MIT Requirements for TLC IRRIIS MIT Conference ROME 8 February 2007 Giustino FUMAGALLI Arnaud ANSIAUX.

Slides:



Advertisements
Similar presentations
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
Advertisements

Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Distributed Data Processing
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
Introduction to IRRIIS testing platform IRRIIS MIT Conference ROME 8 February 2007 Claudio Balducelli.
Cloud computing security related works in ITU-T SG17
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
GAMMA Overview. Key Data Grant Agreement n° Starting date: 1 st September 2013 Duration: 48 months (end date 31 st August 2017) Total Budget:
ISO 9001 : 2000.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Management of IT Environment (5) LS 2012/ Martin Sarnovský Department of Cybernetics and AI, FEI TU Košice ITIL:Service Design IT Services Management.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
IRRIIS – Integrated Risk Reduction of Information-based Infrastructure Systems Workshop - Middleware Improved Technology for Interdependent Critical Infrastructures.
Security Controls – What Works
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Software Engineering and Middleware: a Roadmap by Wolfgang Emmerich Ebru Dincel Sahitya Gupta.
Lecture 11 Reliability and Security in IT infrastructure.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Stephen S. Yau CSE , Fall Security Strategies.
TERRORISM / POLITICAL VIOLENCE SOLUTIONS FAIR International Insurance Conference on "Political Violence" April 2010 – Karachi Daniel O’Connell
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
ACTION PROPOSAL FOR FLYWHEEL ENERGY TECHNOLOGY Enhance future grid reliability, interoperability, & extreme event protection In 20 years, the flywheel.
Session 4.2: Creation of national ICT security infrastructure for developing countries National IP-based Networks Security Centres for Developing Countries.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
Management Information Systems
ITU Focal Point for Emergency Telecommunications
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Information ITIL Technology Infrastructure Library ITIL.
Global test beds for control, safety, security and dependability in ICT-Enabled Critical Infrastructures From SAFEGUARD Intrusion Detection Test Environment.
1 06/00 Questions 10/6/2015 QoS in DOS ECOOP 2000John Zinky BBN Technologies ECOOP 2000 Workshop on Quality of Service in Distributed Object Systems
S. Bologna, C. Balducelli, A. Di Pietro, L. Lavalle, G. Vicoli ENERSIS 2008 Milano, 17 Giugno, 2008 Una strategia per.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Technical Policy and Standards Andy Gorton – Senior Architect: Institutional Networks.
Introduction to IRRIIS MIT Add-On Components IRRIIS, CRUTIAL & GRID Review Meeting 15 March 2007, Brussels Sandro Bologna.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Applicazione del paradigma Diffserv per il controllo della QoS in reti IP: aspetti teorici e sperimentali Stefano Salsano Università di Roma “La Sapienza”
Engineering Essential Characteristics Security Engineering Process Overview.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
One or More Topologies ? One or More Topologies ? A methodological reflection IRRIIS Project, WP2.1 “Topology Analysis” Rome Meeting, 6,7 April 2006 IST.
Challenge 6: Mobility, Environmental sustainability and energy efficiency Includes as driving objective: “Sustainable growth and environmental sustainability”
Self-healing Architectures based on context DEpendent adaptive Software Agents (SADESA) – an extension of EU-IST Project SAFEGUARD DeSIRE Workshop Pisa,
RESERVOIR RESERVOIR Resources and Services Virtualization without Barriers Philippe Massonet (CETIC)
Introduction to the IRRIIS Simulation SimCIP Césaire Beyel.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Introduction to IRRIIS MIT Add-On Components Middleware Improvement Technology for Interdependent Critical Infrastructure 08 February 2007, Rome Giordano.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
MIT Communication & Risk Management Language Workshop - Middleware Improved Technology for Interdependent Critical Infrastructures 8 February 2007, Rome.
MIT requirements from the TSO perspective MIDDLEWARE IMPROVED TECHNOLOGY (MIT) for increased resilience of Interdependent Critical Infrastructure ROME,
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
INFSO-RI Enabling Grids for E-sciencE NRENs & Grids Workshop Relations between EGEE & NRENs Mathieu Goutelle (CNRS UREC) EGEE-SA2.
IS3220 Information Technology Infrastructure Security
GRC: Aligning Policy, Risk and Compliance
RCC Preparations WCIT-12 Dmitry Cherkesov (Russia) Deputy Head of RCC WP for WCIT-12 Com-ITU Meeting 6 – 8 September 2011 Lisbon, Portugal.
Linda Hanwacker MSCS, MBA, CBCP. Information Technology (IT) – hardware and software used to store, retrieve and process data Communication Technology.
Principles Identified - UK DfT -
CS457 Introduction to Information Security Systems
Critical Infrastructure Protection Policy Priorities
Instantiation of the Concept in GAMMA Prototypes
Cloud Consulting Services and Solutions
Presentation transcript:

MIT Requirements for TLC IRRIIS MIT Conference ROME 8 February 2007 Giustino FUMAGALLI Arnaud ANSIAUX

IRRIIS ICT networks and systems are the nervous system of our modern technological society. The dependencies of other services (energy, transportation …) supply on ICT networks have grown ever more complex. ICT : Information Communications Technology General context (

IRRIIS Because of this interconnectedness and an increasing reliance on ICT networks, services critical to society and economy are becoming more fragile and may fall faster than ever before because of a major technological collapse of an ICT network or system. ICT : Information Communications Technology General context

IRRIIS The IRRIIS project will provide a novel technology, named « MIT system » aiming at enhancing the dependability, the survivability and the resilience of LCCIs. MIT system will : o Improve the networks’ operators mutual awareness; o Improve the negotiation capacity between different networks; o Reduce the chance that failures spread; o Mitigate the cascading effects. MIT : Middleware Improved Technology; LCCI : Large Complex Critical Infrastructure. IRRIIS project

IRRIIS Why MIT System for Telco ? Telecommunication infrastructure is defined as « Organizations, personnel, procedures, facilities and networks » employed to transmit and receive information. ( TELCO infrastructure is definitly a very complexe system to be handled in globality. Eight Ingredient Framework of Communications Infrastructure

IRRIIS “Intradependencies” in Telco Intradependencies must be taken into account inside a single operator telecommunication network.

