SlideShare a Scribd company logo
Open Source Private Cloud
Management with OpenStack and
Security Evaluation with
Intrusion Detection/Prevention
Systems
Penetration Testing for Evaluation
of Cloud’s Security
05/07/2016
1
Taking a sneak peek on cloud
computing definition
• Key technology for sharing resources
• Web as a space where computing has been
preinstalled and exists as a service
Data centres, storage, operating systems,
applications and processing power ALL shared
on the web.
05/07/2016
2
Virtualization in Cloud Systems
• Almost complete simulation of the actual
Hardware to allow Software to run unmodified
• Example: We have a desktop computer with
Ubuntu OS and with virtualization technology
we can run another Ubuntu OS, inside the Host
machine, as a complete fully functional second
desktop computer inside ours
05/07/2016
3
How is cloud connected to
virtualization?
• Easy to understand. Cloud Computing provides:
on-demand resources and dynamically
Virtualization provides : on-demand resources
(you can create a virtual machine whenever you
need or delete one) and dynamically (change
your resources as you like, example 1) CPU, 2)
CPUs, 3) CPUs
05/07/2016
4
Our Project’s Goal !
• Create a Cloud using virtualization Hardware
• Specifically Using OpenStack Cloud
Management System
• Secure our Cloud System with Security software
and tools
05/07/2016
5
Architecture of our Cloud System(1)
• Initial plan
• 3 virtualized OpenStack nodes
• 1 OSSEC server monitoring the physical network
and servers, plus the virtualized network and
servers
• Deployment of Fortification/security measures
on the physical and virtualized Servers
• Testing by means of offense
05/07/2016
6
• OpenStack Networking (Neutron) Architecture
• OSSEC server-client architecture
05/07/2016
7
Architecture of our Cloud Systems(2)
• Final plan:
• 1 virtualized OpenStack node
• 1virtualized OSSEC server
• Deployment of Fortification/security measures
on the physical and virtualized Servers
• Testing by means of offense
05/07/2016
8
• DevStack OpenStack Cloud Management
Architecture
• OSSEC server-client architecture
05/07/2016
9
OSSEC Features
• File integrity checking
• Log Monitoring
• Rootkit Detection
• Active Response
05/07/2016
10
OSSEC Compliance Requirements
• Detect + Alerts
Reasons :
• Unauthorized filesystem modifications
• Malicious behaviour in log files
05/07/2016
11
Fortification/security measures of
servers
• SSH configurations for high security
• Firewall rules modifications for inbound traffic
• Iptables rules modifications
• Apache server security hardening with Mod
Security
• Logwatch for the operating systems
• Rkhunter rootkit scanner
05/07/2016
12
Attacking Scenario No.1
• Sqlmap toolset.
• This tool focuses primarily on exploiting an SQL
database.
• The Goal of this test was to check if our Cloud
has any vulnerabilities against SQL attack
methods, like SQL injections.
• Example attack command:
• python sqlmap.py -u
"http://www.site.com/section.php?id=51"
05/07/2016
13
• The next method of attack is by sqlmap again
trying to reach any database entries from the
Dashboard (Horizon)
• The example command is:
• Sqlmap –u “http://192.168.100.50” --db
05/07/2016
14
Attacking Scenario No.2
• THC Hydra toolset
• This tool focuses on cracking login information
• It supports quite plenty of protocols, such as
HTTP, HTTPS, SFTP, SSH (v1 and v2) SSHKEY,
POSTGRE and etc.
• A first method of attack is by trying to attempt
logging in as a root user on an SSH server.
• #hydra –l root –P
/usr/share/wordlists/metasploit/unix_passwor
ds.txt –t 6 ssh://192.168.100.50
05/07/2016
15
Security Evaluation of our Cloud
• It endured any attack from the two scenarios.
• This means the fortification is quite satisfying
• Unfortunately there were not more attacking
methods in order to cover a larger area of
security issues.
The result is : Our Private DevStack Cloud has
achieved to stand against threats.
GOALS ACHIEVED!
05/07/2016
16
Conclusions
• There is no “Best Security Strategy” for a Cloud
System.
• To secure a Cloud we shall:
Be open-minded, adopt and other security
products, methods used by others.
Fuse our strategy with other existing effective
strategies.
Bear in mind, one wooden stick can be broken, 20
wooden sticks, will never be broken, or even
worse, bend.
05/07/2016
17
Conclusions
• Securing the Cloud’s infrastructure is sensible.
• Securing the probable Servers hosting Cloud’s
components is sensible.
• INSENSIBLE would be if only securing one of
these two.
• Nevertheless, our project scope was to deploy
security measures on the Servers of the Cloud.
• However, future work, shall be to research,
design and deploy the security technologies on
the Cloud’s platform.
05/07/2016
18
Conclusions
• Final step :
Deploy and implement complementary security
technologies on the Cloud too.
At last, after a lot of effort, it shall be ready for
migration to real environment.
05/07/2016
19

