security, geni, and open source ketly jean-pierre geni/howard university

11
Security, GENI, and Open Source Ketly Jean-Pierre GENI/Howard University

Upload: chrystal-hunt

Post on 17-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security, GENI, and Open Source Ketly Jean-Pierre GENI/Howard University

Security, GENI, and Open Source

Ketly Jean-PierreGENI/Howard University

Page 2: Security, GENI, and Open Source Ketly Jean-Pierre GENI/Howard University

Agenda

• GPO Summer Experience• Security Policies• Security Tools• Challenges• Next steps• Q & A

Page 3: Security, GENI, and Open Source Ketly Jean-Pierre GENI/Howard University

GPO Summer Intern Experiences

• Documentation Process– Write– Review– Discuss

– Legal checkup– Incorporate

• Upload for use• Install open source software– Different Unix flavor– Installation packages

Page 4: Security, GENI, and Open Source Ketly Jean-Pierre GENI/Howard University

Security Policies

• Draft policies for discussion– Infrastructure Security– Recommended Use Policy

• Accountability/Communication/Cooperation• Risk assessment– Evaluate GENI tools

Page 5: Security, GENI, and Open Source Ketly Jean-Pierre GENI/Howard University

Example Open Source Security Tools

• Some open source tools that can be installed on *NIX and Windows– IDS – Snort• Detect possible intrusions

– Vulnerability scanners – Sara• Discover vulnerability

– Data Encryption – GnuPG• Secure communication and data storage

Page 6: Security, GENI, and Open Source Ketly Jean-Pierre GENI/Howard University

Challenges

• Finding install instructions specifically for NetBSD

• Snort – logs• How to interpret• What to do with information

Page 7: Security, GENI, and Open Source Ketly Jean-Pierre GENI/Howard University

Challenges Cont’d

• What will I use to monitor/measure the success– What is success?

• Getting (grad and possibly undergrad) student participation– Interested (not too comfortable with CLI)• Java or Windows based apps GENI

prototypes/experiments

Page 8: Security, GENI, and Open Source Ketly Jean-Pierre GENI/Howard University

What next…?

• Research– Trust Based Security• Focus on end-user (user point of view)• Can security be user based?

– Tools to help researchers, universities, and commercial participants manage security in prototypes and systems in the GENI environment

• Installation– GENI WIKI

Page 9: Security, GENI, and Open Source Ketly Jean-Pierre GENI/Howard University

Thank Yous

• National Science Foundation (NSF)• Heidi Picher-Dempsey• Henry Yeh• Dr. Rajni Goel (Advisor)• Dr. Moses Garuba (Advisor)• Chip Elliot• GPO Staff

Page 10: Security, GENI, and Open Source Ketly Jean-Pierre GENI/Howard University

Suggestions/Questions

Page 11: Security, GENI, and Open Source Ketly Jean-Pierre GENI/Howard University

Open Source Security Tool

• Recommendations--?– IDS – Snort• Logs

– Vulnerability scanners – Sara• Discover vulnerability

– Data Encryption – GnuPG• Secure communication and data storage

• Any others?