IRRIIS Internationalization of Business; Overall mobility of clients; Convergence of telecoms and IT; … Increase the number of interdependencies between telecommunication operators. “Interdependencies” in Telco

IRRIIS To grant its own service delivery each CI operator needs to be granted on the service delivery provided by others CI operators; Service Level Agreements with others CI operators (both for electricity or Telco); Service Level Agreements for a certain service could include regulation about the exchange of information concerning the status of the provided service; The nature of the information exchanged often requires feed-back mechanisms. Fast alerting about SLA reduction should be useful to implement countermeasures on-time, avoiding critical malfunctions afterwards; Automatic negotiated service restoration after a malfunction, may help cooperation to a faster and safer return to a “normal state” of all CI’ service deliveries. Moreover, it may help civil protection emergency activities. Interdependencies means interworking needs

IRRIIS No-one can understand better his own risk in the “service delivery” than the “service provider” itself : Share his own risk perception with others CI operators should be very important. BUT!!! Automatic data exchange doesn’t mean automatic reaction : internal procedures for the risk management must be respected; “Service consumer” operator need to trust in data received. Share only relevant data to others: “service consumer” is interested in being informed about service delivery, not about “service producer troubles”. SO Exchange service relevant data in a simple format: – Risk estimation; – Where (Location and expected area involved); – When (Time and how long). A basic Interdependency Risk reduction : data exchange

IRRIIS Environment drives also Telco Transformation of Telco Operators business model. The telecom carrier is becoming a global service operator (access to IT resources, hosting, outsourcing, etc …); Development of new technologies (high bandwidth capabilities, multimedia technologies, mobile technologies, service platforms, IP convergence…); Strong partnerships with other operators, ISP and content providers / Constraints due to governmental law enforcement. Change of habits of Clients. Development of new end to end services to their clients ( QoS, security guaranties, service profile, … );

IRRIIS Security Management - “Off-line” analysis - Network engineering; - Risk management studies... - Operational Continuity & Emergency Plans - Crisis Management Process (fast reaction) Existing solutions to enhance resilience in Telco Redundancies of main equipments, services and pathways inside operator networks (logically or physically)

IRRIIS Network Operating Center Security Operating Center Existing solutions to enhance resilience in Telco Security Management ; - “On-line” monitoring : Supervision solutions. - Network Operation Center (NOC); - Security Operation Center (SOC);

IRRIIS Remaining and new issues Supervision solutions - Mainly based on technical information collection ; - Large amount of data are collected from networks which involve issues : storage and data mining, complex treatments (filtering, aggregation, correlation…) ; - Too many supervision tools are needed which make a lot of communication interoperability issues and make decision phase more and more complex. IP and mobility technologies are source of new vulnerabilities, threats and malicious attacks for Telco network operators. A lot of effort should be done to develop single efficient system to enhance overall Telco resilience.

IRRIIS Main requirements for MIT system (1/2) Processing functions Collect and process internal data and information, – Embedded computing at lower level inside the network to make efficient, timely and secure the data processing ( filtering, aggregation and correlation mechanisms); Perform analysis and diagnosis useful for the infrastructure where MIT components are installed and for other infrastructures with which they are connected; Process data coming from other infrastructures in order to allow the operator to prevent potential cascading effects; Security policies management capabilities to define emergency conditions and if possible automatic recovery.

IRRIIS Main requirements for MIT system (2/2) Communication functions Support information sharing to provide early warning to neighboring systems and infrastructure; Exchange data with other Communication Components installed on other infrastructures; Enhance global communication capabilities by defining communication standards to resolve interoperability issues (ie : risk common exchange language); Define standard for scallable, tunable information on resilience and security aspects for inter-domain level agreement.

IRRIIS MIT System general architecture MIT system should be implemented both at : The management service level; The collector level; Inside the operator core network : directly on « critical » network equipments; using specific probes. Network Operating Center Security Operating Center Main objectives : Independent and modular architecture; Define the content of RML * messages. * RML : Risk Management Language

IRRIIS Processing functions Communication functions Because each LCCI will remain responsible for his own security management and overall technical capacity management; But also to ensure the most resilience and scalable capabilities within Telco interdependencies … MIT System general architecture MIT system general architecture has been oriented where each MIT system communicates with all interfaced MIT systems making use of client-server paradigm.

IRRIIS Extension of TELCO MIT system to other domains – Global service continuity, resilience with limiting cascading effect between all critical infrastructures; – Global security reaction management with support of authorized recovery; – Global “TRUST & CONFIDENCE”. The application of these general requirements for MIT system should enhance overall resilience of all these complex communication Infrastructures. Because, ICT networks are the nervous system of other infrastructures, it could be then possible to extend the concept of MIT system to other interdependent domains and really start to think about :

IRRIIS THANK YOU