Secure Cyber Incident Information Sharing UTSA Team Leads Dr. Ram Krishnan, Assistant Professor, ECE Dr. Ravi Sandhu, Executive Director, ICS April 30,

Slides:



Advertisements
Similar presentations
Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University.
Advertisements

1 Towards a Discipline of Mission-Aware Cloud Computing (A Position Paper) Ravi Sandhu Executive Director and Endowed Professor October 2010
1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
1 Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair April 12, © Ravi Sandhu World-Leading.
Canada-EU Future Internet Workshop Waterloo, Canada March 24th, 2011 Ignacio M. Llorente DSA-Research.org Distributed Systems Architecture Research Group.
System Center 2012 R2 Overview
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Institute for Cyber Security Extending OpenStack Access Control with Domain Trust World-Leading Research with Real-World Impact! 1 Bo Tang and Ravi Sandhu.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
Secure Information and Resource Sharing in CloudSecure Information and Resource Sharing in Cloud References OSAC-SID Model [1]K. Harrison and G. White.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
11 World-Leading Research with Real-World Impact! A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon, Ram.
“Grandpa’s up there somewhere.”. Making your IT skills virtual What it takes to move your services to the cloud Erik Mitchell | Kevin Gilbertson | Jean-Paul.
Virtual Clusters Supporting MapReduce in the Cloud Jonathan Klinginsmith School of Informatics and Computing.
+ System Center 2012 SP1 – What’s The Cloud Got To Do With it?
Sanbolic Enabling the Always-On Enterprise Company Overview.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
Metadata in the Cloud Computing 07th June 2012 Baba Piprani Ewelina Szczekocka.
UTSA Amy(Yun) Zhang, Ram Krishnan, Ravi Sandhu Institute for Cyber Security University of Texas at San Antonio San Antonio, TX Nov 03, 2014 Presented.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
Climate Sciences: Use Case and Vision Summary Philip Kershaw CEDA, RAL Space, STFC.
Cloud computing.
Introduction to Cloud Computing
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Cloud Computing in NASA Missions Dan Whorton CTO, Stinger Ghaffarian Technologies June 25, 2010 All material in RED will be updated.
Secure Cyber Incident Information Sharing UTSA Team Leads Dr. Ram Krishnan, Assistant Professor, ECE Dr. Ravi Sandhu, Professor (CS) and Executive Director.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
1 © 2009 Cisco Systems, Inc. All rights reserved.Cisco Confidential Cloud Computing – The Value Proposition Wayne Clark Architect, Intelligent Network.
Advanced Topics StratusLab Tutorial (Orsay, France) 28 November 2012.
Russ Hobby Program Manager Internet2 Cyberinfrastructure Architect UC Davis.
Institute for Cyber Security Multi-Tenancy Authorization Models for Collaborative Cloud Services Bo Tang, Ravi Sandhu, and Qi Li Presented by Bo Tang ©
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware A Cloud Computing Methodology Study of.
Web Technologies Lecture 13 Introduction to cloud computing.
Virtual techdays INDIA │ august 2010 virtual techdays INDIA │ august 2010 Building the Road to Private Cloud M.S.Anand │ Technology Evangelist,
30 November 2001 Advisory Panel on Cyber Infrastructure National Science Foundation Douglas Van Houweling November 30, 2001 National Science Foundation.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Transform the datacenter brought to you by [insert partner name] Speaker name 00/00/0000 Insert your Logo here.
1 Views of Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair March 25, © Ravi Sandhu.
1 Authorization Federation in Multi-Tenant Multi-Cloud IaaS Navid Pustchi Advisor: Prof. Ravi Sandhu.
EGI-InSPIRE RI EGI Compute and Data Services for Open Access in H2020 Tiziana Ferrari Technical Director, EGI.eu
EGI-InSPIRE RI An Introduction to European Grid Infrastructure (EGI) March An Introduction to the European Grid Infrastructure.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Unit 3 Virtualization.
Making Cross-campus, Inter-institutional Collaborations Work
Chapter 6: Securing the Cloud
Avenues International Inc.
South Big Data Innovation Hub
Institute for Cyber Security
Smart Cities and Communities and Social Innovation
Institute for Cyber Security
ATLAS Cloud Operations
Federated IdM Across Heterogeneous Clouding Environment
AWS. Introduction AWS launched in 2006 from the internal infrastructure that Amazon.com built to handle its online retail operations. AWS was one of the.
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
CNIT131 Internet Basics & Beginning HTML
Attribute-Based Access Control: Insights and Challenges
Virtualization Layer Virtual Hardware Virtual Networking
See your OpenStack Network Like Never Before
Attribute-Based Access Control: Insights and Challenges
Cloud Computing: Concepts
Views of Cloud Computing
Windows Azure Hybrid Architectures and Patterns
Productive + Hybrid + Intelligent + Trusted
Presentation transcript:

