SC15 security technology racks with help from Dell, Gigamon, Reservoir Labs, Splunk, and Verisign. |
As the backbone of data communications for SC, SCinet
supports high-bandwidth demos, HPC workshops, classrooms, and thousands of conference
attendees accessing the network at any given point. With network traffic from
the exhibit floor, wireless and external network traffic, there are many
opportunities for the network to be compromised. SCinet’s Network Security team
works to develop novel strategies to protect the integrity of the network.
“The Network Security team has transitioned from using
signatures to detect single instances of malicious activity in the network to
performing behavioral analytics, which track the overall patterns of security
threats,” says Jeff Boote, Technical Staff at Sandia National Laboratories and
co-lead for the SCinet Network Security team. “We started using these security
algorithms to detect malicious hosts on the network about 2-3 years ago to be
more proactive and evolve with the security trends.”
Resevoir Labs staff on SCinet. |
“We went from 2 10-gigabit taps (20-gigabit aggregate) in
2011, to 31 taps with 580-gigabit aggregate in 2015. With an expected 5000 simultaneous
hosts on the Wi-Fi alone, on an open network that is only up for one to two
weeks, the Network Security team must find novel ways to prevent malicious
activity on the network,” says Gates.
Working with vendors and partners, the SCinet team
integrates the technologies to monitor for harmful network traffic, detect and
prevent compromised systems, and mitigate the effects of compromised systems.
Over the last three years, SCinet has used Gigamon to help
monitor and secure its network operation centers and Internet access gateway.
Gigamon acts as a type of mirror, allowing the Network Security team to peer
into network traffic and observe a copy of the activity going through the
gateway. This traffic is being analyzed
by technologies such as the Dell Firewall Sandwich, which provides high-speed
deep packet inspection for malicious security events.
SCinet also serves as a research testbed for the network
security.
“Back in 2000, the intrusion detection system, Bro, was
being developed by Berkeley Lab and ICSI. SCinet was used as a place to test
their technology on a network that is both production and research oriented,”
says Gates. “It’s a balance here. SCinet provides the protection grade security
of a full production network, while at same time working with technology
experts who want to test new features. We’re able to provide both on SCinet. We
provide production level network security while allowing for research
innovation.”
One SCinet partner, Reservoir Labs, began as a SCinet
Sandbox (now called Network Research Exhibition) project and is now an integral
part of security architecture. Reservoir uses Bro technology under the covers to
both log and analyze activity on the network.
Like Bro, Reservoir used SCinet to test the high-speed analysis features
of their product while also providing production-level stability and results.
While SCinet has done behavior-based analysis of security
data within a research context for more than a decade, these techniques are
becoming ever more popular in day-to-day network operations. To fulfill that
role in 2015, SCinet is using Splunk to aggregate the security events from
Gigamon, Reservoir, and Dell SonicWALL, along with intelligence data from
Verisign’s iDefense, to look for suspicious behaviors in network traffic.
This year, SCinet has over $5,000,000 in vendor loaned technology for network security.
The SC15 SCinet Network Operating Center brining in 1.62 Terabits per second of network bandwidth. |
We want to thank all the vendors and researchers over the
years for engaging with SCinet and allowing us to explore the boundaries of
security technologies. We look forward to seeing you at SC16!
5 comments:
So a vital opportunity for the students to read about this experiment and comply every good need of which they are mainly focused, hopefully this will bring about something good to their own. thermodynamics homework help
My name is Mrs Aisha Mohamed, am a Citizen Of Qatar.Have you been looking for a loan?Do you need an urgent personal loan or business loan?contact Dr James Eric Finance Home he help me with a loan of $42,000 some days ago after been scammed of $2,800 from a woman claiming to been a loan lender but i thank God today that i got my loan worth $42,000.Feel free to contact the company for a genuine financial service. Email:(financialserviceoffer876@gmail.com) call/whats-App Contact Number +918929509036 financialserviceoffer.blogspot.com
Free legal advice
supreme court of pakistan judgements
case laws pakistan
Court Marriage in Faisalabad
Free legal advice
supreme court of pakistan judgements
case laws pakistan
Court Marriage in Faisalabad
law books pakistan
Are you in need of Urgent Loan Here no collateral required all problem regarding Loan is solve between a short period of time with a low interest rate of 2% and duration more than 20 years what are you waiting for apply now and solve your problem or start a business with Loan paying of various bills I think you have come to the right place just contact us We Are Here To Show You A Better Way To Financial Freedom !!!
Contact Us At : abdullahibrahimlender@gmail.com
whatspp Number +918929490461
Mr Abdullah Ibrahim
Post a Comment