Collaborative Network Security Targeting Wide-Area Routing and Edge-Network Attacks

Total Page:16

File Type:pdf, Size:1020Kb

Collaborative Network Security Targeting Wide-Area Routing and Edge-Network Attacks “phdThesis” — 2016/10/31 — 13:29 — page i — #1 Link¨opingStudies in Science and Technology Dissertations. No. 1798 Collaborative Network Security Targeting Wide-area Routing and Edge-network Attacks by Rahul Gokulchand Hiran Department of Computer and Information Science Link¨opingUniversity SE-581 83 Link¨oping,Sweden Link¨oping2016 \phdThesis" | 2016/11/1 | 14:39 | page ii | #2 Copyright c 2016 Rahul Hiran ISBN 978-91-7685-662-8 ISSN 0345{7524 Cover art together with Per Lagman Printed by LiU Tryck 2016 URL: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131959 \phdThesis" | 2016/10/31 | 13:29 | page iii | #3 Abstract To ensure that services can be delivered reliably and continuously over the Internet, it is important that both Internet routes and edge networks are secured. However, the sophistication and distributed nature of many at- tacks that target wide-area routing and edge networks make it difficult for an individual network, user, or router to detect these attacks. Therefore collaboration is important. Although the benefits of collaboration between different network entities have been demonstrated, many open questions still remain, including how to best design distributed scalable mechanisms to mitigate attacks on the network infrastructure. This thesis makes several contributions that aim to secure the network infrastructure against attacks targeting wide-area routing and edge networks. First, we present a characterization of a controversial large-scale routing anomaly, in which a large Telecom operator hijacked a very large number of Internet routes belonging to other networks. We use publicly available data from the time of the incident to understand what can be learned about large-scale routing anomalies and what type of data should be collected in the future to diagnose and detect such anomalies. Second, we present multiple distributed mechanisms that enable col- laboration and information sharing between different network entities that are affected by such attacks. The proposed mechanisms are applied in the contexts of collaborating Autonomous Systems (ASes), users, and servers, and are shown to help raise alerts for various attacks. Using a combina- tion of data-driven analysis and simulations, based on publicly available real network data (including traceroutes, BGP announcements, and net- work relationship data), we show that our solutions are scalable, incur low communication and processing overhead, and provide attractive tradeoffs between attack detection and false alert rates. Finally, for a set of previously proposed routing security mechanisms, we consider the impact of regional deployment restrictions, the scale of the collaboration, and the size of the participants deploying the solutions. Al- though regional deployment can be seen as a restriction and the participation of large networks is often desirable, we find interesting cases where regional deployment can yield better results compared to random global deployment, and where smaller networks can play an important role in achieving better security gains. This study offers new insights towards incremental deploy- ment of different classes of routing security mechanisms. This work was supported by the Swedish National Graduate School of Computer Science (CUGS) and the Internet Foundation in Sweden (IIS). iii \phdThesis" | 2016/10/31 | 13:29 | page iv | #4 \phdThesis" | 2016/10/31 | 13:29 | page v | #5 Popul¨arvetenskaplig sammanfattning Internet och dess tj¨anster¨armycket exponerade f¨orattacker. M˚angaav de kritiska protokoll och mekanismer som beh¨ovsf¨oratt leverera tj¨anster ¨over internet designades f¨orflera decennier sedan. Dessa protokoll och mekanis- mer ¨arstarkt beroende av tillit mellan olika n¨atverkskomponenter, s˚asom routers och servrar. Den explosionsartade tillv¨axtenav internetanv¨andning har dock lett till att angripare b¨orjatutnyttja denna underf¨orst˚addatillit mellan komponenter. Till exempel Border Gateway Protocol, som anv¨ands f¨oratt avg¨oravilken v¨agdata p˚ainternet skall ta, till˚ateratt vem som helst kan p˚ast˚aatt en viss v¨agexisterar. D¨arigenomkan angripare avlyssna och manipulera information som skickas ¨over internet. F¨oratt s¨akerst¨allaatt tj¨ansterkan levereras p˚aett tillf¨orlitligts¨att¨over internet ¨ardet viktigt b˚adeatt rutten ¨arkorrekt och att slutanv¨andarn¨atver- ket ¨ars¨akrat.Eftersom angreppen ofta ¨aravancerade och distribuerade ¨ar det sv˚artf¨oren enskild n¨atverksoperat¨oratt uppt¨acka