Security, GENI, and Open Source
Ketly Jean-PierreGENI/Howard University
Agenda
• GPO Summer Experience• Security Policies• Security Tools• Challenges• Next steps• Q & A
GPO Summer Intern Experiences
• Documentation Process– Write– Review– Discuss
– Legal checkup– Incorporate
• Upload for use• Install open source software– Different Unix flavor– Installation packages
Security Policies
• Draft policies for discussion– Infrastructure Security– Recommended Use Policy
• Accountability/Communication/Cooperation• Risk assessment– Evaluate GENI tools
Example Open Source Security Tools
• Some open source tools that can be installed on *NIX and Windows– IDS – Snort• Detect possible intrusions
– Vulnerability scanners – Sara• Discover vulnerability
– Data Encryption – GnuPG• Secure communication and data storage
Challenges
• Finding install instructions specifically for NetBSD
• Snort – logs• How to interpret• What to do with information
Challenges Cont’d
• What will I use to monitor/measure the success– What is success?
• Getting (grad and possibly undergrad) student participation– Interested (not too comfortable with CLI)• Java or Windows based apps GENI
prototypes/experiments
What next…?
• Research– Trust Based Security• Focus on end-user (user point of view)• Can security be user based?
– Tools to help researchers, universities, and commercial participants manage security in prototypes and systems in the GENI environment
• Installation– GENI WIKI
Thank Yous
• National Science Foundation (NSF)• Heidi Picher-Dempsey• Henry Yeh• Dr. Rajni Goel (Advisor)• Dr. Moses Garuba (Advisor)• Chip Elliot• GPO Staff
Suggestions/Questions
Open Source Security Tool
• Recommendations--?– IDS – Snort• Logs
– Vulnerability scanners – Sara• Discover vulnerability
– Data Encryption – GnuPG• Secure communication and data storage
• Any others?
Top Related