20 research outputs found
Will SDN be part of 5G?
For many, this is no longer a valid question and the case is considered
settled with SDN/NFV (Software Defined Networking/Network Function
Virtualization) providing the inevitable innovation enablers solving many
outstanding management issues regarding 5G. However, given the monumental task
of softwarization of radio access network (RAN) while 5G is just around the
corner and some companies have started unveiling their 5G equipment already,
the concern is very realistic that we may only see some point solutions
involving SDN technology instead of a fully SDN-enabled RAN. This survey paper
identifies all important obstacles in the way and looks at the state of the art
of the relevant solutions. This survey is different from the previous surveys
on SDN-based RAN as it focuses on the salient problems and discusses solutions
proposed within and outside SDN literature. Our main focus is on fronthaul,
backward compatibility, supposedly disruptive nature of SDN deployment,
business cases and monetization of SDN related upgrades, latency of general
purpose processors (GPP), and additional security vulnerabilities,
softwarization brings along to the RAN. We have also provided a summary of the
architectural developments in SDN-based RAN landscape as not all work can be
covered under the focused issues. This paper provides a comprehensive survey on
the state of the art of SDN-based RAN and clearly points out the gaps in the
technology.Comment: 33 pages, 10 figure
Near real-time network analysis for the identification of malicious activity
The evolution of technology and the increasing connectivity between devices lead to an
increased risk of cyberattacks. Reliable protection systems, such as Intrusion Detection
System (IDS) and Intrusion Prevention System (IPS), are essential to try to prevent,
detect and counter most of the attacks. However, the increased creativity and type of
attacks raise the need for more resources and processing power for the protection systems
which, in turn, requires horizontal scalability to keep up with the massive companies’
network infrastructure and with the complexity of attacks. Technologies like machine
learning, show promising results and can be of added value in the detection and prevention
of attacks in near real-time. But good algorithms and tools are not enough. They require
reliable and solid datasets to be able to effectively train the protection systems. The
development of a good dataset requires horizontal-scalable, robust, modular and faulttolerant
systems so that the analysis may be done in near real-time. This work describes
an architecture design for horizontal-scaling capture, storage and analyses, able to collect
packets from multiple sources and analyse them in a parallel fashion. The system depends
on multiple modular nodes with specific roles to support different algorithms and tools.A evolução da tecnologia e o aumento da conectividade entre dispositivos, levam a um
aumento do risco de ciberataques. Os sistemas de deteção de intrusão são essenciais para
tentar prevenir, detetar e conter a maioria dos ataques. No entanto, o aumento da criatividade
e do tipo de ataques aumenta a necessidade dos sistemas de proteção possuírem
cada vez mais recursos e poder computacional. Por sua vez, requerem escalabilidade horizontal
para acompanhar a massiva infraestrutura de rede das empresas e a complexidade
dos ataques. Tecnologias como machine learning apresentam resultados promissores e
podem ser de grande valor na deteção e prevenção de ataques em tempo útil. No entanto,
a utilização dos algoritmos e ferramentas requer sempre um conjunto de dados sólidos e
confiáveis para treinar os sistemas de proteção de maneira eficaz. A implementação de um
bom conjunto de dados requer sistemas horizontalmente escaláveis, robustos, modulares
e tolerantes a falhas para que a análise seja rápida e rigorosa. Este trabalho descreve
a arquitetura de um sistema de captura, armazenamento e análise, capaz de capturar
pacotes de múltiplas fontes e analisá-los de forma paralela. O sistema depende de vários
nós modulares com funções específicas para oferecer suporte a diferentes algoritmos e
ferramentas
Service-oriented models for audiovisual content storage
What are the important topics to understand if involved with storage services to hold digital audiovisual content? This report takes a look at how content is created and moves into and out of storage; the storage service value networks and architectures found now and expected in the future; what sort of data transfer is expected to and from an audiovisual archive; what transfer protocols to use; and a summary of security and interface issues
Webspy : uma aplicação de monitoramento Web em tempo real
