SlideShare a Scribd company logo
Open Source Private Cloud
Management with OpenStack and
Security Evaluation with
Intrusion Detection/Prevention
Systems
Penetration Testing for Evaluation
of Cloud’s Security
05/07/2016
1
Taking a sneak peek on cloud
computing definition
• Key technology for sharing resources
• Web as a space where computing has been
preinstalled and exists as a service
Data centres, storage, operating systems,
applications and processing power ALL shared
on the web.
05/07/2016
2
Virtualization in Cloud Systems
• Almost complete simulation of the actual
Hardware to allow Software to run unmodified
• Example: We have a desktop computer with
Ubuntu OS and with virtualization technology
we can run another Ubuntu OS, inside the Host
machine, as a complete fully functional second
desktop computer inside ours
05/07/2016
3
How is cloud connected to
virtualization?
• Easy to understand. Cloud Computing provides:
on-demand resources and dynamically
Virtualization provides : on-demand resources
(you can create a virtual machine whenever you
need or delete one) and dynamically (change
your resources as you like, example 1) CPU, 2)
CPUs, 3) CPUs
05/07/2016
4
Our Project’s Goal !
• Create a Cloud using virtualization Hardware
• Specifically Using OpenStack Cloud
Management System
• Secure our Cloud System with Security software
and tools
05/07/2016
5
Architecture of our Cloud System(1)
• Initial plan
• 3 virtualized OpenStack nodes
• 1 OSSEC server monitoring the physical network
and servers, plus the virtualized network and
servers
• Deployment of Fortification/security measures
on the physical and virtualized Servers
• Testing by means of offense
05/07/2016
6
• OpenStack Networking (Neutron) Architecture
• OSSEC server-client architecture
05/07/2016
7
Architecture of our Cloud Systems(2)
• Final plan:
• 1 virtualized OpenStack node
• 1virtualized OSSEC server
• Deployment of Fortification/security measures
on the physical and virtualized Servers
• Testing by means of offense
05/07/2016
8
• DevStack OpenStack Cloud Management
Architecture
• OSSEC server-client architecture
05/07/2016
9
OSSEC Features
• File integrity checking
• Log Monitoring
• Rootkit Detection
• Active Response
05/07/2016
10
OSSEC Compliance Requirements
• Detect + Alerts
Reasons :
• Unauthorized filesystem modifications
• Malicious behaviour in log files
05/07/2016
11
Fortification/security measures of
servers
• SSH configurations for high security
• Firewall rules modifications for inbound traffic
• Iptables rules modifications
• Apache server security hardening with Mod
Security
• Logwatch for the operating systems
• Rkhunter rootkit scanner
05/07/2016
12
Attacking Scenario No.1
• Sqlmap toolset.
• This tool focuses primarily on exploiting an SQL
database.
• The Goal of this test was to check if our Cloud
has any vulnerabilities against SQL attack
methods, like SQL injections.
• Example attack command:
• python sqlmap.py -u
"http://www.site.com/section.php?id=51"
05/07/2016
13
• The next method of attack is by sqlmap again
trying to reach any database entries from the
Dashboard (Horizon)
• The example command is:
• Sqlmap –u “http://192.168.100.50” --db
05/07/2016
14
Attacking Scenario No.2
• THC Hydra toolset
• This tool focuses on cracking login information
• It supports quite plenty of protocols, such as
HTTP, HTTPS, SFTP, SSH (v1 and v2) SSHKEY,
POSTGRE and etc.
• A first method of attack is by trying to attempt
logging in as a root user on an SSH server.
• #hydra –l root –P
/usr/share/wordlists/metasploit/unix_passwor
ds.txt –t 6 ssh://192.168.100.50
05/07/2016
15
Security Evaluation of our Cloud
• It endured any attack from the two scenarios.
• This means the fortification is quite satisfying
• Unfortunately there were not more attacking
methods in order to cover a larger area of
security issues.
The result is : Our Private DevStack Cloud has
achieved to stand against threats.
GOALS ACHIEVED!
05/07/2016
16
Conclusions
• There is no “Best Security Strategy” for a Cloud
System.
• To secure a Cloud we shall:
Be open-minded, adopt and other security
products, methods used by others.
Fuse our strategy with other existing effective
strategies.
Bear in mind, one wooden stick can be broken, 20
wooden sticks, will never be broken, or even
worse, bend.
05/07/2016
17
Conclusions
• Securing the Cloud’s infrastructure is sensible.
• Securing the probable Servers hosting Cloud’s
components is sensible.
• INSENSIBLE would be if only securing one of
these two.
• Nevertheless, our project scope was to deploy
security measures on the Servers of the Cloud.
• However, future work, shall be to research,
design and deploy the security technologies on
the Cloud’s platform.
05/07/2016
18
Conclusions
• Final step :
Deploy and implement complementary security
technologies on the Cloud too.
At last, after a lot of effort, it shall be ready for
migration to real environment.
05/07/2016
19

