Securing Complex Cyber-Physical Medical Device Landscapes

Total Page:16

File Type:pdf, Size:1020Kb

Securing Complex Cyber-Physical Medical Device Landscapes April 2018 Volume 16 Issue 4 The Dangers in Perpetuating a Culture of Risk Acceptance Using PKI to Build a Secure Industrial Internet of Things The Two Faces of Innovation: From Safe and Dumb to Vulnerable Smart Products and Infrastructure Cyber-Physical Intelligence Securing Complex Cyber-Physical Medical Device Landscapes INTERNET OF THINGS DEVELOPING AND CONNECTING ISSA CYBERSECURITY LEADERS GLOBALLY Securing Complex Cyber-Physical Medical Device Landscapes By Ulrich Lang The author presents innovative approaches to cybersecurity that should be considered to securely integrate medical device landscapes (and many other IoT environments) in the coming years as IoT rapidly matures. Abstract comparison, in 2015 there were approximately 4.9 million things connected to the Internet). In this article we will present innovative approaches to cy- bersecurity that should be considered to securely integrate Importantly, IoT will also play a major role in achieving medical device landscapes (and many other IoT environ- “smart health care” to improve patient care/experience, effi- ments) in the coming years as IoT rapidly matures. The ar- ciency, and outcomes. Hospitals already use many medical ticle is based on the results of several government-funded devices today (e.g., numerous monitoring and pump devic- R&D projects, in particular a research project to secure a es, etc.) though mostly not in a very interconnected fashion. cyber-physical medical environment (for Defense Health Presently, in most cases, there is a human (e.g., nurse) in the Program, DHP), and a research project to automate access loop to ensure safety because the devices in use have not control policy testing (for National Institute of Standards been designed with the security in mind that is required for and Technology, NIST). autonomous operation (e.g., monitoring). According to the latest research, US Department of Health plans to (eventu- ally) save up to USD 300 billion from the national budget he Internet of Things (IoT) is the network of phys- due to medical innovations [3]. ical devices, vehicles, home appliances, and other Such future medical device landscapes pose many cyberse- items embedded with electronics, software, sensors, curity and privacy challenges because most of these are “cy- Tactuators, and connectivity that enables these objects to ber-physical” systems where cybersecurity breaches (and connect and exchange data [1]. The IoT is going to be trans- other failures) could directly impact the physical safety of formational—significantly impacting most industries and patients. parts of society. Experts estimate that the IoT will rapidly grow to 30 billion objects within just two more years [2] (for Today, medical IoT is not fully matured yet, leading to a disconnect: Health IT is increasingly interconnected, while 14 – ISSA Journal | April 2018 Securing Complex Cyber-Physical Medical Device Landscapes | Ulrich Lang information security is not keeping up. This limits “smart 2. Secure device communications: The Data-Distribution health care” improvements and health IoT in general. In this Service (DDS) provides secure publish-subscribe com- emerging environment, hospitals need to prioritize patient munications for real-time and embedded systems. DDS safety first, which means medical devices are often not inte- introduces a virtual global data space where applications grated; since humans are usually in the loop, there isn’t much can share information by simply reading and writing da- need for automation. This leads to inefficiencies, and patient ta-objects addressed by means of an application-defined care/experience is not as good as it could be. Yet, having hu- name (topic) and a key. DDS features fine and extensive mans in the loop actually creates its own risks. control of QoS parameters. Our research uses RTI DDS In this article we will present innovative approaches to cyber- Connext, a leading DDS implementation provided by Re- security that should be considered to securely integrate med- al-Time Innovations (RTI), Inc. OpenICE uses RTI DDS ical device landscapes (and many other IoT environments) in as a communications layer. the coming years as IoT rapidly matures. The article is based 3. Security policy automation simplifies the management on