Sponsored by the National Science Foundation ExptsSecurityAnalysis Spiral 2 Year-end Project Review University of Alabama PI: Xiaoyan Hong, Fei Hu, Yang.

Slides:



Advertisements
Similar presentations
Sponsored by the National Science Foundation 1 August 30, 2010 GENI Shadownet Spiral 2 Year-end Project Review University of Kentucky, AT&T Research, and.
Advertisements

Sponsored by the National Science Foundation 1 Optical Access Nets and S3I Spiral 2 Year-end Project Review University at Buffalo PI: Chunming Qiao Students.
Sponsored by the National Science Foundation WIMXUWI Spiral 2 Year-end Project Review University of Wisconsin-Madison PI: Suman Banerjee Staff: Ben Willard.
Sponsored by the National Science Foundation The Hive Mind: Applying a Security Sensor Network to GENI Spiral 2 Year-end Project Review University of California,
Sponsored by the National Science Foundation Wrap-up Solicitation 2 and funding outlook GENI Engineering Conference 4 Miami, Florida Chip Elliott April.
Sponsored by the National Science Foundation Campus Policies for the GENI Clearinghouse and Portal Sarah Edwards, GPO March 20, 2013.
1 Use ProtoGENI CS606, Xiaoyan Hong University of Alabama.
Sponsored by the National Science Foundation LAMP Spiral 2 Year-end Project Review University of Delaware PI: Martin Swany Staff: Eric Boyd, Jason Zurawski,
Design Deployment and Use of the DETER Testbed Terry Benzel, Robert Braden, Dongho Kim, Clifford Informatino Sciences Institute
Sponsored by the National Science Foundation Project PrimoGENI Spiral 2 Year-end Project Review Florida International University PI: Jason Liu;
Sponsored by the National Science Foundation 1 August 30, 2010 INSTOOLS Spiral 2 Year-end Project Review University of Kentucky PIs: James Griffioen and.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Configuration Management
Sponsored by the National Science Foundation netKarma Spiral 2 Year-end Project Review Indiana University Beth Plale (PI) School of Informatics and Computing.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
Sponsored by the National Science Foundation BGP Mux Spiral 2 Year-end Project Review Georgia Tech PI: Nick Feamster Students: Valas Valancius, Yogesh.
University of Palestine software engineering department Testing of Software Systems Fundamentals of testing instructor: Tasneem Darwish.
Sponsored by the National Science Foundation TIED Spiral 2 Year-end Project Review USC/ISI PI: John Wroclawski Staff: Ted Faber, Mike Ryan August 30, 2010.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Sponsored by the National Science Foundation IMF Spiral 2 Year-end Project Review Lead PI: Rudra Dutta Co-PI: George Rouskas Students: Anjing Wang, Can.
Sponsored by the National Science Foundation ProtoGENI and PGAugmentation Spiral 2 Year-end Project Review University of Utah, Internet2, HP Labs PI: John.
Sponsored by the National Science Foundation KanseiGenie Spiral 2 Year-end Project Review Ohio State University, Wayne State University PI: Anish Arora.
Sponsored by the National Science Foundation ViSE: A Virtualized Sensing Environment Spiral 2 Year-end Project Review ViSE: A Virtualized Sensing Environment.
