473 research outputs found

    Teaching networks in the cloud

    Get PDF
    The Web is populated by a growing number of services that provide access to remote IT resources: they are col- lectively addressed as the Cloud. Such incoherent and expanding number of services is investigated to find those that can help the task of teaching, focusing on a challenging case study for which I have a direct experience: a course in computer networks with the purpose of giving the students a hands-on experience using production-grade techniques. The outcome of the case study is that on-line services can complement traditional frontal lectures, to enrich the communi- cation between the teacher and the student, and to improve the learning experience. This is a hint for teachers, and characterizes a potential market for developers and providers

    Design and implementation of a semi-automated threat analysis system -Tartarus-

    Get PDF
    In recent years, there has been a notable increase in the number of cyberattacks caused by the change in the work model due to the pandemic. People were forced to work at home, away from the secure confines of a corporate network. Moreover, in the coming years the number, intensity and variety of these attacks are expected to keep increasing. Therefore, it is of vital importance to constantly track and adapt to the new techniques, vulnerabilities and malware used by the cybercriminals to understand your level of exposure against these new threats. This project aims to implement a semi-automated threat analysis system that can distribute and execute malware samples into sandboxed virtual machines. Once it has been executed, this system retrieves metrics of the results of each execution to observe the detection and blocking capacity of the machine against these threats

    Dyn Tail - Dynamically Tailored Deployment Engines for Cloud Applications

    Full text link

    Introducing Development Features for Virtualized Network Services

    Get PDF
    Network virtualization and softwarizing network functions are trends aiming at higher network efficiency, cost reduction and agility. They are driven by the evolution in Software Defined Networking (SDN) and Network Function Virtualization (NFV). This shows that software will play an increasingly important role within telecommunication services, which were previously dominated by hardware appliances. Service providers can benefit from this, as it enables faster introduction of new telecom services, combined with an agile set of possibilities to optimize and fine-tune their operations. However, the provided telecom services can only evolve if the adequate software tools are available. In this article, we explain how the development, deployment and maintenance of such an SDN/NFV-based telecom service puts specific requirements on the platform providing it. A Software Development Kit (SDK) is introduced, allowing service providers to adequately design, test and evaluate services before they are deployed in production and also update them during their lifetime. This continuous cycle between development and operations, a concept known as DevOps, is a well known strategy in software development. To extend its context further to SDN/NFV-based services, the functionalities provided by traditional cloud platforms are not yet sufficient. By giving an overview of the currently available tools and their limitations, the gaps in DevOps for SDN/NFV services are highlighted. The benefit of such an SDK is illustrated by a secure content delivery network service (enhanced with deep packet inspection and elastic routing capabilities). With this use-case, the dynamics between developing and deploying a service are further illustrated

    Vagrant Figures: Law, Labor, and Refusal in the Eighteenth-Century Atlantic World

    Get PDF
    The archive of vagrancy is a counter-history of economic rationality. In seeking to catalogue and apprehend the non-laboring body, vagrancy law theorizes labor by tracking its refusal. While vagrancy laws had existed in England since the fourteenth century, vagrancy takes on new meaning in the eighteenth century, as labor becomes central to economic theories of value, emergent penitentiary institutions promote work as a mode of criminal rehabilitation, and transatlantic debates over slavery lend new urgency to the problem of defining free labor. When legal, economic, and literary texts invoke vagrancy, they therefore ask a crucial question for this period: what makes people work? Vagrancy law called on its enforcers to interpret and predict the actions of those who (in the words of many eighteenth-century statutes) could give no good account of themselves. Across a wide variety of genres, vagrancy appears not as an identity, but as a proliferation of figures, a picaresque parataxis that links characteristics and behaviors as signs of a common disposition yet refuses identitarian coherence. By figuring social threat as unpredictable mobility, ambiguity, and incoherence, the rhetoric of vagrancy justified an equally expansive mobility and flexibility for police power. By bringing together texts debating crime and poverty in England, the meaning of free labor in the context of slavery in the Caribbean, and the stakes of mobility in the United States, Vagrant Figures reveals how vagrancy linked police power to economic rationality across transnational circuits of commerce, legal thought, and colonial governance. As economic reasoning informed the management of colonies and the imaginative apprehension of the global, vagrancy came to signify threat to the global enterprises of capitalism and colonial expansion. At the same time, however, the power of vagrancy\u27s rhetoric became a resource for authors seeking to challenge or critique police power. Through readings of authors including Jane Barker, Henry Fielding, Charles Brockden Brown, Edward Long,William Earle, Karl Marx, and Adam Smith, this project traces the resolutely figurative workings of political economy and police power in the long eighteenth century, as both theorized human perception and interiority through registers of the imaginative and rhetorical

    SOFTWARE DEFINED CUSTOMIZATION OF NETWORK PROTOCOLS WITH LAYER 4.5

    Get PDF
    The rise of software defined networks, programmable data planes, and host level kernel programmability gives rise to highly specialized enterprise networks. One form of network specialization is protocol customization, which traditionally extends existing protocols with additional features, primarily for security and performance reasons. However, the current methodologies to deploy protocol customizations lack the agility to support rapidly changing customization needs. This dissertation designs and evaluates the first software-defined customization architecture capable of distributing and continuously managing protocol customizations within enterprise or datacenter networks. Our unifying architecture is capable of performing per-process customizations, embedding per-network security controls, and aiding the traversal of customized application flows through otherwise problematic middlebox devices. Through the design and evaluation of the customization architecture, we further our understanding of, and provide robust support for, application transparent protocol customizations. We conclude with the first ever demonstration of active application flow "hot-swapping" of protocol customizations, a capability not currently supported in operational networks.Office of Naval Research, Arlington, VA 22203Lieutenant Commander, United States NavyApproved for public release. Distribution is unlimited
    corecore