html5-img
1 / 20

An Intrusion Detection Architecture for Computational Grids

An Intrusion Detection Architecture for Computational Grids. Prof. Dr. Mohammed F. Tolba Dr. Ismail A. Taha Ahmad M. Al Shishtawy. Table Of Contents. Introduction Grid Security and the Need for IDS Proposed Architecture. Conclusion. Globus Toolkit.

gwylan
Download Presentation

An Intrusion Detection Architecture for Computational Grids

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. An Intrusion Detection Architecture for Computational Grids Prof. Dr. Mohammed F. Tolba Dr. Ismail A. Taha Ahmad M. Al Shishtawy

  2. Table Of Contents • Introduction • Grid Security and the Need for IDS • Proposed Architecture. • Conclusion.

  3. Globus Toolkit • To build Computational Grids and its applications. • Bag of services approach. • Security • Resource Management • Information Services • Data Management • Research Projects in our Faculty

  4. Table Of Contents • Introduction • Grid Security and the Need for IDS • Proposed Architecture. • Conclusion.

  5. Overview of Security in Globus Toolkit SSL SSH Local Name Local Name Kerberos Global Name Local Name Plain Text TLS Local Name Local Name

  6. Intrusion Detection System • Second line of defense • Normal differ from malicious use. • Anomaly vs. Misuse detection. • Main components: • Data Gathering Module. • Analyzing and Detection Module

  7. LAN Data gathering module Analyzing and Detection module Centralized Intrusion Detection

  8. LAN LAN LAN LAN Distributed Intrusion Detection Data gathering module Analyzing and Detection module

  9. Table Of Contents • Introduction • Grid Security and the need for IDS • Proposed Architecture. • Conclusion

  10. Requirements • Scalable. • Heterogeneity. • Minimal overhead. • Interoperability. • Integrity and confidentially. • Trust relationships. • Avoid bottleneck and single point of failure.

  11. Grid Information Services (MDS-2) discovery (GRIP or other) Aggregate Directory D D lookup (GRIP) registration (GRRP) P P P P standard Information Provider services

  12. Grid Information Services (MDS-2) • Information Providers • Aggregate Directory • The GRid Information Protocol (GRIP) • The GRid Registration Protocol (GRRP) • Security (GSI)

  13. Proposed Grid Intrusion Detection Architecture (GIDA) Aggr. Dir. IDS IDS Aggr. Dir.

  14. User Interface Local IDS DGM A A A Data Gathering Module

  15. Case I (Local) Local IDS IDS IDS Local IDS Local IDS

  16. Case II (Global) IDS IDS

  17. Proposed Grid Intrusion Detection Architecture (GIDA) IDS IDS

  18. Table Of Contents • Introduction • Grid Security and the Need for IDS • Proposed Architecture. • Conclusion.

  19. Conclusions • Intrusion detection is missing in current grid security systems. • Intrusion detection is very important as a second line of defense. • Current intrusion detection does not satisfy the needs of The Grid.

  20. The End Thank you for careful listening 

More Related