Secure Cyber Incident Information Sharing UTSA Team Leads Dr. Ram Krishnan, Assistant Professor, ECE Dr. Ravi Sandhu, Executive Director, ICS April 30, 2014

LMI Research Institute (LRI): Academic Partnership Program Through formal working relationships with universities across the country, LMI bridges the gap between academia and industry to create innovative solutions and explore new research topics The partnership program exposes students to real-world challenges faced by the federal government through structured, funded research projects

Cyber Incident Response Secure information sharing amongst a set of entities/organizations – Often ad hoc What are the effective ways to facilitate information sharing in such circumstances? – Information sharing models – Infrastructure, technologies, platforms

Org A Org B Org C Org D Team 1 Team 2 County Threat Emergency Response Local Police Personnel+ Resources Long-Term Members Personnel Join/Leave Resources Add/Remove Personnel+ Resources Within a team:  Controlled access  Flexible and fine-grained access control  Team should function unaffected by membership dynamics Agile Incident Response

Cyber Incident Information Sharing Scenarios Community – Cyber incidents across critical infrastructure providers in a community Emergency response, healthcare, banks, utility Electric grid – Cyber incidents in electric power provider orgs Local utilities, ISOs, ERCOT, NERC

Key Requirements Cyber infrastructure sharing to support data and compute – Need a community information sharing platform Controlled access Light-weight and agile Rapid deployment and configuration Secure environment

Cloud Infrastructure as a Service Virtualized IT infrastructure (servers, storage, networks, OS, etc.) – Delivered as a service over a network, on demand, dynamic scaling, etc. Prominent examples – Amazon AWS – OpenStack

Enforcement in Cloud IaaS Participant B Secure Isolated Domain (SID) Community Cloud Add/Remove Data Join/Leave Users Add/Remove Data Join/Leave Users Add/Remove Data Join/Leave Users View #1: Participant C View #2: SID View #1: Participant B View #2: SID View #1: Participant A View #2: SID Participant C Participant A

Next Steps UTSA to incorporate INL input Develop prototype in OpenStack Share research results with INL – August/September

Thanks Comments, Q&A

Backup

OpenStack – Dominant open source cloud IaaS platform  > 200 companies  ~14000 developers  >130 countries

Project Goal Storage Servers Network CSP Personnel Tasks: 1.Manage Virtual Infrastructure 2.Create and Manage Tenants (e.g. create tenant super-user) Tenant #1 IT Super-Users (Architects) Tasks: 1.Architect Attributes of Org’s Users + Cloud Resources 2.Create and Manage Admin Users 3.Manage Attributes of Admin Users Tenant #1 Administrative IT Users Tasks: 1.Create and Manage Org’s Regular Users 2.Manage Attributes of Regular Users 3.Manage Attributes of Org’s Resources CSP’s OpenStack Tenant #1 Regular IT Users Tasks: 1.Day-to-Day Operations 2.Add/Remove Capacity 3.Manage N/W 4.Backup, Snapshot, etc. Tenant #2 Tenant #3 ABAC Administrative ModelsABAC Operational Models Utilize Inter-Tenant Sharing

Closed Network Scenario Unusual activity in Air Force, Navy & Army networks A physically secure and air-gapped meeting room with members from AFCYBER, ARCYBER and FLTCYBER Members bring data for analysis and collaboration – Maps, a VM configured with software tools, a VM image with a virus/worm, log files, etc. Strict control on data import/export

Data Exfiltration Scenario Unusual file transfers from IP addresses within an org to an external IP address Similar activities observed in partner orgs Need to find if these events are connected – Any correlation between those files? Members bring data for analysis+collaboration