the results of several government-funded R&D projects, in and technical implementation of security policies. It al- particular a research project to secure a cyber-physical med- lows security professionals to manage rich security pol- ical environment (for the Defense Health Program1) and a icies consistently in one place and often automatically research project to automate access control policy testing (for technically enforce the managed policies across many the National Institute of Standards and Technology2). devices, layers, and technologies. Our research uses Ob- The presented approach comprises several parts: jectSecurity OpenPMF, which generates technical policy enforcement for DDS, networks, etc., from generic secu- 1. Integrated clinical environment: OpenICE is an initia- rity policies and imported information about users, sys- tive to create a community implementation of an integrat- tems, applications, networks, etc. ed clinical environment (ICE). The initiative encompasses not only software implementation but also an architecture Cyber-physical systems for a wider clinical ecosystem to enable new avenues of NIST defines cyber-physical systems as co-engineered inter- clinical research. The OpenICE project is run by MD PnP. acting networks of physical and computational components Our research uses the OpenICE reference implementation [4], which will form the foundation for critical infrastruc- and DocBox’s implementation as an ICE layer. ture and emerging/future smart services. Cyber-physical systems will improve quality of life in many areas, such as “smart” cities, transportation, hospitals, and energy. While 1 ObjectSecurity LLC is a subcontractor to Real-Time Innovations (RTI), Inc. for this SBIR Phase II contract, focusing on the topics described in this article. More cyber-physical systems can be used to improve safety (e.g., information about the R&D project: https://sbirsource.com/sbir/awards/167769- methodologies-and-tools-for-securing-medical-device-systems-in-integrated- public safety), they also pose potential cybersecurity risks es- clinical-environments-ice. pecially because cybersecurity could impact every patient’s 2 This SBIR (Phase II) was awarded to ObjectSecurity LLC. RTI Inc was a subcontractor in Phase I. More information about the R&D project: https:// physical health and safety (in non-cyber-physical systems, objectsecurity.com/nist. Members Join ISSA to: l Earn CPEs through Conferences and Education l Network with Industry Leaders l Advance their Careers www.issa.org l Attend Chapter Events to Meet Local Colleagues l Become part of Special Interest Groups (SIGs) that focus on particular topics Join Today: www.issa.org/join Regular Membership $95* CISO Executive Membership $995 (+Chapter Dues: $0-$35*) (Includes Quarterly Forums) *US Dollars/Year April 2018 | ISSA Journal – 15 Securing Complex Cyber-Physical Medical Device Landscapes | Ulrich Lang employee credentials to gain unauthorized access. Health IT access control simply isn’t capable of providing the security that will be required: access is overprovisioned, too simplistic (identity-based access con- trol (IBAC) and role-based access control (RBAC)), and unmanageable due to being fragmented and siloed. Add the IoT and ransomware attacks such as Mirai (2016) and WannaCry (2017) into the mix (which both affected medical devices) and it be- comes even clearer that locking down ac- cess at all levels to the “minimum neces- sary” is sorely needed. HIPAA fines are rarely administered but are a risk for health providers (fines have gone up to $4.8M for Figure 1 – Example OpenICE system setup [5] non-compliance after a breach). Furthermore, with improved direct/immediate harm is usually directed towards stealing access control (and other cybersecurity), hospitals could en- or changing sensitive, valuable information). able “smart business,” resulting in a forecasted $8.5M in an- nual savings per US hospital (US$36 billion US total) [7]. Smart health care: Integrated medical devices Identity and access management (IAM) is an important pro- should detect and respond automatically gram/initiative for health providers (and most organizations). Smart health care will comprise at least: However, in our experience, hospital IAM systems are often Networked, smart, and semi-autonomous devices not fully mature (based on hospital IAM road-map projects • the author has completed recently). • Clinical, business, and