OnTimeMeasure Integration with Gush Prasad Calyam, Ph.D. (PI) Tony Zhu (Software Programmer) Alex Berryman (REU Student) GEC10 Selected.
Sponsored by the National Science Foundation The Quilt GENI Operations Workshop Spiral 2 Year-end Project Review The Quilt PI: Jen Leasure August 31, 2010.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Sponsored by the National Science Foundation PlanetLab and PLFED Spiral 2 Year-end Project Review Princeton University PI: Larry Peterson Staff: Andy Bavier,
Sponsored by the National Science Foundation OppWireless Spiral 2 Year-end Project Review Howard University PI: Jiang Li Staff: Sankardas Roy (part-time.
Sponsored by the National Science Foundation Comprehensive GENI Security Program Spiral 2 Year-end Project Review National Center for Supercomputing Applications.
Digital Object Architecture
Understand Application Lifecycle Management
Sponsored by the National Science Foundation Davis Social Links Spiral 2 Year-end Project Review University of California, Davis PI: S. Felix Wu, Chen-Nee.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
1 Supporting the development of distributed systems CS606, Xiaoyan Hong University of Alabama.
Sponsored by the National Science Foundation GENI Meta-Operations Center Spiral 2 Year-end Project Review GlobalNOC at Indiana University PI: Jon-Paul.
Sponsored by the National Science Foundation 1 GENI Columbia Spiral 2 Year-end Project Review Columbia University PI: Henning Schulzrinne Staff:
Sponsored by the National Science Foundation Embedded Measurement Framework (ERM) Spiral 2 Year-end Project Review PI: Keren Bergman Students: Michael.
Sponsored by the National Science Foundation PGTools Spiral 2 Year-end Project Review University of Utah PI: John Regehr, Co-PI: Robert Ricci Staff: Leigh.
Sponsored by the National Science Foundation GENI Security Architecture Toolkit (GSAT) Spiral 2 Year-end Project Review SPARTA, Inc. PI: Stephen Schwab.
Sponsored by the National Science Foundation Campus Trials of Enterprise GENI: Georgia Tech Spiral 2 Year-end Project Review Georgia Tech PI: Russ Clark,
Sponsored by the National Science Foundation GENI Registry Services, a.k.a. Digital Object Registry Spiral 2 Year-end Project Review CNRI PI: Larry Lannom.
Sponsored by the National Science Foundation 1 Click to edit Master subtitle style Million Node GENI / Seattle Spiral 2 Year-end Project Review University.
OnTimeMeasure-GENI: Centralized and Distributed Measurement Orchestration Software Prasad Calyam, Ph.D. (PI) Paul Schopis, (Co-PI) Weiping Mandrawa (Network.
Sponsored by the National Science Foundation 1 Last updated April 1, 2013 Are you ready for the tutorial? 1.Sign In 2.Grab a Worksheet 3.Did you do the.
Sponsored by the National Science Foundation Distributed Identity & Authorization Mechanisms Spiral 2 Year-end Project Review SPARTA, Inc. PI: Stephen.
Sponsored by the National Science Foundation Internet2 OpenFlow Backbone Spiral 2 Year-end Project Review Internet2 PI: Eric Boyd Co-PI: Matt Zekauskas.