More Related Content

What's hot (20)

PDF
The Ubuntu OpenStack interoperability lab - Proven integration testing Nicola...
Cloud Native Day Tel Aviv
 
PDF
Mastering OpenStack - Episode 04 - Provisioning and Deployment
Roozbeh Shafiee
 
PDF
Mastering OpenStack - Episode 09 - Storage Decisions
Roozbeh Shafiee
 
PDF
Mastering OpenStack - Episode 10 - Storage Decisions
Roozbeh Shafiee
 
PDF
Define your Future with SUSE
SUSE
 
PDF
Securing OpenStack and Beyond with Ansible
Major Hayden
 
PDF
Mastering OpenStack - Episode 15 - Network Design
Roozbeh Shafiee
 
PPTX
SDN Symposium - Cybera
Edgar Magana
 
PDF
Automating hard things may 2015
Mark Baker
 
PPTX
CloudStack and the HeartBleed vulnerability
John Kinsella
 
PDF
Dell openstack cloud with inktank ceph – large scale customer deployment
Kamesh Pemmaraju
 
PDF
The Environment for Innovation: Tristan Goode, Aptira
OpenStack
 
PDF
Things You MUST Know Before Deploying OpenStack: Bruno Lago, Catalyst IT
OpenStack
 
PDF
OpenStack Benelux - Cloud, OpenStack and a Market In Motion - Sept 2015final
John Zannos
 
PDF
Infrastructure as Code 101: Steve Tegeler + Nathan Ness, VMware
OpenStack
 
PPTX
Successfully Deliver and Operate OpenStack in Production with VMware VIO
Arraya Solutions
 
PDF
The 'Untold' OpenStack Enterprise Customer Stories: Anthony Rees & Alex Tesch...
OpenStack
 
PDF
Openstack lab environment Virtualbox (English)
Abderrahmane TEKFI
 
PDF
Xen Project on SUSE OpenStack Cloud
The Linux Foundation
 
PPTX
Cisco deploying openstack with UCS
solarisyougood
 
The Ubuntu OpenStack interoperability lab - Proven integration testing Nicola...
Cloud Native Day Tel Aviv
 
Mastering OpenStack - Episode 04 - Provisioning and Deployment
Roozbeh Shafiee
 
Mastering OpenStack - Episode 09 - Storage Decisions
Roozbeh Shafiee
 
Mastering OpenStack - Episode 10 - Storage Decisions
Roozbeh Shafiee
 
Define your Future with SUSE
SUSE
 
Securing OpenStack and Beyond with Ansible
Major Hayden
 
Mastering OpenStack - Episode 15 - Network Design
Roozbeh Shafiee
 
SDN Symposium - Cybera
Edgar Magana
 
Automating hard things may 2015
Mark Baker
 
CloudStack and the HeartBleed vulnerability
John Kinsella
 
Dell openstack cloud with inktank ceph – large scale customer deployment
Kamesh Pemmaraju
 
The Environment for Innovation: Tristan Goode, Aptira
OpenStack
 
Things You MUST Know Before Deploying OpenStack: Bruno Lago, Catalyst IT
OpenStack
 
OpenStack Benelux - Cloud, OpenStack and a Market In Motion - Sept 2015final
John Zannos
 
Infrastructure as Code 101: Steve Tegeler + Nathan Ness, VMware
OpenStack
 
Successfully Deliver and Operate OpenStack in Production with VMware VIO
Arraya Solutions
 
The 'Untold' OpenStack Enterprise Customer Stories: Anthony Rees & Alex Tesch...
OpenStack
 
Openstack lab environment Virtualbox (English)
Abderrahmane TEKFI
 
Xen Project on SUSE OpenStack Cloud
The Linux Foundation
 
Cisco deploying openstack with UCS
solarisyougood
 

Viewers also liked (11)

PDF
Architecture Challenges In Cloud Computing
IndicThreads
 
PPTX
Anomaly Detection
guest0edcaf
 
PPTX
Analysis and Design for Intrusion Detection System Based on Data Mining
Pritesh Ranjan
 
PDF
Network Functions Virtualization – Our Strategy
ADVA
 
PPTX
Multithreading: Exploiting Thread-Level Parallelism to Improve Uniprocessor ...
Ahmed kasim
 
