Icarus: A Revolution in Distributed Security Management Rob Bird, University of Florida Gregory Marchwinski, Red Lambda Inc.

Slides:



Advertisements
Similar presentations
Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
TANDBERG Content Server January Organizational Challenges Corporations have struggled in the past:  Achieving unified communications within a global.
Network Instruments Troubleshooting Techniques. What to look for in network monitoring solutions… Key Elements Real Time Statistics Visual Network Traffic.
Tom Sheridan IT Director Gas Technology Institute (GTI)
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Unified Logs and Reporting for Hybrid Centralized Management
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Experiments and Tools for DDoS Attacks Roman Chertov, Sonia Fahmy, Rupak Sanjel, Ness Shroff Center for Education and Research in Information Assurance.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
1 Chapter 7 IT Infrastructures Business-Driven Technology
Supplement 02CASE Tools1 Supplement 02 - Case Tools And Franchise Colleges By MANSHA NAWAZ.
IBM Security Network Protection (XGS)
Advanced Internet Bandwidth and Security Strategies Fred Miller Illinois Wesleyan University.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
Network Architecture for Automatic Security and Policy Enforcement Internet2 Members Meeting Fall 2005 Eric Gauthier ~ Boston University Kevin Amorin ~
Office of Information Technologies CAMP: Bridging Security and Identity Management Christopher Misra 14 February 2008 Tempe, AZ Protecting Network Assets.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Blackboard at Cornell University Clare van den Blink, Cornell Information Technologies
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Create with SharePoint 2010 Jen Dodd Sr. Solutions Consultant
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
SOA, BPM, BPEL, jBPM.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
Module 6 Planning and Deploying Messaging Security.
Systems Design Approaches The Waterfall vs. Iterative Methodologies.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Computer Emergency Notification System (CENS)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
WHAT OUR CUSTOMERS ARE SAYING “After thorough market research and a review process, Qorus Breeze Proposals stood out from the competitors because of its.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
CASE (Computer-Aided Software Engineering) Tools Software that is used to support software process activities. Provides software process support by:- –
Cryptography and Network Security Sixth Edition by William Stallings.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Chapter 4 Automated Tools for Systems Development Modern Systems Analysis and Design Third Edition 4.1.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
REGIONAL STAKEHOLDER TWG KICKOFF WEBINAR MAY 4 1:30-3:30 PM Next Generation Transit Service Information Portal.
Momentum. Strategy & Roadmapping Business Analysis Information Architecture Usability / User Experience Rich Media Social Media (Web 2.0) Interface Design.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
ILink Systems, Inc Feb, 2014 Government IT Solutions.
1. Definition : Malicious code refers to a program that is covertly inserted into another program with the intent to Malicious activities. 2.
Security Methods and Practice CET4884
BMC Integration Service Overview and Architecture
Modern Systems Analysis and Design Third Edition
Securing the Network Perimeter with ISA 2004
EIN 6133 Enterprise Engineering
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Modern Systems Analysis and Design Third Edition
Protecting Network Assets
Modern Systems Analysis and Design Third Edition
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
Securing Windows 7 Lesson 10.
Introduction to Internet Worm
Presentation transcript:

Icarus: A Revolution in Distributed Security Management Rob Bird, University of Florida Gregory Marchwinski, Red Lambda Inc.

Agenda The Problem The Solution - Icarus Icarus System Architecture Icarus Features Use Case Summary

The Problem From the SALSA-Netauth document Strategies for Automating Network Policy Enforcement: “The major security challenge facing university residential networks and other large-scale end-user networks is the thousands of privately owned and unmanaged computers directly connected to an institution's relatively open, high- speed Internet connections. Security policy enforcement is often lax due to a lack of central control over end-user computers and an inability to tie the actions of these computers to particular individuals. A few times a year there are surge events, including the predictable start of each semester and the unpredictable and increasingly frequent reactions to large-scale security incidents, that require massive support intervention.” Current security products lack the sophistication to control & stop P2P networks & defend against mass infection by malware/malusers. Highly Fragmented Network Security & Management marketplace – many point solutions, many appliances, no central architecture, little automation Human intervention is necessary to manage security tasks such as P2P & process vast amounts of data – often overwhelming existing IT Staff members