More Related Content

PDF
Flexible, simple deployments with OpenStack-Ansible
PDF
OpenStack-Ansible Security
PPTX
Deploying OpenStack with Ansible
PPTX
Intro to OpenStack
PDF
OpenNebulaConf2018 - UCLouvain Case Study: VDI for 37,000 students with OpenN...
PDF
Simple flexible deployments with openstack ansible
PPTX
Open source integrated infra structure using ansible configuration management
PPTX
VIO30 Technical Overview
Flexible, simple deployments with OpenStack-Ansible
OpenStack-Ansible Security
Deploying OpenStack with Ansible
Intro to OpenStack
OpenNebulaConf2018 - UCLouvain Case Study: VDI for 37,000 students with OpenN...
Simple flexible deployments with openstack ansible
Open source integrated infra structure using ansible configuration management
VIO30 Technical Overview

What's hot (20)

PDF
The Ubuntu OpenStack interoperability lab - Proven integration testing Nicola...
PDF
Mastering OpenStack - Episode 04 - Provisioning and Deployment
PDF
Mastering OpenStack - Episode 09 - Storage Decisions
PDF
Mastering OpenStack - Episode 10 - Storage Decisions
PDF
Define your Future with SUSE
PDF
Securing OpenStack and Beyond with Ansible
PDF
Mastering OpenStack - Episode 15 - Network Design
PPTX
SDN Symposium - Cybera
PDF
Automating hard things may 2015
PPTX
CloudStack and the HeartBleed vulnerability
PDF
Dell openstack cloud with inktank ceph – large scale customer deployment
PDF
The Environment for Innovation: Tristan Goode, Aptira
PDF
Things You MUST Know Before Deploying OpenStack: Bruno Lago, Catalyst IT
PDF
OpenStack Benelux - Cloud, OpenStack and a Market In Motion - Sept 2015final
PDF
Infrastructure as Code 101: Steve Tegeler + Nathan Ness, VMware
PPTX
Successfully Deliver and Operate OpenStack in Production with VMware VIO
PDF
The 'Untold' OpenStack Enterprise Customer Stories: Anthony Rees & Alex Tesch...
PDF
Openstack lab environment Virtualbox (English)
PDF
Xen Project on SUSE OpenStack Cloud
PPTX
Cisco deploying openstack with UCS
The Ubuntu OpenStack interoperability lab - Proven integration testing Nicola...
Mastering OpenStack - Episode 04 - Provisioning and Deployment
Mastering OpenStack - Episode 09 - Storage Decisions
Mastering OpenStack - Episode 10 - Storage Decisions
Define your Future with SUSE
Securing OpenStack and Beyond with Ansible
Mastering OpenStack - Episode 15 - Network Design
SDN Symposium - Cybera
Automating hard things may 2015
CloudStack and the HeartBleed vulnerability
Dell openstack cloud with inktank ceph – large scale customer deployment
The Environment for Innovation: Tristan Goode, Aptira
Things You MUST Know Before Deploying OpenStack: Bruno Lago, Catalyst IT
OpenStack Benelux - Cloud, OpenStack and a Market In Motion - Sept 2015final
Infrastructure as Code 101: Steve Tegeler + Nathan Ness, VMware
Successfully Deliver and Operate OpenStack in Production with VMware VIO
The 'Untold' OpenStack Enterprise Customer Stories: Anthony Rees & Alex Tesch...
Openstack lab environment Virtualbox (English)
Xen Project on SUSE OpenStack Cloud
Cisco deploying openstack with UCS
Ad

