cs526 presentation
DESCRIPTION
CS526 Presentation. An in depth review of ad hoc mobile network & cloud security concerns. Josh Alcorn Larry Brachfeld. Agenda. Overview of Ad Hoc Mobile and Cloud Networks– Josh Overview of Security Concerns– Larry Attack M ethods & Vulnerabilities- Josh - PowerPoint PPT PresentationTRANSCRIPT
CS526 Presentation
Josh AlcornLarry Brachfeld
An in depth review of ad hoc mobile network & cloud security concerns
Overview of Ad Hoc Mobile and Cloud Networks– Josh
Overview of Security Concerns– Larry Attack Methods & Vulnerabilities- Josh
Overview of Specific Security Proposals– Larry
Future Work - Josh
2
Agenda
Self-configuring infrastructureless network of clouds/mobile devices connected by wireless links.
The emergence of cloud-based computing, where storage and CPU are outsourced to multiple 3rd parties across the globe, implies large collections of highly distributed and continuously evolving data points.
Overview of Ad Hoc Mobile and Cloud Networks
3
Ensure the infrastructure is secure and the clients’ data and applications are protected. While the customer must ensure that the provider has taken the proper security measures to protect their information.
4
Overview of Ad Hoc Mobile and Cloud Networks
Cloud Computing Scenarios
5
Because mobile ad hoc networks have many more vulnerabilities than a traditional wired network, security is much more of a challenge in the mobile ad hoc network environment.
On a wireless network, an adversary is able to eavesdrop on all messages within the emission area, by operating in promiscuous mode and using a packet sniffer
Overview of Security Concerns
6
Furthermore, due to the limitations of the medium, communications can easily be perturbed; the intruder can perform this attack by keeping the medium busy sending its own messages, or just by jamming communications with noise.
Overview of Security Concerns (Cont)
7
Vulnerabilities:◦ Lack of Secure Boundaries◦ Compromised Nodes ◦ Lack of Centralized Management/Standards◦ Restricted Power Supply*◦ Scalability
Attack Methods◦ DoS◦ Impersonation◦ Eavesdropping◦ Attacks Against Routing
Attack Methods & Vulnerabilities
8
CloudSEC proposes a new architecture for composing collaborative security-related services in clouds, such as correlated intrusion analysis, anti-spam, anti-DDOS, automated malware detection and containment.
CloudSEC is modeled as a dynamic peer-to-peer overlay hierarchy with three types of top-down architectural components.
Overview of Security Proposals
9
Based on this architecture, both data distribution and task scheduling overlays can be simultaneously implemented in a loosely coupled fashion, which can efficiently retrieve data resources from heterogeneous network security facilities, and harness distributed collection of computational resources to process data-intensive tasks.
Overview of Security Proposals
10
CLoudSec Architecture
11
PKI to Secure User Data
12
SecureCloud
13
14
Vcloud API
15
Collaborative Mobile Environment Better Network Mapping/Utilization Tools Jurisdiction & Provider Integrity
Future of Ad Hoc Mobile & Cloud Security
16
Questions ?
17