SlideShare a Scribd company logo
Catch Me If You Can
Outrunning Environmental Adversity with Intelligence
at all layers of the OSI Model
Introductions
• Merlin Glynn mglynn@pivotal.io
• Sean Keery skeery@pivotal.io
• Keith Strini kstrini@pivotal.io
• Special Shout out to Raymond Lee
(BDS Team)
What if we could improve performance
& respond to environmental adversity?
APT - A set of stealthy and continuous computer hacking processes,
often orchestrated by human(s) targeting a specific entity.
DDOS – an attempt to make a machine or network resource
unavailable to its intended users, such as to temporarily or
indefinitely interrupt or suspend services of a host connected to the
Internet
Spectrum of cyber vulnerability from DDOS to APT
Quality of service
The overall performance of a computer network, particularly
the performance seen by the users of the network. To
quantitatively measure quality of service, several related
aspects of the network service are often considered, such as
error rates, bit rate, throughput, transmission delay,
availability, jitter, etc.
• Bosh
• CF
• SDN
DSL
Agents:
Actual State
Strategy:
Desired
State
Dynamic
Analysis
Environment
Models
Goals
(SLA)
Predictions
(Metrics)
DSL
Library
Learning
What this Continuous Improvement
over Environmental Adversity looks
like..…
responses
DSLDSL
DSLDSLDSL
Realize
<<no-outage>>
<<predictive>>
<<reliable>>
Project Environment
Use Cases for Demo
• DDOS -> Recognize foreign IP/Add ACL via NSX Rest API
• QoS -> Detect network throughput deficiency/Add 1 .. N routes
• APT -> Recognize foreign IP+Load/Alert Forensics Team
Spin up new CF foundation/subnet/data subnet access
Add new route
Remove forensic route
Shutdown data subnet access from forensic foundation
Goal: uninterrupted production traffic/UX
• DDIL -> Detect network throughput/Identify best cell net throughput
Move highest priority workloads to cell
Add additional service chaining IAW compliancy outlines to
edge
Add 1..n routes
Where do we go from here ….
• Ways to evaluate each
deployment
• Utilize the inherent abilities of
the distributed architecture
• Machine learning where each
distributed component
maintains state, manages itself
In Conclusion…Why Now?
• The cyber vulnerability problem is
imminent
• The operations, networking and
development teams are finally
becoming cohesive units
• The capacity to process, interpret
and act upon petascale data on any
IaaS
• All of this is can already be built into
the very core of the foundation now
– (Diego abstractions, SDN API, Predictive
and ML, Streams, Bosh-Enaml).
enaml.pezapp.io

More Related Content

Viewers also liked

BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
BrightEdge Technologies
 
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
ABDUL MAJID KANDHIR
 
Sexual Dysfunction Presentation
Sexual Dysfunction PresentationSexual Dysfunction Presentation
Sexual Dysfunction Presentation
imagemakers
 
Transportation | Maritime & Trade
Transportation | Maritime & TradeTransportation | Maritime & Trade
Transportation | Maritime & Trade
IHS Markit
 
The Gran Assumpteur v16
The Gran Assumpteur v16The Gran Assumpteur v16
The Gran Assumpteur v16
David Earl Jones
 
Marine board pp17_microcean
Marine board pp17_microceanMarine board pp17_microcean
Marine board pp17_microcean
Rainu Rajeev
 
臺灣公共衛生促進協會簡介20161221
臺灣公共衛生促進協會簡介20161221臺灣公共衛生促進協會簡介20161221
臺灣公共衛生促進協會簡介20161221
phlib1 phlib1
 
Femilift Presentation
Femilift PresentationFemilift Presentation
Femilift Presentation
imagemakers
 
Event Hacks: 7 beginner tips for emcee scripts
Event Hacks: 7 beginner tips for emcee scriptsEvent Hacks: 7 beginner tips for emcee scripts
Event Hacks: 7 beginner tips for emcee scripts
Peatix
 