Viewers also liked (11)

PDF
Architecture Challenges In Cloud Computing
PPTX
Anomaly Detection
PPTX
Analysis and Design for Intrusion Detection System Based on Data Mining
PDF
Network Functions Virtualization – Our Strategy
PPTX
Multithreading: Exploiting Thread-Level Parallelism to Improve Uniprocessor ...
PPTX
FIne Grain Multithreading
PPTX
Update Your Disaster Recovery Plans with Virtualization
PPTX
Disaster recovery and the cloud
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PDF
PPT
Cloud computing simple ppt
Architecture Challenges In Cloud Computing
Anomaly Detection
Analysis and Design for Intrusion Detection System Based on Data Mining
Network Functions Virtualization – Our Strategy
Multithreading: Exploiting Thread-Level Parallelism to Improve Uniprocessor ...
FIne Grain Multithreading
Update Your Disaster Recovery Plans with Virtualization
Disaster recovery and the cloud
Intrusion Detection Systems and Intrusion Prevention Systems
Cloud computing simple ppt
Ad

Similar to Open Source Private Cloud Management with OpenStack and Security Evaluation with Intrusion Detection/ Prevention Systems (20)

PDF
Nebula Webinar | Private Cloud Security: Practical Solutions for a Challengin...
PPT
OpenStack - Security Professionals Information Exchange
PDF
Bitnami Bootcamp. OpenStack
PPT
Presentation-final
PPTX
[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...
PDF
OpenNebulaConf 2013 - Hands-on Tutorial: 1. Introduction and Architecture
PPTX
Deployment of private cloud infrastructure.
PPTX
Deployment of private cloud infrastructure copy
PDF
Creating a Cloud Architecture for Machine Learning and Artificial Intelligenc...
PPTX
Study and implementation a cloud solution based on
PDF
What Is Openstack And Its Importance
PPTX
What are clouds made from
PPTX
Will Your Cloud Be Compliant? OpenStack Security
PPT
Dependability assessments of reliable services in a private cloud environment
PPTX
Operating OpenStack on a Budget
PPTX
Operating OpenStack on a Budget
PPT
Cloud Computing Security Issues
PPTX
PDF
OTechs Cloud computing security
PPT
Unraveling OpenStack Clouds
Nebula Webinar | Private Cloud Security: Practical Solutions for a Challengin...
OpenStack - Security Professionals Information Exchange
Bitnami Bootcamp. OpenStack
Presentation-final
[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...
OpenNebulaConf 2013 - Hands-on Tutorial: 1. Introduction and Architecture
Deployment of private cloud infrastructure.
Deployment of private cloud infrastructure copy
Creating a Cloud Architecture for Machine Learning and Artificial Intelligenc...
Study and implementation a cloud solution based on
What Is Openstack And Its Importance
What are clouds made from
Will Your Cloud Be Compliant? OpenStack Security
Dependability assessments of reliable services in a private cloud environment
Operating OpenStack on a Budget
Operating OpenStack on a Budget
Cloud Computing Security Issues
OTechs Cloud computing security
Unraveling OpenStack Clouds

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
Teaching material agriculture food technology
PDF
cuic standard and advanced reporting.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Electronic commerce courselecture one. Pdf
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25 Week I
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
Programs and apps: productivity, graphics, security and other tools
Electronic commerce courselecture one. Pdf
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity

Open Source Private Cloud Management with OpenStack and Security Evaluation with Intrusion Detection/ Prevention Systems

