We used your IP address to guess your location. If we got it wrong, please change your campus here for local results.
Search all of UITS.iu.edu for services, departments, or workshops.
Duke University's Richard Biever and Charley Kneifel present.
Over the past 4 years, Duke has established SDN bypass networks, an SDN mediated Science DMZ, and other services that rely on identity data about the users and the equipment at Duke. One such service is the Protected Research and Data Network (PRDN), which makes use of our Identity Management (IDM) services both for Duke researchers and their collaborators at other institutions.
In this presentation we will discuss the path that Duke took to implement our network, link the various pieces together and the security model used to protect the network and detect unusual activity. Web based access to services provided inside of our PRDN allow for simple implementation of multi-factor authentication and we will present some novel methods for providing access to both Windows and Linux services inside of a browser. We will also discuss Plexus, our Ryu based SDN controller, and our plans around the firewall/proxy management application, Locutus, that allows us to support multiple controllers in different spaces of our network (alternative to flow space firewall). A short discussion of our ability to integrate with GENI/exoGENI sevices, AL2S, and our regional SDN project will be included.
More information about this presentation is on the event page.
The Center for Trustworthy Scientific Cyberinfrastructure (CTSC) announces the Cybersecurity Center of Excellence (CCOE)Webinar Series to fulfill their mission of providing readily available cybersecurity services tailored to the NSF science community.
The webinars are recorded and will be linked to this page for later viewing. Each webinar includes time for questions from attendees, so please join the live webinar if you are able. They use Adobe Connect to conduct the webinars (test your connection, Adobe add-in not required for participants). Participant lines are muted. They provide a chat box for participant questions.
Upcoming topics are communicated on their blog. If you have questions or comments after the webinar, please join their discussion mailing list. To submit topics or request to present, contact them here.
As the National Science Foundation Cybersecurity Center of Excellence, CTSC draws on expertise from multiple internationally recognized institutions, including Indiana University Pervasive Technology Institute, the University of Illinois, the University of Wisconsin-Madison, and the Pittsburgh Supercomputing Center. Drawing on this expertise, CTSC collaborates with NSF-funded research organizations to focus on addressing the unique cybersecurity challenges faced by such entities. In addition to our leadership team, a world-class CTSC Advisory Committee adds its experience and a critical eye to the center's strategic decision-making.