building systems communication • IAM systems are distributed (there is a main IAM and nu- • Real-time analytics, tracking, etc. merous sub-IAMs) Automation • • There are custom batch processes to keep information Healthcare providers care about smart health care because it synchronized has the significant potential to measurably improve patient • Onboarding/offboarding is done using manual processes care, a patient’s experience, and health provider efficiency. In with limited checks conjunction, healthcare providers (especially hospitals) must implement significantly improved cybersecurity to ensure • There is almost no work-flow automation patient safety, security, and privacy when deploying these au- • There is a flat network with little isolation (including -cy tomated, autonomous IoT environments. ber-physical)
Recommended publications
  • La Sécurité Informatique Edition Livres Pour Tous (
    La sécurité informatique Edition Livres pour tous (www.livrespourtous.com) PDF générés en utilisant l’atelier en source ouvert « mwlib ». Voir http://code.pediapress.com/ pour plus d’informations. PDF generated at: Sat, 13 Jul 2013 18:26:11 UTC Contenus Articles 1-Principes généraux 1 Sécurité de l'information 1 Sécurité des systèmes d'information 2 Insécurité du système d'information 12 Politique de sécurité du système d'information 17 Vulnérabilité (informatique) 21 Identité numérique (Internet) 24 2-Attaque, fraude, analyse et cryptanalyse 31 2.1-Application 32 Exploit (informatique) 32 Dépassement de tampon 34 Rétroingénierie 40 Shellcode 44 2.2-Réseau 47 Attaque de l'homme du milieu 47 Attaque de Mitnick 50 Attaque par rebond 54 Balayage de port 55 Attaque par déni de service 57 Empoisonnement du cache DNS 66 Pharming 69 Prise d'empreinte de la pile TCP/IP 70 Usurpation d'adresse IP 71 Wardriving 73 2.3-Système 74 Écran bleu de la mort 74 Fork bomb 82 2.4-Mot de passe 85 Attaque par dictionnaire 85 Attaque par force brute 87 2.5-Site web 90 Cross-site scripting 90 Défacement 93 2.6-Spam/Fishing 95 Bombardement Google 95 Fraude 4-1-9 99 Hameçonnage 102 2.7-Cloud Computing 106 Sécurité du cloud 106 3-Logiciel malveillant 114 Logiciel malveillant 114 Virus informatique 120 Ver informatique 125 Cheval de Troie (informatique) 129 Hacktool 131 Logiciel espion 132 Rootkit 134 Porte dérobée 145 Composeur (logiciel) 149 Charge utile 150 Fichier de test Eicar 151 Virus de boot 152 4-Concepts et mécanismes de sécurité 153 Authentification forte
    [Show full text]
  • Test-Beds and Guidelines for Securing Iot Products and for Secure Set-Up Production Environments
    IoT4CPS – Trustworthy IoT for CPS FFG - ICT of the Future Project No. 863129 Deliverable D7.4 Test-beds and guidelines for securing IoT products and for secure set-up production environments The IoT4CPS Consortium: AIT – Austrian Institute of Technology GmbH AVL – AVL List GmbH DUK – Donau-Universit t Krems I!AT – In"neon Technologies Austria AG #KU – JK Universit t Lin$ / Institute for &ervasive 'om(uting #) – Joanneum )esearch !orschungsgesellschaft mbH *+KIA – No,ia -olutions an. Net/or,s 0sterreich GmbH *1& – *1& -emicon.uctors Austria GmbH -2A – -2A )esearch GmbH -)!G – -al$burg )esearch !orschungsgesellschaft -''H – -oft/are 'om(etence 'enter Hagenberg GmbH -AG0 – -iemens AG 0sterreich TTTech – TTTech 'om(utertechni, AG IAIK – TU Gra$ / Institute for A((lie. Information &rocessing an. 'ommunications ITI – TU Gra$ / Institute for Technical Informatics TU3 – TU 3ien / Institute of 'om(uter 4ngineering 1*4T – 1-Net -ervices GmbH © Copyright 2020, the Members of the IoT4CPS Consortium !or more information on this .ocument or the IoT5'&- (ro6ect, (lease contact8 9ario Drobics7 AIT Austrian Institute of Technology7 mario:.robics@ait:ac:at IoT4C&- – <=>?@A Test-be.s an. guidelines for securing IoT (ro.ucts an. for secure set-up (ro.uction environments Dissemination level8 &U2LI' Document Control Title8 Test-be.s an. gui.elines for securing IoT (ro.ucts an. for secure set-u( (ro.uction environments Ty(e8 &ublic 4.itorBsC8 Katharina Kloiber 4-mail8 ,,;D-net:at AuthorBsC8 Katharina Kloiber, Ni,olaus DEr,, -ilvio -tern )evie/erBsC8 -te(hanie von )E.en, Violeta Dam6anovic, Leo Ha((-2otler Doc ID8 DF:5 Amendment History Version Date Author Description/Comments VG:? ?>:G?:@G@G -ilvio -tern Technology Analysis VG:@ ?G:G>:@G@G -ilvio -tern &ossible )esearch !iel.s for the -2I--ystem VG:> >?:G<:@G@G Katharina Kloiber Initial version (re(are.