Hotel Renovation
Hotel RenovationHotel Renovation
Hotel Renovation
Ottis Bunning
 
zSystems Enterprise Digital Transformation Conference -IBM contacts
zSystems Enterprise Digital Transformation Conference -IBM contactszSystems Enterprise Digital Transformation Conference -IBM contacts
zSystems Enterprise Digital Transformation Conference -IBM contacts
DevOps for Enterprise Systems
 
peran perikanan dalam kehidupan manusia
peran perikanan dalam kehidupan manusiaperan perikanan dalam kehidupan manusia
peran perikanan dalam kehidupan manusia
PT. SASA
 
Frank Piller: Open Innovation & Customer Co-Creation
Frank Piller: Open Innovation & Customer Co-CreationFrank Piller: Open Innovation & Customer Co-Creation
Frank Piller: Open Innovation & Customer Co-Creation
Frank Piller
 
Fundraising events and social media, how to #win
Fundraising events and social media, how to #winFundraising events and social media, how to #win
Fundraising events and social media, how to #win
Jonathan Waddingham
 
The Content Marketer’s A to-Z Guide to Google Analytics
The Content Marketer’s A to-Z Guide to Google AnalyticsThe Content Marketer’s A to-Z Guide to Google Analytics
The Content Marketer’s A to-Z Guide to Google Analytics
Barry Feldman
 
Template Script for Emcees
Template Script for EmceesTemplate Script for Emcees
Template Script for Emcees
Brian Ybañez
 

Viewers also liked (16)

BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
 
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
 
Sexual Dysfunction Presentation
Sexual Dysfunction PresentationSexual Dysfunction Presentation
Sexual Dysfunction Presentation
 
Transportation | Maritime & Trade
Transportation | Maritime & TradeTransportation | Maritime & Trade
Transportation | Maritime & Trade
 
The Gran Assumpteur v16
The Gran Assumpteur v16The Gran Assumpteur v16
The Gran Assumpteur v16
 
Marine board pp17_microcean
Marine board pp17_microceanMarine board pp17_microcean
Marine board pp17_microcean
 
臺灣公共衛生促進協會簡介20161221
臺灣公共衛生促進協會簡介20161221臺灣公共衛生促進協會簡介20161221
臺灣公共衛生促進協會簡介20161221
 
Femilift Presentation
Femilift PresentationFemilift Presentation
Femilift Presentation
 
Event Hacks: 7 beginner tips for emcee scripts
Event Hacks: 7 beginner tips for emcee scriptsEvent Hacks: 7 beginner tips for emcee scripts
Event Hacks: 7 beginner tips for emcee scripts
 
Hotel Renovation
Hotel RenovationHotel Renovation
Hotel Renovation
 
zSystems Enterprise Digital Transformation Conference -IBM contacts
zSystems Enterprise Digital Transformation Conference -IBM contactszSystems Enterprise Digital Transformation Conference -IBM contacts
zSystems Enterprise Digital Transformation Conference -IBM contacts
 
peran perikanan dalam kehidupan manusia
peran perikanan dalam kehidupan manusiaperan perikanan dalam kehidupan manusia
peran perikanan dalam kehidupan manusia
 
Frank Piller: Open Innovation & Customer Co-Creation
Frank Piller: Open Innovation & Customer Co-CreationFrank Piller: Open Innovation & Customer Co-Creation
Frank Piller: Open Innovation & Customer Co-Creation
 
Fundraising events and social media, how to #win
Fundraising events and social media, how to #winFundraising events and social media, how to #win
Fundraising events and social media, how to #win
 
The Content Marketer’s A to-Z Guide to Google Analytics
The Content Marketer’s A to-Z Guide to Google AnalyticsThe Content Marketer’s A to-Z Guide to Google Analytics
The Content Marketer’s A to-Z Guide to Google Analytics
 
Template Script for Emcees
Template Script for EmceesTemplate Script for Emcees
Template Script for Emcees
 

