WP3 WISDOM SOFTWARE PACKAGE Elias Athanasopoulos FORTH Cork, Ireland, January 2009.

Slides:



Advertisements
Similar presentations
FIM MOBILE PRESENTATION
Advertisements

WP CO Status and Progress December 8th, 2010 Johannes Gutleber PR a-JGU, December 8th, 2010 J. Gutleber 1 R. Gutleber.
PAGE 2 PAGE 3 INTRODUCING HYPER-V EXTENSIBLE SWITCH.
Jose Jimenez Director. International Programmes Telefónica Digital Future INTERNET – SMART CITIES Advancing the global competitiveness of the EU economy.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Massimo Cafaro GridLab Review GridLab WP10 Information Services Massimo Cafaro CACT/ISUFI University of Lecce, Italy.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
● To make a presentable way to show the nurse the information on each patient that needs to be monitored ● We take data from the sensors taken from the.
Building a Campus Dshield Randy Marchany IT Security Lab VA Tech Blacksburg, VA 24060
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
1 Firewalls Types of Firewalls  Screening router firewalls  Computer-based firewalls  Firewall appliances  Host firewalls (firewalls on clients and.
ChalkPro Sport Betting Script
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
Workpackage 3 New security algorithm design ICS-FORTH Heraklion, 3 rd June 2009.
Most Important Factors in Choosing a Reporting Platform Tyler Wilchek Marketing Manager Randy Messing Sr. Engineer Boxtone Greg Harris Sr. Product Manager.
ICS-FORTH WISDOM Workpackage 3: New security algorithm design FORTH-ICS The next six months Cork, 29 January 2007.
Workpackage 3 New security algorithm design ICS-FORTH Paris, 30 th June 2008.
Using Windows Firewall and Windows Defender
Knowledge management exercise GROUP 2 Melisides Konstantinos Konstantinidou Angeliki Evgenidis Nikos
VeriFlow: Verifying Network-Wide Invariants in Real Time
Windows 7 Firewall.
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
WISDOM WP7 Dissemination & Exploitation Start M0, End M36 WP leader is CIP Objectives –Identification of potential groups of users of the developed technologies.
WISDOM WP7 Dissemination & Exploitation Start M0, End M42 WP leader is CIP Objectives –Identification of potential groups of users of the developed technologies.
 Mathias Dutour / UAB Dev. team  UNICOS regular meeting  29 January 2009.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
WISDOM WP7 Dissemination & Exploitation Start M0, End M36 WP leader is CIP Objectives –Identification of potential groups of users of the developed technologies.
An Open Source Firewall/Router Software Kwan – Chris – Jonathan ITEC451 – H. Lee.
CensorNet Ltd An introduction to CensorNet Professional On-premise web filtering & management An introduction to CensorNet Professional On-premise web.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
Networking Components Starla Wachsmann. COMPUTER NETWORKING COMPONETS Today’s wireless and enterprise networks are more complex than ever, delivering.
Packet Filtering COMP 423. Packets packets datagram To understand how firewalls work, you must first understand packets. Packets are discrete blocks of.
-1- Elias Athanasopoulos, ICS-FORTH Software Modeling WP3 Software Modelling WISDOM Simulator Elias Athanasopoulos*, Antonis Krithinakis, George Kopidakis.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726.
Workpackage 3 New security algorithm design ICS-FORTH Ipswich 19 th December 2007.
NETWORKING COMPONENTS BY: TRAVIS MARSHALL. HUBS A hub is a device within a network that has multiple Ethernet ports that devices can plug into. The hub.
INTRODUCTION to MIS 12/24/20151 Introduction To MIS Component Overview.
Module 10: Windows Firewall and Caching Fundamentals.
WebFlow High-Level Programming Environment and Visual Authoring Toolkit for HPDC (desktop access to remote resources) Tomasz Haupt Northeast Parallel Architectures.
WSIM Towards a software framework for modeling the WISDOM architecture Elias Athanasopoulos ICS-FORTH Cork, January 2007.
Introduction to MDT 2012 User Driven Installs (UDI)
Unit 19 Computer Music Systems 1 Examine the hardware options available for the composition and production of music using computer technology assess the.
SECURITY POLICY. FIREWALL AS POLICY  The YIN and YANG of perimeter security policy can be referred to as access and control.  Access pertains to accessibility.
3/5/2016Faculty : Trần Thị Ngọc Hoa1 From Proxy Server To ISA 2006  Overview  History  Functions  Caching Process  Caching Types  How does it work.
WP5 – Wirespeed Photonic Firewall Validation Start M27, finish M41(tbc) CIP now lead Description of Work –Establish test bed suitable to validated the.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
Software. Introduction n A computer can’t do anything without a program of instructions. n A program is a set of instructions a computer carries out.
NETWORKING COMPONENTS Jeffery Rice LTEC Assignment 3.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Windows Vista Configuration MCTS : Network Security.
Ch 21. Computer Network Firewall. What is firewall? Hardware and Software Installed in a computer to protect only one computer.
0 中文 NSS Tested Industry Leading DC Firewall “NSS is happy to see Huawei proactively seeking to subject its security platforms to independent evaluation.
Chapter 4. CONCEPT OF THE OPERATING SYSTEM MANAGING ESSENTIAL FILE OPERATIONS.
IoT Security Part 2, The Malware
What is a Firewall?.
Network Security Analysis Name : Waleed Al-Rumaih ID :
April 28, 2017 SUMIT MAHESHWARI INES UGALDE
Get the MacBook repair services in UAE, Call
Network Configuration Automation at LINX
Operating Systems Security
الانترنت والبريد الإلكتروني
Firewall.
Local configuration global effect
Client/Server Computing and Web Technologies
Presentation transcript:

