This presentation covers the basics about OpenvSwitch and its components. OpenvSwitch is a Open Source implementation of OpenFlow by the Nicira team.
It also also talks about OpenvSwitch and its role in OpenStack Networking
This amazing and unique event has taking place last saturday (29 Sept 2018) and has allowed cybersecurity enthusiasts from several regions of the Cameroon to meet and boost their capacity around a theme worthy of interest: APT type attacks.
During this workshop, the main focus was on exploring the MITRE approach with its ATT&CK framework for adversaries simulation, APT simulation.
The document discusses routed networks in OpenStack Neutron. It describes how routed networks implement layer 3 connectivity while allowing scalability by associating subnets to network segments. Key points include new Neutron APIs for segments and ports in routed networks, integration with the Nova scheduler, and options for implementing distributed virtual routing with features like floating IPs, multiple availability zones, and BGP routing.
Cloud Native Bern 05.2023 — Zero Trust VisibilityRaphaël PINSON
As the adoption of Kubernetes continues to grow, so does the need for securing containerized applications and their data. One effective security model that has gained popularity is Zero Trust Networking, which assumes that all resources, devices and users are untrusted, and access to resources is granted only after proper authentication and authorization. However, implementing Zero Trust Networking in Kubernetes can be challenging, given the dynamic nature of containerized workloads and the complexity of network policies.
In this presentation, we will explore how to implement Zero Trust Networking in Kubernetes using Cilium, Hubble & Grafana. We will start by setting up Cilium on a Kubernetes cluster, which provides network security by enforcing identity-based access control policies using eBPF. Next, we will export Network Policy Verdict metrics using Hubble, which allows us to visualize network policies and track security events in real-time. Finally, we will use a Grafana dashboard to visualize these metrics and demonstrate how to secure a Kubernetes namespace without affecting existing traffic in the namespace.
By the end of this presentation, attendees will have a good understanding of the importance of Zero Trust Networking in Kubernetes and how to implement it using Cilium, Hubble & Grafana. They will also learn how to secure a Kubernetes namespace and monitor network policies using a Grafana dashboard.
OpenStack networking can use either VLAN tagging or GRE tunneling to provide logical isolation between tenant networks. With VLAN, packets are tagged with a VLAN ID at the compute and network nodes to associate them with a particular tenant network. With GRE, packets are encapsulated with a GRE header that includes a tunnel ID to associate them with a tenant network. Security groups are applied using iptables rules to filter traffic between VMs in different networks.
This presentation covers the basics about OpenvSwitch and its components. OpenvSwitch is a Open Source implementation of OpenFlow by the Nicira team.
It also also talks about OpenvSwitch and its role in OpenStack Networking
This amazing and unique event has taking place last saturday (29 Sept 2018) and has allowed cybersecurity enthusiasts from several regions of the Cameroon to meet and boost their capacity around a theme worthy of interest: APT type attacks.
During this workshop, the main focus was on exploring the MITRE approach with its ATT&CK framework for adversaries simulation, APT simulation.
The document discusses routed networks in OpenStack Neutron. It describes how routed networks implement layer 3 connectivity while allowing scalability by associating subnets to network segments. Key points include new Neutron APIs for segments and ports in routed networks, integration with the Nova scheduler, and options for implementing distributed virtual routing with features like floating IPs, multiple availability zones, and BGP routing.
Cloud Native Bern 05.2023 — Zero Trust VisibilityRaphaël PINSON
As the adoption of Kubernetes continues to grow, so does the need for securing containerized applications and their data. One effective security model that has gained popularity is Zero Trust Networking, which assumes that all resources, devices and users are untrusted, and access to resources is granted only after proper authentication and authorization. However, implementing Zero Trust Networking in Kubernetes can be challenging, given the dynamic nature of containerized workloads and the complexity of network policies.
In this presentation, we will explore how to implement Zero Trust Networking in Kubernetes using Cilium, Hubble & Grafana. We will start by setting up Cilium on a Kubernetes cluster, which provides network security by enforcing identity-based access control policies using eBPF. Next, we will export Network Policy Verdict metrics using Hubble, which allows us to visualize network policies and track security events in real-time. Finally, we will use a Grafana dashboard to visualize these metrics and demonstrate how to secure a Kubernetes namespace without affecting existing traffic in the namespace.
