name, Locale Build Number, Version, Service Name, OS Type, Vendor, Version, Build, MOB Path 1.1.1 VMware Folders Name, Identifier, MOB Path

More information

Stonesoft Next Generation Firewall

Stonesoft Next Generation Firewall Stonesoft Next Generation Firewall Release Notes 6.1.3 Revision B Contents About this release on page 2 Lifecycle model on page 2 System requirements on page 3 Build version on page 6 Compatibility on

More information

Configuring Global Service Profiles

Configuring Global Service Profiles This chapter contains the following sections: Global Service Profiles, page 1 Global Service Profile Templates, page 1 Creating a Global Service Profile, page 2 Creating a Global Service Profile Template,

More information

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last

More information

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes. Introducing MVISION Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls Jon Parkes McAfee 1 All information provided here is subject to non-disclosure

More information

Lecture 09: VMs and VCS head in the clouds

Lecture 09: VMs and VCS head in the clouds Lecture 09: VMs and VCS head in the Hands-on Unix system administration DeCal 2012-10-29 1 / 20 Projects groups of four people submit one form per group with OCF usernames, proposed project ideas, and

More information

Project CIP Modifications

Project CIP Modifications Project 2016-02 CIP Modifications Webinar on Standard Drafting Team Considerations for the Use of Virtualization in the CIP Environment April 18, 2017 Administrative Items NERC Antitrust Guidelines It

More information

Creating a Windows Server 2012 R2 virtual instance Maher Saad, Chestnut Residence, University of Toronto

Creating a Windows Server 2012 R2 virtual instance Maher Saad, Chestnut Residence, University of Toronto Creating a Windows Server 2012 R2 virtual instance Maher Saad, Chestnut Residence, University of Toronto Disclaimer The author of this document shall not carry responsibility for any damage to the network,

More information

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central Trend Micro Apex One as a Service / Apex One Best Practice Guide for Malware Protection 1 Best Practice Guide Apex One as a Service / Apex Central Information in this document is subject to change without

More information

A Survey on Virtualization Technologies

A Survey on Virtualization Technologies A Survey on Virtualization Technologies Virtualization is HOT Microsoft acquires Connectix Corp. EMC acquires VMware Veritas acquires Ejascent IBM, already a pioneer Sun working hard on it HP picking up

More information

Gladiator Incident Alert

Gladiator Incident Alert Gladiator Incident Alert Allen Eaves Sabastian Fazzino FINANCIAL PERFORMANCE RETAIL DELIVERY IMAGING PAYMENT SOLUTIONS INFORMATION SECURITY & RISK MANAGEMENT ONLINE & MOBILE 1 2016 Jack Henry & Associates,

More information

PAC094 Performance Tips for New Features in Workstation 5. Anne Holler Irfan Ahmad Aravind Pavuluri

PAC094 Performance Tips for New Features in Workstation 5. Anne Holler Irfan Ahmad Aravind Pavuluri PAC094 Performance Tips for New Features in Workstation 5 Anne Holler Irfan Ahmad Aravind Pavuluri Overview of Talk Virtual machine teams 64-bit guests SMP guests e1000 NIC support Fast snapshots Virtual

More information

Security Architecture

Security Architecture Security Architecture We ve been looking at how particular applications are secured We need to secure not just a few particular applications, but many applications, running on separate machines We need

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Anti-Malware User Guide Version 1.1 July 11, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

Parallels Workstation 4.0 Extreme Read Me

Parallels Workstation 4.0 Extreme Read Me Parallels Workstation 4.0 Extreme Read Me Welcome to Parallels Workstation Extreme build 4.0.6740. This document contains the information you should know to successfully install Parallels Workstation Extreme

More information

Free for All! Assessing User Data Exposure to Advertising Libraries on Android

Free for All! Assessing User Data Exposure to Advertising Libraries on Android Free for All! Assessing User Data Exposure to Advertising Libraries on Android Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang, Carl Gunter University of Illinois at Urbana - Champaign Approach

More information

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING PROTECTING BANKING AND FINANCIAL INSTITUTIONS FROM CYBER FRAUD Enabling the financial industry to become proactively secure and compliant Overview In order to keep up with the changing digital payment

More information

Figure 1: Creating new VM in VirtualBox. Please change the parameters and options, and make them exactly like the following figure.