WP3 WISDOM SOFTWARE PACKAGE Elias Athanasopoulos FORTH Cork, Ireland, January 2009

Good News! WSIM: A software platform to simulate all-optical security operations. –Antonis Krithinakis, Lubomir Stroetmann, Elias Athanasopoulos, Georgios Kopidakis, Evangelos P. Markatos. –In Proceedings of the 4th European Conference on Computer Network Defense (EC2ND 2008). December 2008, Dublin, Ireland. Elias Athanasopoulos, FORTHWP32

Organization SAPI –Software core, mini Operating System WSIM –Simulated environment Integration (SAPI, WSIM) –WISDOM Software Package –Main front-end 3Elias Athanasopoulos, FORTHWP3

SAPI High-Level API –Filter Creation –Firewall Configuration –Bridge with device using DLL provided by Avanex Filter creation –Predefined or custom Filter processing –Export in a snort-like language Filter feeding –WISDOM firewall –WISDOM simulator 4Elias Athanasopoulos, FORTHWP3

Example – Filter Creation /* filter example. */ SAPI_TCP_Filter *mailFilter = new SAPI_TCP_Filter(); mailFilter->SetDestinationPort(25); Elias Athanasopoulos, FORTHWP35

Example – Feed Rule to Device SAPI_Firewall *fw = SAPI::Board_Init(); /* filter example. */ SAPI_TCP_Filter *mailFilter = new SAPI_TCP_Filter(); mailFilter->SetDestinationPort(25); mailFilter->Apply(fw); Elias Athanasopoulos, FORTHWP36

Example – Feed Rule to WSIM SAPI_Simulator *ws = new SAPI_Simulator(); /* filter example. */ SAPI_TCP_Filter *mailFilter = new SAPI_TCP_Filter(); mailFilter->SetDestinationPort(25); ws->Attach(mailFilter->Export()); ws->Run(); Elias Athanasopoulos, FORTHWP37

Main Front End 8Elias Athanasopoulos, FORTHWP3 Launch WSIM Set Rules in the actual device Rule Inspector Predefined Rules Custom Rules

WSIM – Simulated Environment Information source –Real-time, traces Configuration –User driven, SAPI’s rule-set Stable application 9Elias Athanasopoulos, FORTHWP3

WSIM – Evaluation (40 Gbps) Elias Athanasopoulos, FORTHWP310 Packet Drops due to Congestion No False Positives Overall Processing

WISDOM Software Package Demo