Final Presentation 4/21/2010 By Guofu Xiong, Yuli Deng.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

Leveraging WinPE and Linux Preboot for Effective Provisioning Jonathan Richey | Director of Development | Altiris, Inc.
CSE 548 Advanced Computer Network Security Long Qiu Xinyi Dong DOSGI APPLICATION PLATFORM FOR MOBICLOUD.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
DOSGi Application Platform for MobiCloud Long Qiu Xinyi Dong.
D-OSDi + Android Progress Presentation Xinyi Dong Long Qiu.
Jun Peng Stanford University – Department of Civil and Environmental Engineering Nov 17, 2000 DISSERTATION PROPOSAL A Software Framework for Collaborative.
Terminal Services Terminal Services is the modern equivalent of mainframe computing, in which servers perform most of the processing and clients are relatively.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Towards Extending the Antivirus Capability to Scan Network Traffic Mohammed I. Al-Saleh Jordan University of Science and Technology.
Secure Search Engine Ivan Zhou Xinyi Dong. Project Overview  The Secure Search Engine project is a search engine that utilizes special modules to test.
Norman SecureSurf Protect your users when surfing the Internet.
Securing Exchange Server Session Goals: Introduce you to the concepts and mechanisms for securing Exchange Examine the techniques and tools.
QWise software engineering – refactored! Testing, testing A first-look at the new testing capabilities in Visual Studio 2010 Mathias Olausson.
Submitted by: Madeeha Khalid Sana Nisar Ambreen Tabassum.
6/1/2001 Supplementing Aleph Reports Using The Crystal Reports Web Component Server Presented by Bob Gerrity Head.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Sumit Kumar Archana Kumar Group # 4 CSE 591 : Virtualization and Cloud Computing.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
1 © 2008 Avaya Inc. All rights reserved. IPOffice Configuration Service Emil Ratnam.
Cloud-based Antivirus Project Proposal By Yuli Deng, Guofu Xiong.
Computer project – computer virus 1D Christy Chan (9) Patricia Cheung (14)
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Remote Controller & Presenter Make education more efficiently
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Jeny Carrasco and Jai Nayar English 393 Process Manual Assignment 12/08/04 McAfee 7.1 Process Manual.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
6/1/2001 Supplementing Aleph Reports Using The Crystal Reports Web Component Server Presented by Bob Gerrity Head.
Microsoft Management Seminar Series SMS 2003 Change Management.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Principles of Information Systems, Sixth Edition Software: Systems and Application Software Chapter 4.
NetTech Solutions Protecting the Computer Lesson 10.
Dispatching Java agents to user for data extraction from third party web sites Alex Roque F.I.U. HPDRC.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Secure Search Engine Ivan Zhou Xinyi Dong. Project Overview  The Secure Search Engine project is a search engine that utilizes special modules to test.
Service Pack 2 System Center Configuration Manager 2007.
Privacy-Preserving and Content-Protecting Location Based Queries.
FlowLevel Client, server & elements monitoring and controlling system Message Include End Dial Start.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
In this session, you will learn to: Understand managed code Create managed database objects Define the Hypertext Transfer Protocol endpoints Implement.
 Cloud Computing technology basics Platform Evolution Advantages  Microsoft Windows Azure technology basics Windows Azure – A Lap around the platform.
COMPUTER NETWORKS Quizzes 5% First practical exam 5% Final practical exam 10% LANGUAGE.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
Fermilab Scientific Computing Division Fermi National Accelerator Laboratory, Batavia, Illinois, USA. Off-the-Shelf Hardware and Software DAQ Performance.
CLOUDENTIFY.
BUILD SECURE PRODUCTS AND SERVICES
InGenius Connector Enterprise Microsoft Dynamics CRM
Business Directory REST API
Data Virtualization Demoette… ADO.NET Client
Data Virtualization Tutorial… OAuth Example using Google Sheets
Protecting your mobile devices away from virus by a cloud-based approach Wei Wu.
Cloud-based Antivirus
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
Drupal VM and Docker4Drupal For Drupal Development Platform
Drupal VM and Docker4Drupal as Consistent Drupal Development Platform
Cloud Helps Company Scale to Demand for Growing Healthcare Provider Field MINI-CASE STUDY “Microsoft Azure gives us the opportunity to focus on the task.
Cloud Web Filtering Platform
CLOUD COMPUTING.
Preparing for the Windows 8.1 MCSA
Presentation transcript:

Final Presentation 4/21/2010 By Guofu Xiong, Yuli Deng

Outline  Project Goal  Roadmap  System Configuration  Technical Solutions  Demo  Summary