By the end of this presentation, attendees will have a good understanding of the importance of Zero Trust Networking in Kubernetes and how to implement it using Cilium, Hubble & Grafana. They will also learn how to secure a Kubernetes namespace and monitor network policies using a Grafana dashboard.
OpenStack networking can use either VLAN tagging or GRE tunneling to provide logical isolation between tenant networks. With VLAN, packets are tagged with a VLAN ID at the compute and network nodes to associate them with a particular tenant network. With GRE, packets are encapsulated with a GRE header that includes a tunnel ID to associate them with a tenant network. Security groups are applied using iptables rules to filter traffic between VMs in different networks.
Podman is an open source tool for managing OCI containers and container images. It allows users to find, run, build, share and deploy applications using containers. Some key points about Podman include:
- It is daemonless, secure, and designed for Linux containers.
- Podman manages the entire container lifecycle from creation to deletion. It handles mounting, networking, and the container runtime.
- When running a container, Podman generates an OCI specification, pulls the image if needed, configures networking using Netavark, and uses Conmon to monitor the container process.
- Podman 4 introduced a new network stack based on Netavark and Aardvark-dns
Red Hat OpenShift 4 allows for automated and customized deployments. The Full Stack Automation method fully automates installation and updates of both the OpenShift platform and Red Hat Enterprise Linux CoreOS host operating system. The Pre-existing Infrastructure method allows OpenShift to be deployed on user-managed infrastructure, where the customer provisions resources like load balancers and DNS. Both methods use the openshift-install tool to generate ignition configs and monitor the cluster deployment.
KVM provides virtualization capabilities using the Linux kernel. It supports full virtualization of x86, PowerPC, s390 and IA-64 architectures using hardware extensions like Intel-VTx and AMD-V. KVM leverages existing Linux components like the scheduler and uses the Linux security model. Guests are scheduled as regular processes. Paravirtualization is used to improve performance through virtio drivers and paravirt_ops. KVM development is ongoing with goals of supporting more hardware features, improving scalability and integrating with management tools like libvirt.
Definition de Cloud Computing
Historique du Cloud Computing
Les cinq caractéristiques de Cloud Computing
Les trois modèles de services de Cloud Computing
Les quatre modèles de déploiement de Cloud Computing
la différence entre Grid et Cloud Computing
Les Outils
Durant cette soirée, Stéphane Perroud aura le plaisir de partager avec vous ses compétences de praticien sur les différents aspects des risques à identifier et à évaluer, et vous montrera comment trouver des solutions pour rendre le business plus résilient. Il ne faut pas oublier que le but d’un PCA (plan de continuité d’activité) est d'accroître la robustesse du business en renforçant les dispositifs de prévention et de protection.
XDP in Practice: DDoS Mitigation @CloudflareC4Media
Video and slides synchronized, mp3 and slide download available at URL https://bit.ly/2NtlaER.
Gilberto Bertin discusses the architecture of Cloudflare’s automatic DDoS mitigation pipeline, the initial packet filtering solution based on Iptables, and why Cloudflare had to introduce userspace offload. Bertin also describes how they switched from a proprietary offload technology to XDP for network stack bypass and how they are using XDP to load balance traffic. Filmed at qconlondon.com.
Gilberto Bertin works as a System Engineer at Cloudflare London. After working on variety of technologies like P2P VPNs and userspace TCP/IP stacks, he joined the Cloudflare DDoS team in London to help filter all the bad internet traffic.
The document summarizes a talk on container performance analysis. It discusses identifying bottlenecks at the host, container, and kernel level using various Linux performance tools. It then provides an overview of how containers work in Linux using namespaces and control groups (cgroups). Finally, it demonstrates some example commands like docker stats, systemd-cgtop, and bcc/BPF tools that can be used to analyze containers and cgroups from the host system.
Scikit learn: apprentissage statistique en PythonGael Varoquaux
Présentation au niveau sur "scikit-learn", un toolkit d'apprentissage statistique (machine learning) en Python.
Philosophie et strategie du projet, ainsi que API et très bref examples de code.
Vincent Van der Kussen discusses KVM and related virtualization tools. KVM is a kernel module that allows Linux to function as a hypervisor. It supports x86, PowerPC and s390 architectures. Key tools discussed include libvirt (the virtualization API), virsh (command line tool for libvirt), Qemu (runs virtual machines), and virt-tools like virt-install. The document provides an overview of using these tools to manage virtual machines and storage.
