SlideShare a Scribd company logo
1 of 9
Catch Me If You Can
Outrunning Environmental Adversity with Intelligence
at all layers of the OSI Model
Introductions
• Merlin Glynn mglynn@pivotal.io
• Sean Keery skeery@pivotal.io
• Keith Strini kstrini@pivotal.io
• Special Shout out to Raymond Lee
(BDS Team)
What if we could improve performance
& respond to environmental adversity?
APT - A set of stealthy and continuous computer hacking processes,
often orchestrated by human(s) targeting a specific entity.
DDOS – an attempt to make a machine or network resource
unavailable to its intended users, such as to temporarily or
indefinitely interrupt or suspend services of a host connected to the
Internet
Spectrum of cyber vulnerability from DDOS to APT
Quality of service
The overall performance of a computer network, particularly
the performance seen by the users of the network. To
quantitatively measure quality of service, several related
aspects of the network service are often considered, such as
error rates, bit rate, throughput, transmission delay,
availability, jitter, etc.
• Bosh
• CF
• SDN
DSL
Agents:
Actual State
Strategy:
Desired
State
Dynamic
Analysis
Environment
Models
Goals
(SLA)
Predictions
(Metrics)
DSL
Library
Learning
What this Continuous Improvement
over Environmental Adversity looks
like..…
responses
DSLDSL
DSLDSLDSL
Realize
<<no-outage>>
<<predictive>>
<<reliable>>
Project Environment
Use Cases for Demo
• DDOS -> Recognize foreign IP/Add ACL via NSX Rest API
• QoS -> Detect network throughput deficiency/Add 1 .. N routes
• APT -> Recognize foreign IP+Load/Alert Forensics Team
Spin up new CF foundation/subnet/data subnet access
Add new route
Remove forensic route
Shutdown data subnet access from forensic foundation
Goal: uninterrupted production traffic/UX
• DDIL -> Detect network throughput/Identify best cell net throughput
Move highest priority workloads to cell
Add additional service chaining IAW compliancy outlines to
edge
Add 1..n routes
Where do we go from here ….
• Ways to evaluate each
deployment
• Utilize the inherent abilities of
the distributed architecture
• Machine learning where each
distributed component
maintains state, manages itself
In Conclusion…Why Now?
• The cyber vulnerability problem is
imminent
• The operations, networking and
development teams are finally
becoming cohesive units
• The capacity to process, interpret
and act upon petascale data on any
IaaS
• All of this is can already be built into
the very core of the foundation now
– (Diego abstractions, SDN API, Predictive
and ML, Streams, Bosh-Enaml).
enaml.pezapp.io

More Related Content

Viewers also liked

peran perikanan dalam kehidupan manusia
peran perikanan dalam kehidupan manusiaperan perikanan dalam kehidupan manusia
peran perikanan dalam kehidupan manusia
PT. SASA
 
Frank Piller: Open Innovation & Customer Co-Creation
Frank Piller: Open Innovation & Customer Co-CreationFrank Piller: Open Innovation & Customer Co-Creation
Frank Piller: Open Innovation & Customer Co-Creation
Frank Piller
 

Viewers also liked (16)

BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
 
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
 
Sexual Dysfunction Presentation
Sexual Dysfunction PresentationSexual Dysfunction Presentation
Sexual Dysfunction Presentation
 
Transportation | Maritime & Trade
Transportation | Maritime & TradeTransportation | Maritime & Trade
Transportation | Maritime & Trade
 
The Gran Assumpteur v16
The Gran Assumpteur v16The Gran Assumpteur v16
The Gran Assumpteur v16
 
Marine board pp17_microcean
Marine board pp17_microceanMarine board pp17_microcean
Marine board pp17_microcean
 
臺灣公共衛生促進協會簡介20161221
臺灣公共衛生促進協會簡介20161221臺灣公共衛生促進協會簡介20161221
臺灣公共衛生促進協會簡介20161221
 
Femilift Presentation
Femilift PresentationFemilift Presentation
Femilift Presentation
 