    [Show full text]
  • NFV Decouples the Network Functions Such As NAT, Firewall, DPI, IPS/IDS, WAAS, SBC, RR Etc
    Virtualizing Enterprise Network Functions • BRKCRS-3447 Matt Falkner, Distinguished Engineer, Technical Marketing Agenda BRKCRS-3447 • Introduction & Motivation • Deployment Models and Characteristics • The Building Blocks of Virtualization (today) • Virtualization Trade-offs and Research Topics • Conclusion Abstract Network Function Virtualization (NfV) is gaining increasing traction in the industry based on the promise of reducing both CAPEX and OPEX using COTS hardware. This session introduces the use-cases for virtualizing Enterprise network architectures, such as virtualizing branch routers, LISP nodes, IWAN deployments, or enabling enterprise hybrid cloud deployments. The sessions also discusses the technology of Virtualization from both a system architecture as well as a network architecture perspective. Particular focus is given on understanding the impact of running routing functions on top of hypervisors, as well as the placement and chaining of network functions. Performance of virtualized functions is also discussed. BRKCRS-3447 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Introduction and Motivation Network Functions Virtualization (NFV) Announced at SDN World Congress, Oct 2012 • AT&T • BT • CenturyLink • China Mobile • Colt • Deutsche Telekom • KDDI • NTT • Orange • Telecom Italia • Telstra • Verizon • Others TBA… BRKCRS-3447 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 What is NfV? A Definition … NFV decouples the network functions such as NAT, Firewall, DPI, IPS/IDS,
    [Show full text]
  • WP-MIRROR 0.7.4 Reference Manual
    WP-MIRROR 0.7.4 Reference Manual Dr. Kent L. Miller November 22, 2014 DRAFT 1 DRAFT 2 To Tylery DRAFT i WP-MIRROR 0.7.4 Reference Manual Legal Notices Copyright (C) 2012–2014 Dr. Kent L. Miller. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”. THIS PUBLICATION AND THE INFORMATION HEREIN ARE FURNISHED AS IS, ARE FURNISHED FOR INFORMATIONAL USE ONLY, ARE SUBJECT TO CHANGE WITH- OUT NOTICE, AND SHOULD NOT BE CONSTRUED AS A COMMITMENT BY THE AU- THOR. THE AUTHOR ASSUMES NO RESPONSIBILITY OR LIABILITY FOR ANY ER- RORS OR INACCURACIES THAT MAY APPEAR IN THE INFORMATIONAL CONTENT CONTAINED IN THIS MANUAL, MAKES NO WARRANTY OF ANY KIND (EXPRESS, IMPLIED, OR STATUTORY) WITH RESPECT TO THIS PUBLICATION,AND EXPRESSLY DISCLAIMS ANY AND ALL WARRANTIES OF MERCHANTABILITY, FITNESS FOR PAR- TICULAR PURPOSES, AND NONINFRINGEMENT OF THIRD-PARTY RIGHTS. The WP-MIRROR logotype (see margin) was released by the author into the public domain on 2014-Apr-10. See https://www.mediawiki.org/wiki/File:Wp-mirror.png. This logotype fea- tures a sunflower that is derived from 119px-Mediawiki logo sunflower Tournesol 5x rev2.png, which is also in the public domain. See https://en.wikipedia.org/wiki/File:Mediawiki_logo_sunflower_Tournesol_5x.png.
