Comparison to existing state of security experimentation

Slides:



Advertisements
Similar presentations
TIED: A Cluster of One TIED: Trial Integration Environment DETER built on.
Advertisements

METHODOLOGY FOR IDENTIFYING NEAR-OPTIMAL INTERDICTION STRATEGIES FOR A POWER TRANSMISSION SYSTEM Vicki M. Bier, Eli Robert Gratz, Naraphorn J. Haphuriwat,
I would like to thank Louis P. Wilder and Dr. Joseph Trien for the opportunity to work on this project and for their continued support. The Research Alliance.
The Challenges of Repeatable Experiment Archiving – Lessons from DETER Stephen Schwab SPARTA, Inc. d.b.a. Cobham Analytic Solutions May 25, 2010.
Design Deployment and Use of the DETER Testbed Terry Benzel, Robert Braden, Dongho Kim, Clifford Informatino Sciences Institute
Lecture 7 Page 1 CS 236, Spring 2008 Proving It CS 236 Advanced Computer Security Peter Reiher May 13, 2008.
Embedded in a nanomanufacturing research center Librarians & Scholarly Communication: New Roles and Services Jessica Adamick InterNano Project Manager.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
Cluster Computing and Genetic Algorithms With ClusterKnoppix David Tabachnick.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
A Critical Infrastructure Testbed for Cybersecurity Research and Education Ai Onda, Kalana Pothuvila, Joseph Urban, and Jordan Berg Abstract Awareness.
The LOGIIC Consortium Zachary Tudor, CISSP, CISM, CCP Program Director SRI International.
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
Safe Computing Outreach Joseph Howard Undergraduate Research Assistant 05/01/2015 Disclaimer: This research was supported by the National Science Foundation.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
1 Supporting the development of distributed systems CS606, Xiaoyan Hong University of Alabama.
Where are the Academic Jobs ? Interactive Exploration of Job Advertisements in Geospatial and Topical Space Angela M. Zoss 1, Michael Conover 2 and Katy.
The FI-WARE Project – Base Platform for Future Service Infrastructures FI-WARE Interface to the network and Devices Chapter.
October 15, 2003 Art Vandenberg Internet2 Fall Member Meeting1 Taking Grids out of the Lab and onto the Campus at Georgia State University – Case Study.
Computer Aided Design By Brian Nettleton This material is based upon work supported by the National Science Foundation under Grant No Any opinions,
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
Scientific Workflow systems: Summary and Opportunities for SEEK and e-Science.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
QUALITY MEASURES: METROLOGY MADE IN FLORIDA - INDUSTRY TOURS 1 of 12.
Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity.
Networking: Applications and Services Antonia Ghiselli, INFN Stu Loken, LBNL Chairs.
Leader Interviews Name, PhD Title, Organization University This project is funded by the National Science Foundation (NSF) under award numbers ANT
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
HOW TO BUILD A BETTER TESTBED Fabien Hermenier Robert Ricci LESSONS FROM A DECADE OF NETWORK EXPERIMENTS ON EMULAB TridentCom ’
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Geoffrey Fox Panel Talk: February
Cyber Security in the Water Sector
A Low Cost, Portable Platform for Information Assurance and Security Education Dan C. Lo, Kai Qian Department of Computer Science and Software Engineering.
Network Security Analysis Name : Waleed Al-Rumaih ID :
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Understanding the Threats of and Defenses Against Cyber Warfare
Making “Open Data” Work: Challenges for Data Integration in Genomics Research
Christos Markou Institute of Nuclear Physics NCSR ‘Demokritos’
Data & Network Security
Applying Open Source to Open Science
Discussion and Conclusion
Chapter 9: Research Issues in Software Engineering
The Need Addressed by CloudLab
Clemson University: Jill Gemmill
TRUST:Team for Research in Ubiquitous Secure Technologies
SECURITY MECHANISM & E-COMMERCE
Shadow: Scalable and Deterministic Network Experimentation
Sky Computing on FutureGrid and Grid’5000
Title of Poster Site Visit 2017 Introduction Results
Vicki M. Bier, Eli Robert Gratz, Naraphorn J
People Who Did the Study Universities they are affiliated with
Title of session For Event Plus Presenters 12/5/2018.
Efficient Memory Safety for TinyOS 2.1
Reducing Costs of Running Universities with Open Source Software
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Introducing Entrepreneurship to Ursinus College: Pitfalls and Progress
Title of Poster Site Visit 2018 Introduction Results
For the MVHS Cyber Defense CLub
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Sky Computing on FutureGrid and Grid’5000
Topic 12: Virtual Private Networks
OpenDP: A Pitch for a Community Effort
Presentation transcript:

Comparison to existing state of security experimentation Cyber Defense Technology Experimental Research Network (DETER) http://www.isi.edu/deter The DETER testbed provides general-purpose, remotely accessible and partitionable experimental infrastructure to support the development and demonstration of next-generation information security technologies. It is designed to support repeatable experiments in computer security, especially those experiments that involve malicious code. DETER Testbed Architecture Built using Utah’s EMULAB, the DETER testbed has been configured and extended to provide stronger assurances for isolation and containment.. The DETER testbed supports a community of academic, government, and industrial researchers who collaborate and build upon one anothers prior work to run reproducible experiments on system and network attack response and countermeasures. Nodes count: 139 at USC and 62 at Berkeley (9/7/2005) Comparison to existing state of security experimentation Previous approaches Dedicated resources for each researcher. Lack of scientific rigor, poor controls. Difficult to reproduce conditions using open networks. Hard to compare results from different experiments. Danger to the internet from uncontained experiments. DETER approach Shared resources available to community of researchers. Isolation from public internet and from other experiments provides stronger controls. Provides better reproducibility of experiments. Serves as a repository for experiment inputs, traces, topology, software configuration, and network environment. Securely isolated environment for dangerous code. DETER Goals Resources: provide broad library of background & attack traffic traces, traffic & topology generators, experimental profiles, & instrumentation facilities. Reproducibility: repeatable conditions for experiment. Programmability: able to try new algorithms. Scalability: growth in nodes & interconnection of sites. Isolation: To prevent interference to experiments by other experiments or events external to testbed. Containment: To prevent exfiltration from testbed. Confidentiality & Integrity: To protect traces and other inputs, & to protect experimental results. The DETER Testbed This work was supported by funding from the National Science Foundation and the Department of Homeland Security under contract numbers ANI-0335298 (DETER) and CNS-0454381 (DECCOR). Opinions, findings, conclusions and recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the National Science Foundation (NSF).