PPTX
FIne Grain Multithreading
Dharmesh Tank
 
PPTX
Update Your Disaster Recovery Plans with Virtualization
Jason Dea
 
PPTX
Disaster recovery and the cloud
Jason Dea
 
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
PDF
Lisa14
Dan Lambright
 
PPT
Cloud computing simple ppt
Agarwaljay
 
Architecture Challenges In Cloud Computing
IndicThreads
 
Anomaly Detection
guest0edcaf
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Pritesh Ranjan
 
Network Functions Virtualization – Our Strategy
ADVA
 
Multithreading: Exploiting Thread-Level Parallelism to Improve Uniprocessor ...
Ahmed kasim
 
FIne Grain Multithreading
Dharmesh Tank
 
Update Your Disaster Recovery Plans with Virtualization
Jason Dea
 
Disaster recovery and the cloud
Jason Dea
 
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
Cloud computing simple ppt
Agarwaljay
 
Ad

Similar to Open Source Private Cloud Management with OpenStack and Security Evaluation with Intrusion Detection/ Prevention Systems (20)

PPTX
Flexible compute
Peter Clapham
 
PPTX
Sanger, upcoming Openstack for Bio-informaticians
Peter Clapham
 
PPTX
Container Security
Paul Cichonski
 
PPTX
HPC and cloud distributed computing, as a journey
Peter Clapham
 
PPTX
What is the OpenStack Platform? By Peter Dens - Kangaroot
Kangaroot
 
PPTX
An Evaluation of OpenStack Deployment Frameworks
shane_gibson
 
PPTX
OpenStack Enabling DevOps
Cisco DevNet
 
PPTX
Openstack components as containerized microservices
Miguel Zuniga
 
PPTX
Storage as a service and OpenStack Cinder
openstackindia
 
PDF
Open stack
svm
 
PPTX
Utilizing Public AND Private Clouds with Bright Cluster Manager
Ian Lumb
 
PPTX
A Survey of Container Security in 2016: A Security Update on Container Platforms
Salman Baset
 
PDF
Openstack 101
Kamesh Pemmaraju
 
PPTX
OpenStack 101 - All Things Open 2015
Mark Voelker
 
PPTX
OpenStack 101
All Things Open
 
PPTX
Private cloud cloud-phoenix-april-2014
Miguel Zuniga
 
PPTX
The Unbearable Lightness of Ephemeral Processing
DataWorks Summit
 
PDF
StarlingX - Project Onboarding
Shuquan Huang
 
PPTX
Opensource tools for OpenStack IAAS
Satya Sanjibani Routray
 
PPT
Openstack - An introduction/Installation - Presented at Dr Dobb's conference...
Rahul Krishna Upadhyaya
 
Flexible compute
Peter Clapham
 
Sanger, upcoming Openstack for Bio-informaticians
Peter Clapham
 
Container Security
Paul Cichonski
 
HPC and cloud distributed computing, as a journey
Peter Clapham
 
What is the OpenStack Platform? By Peter Dens - Kangaroot
Kangaroot
 
An Evaluation of OpenStack Deployment Frameworks
shane_gibson
 
OpenStack Enabling DevOps
Cisco DevNet
 
Openstack components as containerized microservices
Miguel Zuniga
 
Storage as a service and OpenStack Cinder
openstackindia
 
Open stack
svm
 
Utilizing Public AND Private Clouds with Bright Cluster Manager
Ian Lumb
 
A Survey of Container Security in 2016: A Security Update on Container Platforms
Salman Baset
 
Openstack 101
Kamesh Pemmaraju
 
OpenStack 101 - All Things Open 2015
Mark Voelker
 
OpenStack 101
All Things Open
 
Private cloud cloud-phoenix-april-2014
Miguel Zuniga
 
The Unbearable Lightness of Ephemeral Processing
DataWorks Summit
 
StarlingX - Project Onboarding
Shuquan Huang
 
Opensource tools for OpenStack IAAS
Satya Sanjibani Routray
 
Openstack - An introduction/Installation - Presented at Dr Dobb's conference...
Rahul Krishna Upadhyaya
 
Ad

Recently uploaded (20)

PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 

Open Source Private Cloud Management with OpenStack and Security Evaluation with Intrusion Detection/ Prevention Systems