Sponsored by the National Science Foundation CMUlab Spiral 2 Year-end Project Review Carnegie Mellon University PI: Dave Andersen Staff: Pat Gunn Students:
Sponsored by the National Science Foundation Systematic Experimentation in GENI Sarah Edwards GENI Project Office.
Security Architecture and Design Chapter 4 Part 1 Pages 297 to 319.
Sponsored by the National Science Foundation Spiral 2 Year-end Project Review PI: Staff: Students: Date Project Graphic and/or Photo.
Sponsored by the National Science Foundation Federating a CRON into ProtoGENI Spiral 2 Year-end Project Review Louisiana State University PI: Seung-Jong.
Sponsored by the National Science Foundation GENI Aggregate Manager API Tom Mitchell March 16, 2010.
Behind the Scenes of GENI Experimentation Understanding GENI AM API and RSpec Sponsored by the National Science Foundation
Sponsored by the National Science Foundation OpenFlow Campus Trials at Clemson (OFCLEM) Spiral 2 Year-end Project Review Clemson University PI: Kuang-Ching.
Sponsored by the National Science Foundation Measurement System Spiral 2 Year-end Project Review University of Wisconsin, Colgate University, Boston University.
Virtualization as Architecture - GENI CSC/ECE 573, Sections 001, 002 Fall, 2012 Some slides from Harry Mussman, GPO.
Sponsored by the National Science Foundation Spiral 2 Year-end Project Review Rutgers University PI: Dipankar Raychaudhuri WINLAB, Rutgers University Co-PI:
Sponsored by the National Science Foundation Raven Provisioning Service Spiral 2 Year-end Project Review Department of Computer Science University of Arizona.
Sponsored by the National Science Foundation Scalable, Extensible, and Safe Monitoring of GENI Spiral 2 Year-end Project Review PI: Sonia Fahmy, Purdue.
Behind the Scenes of GENI Experimentation An Introduction to GENI Tools Sponsored by the National Science Foundation.
Sponsored by the National Science Foundation Internet-Scale Overlay Hosting Spiral 2 Year-end Project Review Washington University PI: Jon Turner (5%)
Sponsored by the National Science Foundation OKGems Spiral 2 Year-end Project Review Oklahoma State University and University of Florida PI: Xiaolin (Andy)
Sponsored by the National Science Foundation WiMAX Spiral 2 Year-end Project Review Rutgers University PI: Dipankar Raychaudhuri, WINLAB Rutgers University.
Sponsored by the National Science Foundation OpenFlow: Princeton Spiral 2 Year-end Project Review Princeton University PIs: Michael Freedman, Jennifer.
Sponsored by the National Science Foundation 1 Nov 4, 2010 WiMAX Deployment Roadmap for Spiral 3 Harry Mussman (GPO) Includes the following goals and milestones.
Sponsored by the National Science Foundation 1 GEC16: March 19, 2013 Are you ready for the tutorial? 1.Sign In 2.Grab a Worksheet 3.Did you do the pre-work?
Sponsored by the National Science Foundation GEC17 Plenary Session: Architecture Marshall Brinn, GPO July 22, 2013.
Architecture Review 10/11/2004
Overview Activities from additional UP disciplines are needed to bring a system into being Implementation Testing Deployment Configuration and change management.
Presentation transcript:

