Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.

Slides:



Advertisements
Similar presentations
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Advertisements

1 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés.
Application of Bayesian Network in Computer Networks Raza H. Abedi.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Guide to Network Defense and Countermeasures Second Edition
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Copyright 2002, Center for Secure Information Systems 1 Panel: Role of Data Mining in Cyber Threat Analysis Professor Sushil Jajodia Center for Secure.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
IIT Indore © Neminah Hubballi
Intrusion Detection Techniques for Mobile Wireless Networks Zhang, Lee, Yi-An Huang Presented by: Alex Singh and Nabil Taha.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Digital Object Architecture
N. GSU Slide 1 Chapter 02 Cloud Computing Systems N. Xiong Georgia State University.
Guide to Network Defense and Countermeasures
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Grid Middleware Tutorial / Grid Technologies IntroSlide 1 /14 Grid Technologies Intro Ivan Degtyarenko ivan.degtyarenko dog csc dot fi CSC – The Finnish.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Scalable Grid system– VDHA_Grid: an e-Science Grid with virtual and dynamic hierarchical architecture Huang Lican College of Computer.
Cryptography and Network Security Sixth Edition by William Stallings.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Anomaly Detection. Network Intrusion Detection Techniques. Ştefan-Iulian Handra Dept. of Computer Science Polytechnic University of Timișoara June 2010.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
Module 1: Introduction to Windows 2000 and Networking.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
VIEWS b.ppt-1 Managing Intelligent Decision Support Networks in Biosurveillance PHIN 2008, Session G1, August 27, 2008 Mohammad Hashemian, MS, Zaruhi.
Some Great Open Source Intrusion Detection Systems (IDSs)
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Presented by Edith Ngai MPhil Term 3 Presentation
Grid Computing Security Mechanisms: the state-of-the-art
(A CORPORATE NETWORK APPROACH)
Access control techniques
High Performance Computing Lab.
Security of Grid Computing Environments
QianZhu, Liang Chen and Gagan Agrawal
Network Intrusion Detection Using GA
Security.
Intrusion Detection system
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Operating System Concepts
Presentation transcript:

Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab Ismail A. Taha Presented By: Ahmad M. Al Shishtawy Security of Grid Computing Environments

Agenda Introduction. The Proposed Grid Intrusion Detection Architecture (GIDA). GIDA Implementation. Testing and Results. Conclusions and Future Work. Published Work.

Historical Background Metacomputing. Grid computing coined in the late 1990s. Analogy to the electrical power grid. Ultimate goal: Make access to computational power as easy as access to electrical power Still under research and development.

The Evolution of the Grid PCThe InternetWANLAN PCThe Grid Distributed Computing Cluster The Internet (Sharing of Information): The Grid (Sharing of Computational Power):

Characteristics Heterogeneity. Scalability. Dynamicity or adaptability. Multiple administrative domains and autonomy.

Requirements A Grid system should: Coordinate resources that are not subject to centralized control. Use standard, open, general-purpose protocols and interfaces. Deliver nontrivial Qualities of Service.

Grid Computing – Current Efforts (Sample) Globus: GridBus: Legion:legion.virginia.edulegion.virginia.edu UNICORE:

The Grid Project Description Joint project between: Ain Shams University in Egypt George Washington University in USA Test Project (Signature Verification). Goals: Understand Grid environments. Hands on practice. Master security related issues.

The Grid Scenario

Basic Grid Services Resource Management Information Services Data Management Security

Security Problems The need to establish security relationship among hundreds of processes.(not simple client/server). The dynamic nature of the grid. Interdomain security solutions must interoperate with the diverse intradomain access control technologies

Security Problems Based on Public Key Infrastructure Private Keys can be stolen. Temporary Credentials poorly protected No protection from insiders. Software Bugs and Security Holes

Different Security Levels Firewall Password Authentication Authorization... Intrusion Detection Attacks First Level Second Level Protected Computer System

Intrusion Detection System Second line of defense Normal differ from malicious use. Data Gathering: Host-based. Network-based. Analysis and Detection: Anomaly detection. Misuse detection. Centralized vs. Distributed detection.

Centralized Intrusion Detection LAN Data gathering module Analysis and Detection module

Distributed Intrusion Detection LAN Analysis and Detection module Data gathering module

Hierarchical Distributed Intrusion Detection LAN Data Analysis Module Data Gathering Module Intrusion Detection Servers...

Agenda Introduction. The Proposed Grid Intrusion Detection Architecture (GIDA). GIDA Implementation. Testing and Results. Conclusions and Future Work. Published Work.

Goal Protect Grid resources from attacks that results from installing and using the Grid Infrastructure. Normal Internet attacks (that are not related to the Grid) are the responsibility of the local intrusion detection system at each domain.