Similar to Catch Me If You Can - Cloud Foundry Summit Europe 2016

PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
Marta Pacyga
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PROIDEA
 
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scaleVelocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
Michael Kehoe
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
Chinatu Uzuegbu
 
2015 04 bio it world
2015 04 bio it world2015 04 bio it world
2015 04 bio it world
Chris Dwan
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational Perspectives
Megan Eskey
 
cloud computing
cloud computingcloud computing
cloud computing
Krishna Kumar
 
Modern apps with dcos
Modern apps with dcosModern apps with dcos
Modern apps with dcos
Sam Chen
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
LeahRachael
 
Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival
Digital Health Enterprise Zone
 
Design of network
Design of networkDesign of network
Design of network
Aniruddh Brahmbhatt
 
Future services on Janet
Future services on JanetFuture services on Janet
Future services on Janet
Jisc
 
20-datacenter-measurements.pptx
20-datacenter-measurements.pptx20-datacenter-measurements.pptx
20-datacenter-measurements.pptx
Steve491226
 
Cluster and Grid Computing
Cluster and Grid ComputingCluster and Grid Computing
Cluster and Grid Computing
Sayed Chhattan Shah
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA Automation
Cisco Canada
 
Why we got to Docker
Why we got to DockerWhy we got to Docker
Why we got to Docker
allingeek
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
Iben Rodriguez
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
Stenio Fernandes
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
Firas Alsayied
 

Similar to Catch Me If You Can - Cloud Foundry Summit Europe 2016 (20)

PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scaleVelocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
2015 04 bio it world
2015 04 bio it world2015 04 bio it world
2015 04 bio it world
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational Perspectives
 
cloud computing
cloud computingcloud computing
cloud computing
 
Modern apps with dcos
Modern apps with dcosModern apps with dcos
Modern apps with dcos
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival
 
Design of network
Design of networkDesign of network
Design of network
 
Future services on Janet
Future services on JanetFuture services on Janet
Future services on Janet
 
20-datacenter-measurements.pptx
20-datacenter-measurements.pptx20-datacenter-measurements.pptx
20-datacenter-measurements.pptx
 
Cluster and Grid Computing
Cluster and Grid ComputingCluster and Grid Computing
Cluster and Grid Computing
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA Automation
 
Why we got to Docker
Why we got to DockerWhy we got to Docker
Why we got to Docker
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 

Recently uploaded

Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 

Recently uploaded (20)

Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 

Catch Me If You Can - Cloud Foundry Summit Europe 2016

  • 1. Catch Me If You Can Outrunning Environmental Adversity with Intelligence at all layers of the OSI Model
  • 2. Introductions • Merlin Glynn mglynn@pivotal.io • Sean Keery skeery@pivotal.io • Keith Strini kstrini@pivotal.io • Special Shout out to Raymond Lee (BDS Team)
  • 3. What if we could improve performance & respond to environmental adversity? APT - A set of stealthy and continuous computer hacking processes, often orchestrated by human(s) targeting a specific entity. DDOS – an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet Spectrum of cyber vulnerability from DDOS to APT Quality of service The overall performance of a computer network, particularly the performance seen by the users of the network. To quantitatively measure quality of service, several related aspects of the network service are often considered, such as error rates, bit rate, throughput, transmission delay, availability, jitter, etc.
  • 4. • Bosh • CF • SDN DSL Agents: Actual State Strategy: Desired State Dynamic Analysis Environment Models Goals (SLA) Predictions (Metrics) DSL Library Learning What this Continuous Improvement over Environmental Adversity looks like..… responses DSLDSL DSLDSLDSL Realize <<no-outage>> <<predictive>> <<reliable>>
  • 6. Use Cases for Demo • DDOS -> Recognize foreign IP/Add ACL via NSX Rest API • QoS -> Detect network throughput deficiency/Add 1 .. N routes • APT -> Recognize foreign IP+Load/Alert Forensics Team Spin up new CF foundation/subnet/data subnet access Add new route Remove forensic route Shutdown data subnet access from forensic foundation Goal: uninterrupted production traffic/UX • DDIL -> Detect network throughput/Identify best cell net throughput Move highest priority workloads to cell Add additional service chaining IAW compliancy outlines to edge Add 1..n routes
  • 7. Where do we go from here …. • Ways to evaluate each deployment • Utilize the inherent abilities of the distributed architecture • Machine learning where each distributed component maintains state, manages itself
  • 8. In Conclusion…Why Now? • The cyber vulnerability problem is imminent • The operations, networking and development teams are finally becoming cohesive units • The capacity to process, interpret and act upon petascale data on any IaaS • All of this is can already be built into the very core of the foundation now – (Diego abstractions, SDN API, Predictive and ML, Streams, Bosh-Enaml).