The Solution - Icarus Developed at the University of Florida in December 2002 to automate security and policy enforcement –In production on 10,000 user residential network since 2003 –Now on version 2 Automatically performs policy-based admission control, mitigates P2P networks, complex malware scenarios and manages adherence to university security policy Distributed framework – enables security and network management via three key elements - Neuron Microkernel, Collaborative Grid, Peer Management Console Patent Pending –developed as an open standards middleware collaborative grid system to utilize all connected resources to defend / manage the network Recognized by industry analysts and highlighted in numerous technical publications

Icarus System Architecture

Product Features Java 5 XML-based policy and messaging architecture allows complex workflow automation via graphical or text editor Lightweight microkernel features component-based architecture which allows third party applications, libraries (Java and C/C++) and scripts (Perl and Python/Jython) to be combined and used as elements in the workflow –EG: Existing UF implementation integrates into network registration, security appliances, network hardware, trouble ticketing, billing, judicial management and captive information portal Allows the easy combination of L2, L3 and L7 detection, isolation, notification and remediation techniques Equally suited to wired or wireless networks Drives behavioral change of students by sending a clear and consistent message –Traffic enforcement cameras vs. Citation by policeman

Product Features Extensible solution to management issues such as: –P2P network abuse –Viral and worm attacks –Spam relays - automatically contains –Spyware –Botnets –Outbound malicious behavior such as port scans, exploit scans, etc.

Product Features Hierarchical administration levels enables multiple views and span of control via console to reflect organizational boundaries and federated management schemes Ability to quickly change automatic behavior of system via graphical work flow interface or built-in command editor Extensive reporting engine helps generate compliance and exception reports for internal and third party use

Product Features

Use Case – UF In production since 2003 Automates complete registration, detection, isolation, notification and remediation workflow for P2P, malware and maluser scenarios P2P policy enforcement –No DMCA complaints since 2003 –1 st Offense: 15 minute campus-only restriction –2 nd Offense: 5 day campus-only restriction –3 rd Offense: Refer to judicial affairs –Automatically generates remediation and education content for captive information portal Malware/Maluser policy enforcement –Classful isolation system, different isolation types depending on situation –Automatically generates remediation and education content for captive information portal

Use Case – UF Access Level Requires Registration? Destination Restrictions ? Routed?Notes GuestNoYes Allows access to registration and information sites only RestrictedYes Allows access to University resources only QuarantineSpecialYesNoAllows access to local network quarantine resources Black HoleSpecialYesNoUntrunked, Unrouted NormalYesNoYesTypical User Wireless GuestNoYes Allows access to registration and information sites only Wireless Restricted Yes Allows access to University resources only Wireless Quarantine SpecialYesNoAllows access to local network quarantine resources Wireless Normal YesNoYesTypical User TerminatedNo Service Last resort

Use Case – UF st Offense nd Offense rd Offense Total Offender RatesRecidivism Rates Pre-Icarus % of residents using P2P54.67% Post-Icarus % of total residents w/1 st Offense27.64% of 1 st to 2 nd Offense21.01% % of total residents w/2 nd Offense5.81% of 2 nd to 3 rd Offense15.67% % of total residents w/3 rd Offense0.91% of 1 st to 3 rd Offense3.29% *NOTE: Offender and Recidivism Rates do not include

Case Study – UF

Summary Patent-pending technology features fully-distributed collaborative grid architecture for distributed security and network management Architecture designed to enable product enhancements and quick addition / distribution of new modules Easily leverages security tools and methods thereby increasing the value of existing software/system investments P2P Mitigation being deployed in October to early adopters, GA in December Pricing per user per year with extensive educational discount structure In production for over 2.5 years at the University of Florida managing over 10,000 users

Questions? Rob Bird – Greg Marchwinski – Other information: