SECURITY WG Paul Howell, Eric Boyd Internet2 © 2015 Internet2.

Slides:



Advertisements
Similar presentations
ICANN Security and Stability Advisory Committee ICANN Meetings Shanghai October 30, 2002.
Advertisements

Jump to first page NIST Risk Management Guide for Information Technology Systems Reference:
CONEX BoF. Welcome to CONEX! Chairs: –Leslie Daigle –Philip Eardley Scribe Note well MORE INFO: -ECN.
ICN RG Proposed Charter IETF–81 July 2011 Börje Ohlman & Dirk Kutscher.
DS-01 Disaster Risk Reduction and Early Warning Definition
1 Bandwidth management essentials Issues for technical staff and technical solutions.
Database Security Policies and Procedures and Implementation for the Disaster Management Communication System Presented By: Radostina Georgieva Master.
Campaign Basics 101. WELCOME & INTRODUCTIONS Your Name Your Company Your Role What are you hoping to learn today?
Technical Assessment Review / Decision Briefing Template
Russ Housley IETF Chair 23 July 2012 Introduction to the IETF Standards Process.
1 Advanced Security Research Wes Hardaker Eric Monteith, Russ Mundy, Eric O’Brian, Ron Ostrenga, Dan Sterne, Roshan Thomas NAI Labs under contract to DARPA.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
Working Group 2: Next Generation Alerting December 16, 2011 Co-Chairs: Damon Penn, Asst. Administrator, Nat’l Continuity Programs, DHS-FEMA Scott Tollefsen,
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Council of Europe e-voting meeting Progress Report – Austria Andreas Ehringfeld INSO - Industrial Software Institute of Computer Aided Automation | Vienna.
Security Professionals Conference May REN-ISAC Goal The goal of the REN-ISAC is to aid and promote cyber security protection and response within.
London Membership MeetingWashington Membership Meeting24 October 2007 The Coalition since London, October 2007 Semi-annual Membership Meeting Washington.
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
BFC Information and Communication Tools. Objective to facilitate communication and information flows, the sharing of technical and administrative resources.
Internet Emergency Preparedness WG (ieprep) Agenda Monday, August 1, ============================== Chair(s): Scott Bradner Kimberly King AGENDA:
Towards the definition of an eIRGRoma, 10 December An e-Infrastructure in Europe: a strategy and policy driven approach for a policy eIRG A pink.
For a Better Future. Objectives Understand the Need Identify Solutions Achieve the Goal Celebrate Achievement.
Working Group #4: Network Security Best Practices March 22, 2012 Presenter: Tony Tauber, Comcast WG #4 Member Via teleconference: Rod Rasmussen, Internet.
EC proposal: Formation of a Cooperation SIG Akinori Maemura APNIC 38 Brisbane, Australia Tuesday, 16th September 2014.
United States Department of Justice Global Security Working Group Update Global Advisory Committee November 2, 2006 Washington, D.C.
January 2004doc.: IEEE /008r3 Clint Chaplin, Symbol TechnologiesSlide 1Submission Security Standing Committee Clint Chaplin, Symbol Technologies.
January 2004doc.: IEEE /008r1 Clint Chaplin, Symbol TechnologiesSlide 1Submission Security Standing Committee Clint Chaplin, Symbol Technologies.
Ieprep User Objectives Draft-ietf-ieprep-requirements-01.txt OBJECTIVES to be considered in provision of telecommunication services to support emergency.
ENISA efforts for securing European Internet Infrastructure
NSF Cybersecuity Summit May REN-ISAC Goal The goal of the REN-ISAC is to aid and promote cyber security protection and response within the higher.
A Review of Policy Development Processes in the Asia Pacific Region Address Policy SIG APNIC 15, Taipei, Taiwan 27 February 2003.
Awicaksi E-Commerce Security & Payment System E-Commerce.
Work Group 4C Steering Committee Technical Options for E9-1-1 LOCATION ACCURACY October 7, 2010.