    [Show full text]
  • Custom Equipment Monitoring with Openwrt and Carambola
    Custom Equipment Monitoring with OpenWRT and Carambola Sysadmin Miniconf Linux.conf.au Perth - 6 January 2014 Andrew McDonnell - Software Engineer & Tech Problem Solver [email protected] Twitter: @pastcompute http://blog.oldcomputerjunk.net https://launchpad.net/~andymc73 https://github.com/andymc73 Overview ● Equipment Monitoring with a Budget ● Introduction to Carambola ● Introduction to OpenWRT ● Monitoring with OpenWRT and Carambola Andrew McDonnell – LCA2014 Sysadmin Miniconf - Custom equipment monitoring with OpenWRT and Carambola – [email protected] 2 Use Case ● Everything has a computer in it these days ● And a connection: http://en.wikipedia.org/wiki/File:SolarpanelBp.JPG http://en.wikipedia.org/wiki/File:2008-07-11_Air_conditioners_at_UNC-CH.jpg http://en.wikipedia.org/wiki/File:Davis_VantagePro.jpg Andrew McDonnell – LCA2014 Sysadmin Miniconf - Custom equipment monitoring with OpenWRT and Carambola – [email protected] 3 Use Case Requirements ● So if you have a <insert widget here>? ● And a small physical space requirement? ● How do you have it talk to <insert toolkit here>? i2c rs485 http://openclipart.org/detail/182810/old-computer-by-jhnri4-182810 http://openclipart.org/detail/188441/sid-chip-by-arvin61r58-188441 Andrew McDonnell – LCA2014 Sysadmin Miniconf - Custom equipment monitoring with OpenWRT and Carambola – [email protected] 4 Potential Solutions ● Industrial COTS ● Embedded microcontrollers ● arduino ● Embedded Linux ● Raspberry Pi ● Beaglebone Black ● Carambola2 http://www.openelectrical.org/wiki/images/4/43/Programmable-logic-controller-plc-22971.jpg
    [Show full text]
  • D4.2: In-Vehicular Antitampering Security
    Ref. Ares(2021)2227326 - 31/03/2021 DIAS Smart Adaptive Remote Diagnostic Antitampering Systems EUROPEAN COMMISSION HORIZON 2020 LC-MG-1-4-2018 Grant agreement ID: 814951 Deliverable No. D4.2 Deliverable Title In-vehicular antitampering security techniques and integration Issue Date 31/03/2021 Dissemination level Public Main Author(s) Genge Béla (UMFST) Lenard Teri (UMFST) Obaid Ur-Rehman (FEV) Miao Zhang (FEV) Liu Cheng (BOSCH) Siegel Bjoern (BOSCH) Roland Bolboacă (UMFST) Haller Piroska (UMFST) DIAS D4.2-In-vehicular antitampering security techniques and integration, v1.0 Sofia Terzi (CERTH) Athanasios Sersemis (CERTH) Charalampos Savvaidis (CERTH) Konstantinos Votis (CERTH) Version v1.0 2 31/03/2021 DIAS D4.2-In-vehicular antitampering security techniques and integration, v1.0 DIAS Consortium This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 814951. This document reflects only the author's view and the Agency is not responsible for any use that may be made of the information it contains. 3 31/03/2021 DIAS D4.2-In-vehicular antitampering security techniques and integration, v1.0 Document log Distributed Version Description Assigned to Date for Draft structure of Structure Reviewer 1: FEV v0.1 20/11/2020 deliverable review Reviewer 2: UMFST Reviewer 1: Sofia Terzi v0.2- Draft content of Content (CERTH) 26/02/2021 v0.4 deliverable reviews Reviewer 2: Dominic Woerner (Bosch IoT) Final content of v0.5 GA check GA members 19/03/2021 deliverable v1.0 First final