angrepp. Samarbete ¨ard¨arf¨orviktigt f¨oratt uppt¨acka och skydda mot s˚adanaangrepp. Trots att f¨ordelarmed samarbete mellan n¨atverksoperat¨orerhar p˚avisats˚aterst˚ar m˚angautmaningar. En s˚adanutmaning best˚ari att designa distribuerade skalbara mekanismer f¨oratt f¨orhindraangrepp mot n¨atverksinfrastruktur. I denna avhandling f¨oresl˚asoch utv¨arderasflera s¨attatt skydda valet av rutter samt slutanv¨andarn¨atverk. F¨oratt f¨orst˚aomfattning och vilka tekniker som anv¨andsf¨oratt utf¨ora angrepp mot n¨atverksinfrastruktur presenterar vi f¨orsten beskrivande studie av en storskalig incident d¨arChina Telecoms n¨atverkssystem felaktigt p˚astod att de var slutdestination f¨oren betydande del av trafiken p˚ainternet. Detta ledde till att mycket internettrafik omdirigerades till China Telecom, inklu- sive trafik ¨amnadf¨oramerikanska f¨orsvarsorganisationer. Det som utm¨arkte denna incident var att China Telecom hade bandbredd nog att i sin tur lev- erera trafik till den korrekta destinationen, vilket gjorde incidenten sv˚aratt uppt¨acka. Vi har studerat konsekvenserna av denna incident och unders¨okt vilka f¨oruts¨attningarsom gjorde den storskaliga avledningen av trafik m¨ojlig. Vi f¨oresl˚aroch utv¨arderarflera mekanismer som till˚atersamarbete mel- lan olika n¨atverksoperat¨orer, och som m¨ojligg¨oruppt¨ackt av f¨ors¨okatt omdirigera rutter. De f¨oreslagnametodernas l¨amplighetf¨oratt uppt¨acka angrepp mot n¨atverk unders¨oksgenom omfattande simuleringar. Vi visar p˚a en f¨ordelaktigbalans mellan antal rapporterade avvikelser och n¨odv¨andiga systemresurser. Slutligen unders¨oker vi hur s¨akerhetsvinsterna av tidigare f¨oreslagna mekanismer p˚averkas n¨artill¨ampningenav dessa mekanismer begr¨ansas,till exempel geografiskt. Genom att j¨amf¨oraden begr¨ansadetill¨ampningenmed v \phdThesis" | 2016/10/31 | 13:29 | page vi | #6 den obegr¨ansadevisar vi hur effektiv en implementation i till exempel en- dast EU-omr˚adetskulle kunna vara. Vi unders¨oker hur antal samarbetande n¨atverk, samt n¨atverkens storlek, p˚averkar m¨ojlighetenatt uppt¨acka och f¨orebygga angrepp. Vi unders¨oker ¨aven v˚araegna protokoll f¨oratt demon- strera nyttan av dessa i b˚adestor och liten skala. Vi visar att v˚aramekanis- mer kan hj¨alpatill att skydda anv¨andarestrafik, inte bara i regionen d¨arde implementeras, utan ¨aven globalt. \phdThesis" | 2016/11/1 | 14:39 | page vii | #7 Acknowledgements First I would like to thank my primary supervisor, Professor Nahid Shah- mehri for giving me the opportunity to do research in the interesting area of security. She has played a vital role in shaping my research work. Not only has she been tireless in planning for my research, she has helped me with smaller but important aspects such as presentation skills, writing, listening, questioning, and improving my research ideas. She has helped me improve my research skills in so many ways. I would also like to take this opportunity to thank my co-supervisor, Associate Professor Niklas Carlsson. I truly enjoy working with Niklas. He has been an inspiration and a role model as a researcher. He has been instrumental in helping me choose interesting research topics and research questions. Our discussions on research questions and their possible solutions are always interesting. I can ask him, without hesitation, the simplest or the hardest of questions, and always receive helpful tips. During my PhD studies I have had the opportunity to work with As- sistant Professor Phillipa Gill. Working with Phillipa helped me increase my knowledge and experience greatly. I am thankful to her for the collab- oration. I would also like to thank Dr. David Byers with whom I worked during the initial period of my PhD. I thank Brittany Shahmehri for thor- ough proof-reading of the thesis. I would also like to thank Anne Moe for all the help with administrative matters. I thank all current and former members of ADIT for their friendship, support, and all the valuable comments during numerous ADIT meetings. I would also like to express my gratitude to members of the badminton group at Campushallen and IDA. I enjoyed training with them, which helped improve my badminton skills and kept me healthy. I express my gratitude to my wife, Vaishali, who has positively impacted my studies. She has been a constant source of support and, when needed, a pleasant distraction. Finally, I thank my family for supporting and trusting the decisions that I make in life. Rahul Hiran September 2016 Link¨oping,Sweden vii \phdThesis" | 2016/10/31 | 13:29 | page viii | #8 \phdThesis" | 2016/10/31 | 13:29 | page ix | #9 Dedicated to Riddhansh, Shashwati, Divya, Grishma, Sakshi, and Shraddha ix \phdThesis" | 2016/10/31 | 13:29 | page x | #10 \phdThesis" | 2016/10/31 | 13:29 | page xi | #11 Contents 1 Introduction 1 1.1 Cybercrime . .1 1.1.1 Incidents of cybercrimes . .2 1.1.2 Reasons networks and users are vulnerable to cyber- attacks . .4 1.2 Cybercrime classification and thesis focus . .5 1.3 Network-centric attacks . .7 1.3.1 Incidents of network-centric attacks . .8 1.3.2 Factors contributing to network-centric attacks . 