SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE...
-
Upload
matilda-garrison -
Category
Documents
-
view
217 -
download
0
Transcript of SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE...
![Page 1: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/1.jpg)
SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING
TELECOM PARIS TECH- FRANCEFOUAD GUENANE
26/02/2015
![Page 2: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/2.jpg)
AGENDA Context Security As A Service Hybrid Deployment Architecture Cloud Based Deployment Architecture Futur works Conclusion
![Page 3: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/3.jpg)
Context In 2013, 60% of companies were DDoS-attacked, up
from 35% experiencing a disruptive attack in 2012 (Neustar Annual Report 2014)
87% of companies attacked were hit multiple times In 2013, 74% of companies reported that DDoS attacks
lasted less than a day (16% between 1-2 days). Attacks between 1-5 Gbps represent approximately 20%
(One amplification attack this year measured 400 Gbps)
![Page 4: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/4.jpg)
Context DDoS drains manpower: over half of businesses (57%)
need 6 or more people to mitigate DDoS attacks For small and medium businesses (up to 5 Mbps of Internet
connectivity): Deployment and maintenance are estimated to $116,075 for
the first year An annual cost of $108,200
Hence, there is a growing interest in outsourcing security services to a Cloud provider in order to reduce firewall management and deployment costs
![Page 5: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/5.jpg)
Security As A Service Security-as-a-service (SaaS) is an outsourcing
model for security management. Typically, Security as a Service involves
applications such as anti-virus software delivered over the Internet
But the term can also refer to security management provided in-house by an external organization. (Cloud Security Alliance)
![Page 6: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/6.jpg)
Security As A Service
First line of defense Expensive costs which
include: Human resources and
training Maintenance, updates and
the price of licenses Deployment costs
Limited resources
High availability Ability to add or remove
firewalls dynamically Increase in processing
capacity (Throughput) Centralized or distributed
management Provisioning of resources
(needs)
Physical Firewall Virtual Firewall
![Page 7: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/7.jpg)
Hybrid Deployment Architecture
![Page 8: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/8.jpg)
Hybrid Deployment Architecture
We explore two mechanisms:
Secure Forwarding Architecture Secure Sharing Architecture
![Page 9: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/9.jpg)
9
Secure Forwarding Architecture
9
![Page 10: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/10.jpg)
10
Secure Forwarding Architecture
10
![Page 11: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/11.jpg)
Cloud Based Deployment Architecture
![Page 12: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/12.jpg)
Cloud Based Deployment Architecture
The general model proposed looks like a huge proxy or proxy server and consists of three main components:
Front Gatew
ay
Instances de
Firewall
Back Gatew
ay
![Page 13: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/13.jpg)
Cloud Based Deployment Architecture
![Page 14: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/14.jpg)
Futur Projects Security and Privacy in Cloud governance Inter-Cloud (interconnection of Cloud
Provider) RFID Technologies for Tracability Green Computing …etc.
![Page 15: SECURITY AS A SERVICE: CHALLENGES AND UNDERSTANDING TELECOM PARIS TECH- FRANCE FOUAD GUENANE 26/02/2015.](https://reader033.fdocuments.in/reader033/viewer/2022052510/56649efd5503460f94c10fbc/html5/thumbnails/15.jpg)
Conclusion Innovative architecture to effectively manage
the performance and reliability in a cloud-based firewall
Encouraging and promising preliminary results network administrators could manage their
infrastructure with the expertise of their Cloud provider for better exploitation