Project Goal  Build a demonstrative system to study the concept of Cloud-Based Anti-Virus  Learn the Cloud-Based Anti-Virus pros and cons  Complete deploying the system  Integrate the SSE into our project to enable the white/black list function

Roadmap Tasks \ TimeBy 2/13By 2/20By 3/1By 3/11By 4/3By 4/15By 4/21 Task 1 : Preparation Task 2 : Setting environment Task 3 : Self- Developed program Task 4 : AntiVirus Proxy Task 5 : Test and deploy

System Configuration  Hardware  2 virtual machines running on the mobicloud.  Software  Ubuntu  HAVP  Squid3  C-ICAP  Clamav scan engine with its library  AVG scan engine  CURL library

Technical Solutions 1. Client software + Server side code + 3 rd party cloud scan engines 2. (Anti-virus proxy) Squid + C-ICAP + Clamav 3. (Anti-virus proxy) HAVP + Clamav & AVG 4. (Anti-virus proxy) Squid + C-ICAP & SSE + HAVP + Clamav & AVG

Solution 1 : Workflow Features:  A simple server utilizes current online Cloud AV engines (Symantec, Trend,..)  An windows client program  C++ is expected to be used for coding Steps: (1)User enters a URL; (2)Agent sends the URL to the server; (3) Server downloads the target file and send it to the 3 rd party scan engines; (4) Scan engines return result; (5) Server sends result to the user agent; (6) User agent decides action.

Solution 1 : Pros and Cons Pros:  Workflow is simple, easy to develop and deploy. Cons:  The process of transferring a file from the server to the 3 rd party scan engines is time- consuming.  Hard to retrieve various types of URL address from mobile phone and download them.

Solution 2 : Workflow Steps: (1)User browsed/download the URL in their agent; (2)User agent sends requests to Internet through squid proxy; (3)Squid gets data from the Internet, C-ICAP gets them and hands to scan clamav; (4)Clamav reports result; (5)Squid reports results to the users. *.This solution is first implemented by Zhibin, Xinyi and Tianyi

Solution 2 : Pro and Cons Pros:  Able to utilize anti-virus scan engine and black/white function at the same time.  Effective.  Easy for end users to configure. Cons:  Unable to utilize different scan engines at the same time. (Only Clamav is used).  Buffered data in squid will not be scanned if users try to access this data again in some conditions.

Solution 3 : Workflow Steps: (1)User browses/downloads a URL in their agent; (2)User agent sends requests through proxy (user-> HAVP -> Internet); (3)HAVP receives data from the Internet and sends them to scan engines; (4)HAVP sends data to the user at the same time but holds the end section of data; (5)If scan engines report virus, stop sending data to client and report to the user.

Solution 3 : Pros and Cons Pros:  Efficient, almost no delay in user browsing.  Able to utilize different scans engines at the same time.  Easy for users to configure. Cons:  Can’t integrate SSE.  Can’t buffer internet traffic.  Weaknesses in HAVP: File bigger than “hold back data” would be ignored by HAVP.

Final Solution : Workflow Steps: (1)User browses/downloads a URL in their agent; (2)User agent sends requests through proxy (user -> Squid -> HAVP -> Internet); (3)C-ICAP gets the URL and send to SSE, if phishing, send back result; (4)HAVP receives data from the Internet and send them to scan engines; (5)HAVP sends data to the user at the same time but holds the end section of data; (6)If scan engines report virus, stop sending data to client and report to the user.

Final Solution : Pros and Cons Pros:  Utilized various kinds of scan engines.  Enabled the white/black list function with SSE.  Squid(with its components) and HAVP(with its components) can be located in different machines.  Easy for end users to configure.  Enable to buffer data to increase the speed. Cons:  The scan/filter procedure decreases the speed of browsing and downloading. (The speed is most affected by the slowest component)  HAVP has weaknesses (Addressed before).  Buffered data in squid will not be scanned if accessed by users in some conditions.

Demo Time

Summary  Cloud-based anti-virus is a promising trend for the security field for its advantages;  There are many existing modules available for us to utilize;  More functions will lead to the decrease in the speed of browsing the Internet;  The hardware require for cloud-based anti- virus is very high.

Acknowledgements  Thanks for Zhibin and Xinyi’s previous solution. Part of our final solution is based on their work.  Thanks for Tianyi on providing mobicloud platform for our project;  Thanks for Dr. Huang who give us the instructions and the opportunity to learn and practice.

Any Question? Thank you!