SlideShare a Scribd company logo
ENHANCE VIRTUAL MACHINE
SECURITY IN OPENSTACK USING
SURICATA IPS
NOR ASHILA BINTI MOHD RASHID
BACHELOR OF COMPUTER SCIENCE (COMPUTER NETWORK SECURITY) WITH
HONOURS
MATRIC NO.: 044184
SUPERVISOR: DR. WAN NOR SHUHADAH
OBJECTIVES
• To do research on OpenStack cloud platform and Suricata based
Intrusion Prevention System.
• To configure OpenStack cloud platform.
• To configure Suricata based Intrusion Prevention System.
• To integrate and test OpenStack cloud platform with Suricata
Intrusion Prevention System.
PROBLEMS STATEMENT
• Instances are the individual virtual machines that run on physical compute nodes
inside the cloud. Users can launch any number of instances from the same image. As
known, there are a lot of vulnerabilities appear in the cloud. Then, how to secure our
instances or virtual machine from black hat communities in the cloud?
• Virtual machine is vulnerable to attacks
• Due to many number of intruders rising day by day.
• May potentially be disrupted by DoS attack
• The internet shared resources.
• Security and mechanism at physical network are not able to monitor the traffic over
virtualized network.
SCOPE & FRAMEWORK
(1) Installation of VirtualBox
as the virtual machine.
CentOS 7
Virtual machine
CentOS 7
(2) Installation and configuration
of CentOS 7 in the VirtualBox
(3) Installation and configuration
of OpenStack on Centos 7
(4) Launch virtual machine
based OpenStack
(5) Install and integrate
Suricata with OpenStack
INSTALLATION OF VIRTUALBOX AS THE VIRTUAL
MACHINE.
INSTALLATION AND CONFIGURATION OF CENTOS 7
IN THE VIRTUALBOX
INSTALLATION AND CONFIGURATION OF
OPENSTACK ON CENTOS 7
Install OpenStack using
command line in terminal Centos
7
- install all the OpenStack
Component.
-get the IP address and password
for admin
Using PuTTY to remote access the
OpenStack and get Admin
password.
Open OpenStack dashboard
PROOF OF CONCEPT
LAUNCH VIRTUAL MACHINE BASED OPENSTACK
• Create Instances
1) Instance name
2) Source (Image)
3) Select Image
4) Allocate flavour
Launch Instances
Generate the username
and password by using
PuTTY.
-Using PuTTY gent to create private key based on
public key given in key pairs.
-Using putty to access control to instances using
private key.
Login as user
and install all
the
component
INSTALL AND INTEGRATE SURICATA WITH OPENSTACK
1. Deploy OpenStack with Contrail SDN
that will bring NFV into the cloud.
2. Create a VM image with the Suricata
IDPS installed.
3. Configure the Contrail SDN to run an
IDPS service instance (VNF) and steer
traffic to this instance for further
analysis.
To enable Suricata IDPS as a
virtual network function
(VNF) on OpenStack.
 Go to the Contrail web UI
 Open the Service
Templates panel in
the Configure tab.
 Create an IPS template
service.
NETWORK
PACKET CAPTURE
DECODE & STREAM APPLICATION LAYER
DETECTDETECTDETECT
OUTPUT
Architecture of Suricata
IPS
DATA MODEL
User
VM1
VM2
Firewall
Suricat
aIPS
PASS
DROP
REJECT
ALERT
yes no
Admi
n
Only system administrator can notice this
alert
EXPECTED RESULT
• Improve virtual machine security using Suricata based Intrusion
Prevention System
• Secure Virtual Machine based OpenStack cloud platform.
EXAMPLE OUTPUT
10/06/2012-11:40:49.018377 [Drop] [**] [1:1:0] facebook is blocked [**] [Classification: Potential Corporate Privacy Violation] [Priority: 1]
{TCP} 192.168.122.48:57113 -> 173.252.100.16:80 10/06/2012-11:40:49.020955 [Drop] [**] [1:1:0] facebook is blocked [**] [Classification:
Potential Corporate Privacy Violation]
[Priority: 1] {TCP} 192.168.122.48:57114 -> 173.252.100.16:80 10/06/2012-11:40:51.991876 [Drop] [**] [1:1:0] facebook is blocked [**]
[Classification: Potential Corporate Privacy Violation] [Priority: 1] {TCP} 192.168.122.48:57115 -> 173.252.100.16:80
Create local.rules in /etc/suricata/rules/ using a text editor.
drop tcp any any -> any any (msg:"facebook is blocked"; content:"facebook.com";
http_header; nocase; classtype:policy-violation; sid:1;)
Restart Suricata:
service suricata restart
Now open Firefox, and try to go to http://www.facebook.com/, the
request should time out.
The logfile /var/log/suricata/fast.log will have:
REFERENCES
• 1. https://geek-university.com/oracle-virtualbox/what-is-oracle-vm-virtualbox/
• 2.https://pdfs.semanticscholar.org/9f1d/635bf58d80cf15b89ab99fb2d17bcbca6d0b.p
df?_ga=2.115730752.794654359.1544485224-1575586317.1544485224
• 3. https://docs.openstack.org/security-guide/introduction/introduction-to-
openstack.html
• 4. https://hub.packtpub.com/openstack-networking-nutshell/amp/
• 5. https://www.centosblog.com/what-is-centos/
• 6. file:///C:/Users/user/Downloads/SnortandSuricataIDPStoolsoverview-
RomanFekolkin.pdf
• 7. https://docs.openstack.org/security-guide/networking/securing-services.html