10 1.4 Problem formulation . 11 1.5 Contributions . 14 1.5.1 Study of large-scale routing anomaly . 14 1.5.2 Collaboration among network entities to detect attacks 14 1.5.3 Effect of scale, size, and locality . 15 1.6 Methodology . 16 1.6.1 Characterization and empirical observations . 16 1.6.2 Evaluation of large-scale systems . 16 1.6.3 Working with large datasets . 18 1.7 List of publications . 20 1.8 Thesis organization . 21 2 Background and Related Work 23 2.1 Internet routing .
Recommended publications
  • Learning Apache Mahout Classification Table of Contents
    Learning Apache Mahout Classification Table of Contents Learning Apache Mahout Classification Credits About the Author About the Reviewers www.PacktPub.com Support files, eBooks, discount offers, and more Why subscribe? Free access for Packt account holders Preface What this book covers What you need for this book Who this book is for Conventions Reader feedback Customer support Downloading the example code Downloading the color images of this book Errata Piracy Questions 1. Classification in Data Analysis Introducing the classification Application of the classification system Working of the classification system Classification algorithms Model evaluation techniques The confusion matrix The Receiver Operating Characteristics (ROC) graph Area under the ROC curve The entropy matrix Summary 2. Apache Mahout Introducing Apache Mahout Algorithms supported in Mahout Reasons for Mahout being a good choice for classification Installing Mahout Building Mahout from source using Maven Installing Maven Building Mahout code Setting up a development environment using Eclipse Setting up Mahout for a Windows user Summary 3. Learning Logistic Regression / SGD Using Mahout Introducing regression Understanding linear regression Cost function Gradient descent Logistic regression Stochastic Gradient Descent Using Mahout for logistic regression Summary 4. Learning the Naïve Bayes Classification Using Mahout Introducing conditional probability and the Bayes rule Understanding the Naïve Bayes algorithm Understanding the terms used in text classification Using the Naïve Bayes algorithm in Apache Mahout Summary 5. Learning the Hidden Markov Model Using Mahout Deterministic and nondeterministic patterns The Markov process Introducing the Hidden Markov Model Using Mahout for the Hidden Markov Model Summary 6. Learning Random Forest Using Mahout Decision tree Random forest Using Mahout for Random forest Steps to use the Random forest algorithm in Mahout Summary 7.
    [Show full text]
  • Linux VDS Release Notes
    Linux VDS Release Notes Linux VDS Release Notes Introduction Important: This document is based on the most recent available information regarding the release of Linux VDS. Future revisions of this document will include updates not only to the status of features, but also an overview of updates to customer documentation. The Linux VDS platform provides a set of features designed and implemented to suit the value-added reseller (VAR), small hosting service provider (HSP), application service provider (ASP), independent software vendor (ISV), and any small- and medium-sized business (SMB). This document provides administrators who possess minimal to moderate technical skills with a guide to the latest documentation and other sources of information available at the time of the release. This document also includes any cautions and warnings specific to this release. For more information, refer to the following documents: • Linux VDS User’s Guide • Linux VDS Getting Started Guide In addition, you can also refer to the following Web content: • Frequently-asked questions (FAQ) Status of Features Linux VDS introduces new features and enhancements. What’s New? The following table describes the status of features included with this release: Feature Status Accrisoft This release introduces support for Accrisoft e-commerce software (http://www.accrisoft.com/ ). You can use the software to build and manage profitable Web sites. Accrisoft is a fee-based, optional application. This release also provides an installation script to assure the software operates fully and correctly on your account. An uninstall script assures that you can remove the software completely and effectively if you need to do so.
