OASIS V2+ Next Generation Open Access Server CSD 2006 / Team 12.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Authentication.
Licia Florio EUNIS05, Manchester 1 Eduroam EUNIS Conference, June Licia Florio.
Chapter 19: Network Management Business Data Communications, 5e.
June 2010 At A Glance The Room Alert Adapter software in conjunction with AVTECH Room Alert™ devices assists in monitoring computer room environments as.
CSD-Team 13 Oasis v.2. Introduction Oasis v.1 ISPs share access network Security Choice for end-users Compatible with legacy systems Problems with the.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Red Hat Linux Network. Red Hat Network Red Hat Network is the environment for system- level support and management of Red Hat Linux networks. Red Hat.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Team: Maya Zalcberg Diana Attar Levona Hershtik Academic advisor: Prof. Ehud Gudes ADD Presentation.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Multiple Tiers in Action
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
Technical solution presentation AVL System for Fire Brigades.
Remote Networking Architectures
SNMP Configuration Manager Elad Dolev Sagi Rodin Supervisor – Zeev Schneider Project Manager – Ilana David Technion Institute of Technology, Haifa.
Software Development Architectures Ankur K. Rajopadhye Louisiana Tech University.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
CSD 2006 / TEAM 12 Final presentation 29 th May 2006.
Wireless and Security CSCI 5857: Encoding and Encryption.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Dynamic Firewalls and Service Deployment Models for Grid Environments Gian Luca Volpato, Christian Grimm RRZN – Leibniz Universität Hannover Cracow Grid.
VoIP in Disaster & Emergency Response Voice over IP in Disaster and Emergency Response Team Members: Muhammad Ali Mansoor A. Siddiqui Carlos Loarca de.
Authors: Jiann-Liang Chenz, Szu-Lin Wuy,Yang-Fang Li, Pei-Jia Yang,Yanuarius Teofilus Larosa th International Wireless Communications and Mobile.
Rwanda GovNet Xuan Pan Nkusi Issa Claude Hakizimana Joakim Slettengren Innocent Nkurunziza Xuan Pan Nkusi Issa Claude Hakizimana Joakim Slettengren Innocent.
GROUP INVOLVED IN A WEB APPLICATION DEVELOPMENT Continue.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 School of Computer, National University of Defense Technology A Profile on the Grid Data Engine (GridDaEn) Xiao Nong
® IBM Software Group © 2007 IBM Corporation J2EE Web Component Introduction
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
Module 11: Remote Access Fundamentals
PAPI Points of Access to Providers of Information.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
NuolSec VIspace Vientiane, Laos.
Keeping Network Monitoring Current using Automated Nagios Configurations (WIP) Greg Wickham APAN July 2005.
Module 9: Fundamentals of Securing Network Communication.
Graphing and statistics with Cacti AfNOG 11, Kigali/Rwanda.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Java Portals and Portlets Submitted By: Rashi Chopra CIS 764 Fall 2007 Rashi Chopra.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Oracle's Distributed Database Bora Yasa. Definition A Distributed Database is a set of databases stored on multiple computers at different locations and.
輔大資工所 在職研一 報告人:林煥銘 學號: Public Access Mobility LAN: Extending The Wireless Internet into The LAN Environment Jun Li, Stephen B. Weinstein, Junbiao.
WLAN In Disaster and Emergency Response (WIDER) MidTerm Presentation.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
System/SDWG Update Management Council Face-to-Face Flagstaff, AZ August 22-23, 2011 Sean Hardman.
1. ◦ Intro ◦ Client-side security ◦ Server-side security ◦ Complete security ? 2.
A Web-based Integrated Console for Controlling a Set of Networks (WICCSN) By Avinash & Amber For Web Security Class under Dr Yang Andrews.
Authors: Jiann-Liang Chenz, Szu-Lin Wuy, Yang-Fang Li, Pei-Jia Yang,
DCS230 Centralized or Decentralized Data Transfer Prof. Nalini Venkatasubramanian -Myung Guk Lee -YunHo Huh -Abhinav.
2 nd lecture Presented by Dr. Sarah Mustafa Eljack.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Computer and Information Security
By Sachin Kumar Korenga & Rochita Thakkallapally
Securing the Network Perimeter with ISA 2004
What’s New in Fireware v12.1.1
DUCKS – Distributed User-mode Chirp-Knowledgeable Server
Server-to-Client Remote Access and DirectAccess
Presentation transcript:

