TRUST:Team for Research in Ubiquitous Secure Technologies

Slides:



Advertisements
Similar presentations
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
Advertisements

Griffin Final Report DETER Testbed Update Anthony D. Joseph UC Berkeley Sahara Retreat, June 2004.
Design Deployment and Use of the DETER Testbed Terry Benzel, Robert Braden, Dongho Kim, Clifford Informatino Sciences Institute
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
1 Emulab Security. 2 Current Security Model Threat model: No malicious authenticated users, Bad Guys are all “outside” –Protect against accidents on the.
Network Security Overview Tales from the trenches.
1 DETER Community Meeting January 31 – February 1 Terry V. Benzel Information Sciences Institute University of Southern California.
1 GENI: Global Environment for Network Innovations Jennifer Rexford Princeton University
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Cloud Usability Framework
1 Creating a Virtual Laboratory to Teach Information Assurance Courses Online Dr. Wayne Summers & Dr. Bhagyavati Columbus State University Columbus, Georgia.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
This work was supported by the TRUST Center (NSF award number CCF ) Introduction Since public utilities must rely on the internet, they are vulnerable.
1 Supporting the development of distributed systems CS606, Xiaoyan Hong University of Alabama.
Firewall Network Processor™: Technical Concept and Business Solutions FNP™ – is a trademark of Fractel Inc. December 2008 Columbus.
VirtualBox What you need to know to build a Virtual Machine.
GEC3www.geni.net1 GENI Spiral 1 Control Frameworks Global Environment for Network Innovations Aaron Falk Clearing.
1 FREE STAR* Greg Speakman (VA3OMO). 2Topics What is FREE STAR* FREE STAR* Components VE3FSR FREE STAR* System Where to go to get more info on FREE STAR*
Sponsored by the National Science Foundation GENI Exploring Networks of the Future
Dec 14 th, 2005Telecom Italia Strategy Meeting TRUST :Team for Research in Ubiquitous Secure Technologies Strategic and Implementation Plan overview Shankar.
DETER Testbed Breakout Final Summary of Priorities Feb 1, 2006.
DETER Testbed Status Kevin Lahey (ISI) Anthony D. Joseph (UCB) January 31, 2006.
Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Based upon slides from Jay Lepreau, Utah Emulab Introduction Shiv Kalyanaraman
Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity.
CERN Campus Network Infrastructure Specificities Jean-Michel Jouanigot Campus Network Leader CERN EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH EUROPEAN LABORATORY.
Education and Human Resource development By Ruzena Bajcsy TRUST TRUST:Team for Research in Ubiquitous Secure Technologies September 13th 2004 NSF STC Review.
HOW TO BUILD A BETTER TESTBED Fabien Hermenier Robert Ricci LESSONS FROM A DECADE OF NETWORK EXPERIMENTS ON EMULAB TridentCom ’
EN Spring 2016 Lecture Notes FUNDAMENTALS OF SECURE DESIGN (NETWORK TOPOLOGY)
Session 1: Technology Development August 15 NSF Workshop.
Central Management of 300 Firewalls and Access-Lists Fabian Mauchle TNC 2012 Reykjavík, 21-May-2012.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Dr. Ir. Yeffry Handoko Putra
Security fundamentals
Security and resilience for Smart Hospitals Key findings
Chapter 6: Securing the Cloud
A product is useless without a platform, or more precisely and accurately, a platform-less product will always be replaced by an equivalent platform-ized.
Atsushi Iwata, Takashi Egawa System Platforms Research Laboratories
Implementing Network Access Protection
Securing the Network Perimeter with ISA 2004
DETER Testbed Breakout
Use Cases and Requirements for I2NSF_
Monitoring Network Bias
An Overview of the ITTC Networking & Distributed Systems Laboratory
TRUST:Team for Research in Ubiquitous Secure Technologies
The Stanford Clean Slate Program
Software Defined Networking (SDN)
TRUST:Team for Research in Ubiquitous Secure Technologies
NSF cloud Chameleon: Phase 2 Networking
Extending MPLS/BGP VPNs to End-Systems
TRUST:Team for Research in Ubiquitous Secure Technologies
Firewalls Routers, Switches, Hubs VPNs
TRUST:Team for Research in Ubiquitous Secure Technologies
Cyber System-Centric Approach To Cyber Security and CIP
Professional Network Services
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
Scheduled Accomplishments
Towards Distributed Test-Lab for Planetary-Scale Services
GENI Global Environment for Network Innovation
GENI Exploring Networks of the Future
Security and identity (Network Access Protection, Parental Controls)
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
Security week 1 Introductions Class website Syllabus review
Comparison to existing state of security experimentation
NetFPGA - an open network development platform
Web Service Security support in the SSE Toolbox
Global One Communications
Presentation transcript:

TRUST:Team for Research in Ubiquitous Secure Technologies DETER; Cyber Defense Technology Evaluation Research testbed Terry Benzel (USC-ISI), Anthony Joseph, Shankar Sastry NSF STC Review September 6, 2004

DETER Testbed Goals Facilitate scientific experimentation Establish baseline for validation of new approaches Provide a safe platform for experimental approaches that involve breaking network infrastructure Create researcher- and vendor-neutral environment Provide access for wide community of users NSF STC Review November 12, 2018

Architectural Plan Construct a homogeneous emulation cluster based upon University of Utah’s Emulab Implement network services – DNS, BGP Add containment, security, and usability features to the software Add (controlled) hardware heterogeneity Evaluate usefulness of other testbed approaches – esp. overlays like Planetlab NSF STC Review November 12, 2018

Basic Testbed Architecture Cyber Defense Experiments run on Virtual Internet Network Traces UC Berkeley Internet ISI-East ISI-USC NSF STC Review November 12, 2018

ISI Cluster Node Architecture NSF STC Review November 12, 2018

UCB DETER Testbed Cluster Architecture Internet To ISI Control Network Cache Boss Server Firewall Experiment VPN Server Control VPN Server Serial Line & Power Control Server Control Hardware VLAN Control Network VLAN 160 APC Power Controllers PC PC PC 32 x 4 @1000bT Data ports Switch Control Interface Programmable Patch Panel (VLAN switch) NSF STC Review November 12, 2018

Status Developed Draft Policy and Procedures Experiment Definition Experiment Review Board Security Isolation Argument Architecture Design Report ISI and UCB Node Operational Held first set of Experiments June 8, 2004 NSF STC Review November 12, 2018

Experimentation Scenarios for TRUSTees Deploy prototype technology in testbed Research and classroom laboratory tools Provides repeatable experiments Training Validation other researchers’ work Comparing new methods to old approaches NSF STC Review November 12, 2018

Summary Critical infrastructures continue to be vulnerable to cyber attack The urgent education about and application of cyber defense technologies is required State of the art in evaluation of network security mechanisms must be improved DETER/EMIST are a significant contribution towards this goal, and a significant enabler for TRUST NSF STC Review November 12, 2018