    [Show full text]
  • A Rule Based Approach for Spam Detection
    A RULE BASED APPROACH FOR SPAM DETECTION Thesis submitted in partial fulfillment of the requirements for the award of degree of Master of Engineering In Computer Science & Engineering By: Ravinder Kamboj (Roll No. 800832030) Under the supervision of: Dr. V.P Singh Mrs. Sanmeet Bhatia Assistant Professor Assistant Professor Computer Science & Engineering Department of SMCA COMPUTER SCIENCE AND ENGINEERING DEPARTMENT THAPAR UNIVERSITY PATIALA – 147004 JULY- 2010 i ii Abstract Spam is defined as a junk Email or unsolicited Email. Spam has increased tremendously in the last few years. Today more than 85% of e-mails that are received by e-mail users are spam. The cost of spam can be measured in lost human time, lost server time and loss of valuable mail. Spammers use various techniques like spam via botnet, localization of spam and image spam. According to the mail delivery process anti-spam measures for Email Spam can be divided in to two parts, based on Emails envelop and Email data. Black listing, grey listing and white listing techniques can be applied on the Email envelop to detect spam. Techniques based on the data part of Email like heuristic techniques and Statistical techniques can be used to combat spam. Bayesian filters as part of statistical technique divides the income message in to words called tokens and checks their probability of occurrence in spam e-mails and ham e-mails. Two types of approaches can be followed for the detection of spam e-mails one is learning approach other is rule based approach. Learning approach required a large dataset of spam e-mails and ham e-mails is required for the training of spam filter; this approach has good time characteristics filter can be retrained quickly for new Spam.
    [Show full text]
  • Chapter 25: Taking Stock
    Chapter 25 Taking Stock But: connecting the world meant that we also connected all the bad things and all the bad people, and now every social and political problem is expressed in software. We’ve had a horrible ‘oh shit’ moment of realisation, but we haven’t remotely worked out what to do about it. – Benedict Evans If you campaign for liberty you’re likely to find yourself drinking in bad company at the wrong end of the bar. –WhitDiffie 25.1 Introduction Our security group at Cambridge runs a blog, www.lightbluetouchpaper.org, where we discuss the latest hacks and cracks. Many of the attacks hinge on specific applications, as does much of the cool research. Not all applications are the same, though. If our blog software gets hacked it will just give a botnet one more server, but there are other apps from which money can be stolen, others that people rely on for privacy, others that mediate power, and others that can kill. I’ve already discussed many apps from banking through alarms to prepay- ment meters. In this chapter I’m going to briefly describe four classes of ap- plication at the bleeding edge of security research. They are where we find innovative attacks, novel protection problems, and thorny policy issues. They are: autonomous and remotely-piloted vehicles; machine learning, from adver- sarial learning to more general issues of AI in society; privacy technologies; and finally, electronic elections. What these have in common is that while previously, security engineering was about managing complexity in technology with all its exploitable side-e↵ects, we are now bumping up against complexity in human society.
    [Show full text]
  • Return of Organization Exempt from Income
    OMB No. 1545-0047 Return of Organization Exempt From Income Tax Form 990 Under section 501(c), 527, or 4947(a)(1) of the Internal Revenue Code (except black lung benefit trust or private foundation) Open to Public Department of the Treasury Internal Revenue Service The organization may have to use a copy of this return to satisfy state reporting requirements. Inspection A For the 2011 calendar year, or tax year beginning 5/1/2011 , and ending 4/30/2012 B Check if applicable: C Name of organization The Apache Software Foundation D Employer identification number Address change Doing Business As 47-0825376 Name change Number and street (or P.O. box if mail is not delivered to street address) Room/suite E Telephone number Initial return 1901 Munsey Drive (909) 374-9776 Terminated City or town, state or country, and ZIP + 4 Amended return Forest Hill MD 21050-2747 G Gross receipts $ 554,439 Application pending F Name and address of principal officer: H(a) Is this a group return for affiliates? Yes X No Jim Jagielski 1901 Munsey Drive, Forest Hill, MD 21050-2747 H(b) Are all affiliates included? Yes No I Tax-exempt status: X 501(c)(3) 501(c) ( ) (insert no.) 4947(a)(1) or 527 If "No," attach a list. (see instructions) J Website: http://www.apache.org/ H(c) Group exemption number K Form of organization: X Corporation Trust Association Other L Year of formation: 1999 M State of legal domicile: MD Part I Summary 1 Briefly describe the organization's mission or most significant activities: to provide open source software to the public that we sponsor free of charge 2 Check this box if the organization discontinued its operations or disposed of more than 25% of its net assets.