More Related Content

What's hot

Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
MD. SHORIFUL ISLAM
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
Jothi Lakshmi
 
Snort
SnortSnort
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones
Fatih Ozavci
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security models
G Prachi
 
Embedded linux network device driver development
Embedded linux network device driver developmentEmbedded linux network device driver development
Embedded linux network device driver development
Amr Ali (ISTQB CTAL Full, CSM, ITIL Foundation)
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)
shashikant pabari
 
DNS Configuration
DNS ConfigurationDNS Configuration
DNS Configuration
Vinod Gour
 
Browsing Linux Kernel Source
Browsing Linux Kernel SourceBrowsing Linux Kernel Source
Browsing Linux Kernel Source
Motaz Saad
 
Socket System Calls
Socket System CallsSocket System Calls
Socket System Calls
Avinash Varma Kalidindi
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
Alok Tripathi
 
Linux Programming
Linux ProgrammingLinux Programming
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
saurav kumar mourya
 
Linux Memory Management with CMA (Contiguous Memory Allocator)
Linux Memory Management with CMA (Contiguous Memory Allocator)Linux Memory Management with CMA (Contiguous Memory Allocator)
Linux Memory Management with CMA (Contiguous Memory Allocator)
Pankaj Suryawanshi
 
DPDK & Layer 4 Packet Processing
DPDK & Layer 4 Packet ProcessingDPDK & Layer 4 Packet Processing
DPDK & Layer 4 Packet Processing
Michelle Holley
 
Nmap basics
Nmap basicsNmap basics
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
Coursenvy.com
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
rjain51
 
Herramientas de monitorización de flujos ¿Qué tenemos? ¿Qué necesitamos?
Herramientas de monitorización de flujos ¿Qué tenemos? ¿Qué necesitamos?Herramientas de monitorización de flujos ¿Qué tenemos? ¿Qué necesitamos?
Herramientas de monitorización de flujos ¿Qué tenemos? ¿Qué necesitamos?
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Process management
Process managementProcess management
Process management
Akshay Ithape
 

What's hot (20)

Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Snort
SnortSnort
Snort
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security models
 
Embedded linux network device driver development
Embedded linux network device driver developmentEmbedded linux network device driver development
Embedded linux network device driver development
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)
 
DNS Configuration
DNS ConfigurationDNS Configuration
DNS Configuration
 
Browsing Linux Kernel Source
Browsing Linux Kernel SourceBrowsing Linux Kernel Source
Browsing Linux Kernel Source
 
Socket System Calls
Socket System CallsSocket System Calls
Socket System Calls
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Linux Programming
Linux ProgrammingLinux Programming
Linux Programming
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 
Linux Memory Management with CMA (Contiguous Memory Allocator)
Linux Memory Management with CMA (Contiguous Memory Allocator)Linux Memory Management with CMA (Contiguous Memory Allocator)
Linux Memory Management with CMA (Contiguous Memory Allocator)
 
DPDK & Layer 4 Packet Processing
DPDK & Layer 4 Packet ProcessingDPDK & Layer 4 Packet Processing
DPDK & Layer 4 Packet Processing
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Herramientas de monitorización de flujos ¿Qué tenemos? ¿Qué necesitamos?
Herramientas de monitorización de flujos ¿Qué tenemos? ¿Qué necesitamos?Herramientas de monitorización de flujos ¿Qué tenemos? ¿Qué necesitamos?
Herramientas de monitorización de flujos ¿Qué tenemos? ¿Qué necesitamos?
 