CONEX BoF. Welcome to CONEX! Chairs: –Leslie Daigle –Philip Eardley Scribe Note well.
Protecting your site from DDoS and data breach attacks Ronan Lavelle LeaseWeb Web Application Security Group.
1 GISFI_SIG_ GISIF#7, Dec., 2011 Agenda GISFI_SIG_ : Security SIG to Security WG, NEC Corporation GISFI_SIG_ : Security and.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Session title: Protection of Smart Utility Grids Group edited strategy.
INCOSE Systems of Systems Working Group Alan Harding BAE Systems Dr. Judith Dahmann MITRE Corporation SoS Working Group Co-chairs.
United States Department of Justice Achieving Information Interoperability: The Justice Reference Architecture A Global Project Tom.
SIT Operations survey CNES SIT Workshop Agenda Item 26 CEOS SIT Technical Workshop EUMETSAT, Darmstadt, Germany 17 th – 18 th September 2015 Committee.
Status Update Deven McGraw, Chair Center for Democracy & Technology Micky Tripathi, Co-Chair Massachusetts eHealth Collaborative May 19, HIT Policy.
January 2004doc.: IEEE /008r2 Clint Chaplin, Symbol TechnologiesSlide 1Submission Security Standing Committee Clint Chaplin, Symbol Technologies.
Project Management Group (PMG) Status Report to the Commercial Mobile Service Alert Advisory Committee September 19, 2007 Jeffery Goldthorp, PMG Leader.
Current and future work of the Adaptation Committee in the area of adaptation technologies Workshop on technologies for adaptation Bonn, Germany, 4 March.
111 © 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID Cisco Services & Support World Class Partners Technical Support Services Advanced.
Query Health Operations Workgroup Standards & Interoperability (S&I) Framework October 13, :00am – 12:00pm ET.
Mary Barnes (WG co-chair) Cullen Jennings (WG co-chair) DISPATCH WG IETF-86.
Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
Bylaws Review Air Improvement Resources Advisory Committee Meeting
For Computer Society Internal Use Only
Town of Fuquay-Varina Planning Board
Sustainable Fisheries in the Black Sea
For Computer Society Internal Use Only
USA Final Project Report
McAfee Customer Support Number
CONEX BoF.
Cybersecurity compliance for attorneys
FTPBP # Sponsored by IFTA, Inc. Board of Trustees
IWAF3 Session 4 – International Assistance for aviation in Africa
IEEE P Working Group for Wireless Personal Area Networks
Security Standing Committee
DRAFT America Makes Parts Family Classification Working Group Charter
Partners Developing Wisconsin’s Workforce
TT-eWIS/2018: Technology and Architecture (#5)
Project overseer Song Yanqin May 11, 2004 Honolulu
ICAEW Governance Structure ICAEW Regulatory Board (IRB)
Presentation title 12th meeting of the Adaptation Committee Agenda item 5 (a) Review of adaptation-related institutional arrangements under the Convention.
Presentation transcript:

SECURITY WG Paul Howell, Eric Boyd Internet2 © 2015 Internet2

[ 2 ] Today’s Session Charter WG Chair DDoS Mitigation –Blocking Service –Scrubbing Service

[ 3 ] Security WG Charter The Security WG is an Internet2 WG, organized under the umbrella of the Network Technical Advisory Committee. The goal of the Security WG is to develop and recommend a DDoS mitigation solution that is activated by a member institution under DDoS attack. The WG’s recommendation should include tools and processes to be implemented. Also, consideration for sustaining and evolving (as necessary) this solution for the future. Best practices will be developed for recovery from a DDoS attack along with general guidance on how to avoid becoming the source of DDoS attack.

[ 4 ] Security WG Chair Volunteers? Nominees?

Threat Vector: Commercial Network Vector

Solution: Scrubbing Service

Threat Vector: R&E Network Vector

Solution: Blocking Service

SECURITY WG Paul Howell, Eric Boyd Internet2 © 2015 Internet2