    [Show full text]
  • Cloud Security Guidelines for IBM Power Systems
    Front cover Cloud Security Guidelines for IBM Power Systems Turgut Aslan Peter G. Croes Liviu Rosca Max Stern Redbooks International Technical Support Organization Cloud Security Guidelines for IBM Power Systems February 2016 SG24-8242-01 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. Second Edition (February 2016) This edition applies to IBM PowerVC 1.3.0 (5765-VCS), IBM PowerVM 2.2.4 (5765-PVS Standard Edition, 5765-PVE Enterprise Edition, 5765-PVL Linux Edition), IBM PowerKVM 3.1 (5765-KVM), IBM Cloud Manager with OpenStack 4.3 (5765-OSP), and the IBM Hardware Management Console 8.3.2 (7042-CR8). © Copyright International Business Machines Corporation 2015, 2016. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x IBM Redbooks promotions . xi Preface . xiii Authors. xiii Now you can become a published author, too! . .xv Comments welcome. .xv Stay connected to IBM Redbooks . xvi Part 1. Business context and architecture considerations. 1 Chapter 1. Business context . 3 1.1 Overview . 4 1.1.1 Cloud deployment models . 4 1.1.2 Cloud service models . 5 1.2 Business drivers for cloud computing . 6 1.3 IBM Power Systems and the cloud . 7 1.3.1 Hypervisors . 7 1.3.2 Platform management. 8 1.3.3 Advanced virtualization management . 8 1.3.4 Cloud management. 9 1.4 Conclusion . 11 Chapter 2. Cloud security reference architecture . 13 2.1 IBM Cloud Computing Reference Architecture .
    [Show full text]
  • Writing Netfilter Modules
    Writing Netfilter modules Jan Engelhardt, Nicolas Bouliane rev. July 3, 2012 The Netfilter/Xtables/iptables framework gives us the possibility to add features. To do so, we write kernel modules that register against this framework. Also, depending on the feature’s category, we write an iptables userspace module. By writing your new extension, you can match, mangle, track and give faith to a given packet or complete flows of interrelated connections. In fact, you can do almost everything you want in this world. Beware that a little error in a kernel module can crash the computer. We will explain the skeletal structures of Xtables and Netfilter modules with complete code examples and by this way, hope to make the interaction with the framework a little easier to understand. We assume you already know a bit about iptables and that you do have C programming skills. Copyright © 2005 Nicolas Bouliane <acidfu (at) people.netfilter.org>, Copyright © 2008–2012 Jan Engelhardt <jengelh (at) inai.de>. This work is made available under the Creative Commons Attribution-Noncom- mercial-Sharealike 3.0 (CC-BY-NC-SA) license. See http://creativecommons.org/ licenses/by-nc-sa/3.0/ for details. (Alternate arrangements can be made with the copyright holder(s).) Additionally, modifications to this work must clearly be indicated as such, and the title page needs to carry the words “Modified Version” if any such modifications have been made, unless the release was done by the designated maintainer(s). The Maintainers are members of the Netfilter Core Team, and any person(s) appointed as maintainer(s) by the coreteam.