Process management
Process managementProcess management
Process management
 

Similar to Enhance Virtual Machine Security in OpenStack Using Suricata IPS

New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
Iben Rodriguez
 
Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...
Joel W. King
 
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Disha Bedi
 
OpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information ExchangeOpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information Exchange
Cybera Inc.
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Network
ijtsrd
 
666 670
666 670666 670
Io t security and azure sphere
Io t security and azure sphereIo t security and azure sphere
Io t security and azure sphere
Pushkar Saraf
 
Openstack_administration
Openstack_administrationOpenstack_administration
Openstack_administration
Ashish Sharma
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsx
solarisyougood
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
Kumar Gaurav
 
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
OpenStack Korea Community
 
Fiware cloud developers week brussels
Fiware cloud developers week brusselsFiware cloud developers week brussels
Fiware cloud developers week brussels
Fernando Lopez Aguilar
 
5 cisco open_stack
5 cisco open_stack5 cisco open_stack
5 cisco open_stack
openstackindia
 
Inherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV DeploymentsInherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV Deployments
OPNFV
 
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld
 
Handouts for east coast hands on exercises v1
Handouts for east coast hands on exercises v1Handouts for east coast hands on exercises v1
Handouts for east coast hands on exercises v1
ozkan01
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
David kankam
 
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
IGedeArieYogantaraSu
 
Opensource tools for OpenStack IAAS
Opensource tools for OpenStack IAASOpensource tools for OpenStack IAAS
Opensource tools for OpenStack IAAS
Satya Sanjibani Routray
 
Cisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution BriefCisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution Brief
LiveAction Next Generation Network Management Software
 

Similar to Enhance Virtual Machine Security in OpenStack Using Suricata IPS (20)

New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
 
Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...
 
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
 
OpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information ExchangeOpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information Exchange
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Network
 
666 670
666 670666 670
666 670
 
Io t security and azure sphere
Io t security and azure sphereIo t security and azure sphere
Io t security and azure sphere
 
Openstack_administration
Openstack_administrationOpenstack_administration
Openstack_administration
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsx
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
 
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
 
Fiware cloud developers week brussels
Fiware cloud developers week brusselsFiware cloud developers week brussels
Fiware cloud developers week brussels
 
5 cisco open_stack
5 cisco open_stack5 cisco open_stack
5 cisco open_stack
 
Inherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV DeploymentsInherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV Deployments
 
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
 
Handouts for east coast hands on exercises v1
Handouts for east coast hands on exercises v1Handouts for east coast hands on exercises v1
Handouts for east coast hands on exercises v1
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
 
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
 
Opensource tools for OpenStack IAAS
Opensource tools for OpenStack IAASOpensource tools for OpenStack IAAS
Opensource tools for OpenStack IAAS
 
Cisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution BriefCisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution Brief
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 