Figure 1: Creating new VM in VirtualBox. Please change the parameters and options, and make them exactly like the following figure. Run SEEDAndroid on VirtualBox We have already built Android VM for you. You can run this Android VM on VirtualBox by going through the instructions written here. Some steps might vary based on the VirtualBox

More information

BotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts

BotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts 2014 7th International Symposium on Telecommunications (IST'2014) BotCatch: Botnet Based on Coordinated Group Activities of Compromised Hosts Mosa Yahyazadeh and Mahdi Abadi Faculty of Electrical and Computer

More information

Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy

Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy Vitor Monte Afonso 1, Antonio Bianchi 2, Yanick Fratantonio 2, Adam Doupé 3, Mario Polino

More information

Vulnerability Assessment using Nessus

Vulnerability Assessment using Nessus Vulnerability Assessment using Nessus What you need Computer with VirtualBox. You can use any host OS you like, and if you prefer to use some other virtual machine software like VMware or Xen, that s fine

More information

EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services

EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services Gianluca Stringhini,, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, and Giovanni Vigna University College

More information

Govern every identity, Inspect every packet. Transform IT to the Department of YES

Govern every identity, Inspect every packet. Transform IT to the Department of YES SESSION ID: GPS2-R09 Govern every identity, Inspect every packet. Transform IT to the Department of YES Marco Zhang Senior Consultant Identity & Access Management, APJ Dell, Inc. Kent Shuart Director,

More information

Implementing Cisco Network Security (IINS) 3.0

Implementing Cisco Network Security (IINS) 3.0 Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Real-time Monitoring, Inventory and Change Tracking for. Track. Report. RESOLVE!

Real-time Monitoring, Inventory and Change Tracking for. Track. Report. RESOLVE! Real-time Monitoring, Inventory and Change Tracking for Track. Report. RESOLVE! Powerful Monitoring Tool for Full Visibility over Your Hyper-V Environment VirtualMetric provides the most comprehensive

More information

Next Generation Endpoint Security Confused?

Next Generation Endpoint Security Confused? SESSION ID: CEM-W06 Next Generation Endpoint Security Confused? Greg Day VP & Chief Security Officer, EMEA Palo Alto Networks @GreDaySecurity Brief Intro Questions we will answer Do I need a new (NG) endpoint

More information

Xen Summit Spring 2007

Xen Summit Spring 2007 Xen Summit Spring 2007 Platform Virtualization with XenEnterprise Rich Persaud 4/20/07 Copyright 2005-2006, XenSource, Inc. All rights reserved. 1 Xen, XenSource and XenEnterprise

More information

ironic-staging-drivers Documentation

ironic-staging-drivers Documentation ironic-staging-drivers Documentation Release 0.10.2.dev1 Ironic Staging Drivers Developers Aug 20, 2018 Contents 1 Ironic Staging Drivers 3 1.1 What the Ironic Staging Drivers is not..................................

More information

IT HealthCheck Feature List

IT HealthCheck Feature List IT HealthCheck Feature List Rev: 06/24/2014 Contents Solving Problems...3 Index of Main Report Checks... 3 Benchmarking... 7 Preparing for Change: Rightsizing your Environment...8 TrafficSim... 8 Equipment

More information

Annexure E Technical Bid Format

Annexure E Technical Bid Format Annexure E Technical Bid Format ANTIVIRUS SOLUTION FOR MAIL SERVER SECURITY AND SERVER SECURITY FOR DESKTOP,LAPTOP Sr. No Description Compliance (Y/N) Remark 01 Must offer comprehensive client/server security

More information

Installing and Using Openfiler 2.3 with ESX Server

Installing and Using Openfiler 2.3 with ESX Server January 28, 2011 2011 Installing and Using Openfiler 2.3 with ESX Server Openfiler 2.3 as an iscsi SAN and NFS Share This documents covers the procedures for installing Openfiler 2.3 on bare metal or as

More information

LA RELEVANCIA DEL ANALISIS POST- BRECHA

LA RELEVANCIA DEL ANALISIS POST- BRECHA LA RELEVANCIA DEL ANALISIS POST- BRECHA Hillstone Networks Diego Amauri Orjuela Santamaria Director General ART2SEC 1 www. Data Breaches 2 $3.79M average cost of a data breach in 2015 23% increase since

More information