SlideShare une entreprise Scribd logo
1  sur  26
Training and Consulting in Information and Communications Technologies
Sean McCarthy
L&M Data Communications
Insecurity & Complexity
2
Communications networks' current situation
• Currently all the networks, services and applications are based on
Internet technologies: TCP/IP Communication Protocols
• Any current device (PCs, Tablets, Telephones, Game Stations, TV,
control equipment, etc.) includes these TCP/IP protocols
• TCP/IP DNA:
– Designed in the 70s for the interconnection of heterogeneous global
networks
– Introduced in the early 80s on the Local Area Networks
– The target was to interconnect heterogeneous networks and equipment,
without taking into account security or efficiency
• Internet was not designed with security in mind
3
Where is the Problem?
TCP/IP Communications Architecture
• The user can fiddle with the communications
4
TCP
IP
ETH A
PHY A PHY C
ETH C
App App App App
App
IP
IP net
Internet Aplication Service is provided
by TCP and controlled by the user
TCP
App
Service
Demarcation
Service
Demarcation
Network
Edge
Network
Edge
POTS (Plain Old Telephone Service) versus Internet TCP/IP
• All the communications are handled and controlled by the Telephone
Operator
5
Service
Demarcation
Service
Demarcation
Network
Edge
Network
Edge
Internet Insecurity (Insecurity everywhere)
In this insecure TCP/IP environment you can do everything, or almost
everything
• Use a fake IP address (origin / destination)
• Impersonation of user´s identity, network equipment, services,
applications, etc.
• Intercept communications from anywhere
• Datagrams modification (changing data)
• Denial of service attacks
• Malicious use of the innumerable auxiliary communications protocols
• And many more bad things…
6
What companies and organizations are doing
• Installing new, complex and expensive secure systems
– Firewalls
– VPNs (Virtual Private Networks)
– Encryption & Authentication & Integrity Protocols
– Digital signature
– Additional Security Protocols
– Intrusion Detection Systems
– Secure Network Devices
– Policies, Audits, PENtesting ....
Time and $$$$$$$$$
• The result is always frustrating, because after removing the known
security holes, new vulnerabilities appear
7
Firewalls, are they really secure?
8
Communication networks must be, and can be:
Secure, simple and more efficient
But to achieve this, we have to change the way we are doing it
9
If I had asked people what they wanted, they would have said faster horses.
(Henry Ford)
Disruptive Technologies
Breaking the rules and the way everybody does it
• Simple, not complex
– Fewer technologies and techniques
– More complex equipment = less secure
– No longer adding more and more security layers
• “Built-in Security”: as the POTS (Plain Old Telephone Service)
– Old circuit switching tech… but in TCP/IP networks
• Reduce the “Cyber Attack Surface” close to zero
– Today, everyone from anywhere can launch a cyber-attack leaving no trace
10
Insanity: doing the same thing over and over again and expecting different results
(Albert Einstein)
We want this idyllic scenario:
• Network equipment (the LAN switches where all the computers are
connected to) must provide the following security features:
– No more additional protocols and no more complex configuration
– Prevent “Fake Internet Addresses”
– Block and disable hacking tools
– Native firewalling features. No rules, no configuration
– Foolproof and automatic attack detection
– Hide the network to outside users to minimize the "attack surface"
– Instantly identify the attack source and block it
• A deep knowledge of networking and how to modify it, to dramatically
improve security, is required to achieve these goals
11
•12
PHY B
Link B
IP
Transport
TCP
IP
Link A
PHY A PHY A PHY CPHY C
Link A Link C Link C
Transport
TCP
App App
App
IP
App App
App
IP IP
PHY B
Link B
IP
Subnet 1 Subnet 2 Subnet 3 •13
PHY B
Link B
IP
Transport
TCP
IP
Link A
PHY A PHY A PHY CPHY C
Link A Link C Link C
Transport
TCP
App App
App
IP
App App
App
IP IP
PHY B
Link B
IP
Subnet 1 Subnet 2 Subnet 3 •14
PHY B
Link B
IP
Transport
TCP
IP
Link A
PHY A PHY A PHY CPHY C
Link A Link C Link C
Transport
TCP
App App
App
IP
App App
App
IP IP
PHY B
Link B
IP
Subnet 1 Subnet 2 Subnet 3 •15
•16
What can we do to secure the TCP / IP
communications without any change to
the applications, infrastructures or users'
computers?
17
18
What is UETS?
An L&M Data Communications idea, patented in U.S. and Spain
• Simple Communications Architecture which uses circuit switching to
transmit Ethernet datagrams
– Provide both the end users and the applications, fully transparent and
compatible IP services
– All the communications are handled and controlled by the Network
equipment
– Non-hijacking communications, rendering eavesdropping and cyber-attacks
to network infrastructures impossible
• Radically opposed to the current strategy of adding new security layers
and complexity
19
PHY B
Transport
TCP
IP
Link A
PHY A PHY A PHY CPHY C
Link C
Transport
TCP
App App
App
App App
App
IP
PHY B
UETS with no changes to the user’s computer
20
TCP
IP
Link A
ETH A
TCP
IP
Link C
ETH C
IP
Link A
ETH A
IP
Link B
ETH B
IP
Link B
ETH B
IP
Link C
ETH C
UETS Highest level of security
(NO TCP/IP on the user's computer)
App App
App
App
App
App
21
PHY B
ETHERNET
PHY A PHY A PHY CPHY C
ETHERNET
App App
App
App App
App
PHY B
EtherNET
UETS Highest level of security
(NO TCP/IP on the user’s computer)
22
UETS Key aspects
• Circuit technology in Ethernet networks
• High security: NO TCP/IP NO TCP/IP attacks
• Full Backward IP Compatibility
• Using standard TCP / IP applications
• Removing Complexities to the minimum
• Eliminating complex solutions
23
INTERNET
UETS Demonstration Platform
LAN
UNI
0 0
0 0
1 1
1 1
UETS SWITCH
Transport Network and Core outside the
scope of concept`s proof
24
SNMP over IP & SNMP over UETS (Trace Wireshark)
SNMP over IP
SNMP over UETS
}
}
It's time for change
26

