Security Challenges for Future Internet Design Cybertrust PI Meeting Breakout.

Slides:



Advertisements
Similar presentations
Fundamental Issues of Future Internet Introduction, Design Goals and Principles Mingwei Xu Qingdao.
Advertisements

Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 OpenFlow Research on the Georgia Tech Campus Network Russ Clark Nick Feamster Students: Yogesh Mundada, Hyojoon Kim, Ankur Nayak, Anirudh Ramachandran,
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
17/10/031 Summary Peer to peer applications and IPv6 Microsoft Three-Degrees IPv6 transition mechanisms used by Three- Degrees: 6to4 Teredo.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
High Performance Computing Course Notes Grid Computing.
VLANs Virtual LANs CIS 278.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Security+ Guide to Network Security Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
1 Next-Generation Secure Internet: Security Overview and Context Adrian Perrig in collaboration with Steven Bellovin, David Clark, Dawn Song.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Internet Protocol Security (IPSec)
Anonymity Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Byung Choi.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Chapter 1: Hierarchical Network Design
NW Security and Firewalls Network Security
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Chapter 1 Overview Review Overview of demonstration network
Common Devices Used In Computer Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Internetworking Concept and Architectural Model Chapter 3.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Intro to Switching Lecture # 3 Hassan Shuja 03/14/2006.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
12/6/2015CST Computer Networks1 Reverse Address Resolution CST 415.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
CSCI 465 D ata Communications and Networks Lecture 24 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
17/10/031 Euronetlab – Implementation of Teredo
Networking (Cont’d). Congestion Control l Is achieved by informing nodes along a route that congestion has occurred and asking them to reduce their packet.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
COMPUTER NETWORKS CS610 Lecture-22 Hammad Khalid Khan.
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
CompTIA Security+ Study Guide (SY0-401)
THE OSI MODEL By: Omari Dasent.
Chapter 5: Inter-VLAN Routing
CompTIA Security+ Study Guide (SY0-401)
Chapter 2. Malware Analysis in VMs
CPE 401 / 601 Computer Network Systems
Module 5 - Switches CCNA 3 version 3.0.
IS4680 Security Auditing for Compliance
Firewalls Routers, Switches, Hubs VPNs
Presentation transcript:

Security Challenges for Future Internet Design Cybertrust PI Meeting Breakout

Breakout Goal and Outcome Bridge the gap between security research in FIND and networking research in CT Spark collaborations on security-related future Internet design issues Outcome: 5-minute report (??)

FIND Summary

Architecture: Placement of Function Intrusion detection, detection of unwanted traffic, etc. actually require cooperation from both host and network Should we be thinking across boundaries? Where should appropriate function be placed/developed? –New address formats –Packet tagging –Should network incorporate help from end hosts? If so, how?

Some Questions How can information observed at end hosts (end systems, etc.) be shared and ultimately incorporated into the protocols that monitor the network "core"? Could routers or other network devices be instrumented to mark traffic in ways that make tasks at the network edge (e.g., host intrusion detection, spam filtering, malware tracking) easier? Could hosts be instrumented to mark traffic in ways that makes conventional network monitoring tasks (e.g., high-speed monitoring in the network core) easier? Could architectural changes make it possible to consider host and network security each solvable without the help of the other, or are the two tasks fundamentally dependent on one another? Could the trust that users build with each other (e.g., through social networks) be used to bootstrap host or network security?

Does free == broken? –(tragedy of the commons) –e.g., Do we need accounting/charging to eliminate unwanted traffic? Need for fine-grained accountability –Can we do this with a future Internet if end hosts are secure? –Is a default-off infrastructure feasible? Would it make a difference? How to avoid centralized, TTP situation? Privacy implications… Does virtualization really provide security? How does this translate to communication (e.g., actually communicating with trusted parties vs. miscreants) How to reconcile privacy with accountability? –At what layer should privacy be incorporated? Network layer? Application layer? –Note: Not necessarily a conflict between accountability and privacy What information about trust, identity, etc. should be cooked into the network layer vs. just taken care of at the application layer? Use of dynamic addresses…tradeoffs worth it? What services are needed? At what layer do we need them? –Need for cross-layer design? Reinvention of functions… Shouldnt location, time, and context be brought into the architecture? The network should be configurable in terms of the accountability it provides (and that configuration should also be accountable). We need mechanisms for resolving disputes between users/operators, … What can we do about covert channels? (probably nothing) What if we dont trust the hardware and software on the end hosts? Can we even hope to build a reliable network? –Complete record of data provenance Compressive sensing What can we learn from the past? (e.g., DiffServ) –Will better QoS lead to better security? –Study successes, failures. Need some parables. Different virtual networks for different security postures? If we could fix the end host, how much in the network would we need to fix? –If we could put some accountability at the edge, what functions would we need in the network?