Grid Intrusion Detection Architecture Intrusion Detection Agent (IDA) Data Gathering Module Intrusion Detection Server (IDS) Analysis and Detection Module Cooperation Module

Proposed Grid Intrusion Detection Architecture (GIDA)

Data Gathering Module IDA A A A Local IDS User Interface

Proposed Grid Intrusion Detection Architecture (GIDA) GIS or DB GIS or DB IDS

Proposed Grid Intrusion Detection Architecture (GIDA) GIS or DB GIS or DB IDS Heterogeneity Scalability Dynamicity or adaptability Autonomy No centralized control Standard protocols Nontrivial QoS

Agenda Introduction. The Proposed Grid Intrusion Detection Architecture (GIDA). GIDA Implementation. Testing and Results. Conclusions and Future Work. Published Work.

GIDA Implementation Simulated Grid environment. Simulated IDA. Host-based anomaly detection technique. Homogeneous IDSs with LVQ Neural Network. Simple cooperation with sharing results.

Why Simulation? No real Grid for testing (Expensive). Best for testing and evaluation new architectures. Control experiments in dynamic environment.

Grid Simulators Many Grid simulation tools (GridSim, SimGrid, MicroGrid, … ). Unfortunately they concentrate on resource management problems. Develop our own simulator for security and intrusion detection based on GridSim.

The Simulated Grid IDS Log UsersIntruders Intrusion Detection Servers Generated Log Files... Resources... Requests

GIDA Implementation IDS Peer-to-peer Network or GIS Lo g

Why LVQ? Similar to SOM and used for classification. Does not require anomalous records in training data. Classes and their labels (User Name) are known.

IDS Analyzing Module Preprocessing Trained LVQ Decision Module Cooperation Module Log Response Analyzing and detection module

Agenda Introduction. The Proposed Grid Intrusion Detection Architecture (GIDA). GIDA Implementation. Testing and Results. Conclusions and Future Work. Published Work.

Measured Parameters False Positive Percentage. False Negative Percentage. Recognition Rate. Training Time. Detection Duration

Tested Issues Controllable (Internal) Data Preprocessing Number of IDSs Uncontrollable (External) Number of Users Number of Resources Number of Intruders

Different Types of Windows (Preprocessing)

Fixed Window Size 1 IDS 4 IDSs Legend

Time Period Window 1 IDS 4 IDSs Legend

Hybrid Window at size 10 1 IDS 4 IDSs Legend

Hybrid Window at size 20 1 IDS 4 IDSs Legend

Hybrid Window at size 30 1 IDS 4 IDSs Legend

Number of IDSs 50 Users 200 Users Legend 350 Users

Number of Users 1 IDS 4 IDSs Legend 8 IDSs

Number of Resources 1 IDS 4 IDSs Legend 8 IDSs

Number of Intruders 1 IDS 4 IDSs Legend 8 IDSs

Agenda Introduction. The Proposed Grid Intrusion Detection Architecture (GIDA). GIDA Implementation. Testing and Results. Conclusions and Future Work. Published Work.

Conclusions GIDA designed compatible with the grid and proved by experiments. (IDA, IDS) The hybrid window gave the best results by managing the number of events efficiently. (Detection Duration, False Negative) Distributed systems is better that Centralized systems. (False Negative, Training Time)

Conclusions GIDA is scalable. (IDSs, Users) Natural increase in number of resources improved the results. (False Positive) Better understanding of the problem of intrusion detection in Grid environments.

Future Work Trust Relationships in Grid environment. Heterogeneous IDSs. More complicated algorithms for cooperation. Misuse detection. Testing on real Grid testbeds.

Agenda Introduction. The Proposed Grid Intrusion Detection Architecture (GIDA). GIDA Implementation. Testing and Results. Conclusions and Future Work. Published Work.

Published Work 1. M. Tolba, I. Taha, and A. Al-Shishtawy, "An Intrusion Detection Architecture for Computational Grids". First International Conference on Intelligent Computing and Information Systems, June M. Tolba, M. Abdel-Wahab, I. Taha, and A. Al-Shishtawy, “ A Secure Grid Enabled Signature Verification System ”. Second International Conference on Intelligent Computing and Information Systems, Cairo, Egypt, March M. Tolba, M. Abdel-Wahab, I. Taha, and A. Al-Shishtawy, "Distributed Intrusion Detection System for Computational Grids". Second International Conference on Intelligent Computing and Information Systems, Cairo, Egypt, March 2005.

Published Work 4. M. Tolba, M. Abdel-Wahab, I. Taha, and A. Al- Shishtawy, "GIDA: Toward Enabling Grid Intrusion Detection Systems". Cluster Computing and Grid 2005, Cardiff, UK, May p/schedule/Paper20.pdf 5. M. Tolba, M. Abdel-Wahab, I. Taha, and A. Al- Shishtawy, "Intrusion Detection System for the Grid". The 2005 International Conference on Grid Computing and Applications (GCA'05). Las Vegas, Nevada, USA, June 2005.

The End Thank you for careful listening