Enhance Virtual Machine Security in OpenStack Using Suricata IPS

  • 1. ENHANCE VIRTUAL MACHINE SECURITY IN OPENSTACK USING SURICATA IPS NOR ASHILA BINTI MOHD RASHID BACHELOR OF COMPUTER SCIENCE (COMPUTER NETWORK SECURITY) WITH HONOURS MATRIC NO.: 044184 SUPERVISOR: DR. WAN NOR SHUHADAH
  • 2. OBJECTIVES • To do research on OpenStack cloud platform and Suricata based Intrusion Prevention System. • To configure OpenStack cloud platform. • To configure Suricata based Intrusion Prevention System. • To integrate and test OpenStack cloud platform with Suricata Intrusion Prevention System.
  • 3. PROBLEMS STATEMENT • Instances are the individual virtual machines that run on physical compute nodes inside the cloud. Users can launch any number of instances from the same image. As known, there are a lot of vulnerabilities appear in the cloud. Then, how to secure our instances or virtual machine from black hat communities in the cloud? • Virtual machine is vulnerable to attacks • Due to many number of intruders rising day by day. • May potentially be disrupted by DoS attack • The internet shared resources. • Security and mechanism at physical network are not able to monitor the traffic over virtualized network.
  • 5. (1) Installation of VirtualBox as the virtual machine. CentOS 7 Virtual machine CentOS 7 (2) Installation and configuration of CentOS 7 in the VirtualBox (3) Installation and configuration of OpenStack on Centos 7 (4) Launch virtual machine based OpenStack (5) Install and integrate Suricata with OpenStack
  • 6. INSTALLATION OF VIRTUALBOX AS THE VIRTUAL MACHINE.
  • 7. INSTALLATION AND CONFIGURATION OF CENTOS 7 IN THE VIRTUALBOX
  • 8. INSTALLATION AND CONFIGURATION OF OPENSTACK ON CENTOS 7 Install OpenStack using command line in terminal Centos 7 - install all the OpenStack Component. -get the IP address and password for admin Using PuTTY to remote access the OpenStack and get Admin password. Open OpenStack dashboard
  • 10.
  • 11. LAUNCH VIRTUAL MACHINE BASED OPENSTACK • Create Instances 1) Instance name 2) Source (Image) 3) Select Image 4) Allocate flavour Launch Instances Generate the username and password by using PuTTY. -Using PuTTY gent to create private key based on public key given in key pairs. -Using putty to access control to instances using private key. Login as user and install all the component
  • 12. INSTALL AND INTEGRATE SURICATA WITH OPENSTACK 1. Deploy OpenStack with Contrail SDN that will bring NFV into the cloud. 2. Create a VM image with the Suricata IDPS installed. 3. Configure the Contrail SDN to run an IDPS service instance (VNF) and steer traffic to this instance for further analysis. To enable Suricata IDPS as a virtual network function (VNF) on OpenStack.  Go to the Contrail web UI  Open the Service Templates panel in the Configure tab.  Create an IPS template service.
  • 13.
  • 14. NETWORK PACKET CAPTURE DECODE & STREAM APPLICATION LAYER DETECTDETECTDETECT OUTPUT Architecture of Suricata IPS
  • 16. EXPECTED RESULT • Improve virtual machine security using Suricata based Intrusion Prevention System • Secure Virtual Machine based OpenStack cloud platform.
  • 17. EXAMPLE OUTPUT 10/06/2012-11:40:49.018377 [Drop] [**] [1:1:0] facebook is blocked [**] [Classification: Potential Corporate Privacy Violation] [Priority: 1] {TCP} 192.168.122.48:57113 -> 173.252.100.16:80 10/06/2012-11:40:49.020955 [Drop] [**] [1:1:0] facebook is blocked [**] [Classification: Potential Corporate Privacy Violation] [Priority: 1] {TCP} 192.168.122.48:57114 -> 173.252.100.16:80 10/06/2012-11:40:51.991876 [Drop] [**] [1:1:0] facebook is blocked [**] [Classification: Potential Corporate Privacy Violation] [Priority: 1] {TCP} 192.168.122.48:57115 -> 173.252.100.16:80 Create local.rules in /etc/suricata/rules/ using a text editor. drop tcp any any -> any any (msg:"facebook is blocked"; content:"facebook.com"; http_header; nocase; classtype:policy-violation; sid:1;) Restart Suricata: service suricata restart Now open Firefox, and try to go to http://www.facebook.com/, the request should time out. The logfile /var/log/suricata/fast.log will have:
  • 18. REFERENCES • 1. https://geek-university.com/oracle-virtualbox/what-is-oracle-vm-virtualbox/ • 2.https://pdfs.semanticscholar.org/9f1d/635bf58d80cf15b89ab99fb2d17bcbca6d0b.p df?_ga=2.115730752.794654359.1544485224-1575586317.1544485224 • 3. https://docs.openstack.org/security-guide/introduction/introduction-to- openstack.html • 4. https://hub.packtpub.com/openstack-networking-nutshell/amp/ • 5. https://www.centosblog.com/what-is-centos/ • 6. file:///C:/Users/user/Downloads/SnortandSuricataIDPStoolsoverview- RomanFekolkin.pdf • 7. https://docs.openstack.org/security-guide/networking/securing-services.html