Analysis of Terminal Server Architectures for Thin Clients in a High Assurance Network Steven R. Balmer & Cynthia E. Irvine Department of Computer Science.

Slides:



Advertisements
Similar presentations
Topology The physical topology of a network refers to the configuration of cables, computers and other peripherals. The main types of network topologies.
Advertisements

Distributed Data Processing
Distributed Processing, Client/Server and Clusters
ICS 434 Advanced Database Systems
Computer networks Fundamentals of Information Technology Session 6.
Chapter 6 Security Kernels.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
Trusted Hardware: Can it be Trustworthy? Design Automation Conference 5 June 2007 Karl Levitt National Science Foundation Cynthia E. Irvine Naval Postgraduate.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
Presented by, Sai Charan Obuladinne MYSEA Technology Demonstration.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 12 Slide 1 Distributed Systems Design 1.
File Systems (2). Readings r Silbershatz et al: 11.8.
Software Development Architectures Ankur K. Rajopadhye Louisiana Tech University.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Chapter 1 An Introduction to Networking
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
Remote OMNeT++ v2.0 Introduction What is Remote OMNeT++? Remote environment for OMNeT++ Remote simulation execution Remote data storage.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
A Cloud-Oriented Cross-Domain Security Architecture 단국대학교 컴퓨터 보안 및 OS 연구실 임경환 Thuy D. NguyenMark A. Gondree The 2010 Military.
A Multilevel Secure Testbed to Support Coalition Operations 12 December 2005 Cynthia Irvine, PhD Department of Computer Science Naval Postgraduate School.
Chapter 1 An Introduction to Networking Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft IT Academy Administrator Computer Information.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
By. Shafiq Ahmed Chachar Internet Applications Internet Relay Chat Telnet Search Engines E-Commerce File Transfer Protocol (FTP) Popular Uses of.
A Project Training Seminar on “Server Multi Client Chat”
Basic Concepts Of CITRIX XENAPP.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Personal Computer - Stand- Alone Database  Database (or files) reside on a PC - on the hard disk.  Applications run on the same PC and directly access.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
CENTRALISED AND CLIENT / SERVER DBMS. Topics To Be Discussed………………………. (A) Centralized DBMS (i) IntroductionIntroduction (ii) AdvantagesAdvantages (ii)
An Introduction to Networking
Unit 9: Distributing Computing & Networking Kaplan University 1.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
 Abstract of Green Computing  Green computing, green IT or ICT Sustainability, refers to environmentally sustainable computing or IT. In the article.
A Scalable Virtual Registry Service for jGMA Matthew Grove DSG Seminar 3 rd May 2005.
Communications & Networks National 4 & 5 Computing Science.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Archictecture for MultiLevel Database Systems Jeevandeep Samanta.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Vignesh Ravindran Sankarbala Manoharan. Infrastructure As A Service (IAAS) is a model that is used to deliver a platform virtualization environment with.
CSC 480 Software Engineering Lecture 17 Nov 4, 2002.
Network Security The Parts of the Sum Stephen T. Walker Overview by Justin Childs.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
Chapter 16 Client/Server Computing Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
Distributed Systems Architectures. Topics covered l Client-server architectures l Distributed object architectures l Inter-organisational computing.
Network Attached Storage Overview
Securing the Network Perimeter with ISA 2004
CHAPTER 1 INTRODUCTION:
IS4550 Security Policies and Implementation
TERRA Authored by: Garfinkel, Pfaff, Chow, Rosenblum, and Boneh
Comparison of LAN, MAN, WAN
An Introduction to Computer Networking
CLUSTER COMPUTING.
Network+ Guide to Networks, Fourth Edition
Presentation transcript:

Analysis of Terminal Server Architectures for Thin Clients in a High Assurance Network Steven R. Balmer & Cynthia E. Irvine Department of Computer Science Naval Postgraduate School

Agenda Introduction Terminal server topology NPS multilevel secure LAN Seven terminal server topologies & analysis Summary

Introduction Paper Focus Examination of the architectural and security impact of using terminal servers to support thin clients within the context of a high assurance multilevel network Base Project Naval Postgraduate School(NPS) Multilevel Secure Local Area Network (MLS LAN) project

Terminal Server Topologies Multi-user terminal server Deliver the graphic user interface and keyboard service to clients Run operating system and application A protocol interface between the server and the client Client software Permit PC on LAN acting as terminal