  • 1. Open Source Private Cloud Management with OpenStack and Security Evaluation with Intrusion Detection/Prevention Systems Penetration Testing for Evaluation of Cloud’s Security 05/07/2016 1
  • 2. Taking a sneak peek on cloud computing definition • Key technology for sharing resources • Web as a space where computing has been preinstalled and exists as a service Data centres, storage, operating systems, applications and processing power ALL shared on the web. 05/07/2016 2
  • 3. Virtualization in Cloud Systems • Almost complete simulation of the actual Hardware to allow Software to run unmodified • Example: We have a desktop computer with Ubuntu OS and with virtualization technology we can run another Ubuntu OS, inside the Host machine, as a complete fully functional second desktop computer inside ours 05/07/2016 3
  • 4. How is cloud connected to virtualization? • Easy to understand. Cloud Computing provides: on-demand resources and dynamically Virtualization provides : on-demand resources (you can create a virtual machine whenever you need or delete one) and dynamically (change your resources as you like, example 1) CPU, 2) CPUs, 3) CPUs 05/07/2016 4
  • 5. Our Project’s Goal ! • Create a Cloud using virtualization Hardware • Specifically Using OpenStack Cloud Management System • Secure our Cloud System with Security software and tools 05/07/2016 5
  • 6. Architecture of our Cloud System(1) • Initial plan • 3 virtualized OpenStack nodes • 1 OSSEC server monitoring the physical network and servers, plus the virtualized network and servers • Deployment of Fortification/security measures on the physical and virtualized Servers • Testing by means of offense 05/07/2016 6
  • 7. • OpenStack Networking (Neutron) Architecture • OSSEC server-client architecture 05/07/2016 7
  • 8. Architecture of our Cloud Systems(2) • Final plan: • 1 virtualized OpenStack node • 1virtualized OSSEC server • Deployment of Fortification/security measures on the physical and virtualized Servers • Testing by means of offense 05/07/2016 8
  • 9. • DevStack OpenStack Cloud Management Architecture • OSSEC server-client architecture 05/07/2016 9
  • 10. OSSEC Features • File integrity checking • Log Monitoring • Rootkit Detection • Active Response 05/07/2016 10
  • 11. OSSEC Compliance Requirements • Detect + Alerts Reasons : • Unauthorized filesystem modifications • Malicious behaviour in log files 05/07/2016 11
  • 12. Fortification/security measures of servers • SSH configurations for high security • Firewall rules modifications for inbound traffic • Iptables rules modifications • Apache server security hardening with Mod Security • Logwatch for the operating systems • Rkhunter rootkit scanner 05/07/2016 12
  • 13. Attacking Scenario No.1 • Sqlmap toolset. • This tool focuses primarily on exploiting an SQL database. • The Goal of this test was to check if our Cloud has any vulnerabilities against SQL attack methods, like SQL injections. • Example attack command: • python sqlmap.py -u "http://www.site.com/section.php?id=51" 05/07/2016 13
  • 14. • The next method of attack is by sqlmap again trying to reach any database entries from the Dashboard (Horizon) • The example command is: • Sqlmap –u “http://192.168.100.50” --db 05/07/2016 14
  • 15. Attacking Scenario No.2 • THC Hydra toolset • This tool focuses on cracking login information • It supports quite plenty of protocols, such as HTTP, HTTPS, SFTP, SSH (v1 and v2) SSHKEY, POSTGRE and etc. • A first method of attack is by trying to attempt logging in as a root user on an SSH server. • #hydra –l root –P /usr/share/wordlists/metasploit/unix_passwor ds.txt –t 6 ssh://192.168.100.50 05/07/2016 15
  • 16. Security Evaluation of our Cloud • It endured any attack from the two scenarios. • This means the fortification is quite satisfying • Unfortunately there were not more attacking methods in order to cover a larger area of security issues. The result is : Our Private DevStack Cloud has achieved to stand against threats. GOALS ACHIEVED! 05/07/2016 16
  • 17. Conclusions • There is no “Best Security Strategy” for a Cloud System. • To secure a Cloud we shall: Be open-minded, adopt and other security products, methods used by others. Fuse our strategy with other existing effective strategies. Bear in mind, one wooden stick can be broken, 20 wooden sticks, will never be broken, or even worse, bend. 05/07/2016 17
  • 18. Conclusions • Securing the Cloud’s infrastructure is sensible. • Securing the probable Servers hosting Cloud’s components is sensible. • INSENSIBLE would be if only securing one of these two. • Nevertheless, our project scope was to deploy security measures on the Servers of the Cloud. • However, future work, shall be to research, design and deploy the security technologies on the Cloud’s platform. 05/07/2016 18
  • 19. Conclusions • Final step : Deploy and implement complementary security technologies on the Cloud too. At last, after a lot of effort, it shall be ready for migration to real environment. 05/07/2016 19