    [Show full text]
  • Universidad Estatal Del Sur De Manabí 2018
    UNIVERSIDAD ESTATAL DEL SUR DE MANABÍ FACULTAD DE CIENCIAS TÉCNICAS CARRERA DE INGENIERÍA SISTEMAS COMPUTACIONALES TESIS DE GRADO PREVIO A LA OBTENCIÓN DEL TÍTULO DE: INGENIERO EN SISTEMAS COMPUTACIONALES TEMA “ESTUDIO DE COMPARACIÓN DE TÉCNICAS DE BALANCEO DE CARGA EN SERVICIOS WEB EN LA CARRERA DE INGENIERÍA EN SISTEMAS COMPUTACIONALES DE LA UNIVERSIDAD ESTATAL DEL SUR DE MANABI” AUTOR DIEGO ARMANDO MENDOZA BRAVO DIRECTOR DE TESIS ING. CRISTHIAN JOSÉ ÁLAVA MERO 2018 CERTIFICACIÓN Ing. Cristhian José Álava Mero docente de la Universidad Estatal del Sur de Manabí de la carrera de Ingeniería en Sistemas Computacionales. CERTIFICO: Que el señor Diego Armando Mendoza Bravo realizo la tesis de grado titulada: “ESTUDIO DE COMPARACIÓN DE TÉCNICAS DE BALANCEO DE CARGA EN SERVICIOS WEB EN LA CARRERA DE INGENIERÍA EN SISTEMAS COMPUTACIONALES DE LA UNIVERSIDAD ESTATAL DEL SUR DE MANABI” Bajo la dirección de quien suscribe; habiendo cumplido con las disposiciones reglamentarias establecidas para el efecto. Ing. Cristhian José Álava Mero DIRECTOR DE TESIS I AUTORÍA “La responsabilidad por los hechos, ideas y doctrinas expuestas en este trabajo de investigación me corresponden exclusivamente a su autor, y el patrimonio intelectual de la misma a la Universidad Estatal del Sur de Manabí” _______________________ Diego Armando Mendoza Bravo Autor de Tesis II APROBACIÓN DEL TRIBUNAL Sometida a la comisión de profesionalización de la carrera de Ingeniería en Sistemas Computacionales de la Universidad Estatal del Sur de Manabí: como requisito para obtener el título de Ingeniero en Sistemas Computacionales. Jipijapa…………………. 2018 Miembro del tribunal Miembro del tribunal ……………………….. ….…………………….. Miembro del tribunal …..………………. III DEDICATORIA Con infinito afecto y gratitud, a Dios y de quien formo parte como es mi familia mis padres, Rodrigo y Rocío quien siempre han sido mi guía y formación desde el momento de mi concepción, a mis hermanos y hermanas que gracias a su apoyo moral incentivan mis momentos más difíciles y duros en esta ocasión tan esperada y anhelada.
    [Show full text]
  • Deliverable D3.2
    Ref. Ares(2016)3479770 - 15/07/2016 Converged Heterogeneous Advanced 5G Cloud-RAN Architecture for Intelligent and Secure Media Access Project no. 671704 Research and Innovation Action Co-funded by the Horizon 2020 Framework Programme of the European Union Call identifier: H2020-ICT-2014-1 Topic: ICT-14-2014 - Advanced 5G Network Infrastructure for the Future Internet Start date of project: July 1st, 2015 Deliverable D3.2 Initial 5G multi-provider v-security realization: Orchestration and Management Due date: 30/06/2016 Submission date: 15/07/2016 Deliverable leader: I2CAT Editor: Shuaib Siddiqui (i2CAT) Reviewers: Konstantinos Filis (COSMOTE), Oriol Riba (APFUT), and Michael Parker (UESSEX) Dissemination Level PU: Public PP: Restricted to other programme participants (including the Commission Services) RE: Restricted to a group specified by the consortium (including the Commission Services) CO: Confidential, only for members of the consortium (including the Commission Services) CHARISMA – D3.2 – v1.0 Page 1 of 145 List of Contributors Participant Short Name Contributor Fundació i2CAT I2CAT Shuaib Siddiqui, Amaia Legarrea, Eduard Escalona Demokritos NCSRD NCSRD Eleni Trouva, Yanos Angelopoulos APFutura APFUT Oriol Riba Innoroute INNO Andreas Foglar, Marian Ulbricht JCP-Connect JCP-C Yaning Liu University of Essex UESSEX Mike Parker, Geza Koczian, Stuart Walker Intracom ICOM Spiros Spirou, Konstantinos Katsaros, Konstantinos Chartsias, Dimitrios Kritharidis Ethernity ETH Eugene Zetserov Ericsson Ericsson Carolina Canales Altice Labs Altice Victor Marques Fraunhofer HHI HHI Kai Habel CHARISMA – D3.2 – v1.0 Page 2 of 145 Table of Contents List of Contributors ................................................................................................................ 2 1. Introduction ...................................................................................................................... 7 1.1. 5G network challenges: Security and Multi-tenancy ......................................................................... 7 1.2.
