115 research outputs found

    Composition de services et supervision : application aux Web Services

    Get PDF
    Stage de DEA. Rapport de stage.Le développement de l'Internet a favorisé l'échange de données entre partenaires et la multiplication de services en ligne. Des plateformes de services évoluées permettent aujourd'hui la conception, le déploiement et la mise en oeuvre de ces services dans des échelles de temps réduites. Au sein de ces plateformes, les services peuvent être perçus comme des composants, et des modèles de composition permettent de les combiner pour aboutir à des services plus élaborés. Ces services présentent par conséquent une forte dynamicité, d'où la nécessité de créer des plateformes de supervision qui soient adaptées. La richesse des spécifications fournies par les modèles de composition peut constituer un socle pour cette supervision. Ce stage de DEA consiste à trouver de nouvelles méthodes permettant d'exploiter les modèles de composition pour faciliter la supervision de services composés. Pour cela, nous nous sommes placés dans le cadre des Web Services et avons étudié une des fonctions de la supervision : la gestion de la qualité. Nous proposons d'étendre un langage de composition pour qu'il intègre des éléments de qualité de service et nous avons défini une plateforme qui exploite cette extension, et qui permet la gestion de la qualité des Web Services composés par recomposition dynamique

    Gestion de la Sécurité pour le Cyber-Espace - Du Monitorage Intelligent à la Configuration Automatique

    Get PDF
    The Internet has become a great integration platform capable of efficiently interconnecting billions of entities, from simple sensors to large data centers. This platform provides access to multiple hardware and virtualized resources (servers, networking, storage, applications, connected objects) ranging from cloud computing to Internet-of-Things infrastructures. From these resources that may be hosted and distributed amongst different providers and tenants, the building and operation of complex and value-added networked systems is enabled. These systems arehowever exposed to a large variety of security attacks, that are also gaining in sophistication and coordination. In that context, the objective of my research work is to support security management for the cyberspace, with the elaboration of new monitoring and configuration solutionsfor these systems. A first axis of this work has focused on the investigation of smart monitoring methods capable to cope with low-resource networks. In particular, we have proposed a lightweight monitoring architecture for detecting security attacks in low-power and lossy net-works, by exploiting different features provided by a routing protocol specifically developed for them. A second axis has concerned the assessment and remediation of vulnerabilities that may occur when changes are operated on system configurations. Using standardized vulnerability descriptions, we have designed and implemented dedicated strategies for improving the coverage and efficiency of vulnerability assessment activities based on versioning and probabilistic techniques, and for preventing the occurrence of new configuration vulnerabilities during remediation operations. A third axis has been dedicated to the automated configuration of virtualized resources to support security management. In particular, we have introduced a software-defined security approach for configuring cloud infrastructures, and have analyzed to what extent programmability facilities can contribute to their protection at the earliest stage, through the dynamic generation of specialized system images that are characterized by low attack surfaces. Complementarily, we have worked on building and verification techniques for supporting the orchestration of security chains, that are composed of virtualized network functions, such as firewalls or intrusion detection systems. Finally, several research perspectives on security automation are pointed out with respect to ensemble methods, composite services and verified artificial intelligence.L’Internet est devenu une formidable plateforme d’intégration capable d’interconnecter efficacement des milliards d’entités, de simples capteurs à de grands centres de données. Cette plateforme fournit un accès à de multiples ressources physiques ou virtuelles, allant des infra-structures cloud à l’internet des objets. Il est possible de construire et d’opérer des systèmes complexes et à valeur ajoutée à partir de ces ressources, qui peuvent être déployées auprès de différents fournisseurs. Ces systèmes sont cependant exposés à une grande variété d’attaques qui sont de plus en plus sophistiquées. Dans ce contexte, l’objectif de mes travaux de recherche porte sur une meilleure gestion de la sécurité pour le cyberespace, avec l’élaboration de nouvelles solutions de monitorage et de configuration pour ces systèmes. Un premier axe de ce travail s’est focalisé sur l’investigation de méthodes de monitorage capables de répondre aux exigences de réseaux à faibles ressources. En particulier, nous avons proposé une architecture de surveillance adaptée à la détection d’attaques dans les réseaux à faible puissance et à fort taux de perte, en exploitant différentes fonctionnalités fournies par un protocole de routage spécifiquement développépour ceux-ci. Un second axe a ensuite concerné la détection et le traitement des vulnérabilités pouvant survenir lorsque des changements sont opérés sur la configuration de tels systèmes. En s’appuyant sur des bases de descriptions de vulnérabilités, nous avons conçu et mis en œuvre différentes stratégies permettant d’améliorer la couverture et l’efficacité des activités de détection des vulnérabilités, et de prévenir l’occurrence de nouvelles vulnérabilités lors des activités de traitement. Un troisième axe fut consacré à la configuration automatique de ressources virtuelles pour la gestion de la sécurité. En particulier, nous avons introduit une approche de programmabilité de la sécurité pour les infrastructures cloud, et avons analysé dans quelle mesure celle-ci contribue à une protection au plus tôt des ressources, à travers la génération dynamique d’images systèmes spécialisées ayant une faible surface d’attaques. De façon complémentaire, nous avonstravaillé sur des techniques de construction automatique et de vérification de chaînes de sécurité, qui sont composées de fonctions réseaux virtuelles telles que pare-feux ou systèmes de détection d’intrusion. Enfin, plusieurs perspectives de recherche relatives à la sécurité autonome sont mises en évidence concernant l’usage de méthodes ensemblistes, la composition de services, et la vérification de techniques d’intelligence artificielle