    [Show full text]
  • Cybercrime Digest
    Cybercrime Digest Bi-weekly update and global outlook by the Cybercrime Programme Office of the Council of Europe (C-PROC) 16-30 June 2020 Source: Council of C-PROC series of cybercrime webinars continue: Europe materials available, next topics and dates announced Date: 30 Jun 2020 Initiated in April, the C-PROC series of webinars on cybercrime have continued in the second half of June with more sessions, respectively dedicated to Cybercrime in Africa and the challenges of international cooperation, co-organized by the U.S. Departement of Justice (USDoJ) and the Council of Europe in the framework of the GLACY+ Project, Introduction to Cyberviolence, conducted in the framework of the CyberEast Project, Cybercrime and Criminal Justice in Cyberspace the regional seminar dedicated to Asisa- Pacific, under the GLACY+ Project, and International standards on collection and handling of electronic evidence, under the CyberSouth Project. New webinars are scheduled for the next period: Cybercrime and Criminal Justice in Cyberspace, the series of seminars hosted by the European Union and the Council of Europe (Africa, EN - 7 July 2020; Africa, FR - 9 July 2020; Latin America and Caribbean, EN - 20 July; Latin America and Caribbean, ES - 22 July]. For further updates, please check our webinars dedicated webpage. Source: Council of CyberSouth: Regional workshop on interagency Europe cooperation on the search, seizure and confiscation of Date: 1 Jul 2020 on-line crime proceeds “CyberSouth project organised a regional online workshop on interagency cooperation on the search, seizure and confiscation of on-line crime proceeds, on the 1st of July 2020. The event gathered around 30 participants from Law Enforcement agencies, Financial Investigation Units and prosecutors of priority countries as well as experts from United Kingdom, Romania and FBI.
    [Show full text]
  • Moving Forward EU-India Relations. the Significance of the Security
    Moving Forward EU-India Relations The Significance of the Security Dialogues edited by Nicola Casarini, Stefania Benaglia and Sameer Patil Edizioni Nuova Cultura Output of the project “Moving Forward the EU-India Security Dialogue: Traditional and Emerging Issues” led by the Istituto Affari Internazionali (IAI) in partnership with Gate- way House: Indian Council on Global Relations (GH). The project is part of the EU-India Think Tank Twinning Initiative funded by the European Union. First published 2017 by Edizioni Nuova Cultura for Istituto Affari Internazionali (IAI) Via Angelo Brunetti 9 – I-00186 Rome – Italy www.iai.it and Gateway House: Indian Council on Global Relations Colaba, Mumbai – 400 005 India Cecil Court, 3rd floor Copyright © 2017 Gateway House: Indian Council on Global Relations (ch. 2-3, 6-7) and Istituto Affari Internazionali (ch. 1, 4-5, 8-9) ISBN: 9788868128531 Cover: by Luca Mozzicarelli Graphic composition: by Luca Mozzicarelli The unauthorized reproduction of this book, even partial, carried out by any means, including photocopying, even for internal or didactic use, is prohibited by copyright. Table of Contents Abstracts .......................................................................................................................................... 9 Introduction ................................................................................................................................. 15 1. Maritime Security and Freedom of Navigation from the South China Sea and Indian Ocean to the Mediterranean:
    [Show full text]
  • Mastering Spam a Multifaceted Approach with the Spamato Spam Filter System
    DISS. ETH NO. 16839 Mastering Spam A Multifaceted Approach with the Spamato Spam Filter System A dissertation submitted to the SWISS FEDERAL INSTITUTE OF TECHNOLOGY ZURICH for the degree of Doctor of Sciences presented by KENO ALBRECHT Dipl. Inf. born June 4, 1977 citizen of Germany accepted on the recommendation of Prof. Dr. Roger Wattenhofer, examiner Prof. Dr. Gordon V. Cormack, co-examiner Prof. Dr. Christof Fetzer, co-examiner 2006 Abstract Email is undoubtedly one of the most important applications used to com- municate over the Internet. Unfortunately, the email service lacks a crucial security mechanism: It is possible to send emails to arbitrary people with- out revealing one’s own identity. Additionally, sending millions of emails costs virtually nothing. Hence over the past years, these characteristics have facilitated and even boosted the formation of a new business branch that advertises products and services via unsolicited bulk emails, better known as spam. Nowadays, spam makes up more than 50% of all emails and thus has become a major vexation of the Internet experience. Although this problem has been dealt with for a long time, only little success (measured on a global scale) has been achieved so far. Fighting spam is a cat and mouse game where spammers and anti-spammers regularly beat each other with sophisticated techniques of increasing complexity. While spammers try to bypass existing spam filters, anti-spammers seek to detect and block new spamming tricks as soon as they emerge. In this dissertation, we describe the Spamato spam filter system as a mul- tifaceted approach to help regain a spam-free inbox.