Contenu connexe

Tendances

Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
mrtheodisthorne2
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
tardeep
 
Wifi Challenges
Wifi ChallengesWifi Challenges
Wifi Challenges
none
 

Tendances (20)

wi-fi ppt
wi-fi pptwi-fi ppt
wi-fi ppt
 
E:\All About Dect
E:\All About DectE:\All About Dect
E:\All About Dect
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
WIFI[autosaved]
WIFI[autosaved]WIFI[autosaved]
WIFI[autosaved]
 
Bluetooth vs Wi-Fi comparison for IoT Solutions
Bluetooth vs Wi-Fi comparison for IoT SolutionsBluetooth vs Wi-Fi comparison for IoT Solutions
Bluetooth vs Wi-Fi comparison for IoT Solutions
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
Wifi Challenges
Wifi ChallengesWifi Challenges
Wifi Challenges
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
Wi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen MominWi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen Momin
 
Lifi technology presentation
Lifi technology presentation Lifi technology presentation
Lifi technology presentation
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wifi Presentation
Wifi PresentationWifi Presentation
Wifi Presentation
 
Build of Industrial Wireless Based on MulteFire
Build of Industrial Wireless Based on MulteFireBuild of Industrial Wireless Based on MulteFire
Build of Industrial Wireless Based on MulteFire
 

Similaire à 2017 conferencia-uets-mobilecongress l∓m

Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
SANTIAGO PABLO ALBERTO
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
Lindsey Jones
 
Data analysis telecommunications the int
Data analysis telecommunications the intData analysis telecommunications the int
Data analysis telecommunications the int
123456naji
 
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdfchapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
AliMurat5
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
ssuser06ea42
 

Similaire à 2017 conferencia-uets-mobilecongress l∓m (20)

Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - Licensing
 
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Final project report
Final project reportFinal project report
Final project report
 
Data analysis telecommunications the int
Data analysis telecommunications the intData analysis telecommunications the int
Data analysis telecommunications the int
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
 
1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.ppt1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.ppt
 
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdfchapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
 
Chapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technologyChapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technology
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
Networking
NetworkingNetworking
Networking
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.ppt
 
INTERNET AS A NETWORK INFRASTRUCTURE ...
INTERNET AS A NETWORK INFRASTRUCTURE                                         ...INTERNET AS A NETWORK INFRASTRUCTURE                                         ...
INTERNET AS A NETWORK INFRASTRUCTURE ...
 
niceData com.
niceData com.niceData com.
niceData com.
 
niceData com.
niceData com.niceData com.
niceData com.
 

Dernier

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 

Dernier (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 

2017 conferencia-uets-mobilecongress l∓m

  • 1. Training and Consulting in Information and Communications Technologies Sean McCarthy L&M Data Communications
  • 3. Communications networks' current situation • Currently all the networks, services and applications are based on Internet technologies: TCP/IP Communication Protocols • Any current device (PCs, Tablets, Telephones, Game Stations, TV, control equipment, etc.) includes these TCP/IP protocols • TCP/IP DNA: – Designed in the 70s for the interconnection of heterogeneous global networks – Introduced in the early 80s on the Local Area Networks – The target was to interconnect heterogeneous networks and equipment, without taking into account security or efficiency • Internet was not designed with security in mind 3
  • 4. Where is the Problem? TCP/IP Communications Architecture • The user can fiddle with the communications 4 TCP IP ETH A PHY A PHY C ETH C App App App App App IP IP net Internet Aplication Service is provided by TCP and controlled by the user TCP App Service Demarcation Service Demarcation Network Edge Network Edge
  • 5. POTS (Plain Old Telephone Service) versus Internet TCP/IP • All the communications are handled and controlled by the Telephone Operator 5 Service Demarcation Service Demarcation Network Edge Network Edge
  • 6. Internet Insecurity (Insecurity everywhere) In this insecure TCP/IP environment you can do everything, or almost everything • Use a fake IP address (origin / destination) • Impersonation of user´s identity, network equipment, services, applications, etc. • Intercept communications from anywhere • Datagrams modification (changing data) • Denial of service attacks • Malicious use of the innumerable auxiliary communications protocols • And many more bad things… 6
  • 7. What companies and organizations are doing • Installing new, complex and expensive secure systems – Firewalls – VPNs (Virtual Private Networks) – Encryption & Authentication & Integrity Protocols – Digital signature – Additional Security Protocols – Intrusion Detection Systems – Secure Network Devices – Policies, Audits, PENtesting .... Time and $$$$$$$$$ • The result is always frustrating, because after removing the known security holes, new vulnerabilities appear 7
  • 8. Firewalls, are they really secure? 8
  • 9. Communication networks must be, and can be: Secure, simple and more efficient But to achieve this, we have to change the way we are doing it 9 If I had asked people what they wanted, they would have said faster horses. (Henry Ford)
  • 10. Disruptive Technologies Breaking the rules and the way everybody does it • Simple, not complex – Fewer technologies and techniques – More complex equipment = less secure – No longer adding more and more security layers • “Built-in Security”: as the POTS (Plain Old Telephone Service) – Old circuit switching tech… but in TCP/IP networks • Reduce the “Cyber Attack Surface” close to zero – Today, everyone from anywhere can launch a cyber-attack leaving no trace 10 Insanity: doing the same thing over and over again and expecting different results (Albert Einstein)
  • 11. We want this idyllic scenario: • Network equipment (the LAN switches where all the computers are connected to) must provide the following security features: – No more additional protocols and no more complex configuration – Prevent “Fake Internet Addresses” – Block and disable hacking tools – Native firewalling features. No rules, no configuration – Foolproof and automatic attack detection – Hide the network to outside users to minimize the "attack surface" – Instantly identify the attack source and block it • A deep knowledge of networking and how to modify it, to dramatically improve security, is required to achieve these goals 11
  • 12. •12
  • 13. PHY B Link B IP Transport TCP IP Link A PHY A PHY A PHY CPHY C Link A Link C Link C Transport TCP App App App IP App App App IP IP PHY B Link B IP Subnet 1 Subnet 2 Subnet 3 •13
  • 14. PHY B Link B IP Transport TCP IP Link A PHY A PHY A PHY CPHY C Link A Link C Link C Transport TCP App App App IP App App App IP IP PHY B Link B IP Subnet 1 Subnet 2 Subnet 3 •14
  • 15. PHY B Link B IP Transport TCP IP Link A PHY A PHY A PHY CPHY C Link A Link C Link C Transport TCP App App App IP App App App IP IP PHY B Link B IP Subnet 1 Subnet 2 Subnet 3 •15
  • 16. •16
  • 17. What can we do to secure the TCP / IP communications without any change to the applications, infrastructures or users' computers? 17
  • 18. 18
  • 19. What is UETS? An L&M Data Communications idea, patented in U.S. and Spain • Simple Communications Architecture which uses circuit switching to transmit Ethernet datagrams – Provide both the end users and the applications, fully transparent and compatible IP services – All the communications are handled and controlled by the Network equipment – Non-hijacking communications, rendering eavesdropping and cyber-attacks to network infrastructures impossible • Radically opposed to the current strategy of adding new security layers and complexity 19
  • 20. PHY B Transport TCP IP Link A PHY A PHY A PHY CPHY C Link C Transport TCP App App App App App App IP PHY B UETS with no changes to the user’s computer 20
  • 21. TCP IP Link A ETH A TCP IP Link C ETH C IP Link A ETH A IP Link B ETH B IP Link B ETH B IP Link C ETH C UETS Highest level of security (NO TCP/IP on the user's computer) App App App App App App 21
  • 22. PHY B ETHERNET PHY A PHY A PHY CPHY C ETHERNET App App App App App App PHY B EtherNET UETS Highest level of security (NO TCP/IP on the user’s computer) 22
  • 23. UETS Key aspects • Circuit technology in Ethernet networks • High security: NO TCP/IP NO TCP/IP attacks • Full Backward IP Compatibility • Using standard TCP / IP applications • Removing Complexities to the minimum • Eliminating complex solutions 23
  • 24. INTERNET UETS Demonstration Platform LAN UNI 0 0 0 0 1 1 1 1 UETS SWITCH Transport Network and Core outside the scope of concept`s proof 24
  • 25. SNMP over IP & SNMP over UETS (Trace Wireshark) SNMP over IP SNMP over UETS } }
  • 26. It's time for change 26