Event Hacks: 7 beginner tips for emcee scripts
Event Hacks: 7 beginner tips for emcee scriptsEvent Hacks: 7 beginner tips for emcee scripts
Event Hacks: 7 beginner tips for emcee scripts
 
Hotel Renovation
Hotel RenovationHotel Renovation
Hotel Renovation
 
zSystems Enterprise Digital Transformation Conference -IBM contacts
zSystems Enterprise Digital Transformation Conference -IBM contactszSystems Enterprise Digital Transformation Conference -IBM contacts
zSystems Enterprise Digital Transformation Conference -IBM contacts
 
peran perikanan dalam kehidupan manusia
peran perikanan dalam kehidupan manusiaperan perikanan dalam kehidupan manusia
peran perikanan dalam kehidupan manusia
 
Frank Piller: Open Innovation & Customer Co-Creation
Frank Piller: Open Innovation & Customer Co-CreationFrank Piller: Open Innovation & Customer Co-Creation
Frank Piller: Open Innovation & Customer Co-Creation
 
Fundraising events and social media, how to #win
Fundraising events and social media, how to #winFundraising events and social media, how to #win
Fundraising events and social media, how to #win
 
The Content Marketer’s A to-Z Guide to Google Analytics
The Content Marketer’s A to-Z Guide to Google AnalyticsThe Content Marketer’s A to-Z Guide to Google Analytics
The Content Marketer’s A to-Z Guide to Google Analytics
 
Template Script for Emcees
Template Script for EmceesTemplate Script for Emcees
Template Script for Emcees
 

Similar to Catch Me If You Can - Cloud Foundry Summit Europe 2016

2015 04 bio it world
2015 04 bio it world2015 04 bio it world
2015 04 bio it world
Chris Dwan
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
Iben Rodriguez
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
Stenio Fernandes
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
Firas Alsayied
 

Similar to Catch Me If You Can - Cloud Foundry Summit Europe 2016 (20)

PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scaleVelocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
2015 04 bio it world
2015 04 bio it world2015 04 bio it world
2015 04 bio it world
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational Perspectives
 
cloud computing
cloud computingcloud computing
cloud computing
 
Modern apps with dcos
Modern apps with dcosModern apps with dcos
Modern apps with dcos
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival
 
Design of network
Design of networkDesign of network
Design of network
 
Future services on Janet
Future services on JanetFuture services on Janet
Future services on Janet
 
20-datacenter-measurements.pptx
20-datacenter-measurements.pptx20-datacenter-measurements.pptx
20-datacenter-measurements.pptx
 
Cluster and Grid Computing
Cluster and Grid ComputingCluster and Grid Computing
Cluster and Grid Computing
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA Automation
 
Why we got to Docker
Why we got to DockerWhy we got to Docker
Why we got to Docker
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Catch Me If You Can - Cloud Foundry Summit Europe 2016

  • 1. Catch Me If You Can Outrunning Environmental Adversity with Intelligence at all layers of the OSI Model
  • 2. Introductions • Merlin Glynn mglynn@pivotal.io • Sean Keery skeery@pivotal.io • Keith Strini kstrini@pivotal.io • Special Shout out to Raymond Lee (BDS Team)
  • 3. What if we could improve performance & respond to environmental adversity? APT - A set of stealthy and continuous computer hacking processes, often orchestrated by human(s) targeting a specific entity. DDOS – an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet Spectrum of cyber vulnerability from DDOS to APT Quality of service The overall performance of a computer network, particularly the performance seen by the users of the network. To quantitatively measure quality of service, several related aspects of the network service are often considered, such as error rates, bit rate, throughput, transmission delay, availability, jitter, etc.
  • 4. • Bosh • CF • SDN DSL Agents: Actual State Strategy: Desired State Dynamic Analysis Environment Models Goals (SLA) Predictions (Metrics) DSL Library Learning What this Continuous Improvement over Environmental Adversity looks like..… responses DSLDSL DSLDSLDSL Realize <<no-outage>> <<predictive>> <<reliable>>
  • 6. Use Cases for Demo • DDOS -> Recognize foreign IP/Add ACL via NSX Rest API • QoS -> Detect network throughput deficiency/Add 1 .. N routes • APT -> Recognize foreign IP+Load/Alert Forensics Team Spin up new CF foundation/subnet/data subnet access Add new route Remove forensic route Shutdown data subnet access from forensic foundation Goal: uninterrupted production traffic/UX • DDIL -> Detect network throughput/Identify best cell net throughput Move highest priority workloads to cell Add additional service chaining IAW compliancy outlines to edge Add 1..n routes
  • 7. Where do we go from here …. • Ways to evaluate each deployment • Utilize the inherent abilities of the distributed architecture • Machine learning where each distributed component maintains state, manages itself
  • 8. In Conclusion…Why Now? • The cyber vulnerability problem is imminent • The operations, networking and development teams are finally becoming cohesive units • The capacity to process, interpret and act upon petascale data on any IaaS • All of this is can already be built into the very core of the foundation now – (Diego abstractions, SDN API, Predictive and ML, Streams, Bosh-Enaml).