    [Show full text]
  • Introduction to Internet Governance
    For easy reference: a list of frequently The history of this book is long, in Internet time. The used abbreviations and acronyms original text and the overall approach, including AN INTRODUCTION TO TO AN INTRODUCTION the five-basket methodology, were developed APEC Asia-Pacific Economic Co-operation in 1997 for a training course on information ccTLD country code Top-Level Domain AN INTRODUCTION TO and communications technology (ICT) policy CIDR Classless Inter-Domain Routing for government officials from Commonwealth DMCA Digital Millennium Copyright Act countries. In 2004, Diplo published a print version DNS Domain Name System of its Internet governance materials, in a booklet DRM Digital Rights Management INTERNET entitled Internet Governance – Issues, Actors and GAC Governmental Advisory Committee Divides. This booklet formed part of the Information gTLD generic Top-Level Domain INTERNET Society Library, a Diplo initiative driven by Stefano HTML HyperText Markup Language Baldi, Eduardo Gelbstein, and Jovan Kurbalija. IANA Internet Assigned Numbers Authority GOVERNANCE Special thanks are due to Eduardo Gelbstein, who ICANN Internet Corporation for Assigned made substantive contributions to the sections Names and Numbers GOVERNANCE dealing with cybersecurity, spam, and privacy, and ICC International Chamber of Commerce AN INTRODUCTION TO INTERNET GOVERNANCE Jovan Kurbalija to Vladimir Radunovic, Ginger Paque, and Stephanie aICT Information and Communications Jovan Kurbalija Borg-Psaila who updated the course materials. Technology Comments and suggestions from other colleagues IDN Internationalized Domain Name are acknowledged in the text. Stefano Baldi, Eduardo IETF Internet Engineering Task Force An Introduction to Internet Governance provides a comprehensive overview Gelbstein, and Vladimir Radunovic all contributed IGF Internet Governance Forum of the main issues and actors in this field.
    [Show full text]
  • Suse Linux Enterprise Server 10 Mail Scanning Gateway Build Guide
    SuSE Linux Enterprise Server 10 Mail Scanning Gateway Build Guide Written By: Stephen Carter [email protected] Last Modified 9. May. 2007 Page 1 of 96 Table of Contents Due credit.......................................................................................................................................................4 Overview........................................................................................................................................................5 System Requirements.....................................................................................................................................6 SLES10 DVD............................................................................................................................................6 An existing e-mail server..........................................................................................................................6 A Pentium class PC...................................................................................................................................6 Internet Access..........................................................................................................................................6 Internet Firewall Modifications.................................................................................................................7 Installation Summary.....................................................................................................................................8 How