Monografia (graduação)—Universidade de Brasília, Instituto de Ciências Exatas, Departamento de Ciência da Computação, 2013.O surgimento e difusão da Web permitiu a criação de diversas aplicações, entre elas as domésticas, comerciais e móveis. Dessa forma, o uso da Web através da Internet tornou-se uma ferramenta muito versátil e poderosa. Porém, como não é possível garantir que todos que a utilizam são bem intencionados, discute-se cada vez mais a necessidade de ferramentas de monitoramento de seu uso. Este trabalho busca apresentar uma aplicação para monitoramento do uso da Web em tempo real com foco em um host específico de uma rede: o Webspy. Essa aplicação foi desenvolvida como prova de conceito de que é possível realizar o monitoramento de tráfego da Web através de técnicas de ataque do tipo man-in-the-middle, em especial a técnica de ARP Spoofing. Dentre as funcionalidades propostas destacam-se a filtragem e visualização de tráfego relativo a páginas da Web em tempo real e a reprodução da visualização das páginas interceptadas na ordem em que foram acessadas pelo host monitorado. Todos os conceitos e técnicas que possibilitam o desenvolvimento da aplicação são apresentados e discutidos. A implementação final da aplicação apresentou resultados muito positivos quanto à visualização de páginas HTTP, conseguindo cumprir os objetivos propostos com pequenas limitações. A versão fiinal da aplicação incluiu também a funcionalidade de visualização de páginas HTTPS utilizando a técnica de SSL Stripping. ___________________________________________________________________________ ABSTRACTThe rise and diffusion of the Web has enabled the development of several applications: domestic, commercial and mobile. Like so, the use of the Web through the Internet has become a powerful and versatile tool. However, since it's not possible to guarantee that everyone who use this tool is well intentioned, the need for monitoring tools is a topic being discussed more and more often. This work presents an application called Webspy that is capable of monitoring the use of the Web associated with a specific host in a computer network. This application was developed as a proof of concept that it is possible to accomplish Web monitoring through man-in-the-middle attack techniques, namely ARP Spoofing. The following features are emphasized: filtering and visualization of traffic related to Web pages in real time and the replay of the visualizations of intercepted pages in the order they were viewed by the monitored host. All concepts and techniques that make this approach possible are presented and discussed in this work. The final implementation of the application revealed impressive results in regards to the visualization of HTTP pages, fulfilling the proposed objectives with little limitations. The final version also included the feature of viewing HTTPS pages through the use of the technique known as SSL Stripping
Cloud BI: A Multi-party Authentication Framework for Securing Business Intelligence on the Cloud
Business intelligence (BI) has emerged as a key technology to be hosted on Cloud computing. BI offers a method to analyse data thereby enabling informed decision making to improve business performance and profitability. However, within the shared domains of Cloud computing, BI is exposed to increased security and privacy threats because an unauthorised user may be able to gain access to highly sensitive, consolidated business information. The business process contains collaborating services and users from multiple Cloud systems in different security realms which need to be engaged dynamically at runtime. If the heterogamous Cloud systems located in different security realms do not have direct authentication relationships then it is technically difficult to enable a secure collaboration. In order to address these security challenges, a new authentication framework is required to establish certain trust relationships among these BI service instances and users by distributing a common session secret to all participants of a session. The author addresses this challenge by designing and implementing a multiparty authentication framework for dynamic secure interactions when members of different security realms want to access services. The framework takes advantage of the trust relationship between session members in different security realms to enable a user to obtain security credentials to access Cloud resources in a remote realm. This mechanism can help Cloud session users authenticate their session membership to improve the authentication processes within multi-party sessions. The correctness of the proposed framework has been verified by using BAN Logics. The performance and the overhead have been evaluated via simulation in a dynamic environment. A prototype authentication system has been designed, implemented and tested based on the proposed framework. The research concludes that the proposed framework and its supporting protocols are an effective functional basis for practical implementation testing, as it achieves good scalability and imposes only minimal performance overhead which is comparable with other state-of-art methods