OASIS V2+ Next Generation Open Access Server CSD 2006 / Team 12

Agenda Project background and context Goals and objectives Architecture Project status Future work Questions and answers

Background and context OASIS V.1 -KTH university – IT campus -Stockholm open Problems of V.1: -No encryption of data -Attacks on IP level

Goals and objectives To create a solution for multiple ISPs to share an access network, letting the end- users choose the ISP. To support wired and wireless connections of user-end. To create easy to implement solution for ISP administrators To provide a free and complete software package (open source package).

Architecture User interface - ISP UI - Operator UI Monitoring subsystem Authentication subsystem Management subsystem

User of ISP a VLAN 802.1x Free Radius Proxy server

Authentication Daemon Purpose: authenticate users´ login requests. Program continuously in listening state. A process is tied to every request; reused a number of times. Connection to database – able to read table with username/passwords in order to authenticate users. − Only component allowed to access that table.

Method of Authentication CRAM (challenge response authentication mode). Authentication Type used is a variation of ‘CRAM-MD5’ − It is in fact a modified CRAM-SHA256. Entire transfer of data is tunneled using SSL. Purpose: this method protects against passive attacks. − Dictionary and Replay attacks.

Mechanism Hello Challenge DigestC(Challenge)=DigestS(Challenge) Username+DigestC(challenge )

Policy Daemon This Daemon is related to the authentication daemon. Authentication leads to privileges(sharing resources). − Policy mandates authorization. Responsible for controlling clients´ access to resources according to their privileges. Like in our monitoring system the ISP’s have access to less information than the Network operator.

Monitoring protocol daemon (Monpd)  It acts as a middle man between client and functional daemons.  Unprivileged, listens to external requests.  Performs privileged operations by communicating with other daemons.  It receives XMLRPC queries from client and responds back after servicing the request. PHP (User Interface) Oasis2 Monpd Functional Daemons XMLRPC HTTPS ProcReq( ) Result( )

An Application Layer Protocol. Monitoring Management SNMP (Simple Network Management Protocol)

SNMP Based on Manager/Agent Model Consists of A manager An Agent A Database of Management Information Managed Objects Network Protocol

RRD Master RRDB Config DB OASIS Server SWITCHES GETBULK () SNMP Overview of OASIS v2+

Physical Layout/Grouping Root Node SubArea(1-2) AP (2B) Switch (1C) Area(2) Area(1) SubArea(1-1) Switch (1A) Switch (1B) AP (1A) AP 1(B) Switch (2A) AP (2A) AP (2C) AP (2D) Core Layer Distribution Layer Access Layer

SNMP features in OASIS v2+ Monitoring Interface Traffic Monitoring SNMP Enabled Devices Network Path Definition and link failure Off network Alert Notification Network Performance Reporting

RRDtool SNMP poller Graphical interface RRDb

RRDb – Round Robin Database SNMP poller Graphs on demand Time interval

Graph

How we will implement RRDtool C API Cmd line RRDtool Perl scripts Redesigned C API C++ wrapper Today GoalFaster Scalable Perl scripts Cmd Line Compatibility layer

Project status Subsystem’s analysis finished Use cases − Sequence Diagrams are ready Framework (AFX) − Component Diagrams are ready Designing C++ wrapper for RRDtool − brand-new RRDtool C API

Project status Blueprint of user interface Authentication daemon − Basic functionality XMLRPC server design & implementation − Prototype available. XMLRPC client Initialization

Future work SNMP Poller – basic functionalities Complete Implementing of XMLRPC Server Complete Implementing of XMLRPC client Design of web page for Operator and ISP Policyd completion RRDtool++: implementing more functionality

Thanks for your attention! Questions? Web Site: