20 research outputs found

    Will SDN be part of 5G?

    Get PDF
    For many, this is no longer a valid question and the case is considered settled with SDN/NFV (Software Defined Networking/Network Function Virtualization) providing the inevitable innovation enablers solving many outstanding management issues regarding 5G. However, given the monumental task of softwarization of radio access network (RAN) while 5G is just around the corner and some companies have started unveiling their 5G equipment already, the concern is very realistic that we may only see some point solutions involving SDN technology instead of a fully SDN-enabled RAN. This survey paper identifies all important obstacles in the way and looks at the state of the art of the relevant solutions. This survey is different from the previous surveys on SDN-based RAN as it focuses on the salient problems and discusses solutions proposed within and outside SDN literature. Our main focus is on fronthaul, backward compatibility, supposedly disruptive nature of SDN deployment, business cases and monetization of SDN related upgrades, latency of general purpose processors (GPP), and additional security vulnerabilities, softwarization brings along to the RAN. We have also provided a summary of the architectural developments in SDN-based RAN landscape as not all work can be covered under the focused issues. This paper provides a comprehensive survey on the state of the art of SDN-based RAN and clearly points out the gaps in the technology.Comment: 33 pages, 10 figure

    Near real-time network analysis for the identification of malicious activity

    Get PDF
    The evolution of technology and the increasing connectivity between devices lead to an increased risk of cyberattacks. Reliable protection systems, such as Intrusion Detection System (IDS) and Intrusion Prevention System (IPS), are essential to try to prevent, detect and counter most of the attacks. However, the increased creativity and type of attacks raise the need for more resources and processing power for the protection systems which, in turn, requires horizontal scalability to keep up with the massive companies’ network infrastructure and with the complexity of attacks. Technologies like machine learning, show promising results and can be of added value in the detection and prevention of attacks in near real-time. But good algorithms and tools are not enough. They require reliable and solid datasets to be able to effectively train the protection systems. The development of a good dataset requires horizontal-scalable, robust, modular and faulttolerant systems so that the analysis may be done in near real-time. This work describes an architecture design for horizontal-scaling capture, storage and analyses, able to collect packets from multiple sources and analyse them in a parallel fashion. The system depends on multiple modular nodes with specific roles to support different algorithms and tools.A evolução da tecnologia e o aumento da conectividade entre dispositivos, levam a um aumento do risco de ciberataques. Os sistemas de deteção de intrusão são essenciais para tentar prevenir, detetar e conter a maioria dos ataques. No entanto, o aumento da criatividade e do tipo de ataques aumenta a necessidade dos sistemas de proteção possuírem cada vez mais recursos e poder computacional. Por sua vez, requerem escalabilidade horizontal para acompanhar a massiva infraestrutura de rede das empresas e a complexidade dos ataques. Tecnologias como machine learning apresentam resultados promissores e podem ser de grande valor na deteção e prevenção de ataques em tempo útil. No entanto, a utilização dos algoritmos e ferramentas requer sempre um conjunto de dados sólidos e confiáveis para treinar os sistemas de proteção de maneira eficaz. A implementação de um bom conjunto de dados requer sistemas horizontalmente escaláveis, robustos, modulares e tolerantes a falhas para que a análise seja rápida e rigorosa. Este trabalho descreve a arquitetura de um sistema de captura, armazenamento e análise, capaz de capturar pacotes de múltiplas fontes e analisá-los de forma paralela. O sistema depende de vários nós modulares com funções específicas para oferecer suporte a diferentes algoritmos e ferramentas

    The InfoSec Handbook

    Get PDF
    Computer scienc

    Service-oriented models for audiovisual content storage

    No full text
    What are the important topics to understand if involved with storage services to hold digital audiovisual content? This report takes a look at how content is created and moves into and out of storage; the storage service value networks and architectures found now and expected in the future; what sort of data transfer is expected to and from an audiovisual archive; what transfer protocols to use; and a summary of security and interface issues

    Webspy : uma aplicação de monitoramento Web em tempo real

    Get PDF
    Monografia (graduação)—Universidade de Brasília, Instituto de Ciências Exatas, Departamento de Ciência da Computação, 2013.O surgimento e difusão da Web permitiu a criação de diversas aplicações, entre elas as domésticas, comerciais e móveis. Dessa forma, o uso da Web através da Internet tornou-se uma ferramenta muito versátil e poderosa. Porém, como não é possível garantir que todos que a utilizam são bem intencionados, discute-se cada vez mais a necessidade de ferramentas de monitoramento de seu uso. Este trabalho busca apresentar uma aplicação para monitoramento do uso da Web em tempo real com foco em um host específico de uma rede: o Webspy. Essa aplicação foi desenvolvida como prova de conceito de que é possível realizar o monitoramento de tráfego da Web através de técnicas de ataque do tipo man-in-the-middle, em especial a técnica de ARP Spoofing. Dentre as funcionalidades propostas destacam-se a filtragem e visualização de tráfego relativo a páginas da Web em tempo real e a reprodução da visualização das páginas interceptadas na ordem em que foram acessadas pelo host monitorado. Todos os conceitos e técnicas que possibilitam o desenvolvimento da aplicação são apresentados e discutidos. A implementação final da aplicação apresentou resultados muito positivos quanto à visualização de páginas HTTP, conseguindo cumprir os objetivos propostos com pequenas limitações. A versão fiinal da aplicação incluiu também a funcionalidade de visualização de páginas HTTPS utilizando a técnica de SSL Stripping. ___________________________________________________________________________ ABSTRACTThe rise and diffusion of the Web has enabled the development of several applications: domestic, commercial and mobile. Like so, the use of the Web through the Internet has become a powerful and versatile tool. However, since it's not possible to guarantee that everyone who use this tool is well intentioned, the need for monitoring tools is a topic being discussed more and more often. This work presents an application called Webspy that is capable of monitoring the use of the Web associated with a specific host in a computer network. This application was developed as a proof of concept that it is possible to accomplish Web monitoring through man-in-the-middle attack techniques, namely ARP Spoofing. The following features are emphasized: filtering and visualization of traffic related to Web pages in real time and the replay of the visualizations of intercepted pages in the order they were viewed by the monitored host. All concepts and techniques that make this approach possible are presented and discussed in this work. The final implementation of the application revealed impressive results in regards to the visualization of HTTP pages, fulfilling the proposed objectives with little limitations. The final version also included the feature of viewing HTTPS pages through the use of the technique known as SSL Stripping

    The InfoSec Handbook

    Get PDF
    Computer scienc

    Simple and Lightweight HTTPS Enforcement to Protect against SSL Striping Attack

    No full text

    The Murray Ledger and Times, July 28, 1976

    Get PDF

    Cloud BI: A Multi-party Authentication Framework for Securing Business Intelligence on the Cloud

    Get PDF
    Business intelligence (BI) has emerged as a key technology to be hosted on Cloud computing. BI offers a method to analyse data thereby enabling informed decision making to improve business performance and profitability. However, within the shared domains of Cloud computing, BI is exposed to increased security and privacy threats because an unauthorised user may be able to gain access to highly sensitive, consolidated business information. The business process contains collaborating services and users from multiple Cloud systems in different security realms which need to be engaged dynamically at runtime. If the heterogamous Cloud systems located in different security realms do not have direct authentication relationships then it is technically difficult to enable a secure collaboration. In order to address these security challenges, a new authentication framework is required to establish certain trust relationships among these BI service instances and users by distributing a common session secret to all participants of a session. The author addresses this challenge by designing and implementing a multiparty authentication framework for dynamic secure interactions when members of different security realms want to access services. The framework takes advantage of the trust relationship between session members in different security realms to enable a user to obtain security credentials to access Cloud resources in a remote realm. This mechanism can help Cloud session users authenticate their session membership to improve the authentication processes within multi-party sessions. The correctness of the proposed framework has been verified by using BAN Logics. The performance and the overhead have been evaluated via simulation in a dynamic environment. A prototype authentication system has been designed, implemented and tested based on the proposed framework. The research concludes that the proposed framework and its supporting protocols are an effective functional basis for practical implementation testing, as it achieves good scalability and imposes only minimal performance overhead which is comparable with other state-of-art methods
    corecore