    [Show full text]
  • Curriculum Vitae Von Bastian Nolte (Kurzversion)
    Curriculum Vitae von Bastian Nolte Expert IT Business Consultant & Coach Software-Architekt und Full Stack Developer Telefon (CH) +41 44 586 97 10 Mobil (DE) +49 173 20 989 60 E-Mail [email protected] Adresse Grosswilstrasse 2, 6048 Horw / Luzern, Schweiz Web: https://www.bastian-nolte.name Xing https://www.xing.com/profile/Bastian_Nolte Berufserfahrung 22 Jahre Erfahrung im IT-Bereich, davon etwa 9 Jahre als Business Consultant und 4 als Coach. Rollen in (technischer) Projektleitungsfunktion und als Architekt habe ich zirka 11 Jahre lang ausgeübt. Nationalität Deutsch Einsetzbar CH-LI-D-A (Schweiz, Liechtenstein, Deutschland, Österreich) Bevorzugte Schweiz Arbeitsregion (oder remote) Branchenerfahrung Versicherung, Informationstechnologie, Automotive, Dienstleister, IT Dienstleister, Öffentlicher Dienst, Bildungsträger, Telekommunikation, IT Sicherheit Fremdsprachen Englisch Auszeichnungen Innovationspreis Public Private Partnership 2009 (PPP) für den Fachübergreifen- den Einsatz Neuer Medien Freizeit Wandern, Tauchen, Mountain Biking, Kayaking Letzte 2021 Apache Kafka Kurs Confluent Fortbildungen 4929: Confluent Training «Apache Kafka Fundamentals» 2021 Microsoft Azure Zertifizierung Microsoft, AZ-900: Microsoft Certified Azure Fundamentals Pearson VUE. 2020 Kubernetes-Zertifizierung The Linux LFS158x: Introduction to Kubernetes Foundation, e. 2020 DevOps Kubernetes Camp Software & Viertägiges Intensivtraining über Kubernetes und Knative. Support Medi. 2019 Kommunikation & Moderationstechniken in der IT oose Innovative Informa.
    [Show full text]
  • Openstackでnecが実現する 「OSSクラウド」の世界
    OpenStackでNECが実現する 「OSSクラウド」の世界 2013年3月12日 日本電気株式会社 プラットフォームマーケティング戦略本部 OSS推進室 技術主幹 高橋 千恵子 目次 ▐ OSSの動向 ▐ NECのOSS/Linux事業 ▐ OSSプラットフォームへの取り組み 高可用Linuxプラットフォーム OSSミドルウェアの活用 ▐ OSSクラウド OpenStackへの取り組み OSSクラウドソリューション ~沖縄クラウドサービス基盤~ OpenFlow+OpenStack ▐ 最後に ●本資料に掲載された社名、商品名は各社の商標または登録商標です。 Page 1 © NEC Corporation 2013 OSSの動向 Page 2 © NEC Corporation 2013 OSSコミュニティによるプロジェクト ▐ 全般 ・・・・・SaaS型アプリケーションが増加/著名OSSのベンダー配布、有償サポートや買収が進む OSS定点観測は、freecode.com にて実施。 ▐ インフラ系・・・仮想化やクラウド基盤関係のOSSが注目される/システム、ネット管理OSSの伸びがある サイトでの人気度(300以上)で順位付け。 OSSプロジェクトは2012.4時点で32.4万件。 ▐ デプロイメント系・・PostgreSQL、mySQLが高人気 これらのDB管理、DBクラスタリングOSSも伸びている ビジネス用途を中心に表示。 ▐ アプリ系・・・・SaaS型グループウェアOSS、ソフトウェア分類を越えた統合的な著名OSSの伸びがある コンシューマ・プライベート系は除く。 コンテンツアプリケーション •PHProject [GW] エンジニ コラボレーティブ •EGroupware CRM ERM SCM • Dokuwiki [Wiki] • jGnash アリング • WebGUI [CMF] • phpBB [GW] •OBM [GW] • Enterprise CRM and ア • Tiki Tiki CMS Groupware • ProcessMaker • CorneliOS [CMS] • Ariadne Groupware System • Task Juggler [PM] • Blender オペレーション • TinyMCE [DCM] • XODA • Simple Groupware [GW] プ • OpenWebMail[webmail]• Teamwork [GW] • Dolibarr • Achievo [PM] • mxGraph 製造管理 • Drupal [CMS] • mnoGoSerch • LedgerSMB • white_dune • eZpublish [publish FW]• Managing • ZIm [blog] • Plans [GW] • The Apache Open リ • Tine2.0 [CRM&GW] • GnuCash • Jgraph • OTRS • XWiki [Wiki] • Midgard • Zimbra [GW] for Business • Elastix • GroupOffice [GW] • Twiki [KB] • TUTOS[ERP&PM] • graphviz • FUDForum • OpenSearch Project コンシューマ 系 • SquirrelMail [Webmail] • Time Trex • BRL-CAD • Asterisk • Plone CMS Server • Citadel [bbs] •
    [Show full text]