SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.

Slides:



Advertisements
Similar presentations
The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Advertisements

Take your CMS to the cloud to lighten the load Brett Pollak Campus Web Office UC San Diego.
Tom Yarmas CTO – Cloud Technologies U.S. Public Sector Cloud Computing: How to do it right!
Empowering Business in Real Time. © Copyright 2009, OSIsoft Inc. All rights Reserved. Virtualization and HA PI Systems: Three strategies to keep your PI.
©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Changing the Face of Intrusion Prevention: Check Point IPS Software Blade.
C LOUD C OMPUTING Presented by Ye Chen. What is cloud computing? Cloud computing is a model for enabling ubiquitous, convenient, on- demand network access.
11 Distributed Middleware for Container Transport: Lessons Learned (Klaas Thoelen, Sam Michiels, Wouter Joosen) 7th MiNEMA Workshop August 21, Lappeenranta,
2003 Indigo Technology, Inc. All Rights Reserved Alliance Portfolio Computing Infrastructure Services Customer Relationship Management Engineering Services.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Chapter Two Information Technologies: Concepts and Management.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
Cloud Computing (101).
Cloud Computing Don Young MIS 304 Professor Fang.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Commonwealth of Massachusetts Statewide Strategic IT Consolidation (ITC) Initiative ITD Virtualization and Shared Services Executive Briefing Presentation.
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
A Survey on Interfaces to Network Security
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Cloud computing Tahani aljehani.
An Introduction to Cloud Computing. The challenge Add new services for your users quickly and cost effectively.
Security in Cloud Computing Presented by : Ahmed Alalawi.
Travis, Stephanie, Alex.  Cloud computing is a general term for anything that involves delivering hosted services over the Internet.  These services.
Plan Introduction What is Cloud Computing?
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
Introduction to Cloud Computing
Effectively Explaining the Cloud to Your Colleagues.
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Cloud Computing Brian Curran, Sabatino DeRico, Mike Delisa, Mudit Goel, Jon Guagenti, Jess Caso, Greg Flynn.
FIORANO SERVICE BUS The Cloud Enablement Platform
Cloud Models – Iaas, Paas, SaaS, Chapter- 7 Introduction of cloud computing.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
MIS – 3030 Business Technologies Cloud Computing & Services IoT.
TRANSFORMING IT.  The cloud is a group of servers.  A user interacts with the cloud without worrying about how it is implemented. Cloud computing describes.
LIGHTNESS Introduction 10th Oct, 2012 Low latency and hIGH Throughput dynamic NEtwork infrastructureS for high performance datacentre interconnectS.
An emerging computing paradigm where data and services reside in massively scalable data centers and can be ubiquitously accessed from any connected devices.
Summary of Enterprise Computing Models. Slide 2 Enterprise Dimensions Who does what? In-source out-source hardware and software Staff vs. consultant What.
Sungkyunkwan University (SKKU) Security Lab. A Framework for Security Services based on Software-Defined Networking Jaehoon (Paul) Jeong 1, Jihyeok Seo.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
1 NETE4631 Course Wrap-up and Benefits, Challenges, Risks Lecture Notes #15.
Cloud Computing Presented by Alicia Wallis and Kerri Warf.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Future Internet: Some ideas from CINI Giorgio Ventre Università di Napoli Federico II & Consorzio Interuniversitario Nazionale per l’Informatica
Protecting your site from DDoS and data breach attacks Ronan Lavelle LeaseWeb Web Application Security Group.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
Submitted to :- Neeraj Raheja Submitted by :- Ghelib A. Shuaib (Asst. Professor) Roll No : Class :- M.Tech(CSE) 2 nd Year.
PRESENTED BY– IRAM KHAN ISHITA TRIPATHI GAURAV AGRAWAL GAURAV SINGH HIMANSHU AWASTHI JAISWAR VIJAY KUMAR JITENDRA KUMAR VERMA JITENDRA SINGH KAMAL KUMAR.
By: Joshua Wiegand. Overview ● What is the cloud computing? ● History of Mobile Computing ● Service Models ● Deployment Models ● Architecture ● Security.
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
Content Delivery Cloud A Better Alternative To Your Content Delivery Network (CDN) ©2013 Riverbed Technology Confidential and Proprietary.
Stamatia Bibi1, Dimitris Katsaros2, Panayiotis Bozanis2
Designing the Physical Architecture
(A CORPORATE NETWORK APPROACH)
Intro to SaaS Software as a service (SaaS) is a model of software delivery where the software company provides maintenance, daily technical operation,
Cloud Computing Kelley Raines.
Introduction to Cloud Computing
Cloud Computing.
AWS. Introduction AWS launched in 2006 from the internal infrastructure that Amazon.com built to handle its online retail operations. AWS was one of the.
Cloud Computing and Cloud Networking
IS4680 Security Auditing for Compliance
Emerging technologies-
Cloud Computing Erasmus+ Project
Presentation transcript:

SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015

AGENDA  Context  Security As A Service  Hybrid Deployment Architecture  Cloud Based Deployment Architecture  Futur works  Conclusion

Context  In 2013, 60% of companies were DDoS-attacked, up from 35% experiencing a disruptive attack in 2012 (Neustar Annual Report 2014)  87% of companies attacked were hit multiple times  In 2013, 74% of companies reported that DDoS attacks lasted less than a day (16% between 1-2 days).  Attacks between 1-5 Gbps represent approximately 20% (One amplification attack this year measured 400 Gbps)

Context  DDoS drains manpower: over half of businesses (57%) need 6 or more people to mitigate DDoS attacks  For small and medium businesses (up to 5 Mbps of Internet connectivity):  Deployment and maintenance are estimated to $116,075 for the first year  An annual cost of $108,200  Hence, there is a growing interest in outsourcing security services to a Cloud provider in order to reduce firewall management and deployment costs

Security As A Service  Security-as-a-service (SaaS) is an outsourcing model for security management.  Typically, Security as a Service involves applications such as anti-virus software delivered over the Internet  But the term can also refer to security management provided in-house by an external organization. (Cloud Security Alliance)

Security As A Service  First line of defense  Expensive costs which include:  Human resources and training  Maintenance, updates and the price of licenses  Deployment costs  Limited resources  High availability  Ability to add or remove firewalls dynamically  Increase in processing capacity (Throughput)  Centralized or distributed management  Provisioning of resources (needs) Physical FirewallVirtual Firewall

Hybrid Deployment Architecture

We explore two mechanisms:  Secure Forwarding Architecture  Secure Sharing Architecture

Secure Forwarding Architecture 9 9

10

Cloud Based Deployment Architecture

The general model proposed looks like a huge proxy or proxy server and consists of three main components: Front Gateway Instances de Firewall Back Gateway

Cloud Based Deployment Architecture

Futur Projects  Security and Privacy in Cloud governance  Inter-Cloud (interconnection of Cloud Provider)  RFID Technologies for Tracability  Green Computing  …etc.

Conclusion  Innovative architecture to effectively manage the performance and reliability in a cloud-based firewall  Encouraging and promising preliminary results  network administrators could manage their infrastructure with the expertise of their Cloud provider for better exploitation