INTERNATIONAL NETWORKS At Indiana University Hans Addleman TransPAC Engineer, International Networks University Information Technology Services Indiana.

Slides:



Advertisements
Similar presentations
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
Advertisements

Intrusion Detection System(IDS) Overview Manglers Gopal Paliwal Gopal Paliwal Roshni Zawar Roshni Zawar SenthilRaja Velu SenthilRaja Velu Sreevathsa Sathyanarayana.
Flowspace revisited OpenFlow Basics Flow Table Entries Switch Port MAC src MAC dst Eth type VLAN ID IP Src IP Dst IP Prot L4 sport L4 dport Rule Action.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Barracuda Web Application Firewall
Firewall Configuration Strategies
MSIT 458: Information Security & Assurance By Curtis Pethley.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
John Kristoff DePaul Security Forum Network Defenses to Denial of Service Attacks John Kristoff
Jaehoon (Paul) Jeong, Hyoungshick Kim, and Jung-Soo Park
Host Intrusion Prevention Systems & Beyond
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Intrusion Prevention System Group 6 Mu-Hsin Wei Renaud Moussounda Group 6 Mu-Hsin Wei Renaud Moussounda.
Department Of Computer Engineering
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Barracuda Load Balancer Server Availability and Scalability.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Sungkyunkwan University (SKKU) Security Lab. A Framework for Security Services based on Software-Defined Networking Jaehoon (Paul) Jeong 1, Jihyeok Seo.
SDN based Network Security Monitoring in Dynamic Cloud Networks Xiuzhen CHEN School of Information Security Engineering Shanghai Jiao Tong University,
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
UNM RESEARCH NETWORKS Steve Perry CCNP, CCDP, CCNP-V, CCNP-S, CCNP-SP, CCAI, CMNA, CNSS 4013 Director of Networks.
Chapter 5: Implementing Intrusion Prevention
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Module 10: Windows Firewall and Caching Fundamentals.
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
DoS/DDoS attack and defense
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
Brocade Flow Optimizer
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
TCP Traffic Characteristics—Deep buffer Switch
Presenter : Weerawardhana J.L.M.N. Department of Computer Engineering, University of Peradeniya.
SCIENCE_DMZ NETWORKS STEVE PERRY, DIRECTOR OF NETWORKS UNM PIYASAT NILKAEW, DIRECTOR OF NETWORKS NMSU.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Mitigating Distributed Denial of Service Attacks Using a Proportional- Integral-Derivative Controller Marcus Tylutki.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
An Introduction To Gateway Intrusion Detection Systems Hogwash GIDS Jed Haile Nitro Data Systems.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
UNM SCIENCE DMZ Sean Taylor Senior Network Engineer.
Denial of Service Mitigation with OpenFlow using SciPass
SDN and Security Security as a service in the cloud
IDS Intrusion Detection Systems
Intrusion Detection Systems
Web Application Protection Against Hackers and Vulnerabilities
Firewalls.
Kiyoshi Kodama, SE Japan 07-Oct-2008
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
AKAMAI INTELLIGENT PLATFORM™
Firewalls Purpose of a Firewall Characteristic of a firewall
Software Defined Networking
Enabling Innovation Inside the Network
OpenSec:Policy-Based Security Using Software-Defined Networking
Intrusion Detection Systems
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

INTERNATIONAL NETWORKS At Indiana University Hans Addleman TransPAC Engineer, International Networks University Information Technology Services Indiana University INTERNATIONAL NETWORKS At Indiana University Supported by the National Science Foundation Denial of Service Mitigation with OpenFlow and SciPass

INTERNATIONAL NETWORKS At Indiana University Goals Provide adequate security at 100Gbps speed Detect Distributed Denial of Service (DDOS) attacks Stop attack inside the Wide Area Network (WAN) Automated process Do not impede legitimate traffic

INTERNATIONAL NETWORKS At Indiana University Intrusion Detection System Deep packet inspection Look for known traffic patterns and signatures that signal an attack Useful for identifying DDOS

INTERNATIONAL NETWORKS At Indiana University SciPass Indiana University developed SDN Application Adaptive IDS cluster load balancing Reactive white and blacklisting Web Service API for IDS Feedback Designed primarily for Science DMZ

INTERNATIONAL NETWORKS At Indiana University Background: Campus Networks Campus Networks Firewalls May not be large flow optimized There may be a better path for science / research traffic.

INTERNATIONAL NETWORKS At Indiana University Background: ScienceDMZ Support high performance science applications Reduce loss that impacts TCP performance faster / bigger connection to regional / national / international networks Integrate and allow for test points Provide some security at 100Gbps

INTERNATIONAL NETWORKS At Indiana University SciPass: Approach Create a Reactive System OpenFlow Switch Intrusion Detection PerfSonar Default traffic to slow path Use IDS to detect what goes on fast path

INTERNATIONAL NETWORKS At Indiana University SciPass: Default Traffic follows default path Traffic mirrored to array of Intrusion Detection Systems.

INTERNATIONAL NETWORKS At Indiana University SciPass: Detection IDS identifies science / defined flow IDS signals SciPass to setup fast path

INTERNATIONAL NETWORKS At Indiana University SciPass: Bypass Based on IDS input SciPass installs OpenFlow rules to bypass the firewall / take best path.

INTERNATIONAL NETWORKS At Indiana University SciPass Blacklist Feature Can match: Source / Destination IP Source / Destination Port Ethernet Type SciPass sends OpenFlow rules to switch Flow Based: Block HTTP traffic from Host A to B Prefix Based: Block all traffic to /32 Prefix Based: Block all traffic to or from /24 IDS signals bad traffic to SciPass via web services

INTERNATIONAL NETWORKS At Indiana University Mitigation IDS detects malicious traffic IDS signals SciPass to block traffic SciPass creates openflow rules on switch to block traffic.

INTERNATIONAL NETWORKS At Indiana University SciPass Black List Example

INTERNATIONAL NETWORKS At Indiana University Path Forward Lab Deployment SciPass + Brocade MLXe + IDS (Bro) Generate test traffic Squash false positives Feasibility / Scale TransPAC4 Field Deployment in logging mode TransPAC4 Field Deployment in automatic mode

INTERNATIONAL NETWORKS At Indiana University Questions / Comments? Hans Addleman - TransPAC4 NSF IRNC Award: #