Editor's Notes

  1. Bullet -> Reactive to Proactive Detecting and analyzing the running behavior Predicting the effect different strategic actions would have on the distributed system when real problems are detected. Bullet -> Intermittency is too fast How often data should be observed The criticality of which data should be sent through intermittent connections. Bullet -> Difficult to exploit opportunities Manual Bosh management of virtualized resources in a server cluster across any IaaS. The overall effect of degraded communications affecting degraded performance in managing the system The more intermittent the communication, the greater the effect on Bosh’s management performance
  2. Bullet -> Co-deploying Co-deploying analytics and the analytics platform within the foundation. System metrics via the fire hose transmits this data from the foundation Interpret those metrics and then select strategies defined in foundation relevant DSLs that provides courses of action (COAs) on how the network it rides on, should adapt to changes. Bullet -> Bosh Adds SDN Components Allow Bosh to add new SDN components dynamically through a process of discovery Bosh continuously would monitor. New components would need to be added to allow Bosh to dynamically reconfigure by providing metadata about those individual components. As the degraded performance was detected and the ability to interact with the degrading foundation fell below desired thresholds, Bosh would execute strategies to heal, adapt, optimize, and defend the system against similarly future degradations. Bullet-> Liberating the control plane from the data plane, SDN enables the foundation to truly adapt (at almost all layers of the OSI model) to changing environment and threat circumstances. “Continuous Advantage” makes it difficult to cause substantial damage without launching a full assault against the infrastructure. To take advantage of this inherent resiliency, we must evolve the ability to take advantage of the dynamic possibilities of SDN into the next phase, coupling it with Predictive Analytics and ML to fully optimize and self-protect the enterprises we are in charge of running.
  3. Bullet -> Evaluate the deployment Determine violations of constraints that were defined for the specific foundation. If anomalies are detected or SLAs violated, programmatically adapt the architecture. DSL based strategies matched and evaluated to determine the best approach to solving the SLA or mitigating the anomaly. Choose the strategy to execute that effects changes to the foundation. System metrics via the fire hose transmits this data from the foundation Interpret those metrics and then select strategies defined in foundation relevant DSLs that provides courses of action (COAs) on how the network it rides on, should adapt to changes. Bullet -> Utilize the distributed architecture Each distributed component would have a state in which it could manage itself Once connectivity was restored, report a total system health back to Bosh. No matter how disconnected the systems become, the foundation would still be able to function. The challenge is the limitation on globally optimizing the foundation to holistically address performance degradation. Bullet -> Machine Learning Size and complexity of Cloud Foundry enterprises are beginning to outstrip the ability of humans to understand and control the maintenance The speed required for effective network optimization is ever increasing. In particular this degradation of performance by predicting the future communication states of the system. To address the effects of degraded communications, metrics could be queried against real time analytics to predict the future state of the system. The predicted constraints could then reason on future state values. In this way, Bosh can anticipate events that would require adaptation and issue commands before they are needed. This pre-emptive strategy would allow the foundation to operate in degraded environments by issuing adaptive strategies in communication windows before they are needed. Such learning approaches can also be applied to make decisions based upon currently monitored states and can be used to detect anomalous operation such as hidden APTs, among other capabilities.