cs526 presentation

17
CS526 Presentation Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns

Upload: mulan

Post on 23-Feb-2016

35 views

Category:

Documents


0 download

DESCRIPTION

CS526 Presentation. An in depth review of ad hoc mobile network & cloud security concerns. Josh Alcorn Larry Brachfeld. Agenda. Overview of Ad Hoc Mobile and Cloud Networks– Josh Overview of Security Concerns– Larry Attack M ethods & Vulnerabilities- Josh - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: CS526 Presentation

CS526 Presentation

Josh AlcornLarry Brachfeld

An in depth review of ad hoc mobile network & cloud security concerns

Page 2: CS526 Presentation

Overview of Ad Hoc Mobile and Cloud Networks– Josh

Overview of Security Concerns– Larry Attack Methods & Vulnerabilities- Josh

Overview of Specific Security Proposals– Larry

Future Work - Josh

2

Agenda

Page 3: CS526 Presentation

Self-configuring infrastructureless network of clouds/mobile devices connected by wireless links.

The emergence of cloud-based computing, where storage and CPU are outsourced to multiple 3rd parties across the globe, implies large collections of highly distributed and continuously evolving data points.

Overview of Ad Hoc Mobile and Cloud Networks

3

Page 4: CS526 Presentation

Ensure the infrastructure is secure and the clients’ data and applications are protected. While the customer must ensure that the provider has taken the proper security measures to protect their information.

4

Overview of Ad Hoc Mobile and Cloud Networks

Page 5: CS526 Presentation

Cloud Computing Scenarios

5

Page 6: CS526 Presentation

Because mobile ad hoc networks have many more vulnerabilities than a traditional wired network, security is much more of a challenge in the mobile ad hoc network environment.

On a wireless network, an adversary is able to eavesdrop on all messages within the emission area, by operating in promiscuous mode and using a packet sniffer

Overview of Security Concerns

6

Page 7: CS526 Presentation

Furthermore, due to the limitations of the medium, communications can easily be perturbed; the intruder can perform this attack by keeping the medium busy sending its own messages, or just by jamming communications with noise.

Overview of Security Concerns (Cont)

7

Page 8: CS526 Presentation

Vulnerabilities:◦ Lack of Secure Boundaries◦ Compromised Nodes ◦ Lack of Centralized Management/Standards◦ Restricted Power Supply*◦ Scalability

Attack Methods◦ DoS◦ Impersonation◦ Eavesdropping◦ Attacks Against Routing

Attack Methods & Vulnerabilities

8

Page 9: CS526 Presentation

CloudSEC proposes a new architecture for composing collaborative security-related services in clouds, such as correlated intrusion analysis, anti-spam, anti-DDOS, automated malware detection and containment.

CloudSEC is modeled as a dynamic peer-to-peer overlay hierarchy with three types of top-down architectural components.

Overview of Security Proposals

9

Page 10: CS526 Presentation

Based on this architecture, both data distribution and task scheduling overlays can be simultaneously implemented in a loosely coupled fashion, which can efficiently retrieve data resources from heterogeneous network security facilities, and harness distributed collection of computational resources to process data-intensive tasks.

Overview of Security Proposals

10

Page 11: CS526 Presentation

CLoudSec Architecture

11

Page 12: CS526 Presentation

PKI to Secure User Data

12

Page 13: CS526 Presentation

SecureCloud

13

Page 14: CS526 Presentation

14

Page 15: CS526 Presentation

Vcloud API

15

Page 16: CS526 Presentation

Collaborative Mobile Environment Better Network Mapping/Utilization Tools Jurisdiction & Provider Integrity

Future of Ad Hoc Mobile & Cloud Security

16

Page 17: CS526 Presentation

Questions ?

17