Secure Collective Internet Defense (SCID) Yu Cai 05/30/2003

Slides:



Advertisements
Similar presentations
Slipping Past the Firewall DNS Rebinding with Pure Java Applets Billy K Rios (BK) and Nate McFeters.
Advertisements

How to extend Intranet security to the home
On Proxy Server based Multipath Connections (PSMC) PhD Proposal Yu Cai 12/2003 University of Colorado at Colorado Springs.
ASGC Site Update Yi-Ping Wu Jeng-Hsueh Wu. Two Significant Researches 1.Oracle Security issues and Studies for 3D 2.Streams Replications Study Report.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
Module 1: Microsoft Windows 2000 Networking Services Infrastructure Overview.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
System and Network Security Practices COEN 351 E-Commerce Security.
RASD Rapid Adaptive Secure DNS Matthew Weaver Jeremy Witmer Dr. Chow, Advising CS 622 – Fall 2007.
Dynamic Process Allocation in Apache Server Yu Cai.
Design and Implementation of Alternative Route Against DDOS Jing Yang and Su Li.
Explore the use of multiple gateways for intrusion detection defense Sunil Bhave & Sonali Patankar CS526 Fall 2002.
On Proxy Server based Multipath Connections (PSMC) PhD Proposal Yu Cai 10/2003 University of Colorado at Colorado Springs.
1 TPAC 10/10/2003 chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department of Computer Science.
PSMC Proxy Server-based Multipath Connection CS 526 Advanced Networking - Richard White.
Presented By: Vinay Kumar.  At the time of invention, Internet was just accessible to a small group of pioneers who wanted to make the network work.
ChowSCID1 Secure Collective Internet Defense (SCID) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
ChowSCOLD1 Secure Collective Defense Network (SCOLD) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
RASD Rapid Adaptive Secure DNS Matthew Weaver Jeremy Witmer Dr. Chow, Advising CS 622 – Fall 2007.
Delay Tolerant Networking Gareth Ferneyhough UNR CSE Department
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Design of an Autonomous Anti-DDOS Network (A2D2) Angela Cearns Thesis Proposal Master of Software Engineering University of Colorado, Colorado Springs.
ESI Extensions for Web-based Collaboration Introduction to Edge Side Includes: - ESI helps offload the work of web page construction from origin server.
1 Pertemuan 10 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Enhanced Secure Dynamic DNS Update with Indirect Route David Wilkinson, C. Edward Chow, Yu Cai 06/11/2004 University of Colorado at Colorado Springs IEEE.
ChowSCOLD1 Secure Collective Internet Defense (SCOLD) C. Edward Chow Yu Cai Dave Wilkinson Sarah Jelinek Part of this project is sponsored by a grant from.
Investigations into BIND Dynamic Update with OpenSSL by David Wilkinson.
Dynamic Process Allocation in Apache Server Yu Cai.
1 Cybersecurity Symposium 9/19/2003 chow C. Edward Chow Yu Cai Dave Wilkinson Department of Computer Science University of Colorado at Colorado Springs.
1 DACAManet Proposer’s Workshop UCCS-Raytheon Terry Boult C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs Leland.
1 Security Research 2/7/2003 chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department of.
Autonomous Anti-DDoS Network V2.0 (A2D2-2) Sarah Jelinek University Of Colorado, Colo. Spgs. Spring Semester 2003, CS691 Project.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
1 Security Research 1/10/2003 chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department of.
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
SWITCHaai Team Introduction to Shibboleth.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
Trust and Reputation Based mechanisms for CIP Uniparthenope, UniRC, Polito (Fai della Paganella, Febbraio 2014)
Enabling Embedded Systems to access Internet Resources.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
Web-based E-commerce Architecture
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Xitao Wen Xin Zhao Taiyo Sogawa. Protocol-level vulnerability and attack Defense: Intrusion Detection/Prevention Our goal o Defeat Cisco IPS by manipulating.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
A Comparative Study of Signaling Protocols for Data Management and Synchronization # Department of Computer Engineering, Kocaeli University.
1 ITS-ZeeWave Meeting 2/26/2004 UCCS Chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department.
ClearTunnel Close the SSL Hole! Copyright ©2008 Collective Software, LLC.
Module 7: Advanced Application and Web Filtering.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Keith Murphy Supervisor: Dr Caspar Ryan RMIT University – Distributed Systems and Networking Melbourne, AUSTRALIA Keith Murphy1.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
Defence R&D Canada R et D pour la défense Canada Dynamic VPN Controller Update Developed by NRNS Inc. November 12, 2003.
Introduction to Networking
Enterprise Wrappers OASIS PI Meeting March 12, 2002 Bob Balzer Neil Goldman Mahindra
NETWORK INTRUSION SECURITY BREACHES, THAT MAKE NETWORKS VULNERABLE TO UNAUTHORIZED ATTACKS.
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
Intrusion Tolerant Distributed Object Systems Joint IA&S PI Meeting Honolulu, HI July 17-21, 2000 Gregg Tally
Draft-carpenter-v6ops-label-balance-02 Brian Carpenter Sheng Jiang (Speaker) Willy Tarreau March 2012 IPv6 Flow Label for Server Load Balancing - update.
Security Log Visualization with a Correlation Engine: Chris Kubecka Security-evangelist.eu All are welcome in the House of Bytes English Language Presentation.
Denial-of-Service Attacks
C. Edward Chow Department of Computer Science
Chris Meullion Preston Burden Dwight Philpotts John C. Jones-Walker
Network Services, Cloud Computing, and Virtualization
Introduction to the course
Mobile Internet and WAP
Presentation transcript:

Secure Collective Internet Defense (SCID) Yu Cai 05/30/2003

Introduction SCID: Secure Collective Internet Defense system SCID push back intrusion attacks using an enhanced IDIP (Intrusion Detection and Isolation Protocol) and SLP (Service Location Protocol). SCID tolerate DDoS attacks with secure DNS updates, and alternate routes, via a set of proxy servers with intrusion detection.

Introduction

Task List Extend Bind9 DNS with Secure DNS update/query including indirect routing entries using SSL Develop client side indirect routing; Enhance A2D2IDS with IDIP protocol Develop SLP for locating enhanced proxy server; Create test scripts and benchmark to evaluate SCID version 0.1 system; Suggest improvements to SCID version 0.2 system.

More Information