Editor's Notes

  1. Bullet -> Reactive to Proactive Detecting and analyzing the running behavior Predicting the effect different strategic actions would have on the distributed system when real problems are detected. Bullet -> Intermittency is too fast How often data should be observed The criticality of which data should be sent through intermittent connections. Bullet -> Difficult to exploit opportunities Manual Bosh management of virtualized resources in a server cluster across any IaaS. The overall effect of degraded communications affecting degraded performance in managing the system The more intermittent the communication, the greater the effect on Bosh’s management performance
  2. Bullet -> Co-deploying Co-deploying analytics and the analytics platform within the foundation. System metrics via the fire hose transmits this data from the foundation Interpret those metrics and then select strategies defined in foundation relevant DSLs that provides courses of action (COAs) on how the network it rides on, should adapt to changes. Bullet -> Bosh Adds SDN Components Allow Bosh to add new SDN components dynamically through a process of discovery Bosh continuously would monitor. New components would need to be added to allow Bosh to dynamically reconfigure by providing metadata about those individual components. As the degraded performance was detected and the ability to interact with the degrading foundation fell below desired thresholds, Bosh would execute strategies to heal, adapt, optimize, and defend the system against similarly future degradations. Bullet-> Liberating the control plane from the data plane, SDN enables the foundation to truly adapt (at almost all layers of the OSI model) to changing environment and threat circumstances. “Continuous Advantage” makes it difficult to cause substantial damage without launching a full assault against the infrastructure. To take advantage of this inherent resiliency, we must evolve the ability to take advantage of the dynamic possibilities of SDN into the next phase, coupling it with Predictive Analytics and ML to fully optimize and self-protect the enterprises we are in charge of running.
  3. Bullet -> Evaluate the deployment Determine violations of constraints that were defined for the specific foundation. If anomalies are detected or SLAs violated, programmatically adapt the architecture. DSL based strategies matched and evaluated to determine the best approach to solving the SLA or mitigating the anomaly. Choose the strategy to execute that effects changes to the foundation. System metrics via the fire hose transmits this data from the foundation Interpret those metrics and then select strategies defined in foundation relevant DSLs that provides courses of action (COAs) on how the network it rides on, should adapt to changes. Bullet -> Utilize the distributed architecture Each distributed component would have a state in which it could manage itself Once connectivity was restored, report a total system health back to Bosh. No matter how disconnected the systems become, the foundation would still be able to function. The challenge is the limitation on globally optimizing the foundation to holistically address performance degradation. Bullet -> Machine Learning Size and complexity of Cloud Foundry enterprises are beginning to outstrip the ability of humans to understand and control the maintenance The speed required for effective network optimization is ever increasing. In particular this degradation of performance by predicting the future communication states of the system. To address the effects of degraded communications, metrics could be queried against real time analytics to predict the future state of the system. The predicted constraints could then reason on future state values. In this way, Bosh can anticipate events that would require adaptation and issue commands before they are needed. This pre-emptive strategy would allow the foundation to operate in degraded environments by issuing adaptive strategies in communication windows before they are needed. Such learning approaches can also be applied to make decisions based upon currently monitored states and can be used to detect anomalous operation such as hidden APTs, among other capabilities.