  • 1. Open Source Private Cloud Management with OpenStack and Security Evaluation with Intrusion Detection/Prevention Systems Penetration Testing for Evaluation of Cloud’s Security 05/07/2016 1
  • 2. Taking a sneak peek on cloud computing definition • Key technology for sharing resources • Web as a space where computing has been preinstalled and exists as a service Data centres, storage, operating systems, applications and processing power ALL shared on the web. 05/07/2016 2
  • 3. Virtualization in Cloud Systems • Almost complete simulation of the actual Hardware to allow Software to run unmodified • Example: We have a desktop computer with Ubuntu OS and with virtualization technology we can run another Ubuntu OS, inside the Host machine, as a complete fully functional second desktop computer inside ours 05/07/2016 3
  • 4. How is cloud connected to virtualization? • Easy to understand. Cloud Computing provides: on-demand resources and dynamically Virtualization provides : on-demand resources (you can create a virtual machine whenever you need or delete one) and dynamically (change your resources as you like, example 1) CPU, 2) CPUs, 3) CPUs 05/07/2016 4
  • 5. Our Project’s Goal ! • Create a Cloud using virtualization Hardware • Specifically Using OpenStack Cloud Management System • Secure our Cloud System with Security software and tools 05/07/2016 5
  • 6. Architecture of our Cloud System(1) • Initial plan • 3 virtualized OpenStack nodes • 1 OSSEC server monitoring the physical network and servers, plus the virtualized network and servers • Deployment of Fortification/security measures on the physical and virtualized Servers • Testing by means of offense 05/07/2016 6
  • 7. • OpenStack Networking (Neutron) Architecture • OSSEC server-client architecture 05/07/2016 7
  • 8. Architecture of our Cloud Systems(2) • Final plan: • 1 virtualized OpenStack node • 1virtualized OSSEC server • Deployment of Fortification/security measures on the physical and virtualized Servers • Testing by means of offense 05/07/2016 8
  • 9. • DevStack OpenStack Cloud Management Architecture • OSSEC server-client architecture 05/07/2016 9
  • 10. OSSEC Features • File integrity checking • Log Monitoring • Rootkit Detection • Active Response 05/07/2016 10
  • 11. OSSEC Compliance Requirements • Detect + Alerts Reasons : • Unauthorized filesystem modifications • Malicious behaviour in log files 05/07/2016 11
  • 12. Fortification/security measures of servers • SSH configurations for high security • Firewall rules modifications for inbound traffic • Iptables rules modifications • Apache server security hardening with Mod Security • Logwatch for the operating systems • Rkhunter rootkit scanner 05/07/2016 12
  • 13. Attacking Scenario No.1 • Sqlmap toolset. • This tool focuses primarily on exploiting an SQL database. • The Goal of this test was to check if our Cloud has any vulnerabilities against SQL attack methods, like SQL injections. • Example attack command: • python sqlmap.py -u "http://www.site.com/section.php?id=51" 05/07/2016 13
  • 14. • The next method of attack is by sqlmap again trying to reach any database entries from the Dashboard (Horizon) • The example command is: • Sqlmap –u “http://192.168.100.50” --db 05/07/2016 14
  • 15. Attacking Scenario No.2 • THC Hydra toolset • This tool focuses on cracking login information • It supports quite plenty of protocols, such as HTTP, HTTPS, SFTP, SSH (v1 and v2) SSHKEY, POSTGRE and etc. • A first method of attack is by trying to attempt logging in as a root user on an SSH server. • #hydra –l root –P /usr/share/wordlists/metasploit/unix_passwor ds.txt –t 6 ssh://192.168.100.50 05/07/2016 15
  • 16. Security Evaluation of our Cloud • It endured any attack from the two scenarios. • This means the fortification is quite satisfying • Unfortunately there were not more attacking methods in order to cover a larger area of security issues. The result is : Our Private DevStack Cloud has achieved to stand against threats. GOALS ACHIEVED! 05/07/2016 16
  • 17. Conclusions • There is no “Best Security Strategy” for a Cloud System. • To secure a Cloud we shall: Be open-minded, adopt and other security products, methods used by others. Fuse our strategy with other existing effective strategies. Bear in mind, one wooden stick can be broken, 20 wooden sticks, will never be broken, or even worse, bend. 05/07/2016 17
  • 18. Conclusions • Securing the Cloud’s infrastructure is sensible. • Securing the probable Servers hosting Cloud’s components is sensible. • INSENSIBLE would be if only securing one of these two. • Nevertheless, our project scope was to deploy security measures on the Servers of the Cloud. • However, future work, shall be to research, design and deploy the security technologies on the Cloud’s platform. 05/07/2016 18
  • 19. Conclusions • Final step : Deploy and implement complementary security technologies on the Cloud too. At last, after a lot of effort, it shall be ready for migration to real environment. 05/07/2016 19