    [Show full text]
  • Secured and Controlled Network Traffic with Load Balancing Using IP-Tables
    Volume 6, No. 7, September-October 2015 International Journal of Advanced Research in Computer Science REVIEW ARTICLE Available Online at www.ijarcs.info Secured and Controlled Network Traffic with Load Balancing using IP-Tables Talwinder kaur Mohita Garg M.tech(CSE) North west institute of engg.&tech., North west institute of engg. & tech. Dhudike(Moga) Dhudike (Moga) Abstract : There are two IP addresses for a typical home network: one for local devices to connect to across the local area network (LAN), another for the external or wide area network (WAN) Internet connection. A virtual private network (VPN) is a method for the extension of a private network across a public network, such as the Internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network, and thus are benefiting from the functionality, security and management policies of the private network. The aim of this method of course is to balance the traffic so as to avoid the congestion. Keywords: Load balancing, IP network, VPN, NAT. (1) INTRODUCTION network and the Internet. Firewall prevents unauthorized use and access to your network. The job of a firewall is to carefully analyze data entering and exiting the network A default IP address is normally set to internal LAN, private based on your configuration. It ignores information that number for example, 192.168.1.1 for their internal IP comes from unsecured, unknown or suspicious locations. A address. No matter the brand of router, its default internal IP firewall plays an important role on any network as it address is listed in the manufacturer's documentation.
    [Show full text]
  • Vysoké Učení Technické V Brně Rozhraní Pro
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Digital library of Brno University of Technology VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMAČNÍCH TECHNOLOGIÍ ÚSTAV INFORMAČNÍCH SYSTÉMŮ FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION SYSTEMS ROZHRANÍ PRO KONFIGURACI SÍŤOVÝCH KOMPONENT OPERAČNÍHO SYSTÉMU NETWORKING SUBSYSTEM CONFIGURATION INTERFACE DIPLOMOVÁ PRÁCE MASTER’S THESIS AUTOR PRÁCE Bc. ONDREJ LICHTNER AUTHOR VEDOUCÍ PRÁCE Ing. ONDŘEJ RYŠAVÝ, Ph.D. SUPERVISOR BRNO 2014 Abstrakt Cílem diplomové práce je návrh síťové konfigurační knihovny s dùrazem kladeným na pøenositelnost mezi operačními systémy na bázi Linuxu a BSD a roz¹iøitelnosti podpory knihovny. V druhé kapitole práce zkoumá dostupné konfigurační rozhraní obou operačních sys- témù. Detailně pak rozebírá vlastnosti rozhraní Netlink socketù, které je primárním konfig- uračním rozhraním pro síťové prvky na Linuxu, a systémové volání ioctl, které má na Lin- uxu menší schopnosti, ale zato je primárně používané na BSD a jiných UNIX systémech. Jsou též zkoumané rozhraní pro konfiguraci rozdílných firewallù. V třetí kapitole je práce zameøená na konkrétní typy síťových zařízení, specifika je- jich konfigurace a jejich návaznost na rozhraní jádra popsané v druhé kapitole. V ètvrté kapitole jsou formulovány požadavky na konfigurační knihovnu: jednoduchá roz¹iøitelnost, pøenositelnost na rùzné operaèní systémy, podpora sledování změn a událostí a roz¹iøitelnost o rùzné typy uživatelských rozhraní. Na základě výzkumu z pøedcházejících dvou kapitol je pøednesen návrh knihovny. Návrh definuje konfigurační rozhraní jako hierarchii abstrak- tních tříd, oddělených od implementace. To umožnuje mít současně několik implementací stejného konfiguračního rozhraní i v rámci jednoho operačního systému. Jako vstupní rozhraní knihovny je definovaná třída LibNCFG, která má na starosti tyto konfigurační objekty vytvoøit namísto uživatele.
    [Show full text]