    A TOSCA-Oriented Software-Defined Security Approach for Unikernel-Based Protected Clouds

    Get PDF
    International audienceCloud infrastructures provide new facilities to build elaborated added-value services by composing and configuring a large variety of computing resources, from virtualized hardware devices to software products. In the meantime, they are further exposed to security attacks than traditional environments. The complexity of security management tasks has been increased by the multi-tenancy, heterogeneity and geographical distribution of these resources. They introduce critical issues for cloud service providers and their customers, with respect to security programmability and scenarios of adaptation to contextual changes. In this paper, we propose a software-defined security approach based on the TOSCA language, to enable unikernel-based protected clouds. We first introduce extensions of this language to describe unikernels and specify security constraints for their orchestrations. We then describe an architecture exploiting this extended version of TOSCA for automatically generating, deploying and adjusting cloud resources in the form of protected unikernels with a low attack surface. We finally detail a proof-of-concept prototype, and evaluate the proposed solution through extensive series of experiments

    Preface

    Get PDF

    Collaborative Remediation of Configuration Vulnerabilities in Autonomic Networks and Systems

    Get PDF
    International audienceAutonomic computing has become an important paradigm for dealing with large scale network management. However, changes operated by administrators and self-governed entities may generate vulnerable configurations increasing the exposure to security attacks. In this paper, we propose a novel approach for supporting collaborative treatments in order to remediate known security vulnerabilities in autonomic networks and systems. We put forward a mathematical formulation of vulnerability treatments as well as an XCCDF-based language for specifying them in a machine-readable manner. We describe a collaborative framework for performing these treatments taking advantage of optimized algorithms, and evaluate its performance in order to show the feasibility of our solution

    Ovalyzer: an OVAL to Cfengine Translator

    Get PDF
    International audienceIn this demo we show how we can increase the vulnerability awareness of self-governed environments by feeding the autonomic system Cfengine with security advisories taken from OVAL repositories and automatically translated by Ovalyzer. Ovalyzer is an extensible plugin-based OVAL to Cfengine translator capable of translating OVAL documents to Cfengine policy rules that represent them. These policy rules can be later consumed by Cfengine agents in order to assess their own security exposure in an autonomous manner

    Improving Present Security through the Detection of Past Hidden Vulnerable States

    Get PDF
    International audienceVulnerability assessment activities usually analyze new security advisories over current running systems. However, a system compromised in the past by a vulnerability unknown at that moment may still constitute a potential security threat in the present. Accordingly, past unknown system exposures are required to be taken into account. We present in this paper a novel approach for increasing the overall security of computing systems by identifying past hidden vulnerable states. In that context, we propose a modeling for detecting unknown past system exposures as well as an OVAL-based distributed framework for autonomously gathering network devices information and automatically analyzing their past security exposure. We also describe an implementation prototype and evaluate its performance through an extensive set of experiments

    CMSec: A Vulnerability Prevention Tool for Supporting Migrations in Cloud Composite Services

    Get PDF
    International audienceThe growing maturity of orchestration languages, such as the Topology and Orchestration Specification for Cloud Applications (TOSCA) language, and the continuous improvement of virtualization techniques contribute to the large-scale deployment of cloud composite services based on multiple resources that may be hosted over different cloud service providers. The resources composing these services may be subject to migrations, either live or offline, in order to cope with performance objectives, such as load balancing, latency minimization, and energy savings. However, these migrations may induce changes affecting the configurations of migrated resources. In particular, these changes may lead to vulnerabilities, that may compromise the security of resources, or even the security of the whole cloud service. This demonstration showcases a vulnerability prevention tool, called CMSec, for supporting the resource migrations of TOSCA-based cloud composite services by considering OVAL vulnerability descriptions together with verification techniques. Based on two main scenarios, we will expose how the CMSec tool is able to detect vulnerable configurations prior to resource migrations, and to suggest corrective operations for remediating them

    Towards Vulnerability Prevention in Autonomic Networks and Systems

    Get PDF
    Part 2: PhD Workshop: Autonomic Network and Service ManagementInternational audienceThe autonomic paradigm has been introduced in order to cope with the growing complexity of management. In that context, autonomic networks and systems are in charge of their own configuration. However, the changes that are operated by these environments may generate vulnerable configurations. In the meantime, a strong standardization effort has been done for specifying the description of configuration vulnerabilities. We propose in this paper an approach for integrating these descriptions into the management plane of autonomic systems in order to ensure safe configurations. We describe the underlying architecture and a set of preliminary results based on the Cfengine configuration tool

    A Trust-based Strategy for Addressing Residual Attacks in the RELOAD Architecture

    Get PDF
    Telephony over IP has undergone a large-scale deployment thanks to the development of high-speed broadband access and the standardization of signaling protocols. A particular attention is currently given to P2PSIP networks which are exposed to many security threats. The RELOAD protocol defines a peer-to-peer signaling overlay designed to support these networks. It introduces a security framework based on certification mechanisms, but P2PSIP networks are still exposed to residual attacks, such as refusals of service. We propose in this work to address these residual attacks by integrating into the RELOAD architecture a dedicated trust model coupled with prevention countermeasures. We mathematically defines this trust-based strategy, and describe the considered prevention mechanisms implemented by safeguards and watchmen. We quantify the benefits and limits of our solution through an extensive set of experiments
    • …
    corecore