Sponsored by the National Science Foundation ExptsSecurityAnalysis Spiral 2 Year-end Project Review University of Alabama PI: Xiaoyan Hong, Fei Hu, Yang Xiao Students: Jingcheng Gao, Dawei Li, Sneha Rao, Fnu Shalini, Dong Zhang August 27, 2010 Project Graphic and/or Photo Clust er C Emulab at Utah ProtoGENI GENI Clus ter B Clus ter A Clus ter D Other Emulabs Security Cluster C Cluster E Cluster D Cluster B

Sponsored by the National Science Foundation 2 Project Summary 1783: GENI Experiments for Traffic Capture Capabilities and Security Requirement Analysis Goal: –help define GENI security requirements based on investigations through ProtoGENI experiments Approach: –Select functions of ProtoGENI control framework –Experiments on aggregates (EMULAB first) Experiment design, run, identify/exploit/validate potential vulnerabilities Deliver experiment design documents, experiment reports Experiments are in three directions –Authentication, experiment run-time interaction, aggregate components and management August 27, 2010

Sponsored by the National Science Foundation 3 Milestone & QSR Status IDMilestoneStatus On Time? On Wiki? GPO signoff? ExptsS ec: S2.a Design experiment to evaluate the security of select functions in the ProtoGENI control framework. Experiment will use the Emulab aggregate. The experiment design will be documented and sent to the ProtoGENI PI for review. Milestone achieved. The document of experiment design is delivered: “Description of planned security experiments”. EarlyYes ExptsS ec: S2.b Run experiment designed in Milestone 1 on ProtoGENI/Emulab. Identify potential security vulnerabilities. Develop revised experimentation plans to validate/exploit potential vulnerabilities. Interact with the ProtoGENI PI to get feedback on the potential vulnerabilities and the experiment plans. Deliver software/scripts/documentation needed to repeat experiment Milestone achieved. Delivered: “Revised description of planned security experiments”, and “Report of the initial experiments and findings”. The report was presented at GEC7. On time Yes ExptsS ec: S2.c Run experiments designed in Milestone 2 to validate/exploit vulnerabilities in ProtoGENI/ Emulab. Suggest improvements to ProtoGENI/ EMULab security and experimenter support tools. Deliver software/ scripts/ documentation needed to repeat experiment. Milestone achieved. Delivered: “Report on experimentation exploiting vulnerabilities and validating vulnerability hypotheses”. Part of the results were presented at GEC8. On time Yes ExptsS ec: S2.d Design experiment to extend the scope of the security assessment of ProtoGENI. Add at least one more aggregate to scope of experiment (preferably a wireless aggregate such as the CMU wireless emulator). The experiment design will be documented and sent to the ProtoGENI and CMU Wireless projects for review. Due 09/28/10 QSR: 4Q2009Posted to wiki On time Yes QSR: 1Q2010Posted to wiki On time Yes QSR: 2Q2010Posted to wiki On time yes Yes August 27, 2010

Sponsored by the National Science Foundation 4 Accomplishments 1: Advancing GENI Spiral 2 Goals We identified three major directions in ProtoGENI functions for experiments. They are authentication, experiment run-time interaction, aggregate components and management. Findings and suggestions are summarized in the table. August 27, 2010 FindingsSuggestions Account certificate and credentials at local machines are subject to be stolen if compromised. With those, register slices and create slivers are possible. strictly check user's access behaviors. Security parameters used in the run-time are subject to be stolen if local machine is compromised. With those, experiment nodes can be accessed. Audit experiment traffic pattern. Ports scan be scanned from inside and outside of slices. Most ports are closed. Add anti-scan function. Identity and credential for flash interface are subject to the compromise of the local machine. Additional user identity check before one can create a slice using the interface. ProtoGENI (residual) resources are subject to DoS attack. Tools can help attacker be more efficient and harder to detect. Audit each slice’s creation and destroy operations. Good traffic analysis tools. (continue on next page. Notes: the findings are based on the recent release of CM and test scripts. July 10, 2010)

Sponsored by the National Science Foundation 5 Accomplishments 2: Other Project Accomplishments Findings and suggestions continue: In all, the real attacking experiments may help GENI developers to design and develop more secure systems; August 27, 2010 FindingsSuggestions Slice isolation of bandwidth.Performance is satisfactory under stress test Delays between vnodes show large variance in RTTs. Further ProtoGENI debug needed Slices using shared vnodes could cross communicate under a particular condition. Further ProtoGENI debug needed

Sponsored by the National Science Foundation 6 Issues We have tried to install ProtoGENI reference CM. Due to the need for static IP and host name DNS entry in the installation procedure, the system administrator expressed great concern (reluctant) on whether the CM code is safe or not. Concerns on what some attack experiments may interference other experiments. Since ProtoGENI is still an ongoing project, system bugs happen from time to time which has a severe impact on our progress as most of our efforts are based on the experiments. Because of this, some findings at last turn out to be system flaws. Other times the changes of the system will affect our project plans, we will have to change our plan and experiments design according to the new functions or changes. There are OS images and pc type which reported to be pretty old and perform inconsistent. An update on these obsolete or inconsistent resources may help in saving time and confusion, especially for novice learners. More details about PC type and all resources at Emulab and their specific utilization, if any, can help novice experimenters to select and to utilize resources accordingly. August 27, 2010

Sponsored by the National Science Foundation 7 Plans Plans for the remainder of Spiral 2? –Perform the work described in Milestone #4 –Deliver the design document The GPO is starting to formulate goals for Spiral 3. What are your thoughts regarding potential Spiral 3 work? –Perform the experiments according to the design document of S2.d -- investigate the vulnerability of wireless aggregate. –Investigate issues across multiple aggregates –Following the Spiral II ProtoGENI development results in experiments, possible repeating and extending. August 27, 2010