Basic Terminal Server Architecture PC LAN Terminal Server

Enterprise Terminal Server Architecture PC LAN Terminal Server Cluster Application Server Cluster

NPS Multilevel Secure LAN Building a system to provide controlled sharing of labeled information Permitting users to access the information through popular pc-based COTS personal and office productivity application

NPS Multilevel Secure LAN Architecture PC TCBE PC TCBE PC TCBE LAN High Assurance Server Trusted

NPS Multilevel Secure LAN Components Application server High assurance base (HAS) (Sever-end) Client workstations Trusted computing based extension (TCBE) (User-end)

Trusted Mail Sever Mail server application with high assurance TCB Supports sharing and labeling information Permits user view of the system of mailboxes at or below the user’s current session level

High Assurance Base Enforce security policy Prevent sensitive data exfiltration Prevent corruption of information of higher integrity Provide multiple users with different access classes to communication with server through single physical network Trusted path Session-level negotiation Single-level session communications at different session level

Client Workstation Thin client Diskless Object reuse Sufficient volatile RAM-disk capability TCBE Ensure RAM or other volatile storage are purged with each change of session level or new user login at the workstation

Trusted Computing Base Extension Secure attention key(SAK) Protected communication channel between TCB and TCBE Mechanism to ensure high assurance object reuse Controlled delivery of operating system and application software to client PC

Terminal Server As Peer Architecture PC TCBE PC TCBE PC TCBE LAN High Assurance Server Trusted Terminal Server

Terminal Server As Peer Analysis Strength Scalable Efficient Weakness LAN communication Terminal Server Low assurance Lack of isolation

Terminal Server in Series With HAS Architecture PC TCBE PC TCBE PC TCBE LAN High Assurance Server Trusted Terminal Server

Terminal Server in Series With HAS Analysis Strength Protected LAN communication Weakness Heavy workload on HAS Terminal server Low assurance Lack of isolation

TCBE Enhanced Terminal Server Architecture PC TCBE PC TCBE PC TCBE LAN High Assurance Server Trusted Terminal Server TS-TCBE

TCBE Enhanced Terminal Server Analysis Strength More efficient runtime communication between client and terminal server Protected LAN communication Weakness Terminal server Low assurance Lack of isolation

Per-sensitivity-level Unenhanced Terminal Server Architecture PC TCBE PC TCBE PC TCBE LAN High Assurance Server Trusted HIGH Terminal Server LOW Terminal Server

Per-sensitivity-level Unenhanced Terminal Server Analysis Strength Physical separate terminal servers with different classification level Weakness Lack of communication protection Terminal server  client/TCBE Terminal server Low assurance

Multiple Terminal Servers in Series with High Assurance Server Architecture PC TCBE PC TCBE PC TCBE LAN High Assurance Server Trusted HIGH Terminal Server LOW Terminal Server

Multiple Terminal Servers in Series With High Assurance Server Analysis Strength LAN communication protection Weakness Heavy workload on HAS Lack of scalability

Multiple TCBE-enhanced Terminal Servers Architecture PC TCBE PC TCBE PC TCBE LAN High Assurance Server Trusted HIGH Terminal Server LOW Terminal Server TS-TCBE

Multiple TCBE-enhanced Terminal Servers Analysis Strength More efficient runtime communication between client and terminal server LAN protected communication Vulnerability Terminal server Low assurance Lack of scalability

Terminal Servers Running on a Secure Virtual Machine Monitor Architecture PC TCBE PC TCBE PC TCBE LAN High Assurance Server Trusted Secure VMM HIGH Terminal Server LOW Terminal Server

Terminal Servers Running on a Secure Virtual Machine Monitor Analysis HAS enforces security policies through separation of data VMM enforces policies through the creation of virtual machines at different sensitivity levels TCBE supports SAK, protected communication interface, object reused controls on client

Summary Identify Three secure configurations Multiple TCBE-Enhanced Terminal Servers Suffer performance problem Lack of scalability Multiple Terminal Servers in Series Lack of scalability Terminal Servers on a High Assurance VMM Ideal Conclusion Using terminal server in a high assurance context with many sensitivity levels is Impractical!

What we learnt ? VMM Support multi-access level Thin client Object reuse Centralized management The whole architecture