1 Advanced Security Research Wes Hardaker Eric Monteith, Russ Mundy, Eric O’Brian, Ron Ostrenga, Dan Sterne, Roshan Thomas NAI Labs under contract to DARPA.

Slides:



Advertisements
Similar presentations
On the Necessity of Handling DDoS Traffic in the Middle of the Network Peter Reiher UCLA Computer Communications Workshop October 22, 2008.
Advertisements

Pie(s) in the Sky Mark Crovella Boston University Computer Science.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
Stealth Network Strategies: Offensive and Defensive Mark Loveless RAZOR Security BindView Corporation.
Testing SIP Services Over IP. Agenda  SIP testing – advanced scenarios  SIP testing - Real Life Examples.
1 Experiments and Tools for DDoS Attacks Roman Chertov, Sonia Fahmy, Rupak Sanjel, Ness Shroff Center for Education and Research in Information Assurance.
1 GENI: Global Environment for Network Innovations Jennifer Rexford Princeton University
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
W4140 Network Laboratory Lecture 13 Dec 11 - Fall 2006 Shlomo Hershkop Columbia University.
ExaSphere Network Analysis Engine © 2006 Joseph E. Johnson, PhD
A Performance Analysis of Gateway- to-Gateway and End-to-Gateway L2TP VPN Author: Rukhsana Rahim Butt.
1 Sonia Fahmy Ness Shroff Students: Roman Chertov Rupak Sanjel Center for Education and Research in Information Assurance and Security (CERIAS) Purdue.
Given Connections Solution
(Geneva, Switzerland, September 2014)
What is Actual Internet Speed? Seung Il Lee Network Engineer NTT Com ICT Solutions.
Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine,
Anticensorship in the Network Infrastructure Eric Wustrow University of Michigan.
SECURING NETWORKS USING SDN AND MACHINE LEARNING DRAGOS COMANECI –
Survey – IDS Testing Marmagna Desai [ 592 Presentation]
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
CI Days: Planning Your Campus Cyberinfrastructure Strategy Russ Hobby, Internet2 Internet2 Member Meeting 9 October 2007.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Honeypot and Intrusion Detection System
1 W. Owen – ISECON 2003 – San Diego Designing Labs for Network Courses William Owen Michael Black School of Computer & Information Sciences University.
Current Practice for Network Analysis in CSTNet Chunjing Han CSTNET, CNIC
SECURITY WG Paul Howell, Eric Boyd Internet2 © 2015 Internet2.
KFSensor Vs Honeyd Honeypot System Sunil Gurung
What is Cyberinfrastructure? Russ Hobby, Internet2 Clemson University CI Days 20 May 2008.
Research and Educational Networking and Cyberinfrastructure Russ Hobby, Internet2 Dan Updegrove, NLR University of Kentucky CI Days 22 February 2010.
The Mitre Meteor Robot Control Software “Simulate As You Operate” Presented by Darrell L Sims Richard M. Weatherly Frederick S. Kuhl Robert H. Bolling.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Distributed Denial of Service Attacks
Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity.
EMIST DDoS Experimental Methodology Alefiya Hussain January 31, 2006.
Africa IXP. Outline / Overview Connectivity in Africa 400’000’000.
FUTURE INTERNET: PROPOSAL “PROBLEMS IN CURRENT INTERNET” M S Siddiqui [ID ] Networking LAB, KHU
Alexey A. Didyk Kherson national technical university, Ukraine
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
ICN Baseline Scenarios draft-pentikousis-icn-scenarios-04 K. Pentikousis (Ed.), B. Ohlman, D. Corujo, G. Boggia, G. Tyson, E. Davies, P. Mahadevan, S.
1 Defense Strategies for DDoS Attacks Steven M. Bellovin
Network design Topic 6 Testing and documentation.
1 New Algorithms and Protocols: Development and Testing at HPGC Research Lab PATH: measures Bottleneck Bandwidth PATH: measures Bottleneck Bandwidth Testing.
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
Network Computing Services, Inc. Real-Time Visualization of IP Streams over Switched WANs Real-Time Visualization of IP Streams Over Switched WANs Timothy.
Cyberinfrastructure Overview Russ Hobby, Internet2 ECSU CI Days 4 January 2008.
TechOrchard Phil Poje, CEO. Benefits and Risks Data Breaches BYOD Mobile Device Management.
Advanced Anti-Virus Techniques
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Engage convert more SALES. Let’s take a look at Today’s Automobile buyer’s buying behavior.
CERN Campus Network Infrastructure Specificities Jean-Michel Jouanigot Campus Network Leader CERN EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH EUROPEAN LABORATORY.
Innovations in regulators control tools FG Innovation + ICT Innovation WS Meeting September 2013, Geneva Sami Tabbane.
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Your Systems Don't Work With Ubuntu (and this is one way we can help you fix that) Jeffrey Lane Hardware Certification Engineer Platform Services Team,
Research Focused Networking ● Science DMZ ● Network segment topologically close to campus edge, available as a co-location space for research data ● Optimized.
Direct Deposit Phishing Attack
DDoS Defense for a Community of Peers
Introduction An introduction to the software and organization of the Internet Lab.
IS 4506 Server Configuration (HTTP Server)
Development & Evaluation of Network Test-beds
BORDER WAIT TIME WORKING GROUP Technology Evaluation and Deployment
The New Internet2 Network: Expected Uses and Application Communities
Office 365 Performance Management

Presentation transcript:

1 Advanced Security Research Wes Hardaker Eric Monteith, Russ Mundy, Eric O’Brian, Ron Ostrenga, Dan Sterne, Roshan Thomas NAI Labs under contract to DARPA Designing a Test Bed for Evaluating DDoS Defense Research

2 Advanced Security Research Building a test environment to emulate the real world Designing a Test Bed for Evaluating DDoS Defense Research

3 Advanced Security Research October 12, 2001 Overview Today’s World Our Study and Goals Collecting Information The BOF Tonight Questions

4 Advanced Security Research October 12, 2001 Today’s World

5 Advanced Security Research October 12, 2001 Today’s DDoS World Them # = many You # = few Network = Complex

6 Advanced Security Research October 12, 2001 Today’s Research World Them # = few You # = 1 Network = Simple

7 Advanced Security Research October 12, 2001 A Huge Discrepancy The Real World Research/Validation Cost

8 Advanced Security Research October 12, 2001 The Middle Ground The Real World Research/Validation US

9 Advanced Security Research October 12, 2001 Study Goals Construction Specifications: –Possible Network Topologies –Equipment needs and costs –Connectivity to the real Internet –Staffing and administration

10 Advanced Security Research October 12, 2001 Study Goals Simulation and Usage Specifications: –Manually Launched attack using real DDoS tools –Capture and Replay of traffic –Traffic generation

11 Advanced Security Research October 12, 2001 We Need Help We are seeking input from: –Vendors –Large ISPs –Research Organizations –Government Organizations –Victim Sites –You!

12 Advanced Security Research October 12, 2001 We Need Your Help BOF Tonight –Requirement Discussion. –Solution Discussion. –Feedback from you.

13 Advanced Security Research October 12, 2001 Questions ?

14 Advanced Security Research October 12, 2001 Contact Us Project Team: Wes Hardaker: