ICTF EC2 By Daniel Ruiz.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Ed Duguid with subject: MACE Cloud
By: Michael Kuritzky and Guy Cepelevich Supervisor: Amichai Shulman.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
1 NETE4631 Cloud deployment models and migration Lecture Notes #4.
Cloud Computing Brandon Hixon Jonathan Moore. Cloud Computing Brandon Hixon What is Cloud Computing? How does it work? Jonathan Moore What are the key.
The Most Analytical and Comprehensive Defense Network in a Box.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Infrastructure as a Service (IaaS) Amazon EC2
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities Y.-M. Wang, D. Beck, X. Jiang in Proceedings of.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Network Protocol Packet Analysis By: Daniel Ruiz.
Intrusion Detection using Honeypots Patrick Brannan Honeyd with virtual machines.
Matt Bertrand Building GIS Apps in the Cloud. Infrastructure - Provides computer infrastructure, typically a platform virtualization environment, as a.
Computer Security and Penetration Testing
Cloud Computing (101).
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Developing Scalable Web Applications on Amazon Web Services
The Most Analytical and Comprehensive Defense Network in a Box.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
The Blue Book pages 19 onwards
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
Honeypot and Intrusion Detection System
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
CAPTURE THE FLAG Introductions beer brew man dutchrowboat.
CANVAS REPORT/rvispute 16/4/2016 CANVAS Report for CTF Event at USAFA on 4/25/2007 Subject :Penetration Tools for Front Range Pen Test Exercise By Rajshri.
Preparing For The Strategic Security CTF
CLOUD WITH AMAZON. Amazon Web Services AWS is a collection of remote computing services Elastic Compute Cloud (EC2) provides scalable virtual private.
AWS Usage Tips SCS APAC MAR Agenda About Amazon Web Service Sign up the AWS account AWS Management Oracle Apps AMI – Siebel CRM – EBS R
Arun Madhavan Graduate Assistant, iPlant Collaborative Experiences with Eucalyptus.
Launch Amazon Instance. Amazon EC2 Amazon Elastic Compute Cloud (Amazon EC2) provides resizable computing capacity in the Amazon Web Services (AWS) cloud.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
#SummitNow Alfresco Deployments on AWS Cost-Effective, Scalable & Secure Michael Waldrop Director, Solutions Engineering .
© 2015 MetricStream, Inc. All Rights Reserved. AWS server provisioning © 2015 MetricStream, Inc. All Rights Reserved. By, Srikanth K & Rohit.
100% Exam Passing Guarantee & Money Back Assurance
INTRODUCTION TO AMAZON WEB SERVICES (EC2). AMAZON WEB SERVICES  Services  Storage (Glacier, S3)  Compute (Elastic Compute Cloud, EC2)  Databases (Redshift,
SEMINAR ON.  OVERVIEW -  What is Cloud Computing???  Amazon Elastic Cloud Computing (Amazon EC2)  Amazon EC2 Core Concept  How to use Amazon EC2.
MODULE #8 – Amazon Machine Image [AMI] AWS Administration SUVEN IT  How to create an AWS account ?  How to manage an AWS Console?  Navigating the AWS.
Project CTF Yeganeh Safaei Arizona State University
THE BATTLE OF CLOUDS Openstack vs. Amazon
Amazon Network as a Service
Quattor in Amazon Cloud
Agenda Who am I? Whirlwind introduction to the Cloud
Cloud Security.
Honeypots at CESNET/MU
Welcome to AWS Certification Exam
AWS COURSE DEMO BY PROFESSIONAL-GURU. Amazon History Ladder & Offering.
Acutelearn Amazon Web Services Training Classroom Training Instructor led trainings at Acutelearn premises Corporate Training Custom tailored trainings.
Amazon Web Services as a team project platform
Network Services, Cloud Computing, and Virtualization
Cloud Computing ISY143.
CANVAS Report for CTF Event at USAFA on 4/25/2007
Buy September 2018 Valid Amazon AWS-SysOps Dumps Questions - Amazon AWS-SysOps Braindumps Realexamdumps.com
6. Operating Systems Finger printing & Scanning
Webinar # April 2017 Isolates in the Cloud
AWS Boulder - Denver Meetup – January 2017
Brandon Hixon Jonathan Moore
Managing Services with VMM and App Controller
Lecture 16B: Instructions on how to use Hadoop on Amazon Web Services
Different types of Linux installation
The Blue Book pages 19 onwards
Cloud Computing: Concepts
Nicholas Novello, Shayne Gradwell, Nikolas Todd
SQL Server using Amazon Web Services EC2 Instances
Security in Cloud Computing
Presentation transcript:

ICTF EC2 By Daniel Ruiz

Summary Background ICTF and EC2 Create AMI Manage AMI Cloud Networking ICTF EC2 Network Layout Problems Future Work

Background ICTF and EC2 ICTF EC2 International Capture the Flag (ICTF) is a hacking competition held yearly in December UCCS has been participating in ICTF since 2006 EC2 Amazon Elastic Compute Cloud (EC2) is a web service that provides compute capacity in a cloud. Allow the creation of an Amazon Machine Image (AMI) which is essentially an OS image that can be uploaded and ran within Amazons EC2.

Background Cont. ICTF EC2 Goals Is an attempt to mimic the ICTF network from within Amazons EC2 Goals Allow students to have hands on experience in an ICTF environment before the competition Allow for experimentation on attack and defense

Create AMI Amazon EC2 account AWS Access Key Identifiers x.509 certificate AMI-Tools are needed to create an Linux/Windows AMI Existing AMI’s can also be used Amazon Web Service (AWS) Management Console Elasticfox (Firefox plugin)

Manage AMI AMI cannot be shutdown only terminated and rebooted AMI-Tools can be used to manage AMI GUI Managers are also available: ElasticFox AWS Management Console AWS Management Console ElasticFox

Cloud Networking

ICTF EC2 Network Layout

Problems Cloud Security Cost $$$ Cannot run certain attacks (DoS and DDos) from within the cloud Cost $$$ IP’s can take up to 24 hours to trickle there way through the internet (Can be solved with Elastic IP) Can get kicked out of cloud Would require new account and rebuilding of ICTF images

Future Work Automate deployment and shutdown of the ICTF Cloud Network Create an intelligent network intrusion detection system (NIDS) Experiment with network security solutions such as: Protocol Intrusion Detection Systems (PIDS ) Host-Based Intrusion Detection Systems (HIDS) Honeypots Tarpits

Questions

Connecting to AIM

Snort and WireShark