OpenShift Virtualization allows running virtual machines as containers managed by Kubernetes. It uses KVM with QEMU and libvirt to run virtual machines inside containers. Virtual machines are scheduled and managed like pods through Kubernetes APIs and can access container networking and storage. Templates can be used to simplify virtual machine creation and configuration. Virtual machines can be imported, viewed, managed, and deleted through the OpenShift console and CLI like other Kubernetes resources. Metrics on virtual machine resources usage are also collected.
Red Hat multi-cluster management & what's new in OpenShiftKangaroot
More and more organisations are not only using container platforms but starting to run multiple clusters of containers. And with that comes new headaches of maintaining, securing, and updating those multiple clusters. In this session we'll look into how Red Hat has solved multi-cluster management, covering cluster lifecycle, app lifecycle, and governance/risk/compliance.
Soutenance mémoire d'ingénieur CNAM de Gaël Duperrey sur la BCIGalsungen
Présentation de support pour la soutenance d'ingénieur CNAM de Gaël Duperrey, du 10 juin 2015. Sujet du mémoire : "Brain Computer Interaction (BCI)
étude des dispositifs, choix, installation et mise en œuvre d’un ensemble de cas d’étude et leur évaluation"
Red Hat Insights is a service that analyzes customer environments running Red Hat Enterprise Linux to identify and resolve configuration issues before they impact operations. It uses a lightweight agent that collects minimal data and sends it to Red Hat's rules engine for analysis against their knowledge base of over 30,000 solutions. The service provides a web interface where customers can view prioritized risks and get guidance on remediation. Using Insights with Technical Account Managers allows them to proactively help customers uncover vulnerabilities. Customers can acquire Insights through various Red Hat products or as standalone offerings.
Podman is an open source tool for managing OCI containers and container images. It allows users to find, run, build, share and deploy applications using containers. Some key points about Podman include:
- It is daemonless, secure, and designed for Linux containers.
- Podman manages the entire container lifecycle from creation to deletion. It handles mounting, networking, and the container runtime.
- When running a container, Podman generates an OCI specification, pulls the image if needed, configures networking using Netavark, and uses Conmon to monitor the container process.
- Podman 4 introduced a new network stack based on Netavark and Aardvark-dns
Red Hat OpenShift 4 allows for automated and customized deployments. The Full Stack Automation method fully automates installation and updates of both the OpenShift platform and Red Hat Enterprise Linux CoreOS host operating system. The Pre-existing Infrastructure method allows OpenShift to be deployed on user-managed infrastructure, where the customer provisions resources like load balancers and DNS. Both methods use the openshift-install tool to generate ignition configs and monitor the cluster deployment.
KVM provides virtualization capabilities using the Linux kernel. It supports full virtualization of x86, PowerPC, s390 and IA-64 architectures using hardware extensions like Intel-VTx and AMD-V. KVM leverages existing Linux components like the scheduler and uses the Linux security model. Guests are scheduled as regular processes. Paravirtualization is used to improve performance through virtio drivers and paravirt_ops. KVM development is ongoing with goals of supporting more hardware features, improving scalability and integrating with management tools like libvirt.
Definition de Cloud Computing
Historique du Cloud Computing
Les cinq caractéristiques de Cloud Computing
Les trois modèles de services de Cloud Computing
Les quatre modèles de déploiement de Cloud Computing
la différence entre Grid et Cloud Computing
Les Outils
Durant cette soirée, Stéphane Perroud aura le plaisir de partager avec vous ses compétences de praticien sur les différents aspects des risques à identifier et à évaluer, et vous montrera comment trouver des solutions pour rendre le business plus résilient. Il ne faut pas oublier que le but d’un PCA (plan de continuité d’activité) est d'accroître la robustesse du business en renforçant les dispositifs de prévention et de protection.
XDP in Practice: DDoS Mitigation @CloudflareC4Media
Video and slides synchronized, mp3 and slide download available at URL https://bit.ly/2NtlaER.
Gilberto Bertin discusses the architecture of Cloudflare’s automatic DDoS mitigation pipeline, the initial packet filtering solution based on Iptables, and why Cloudflare had to introduce userspace offload. Bertin also describes how they switched from a proprietary offload technology to XDP for network stack bypass and how they are using XDP to load balance traffic. Filmed at qconlondon.com.
Gilberto Bertin works as a System Engineer at Cloudflare London. After working on variety of technologies like P2P VPNs and userspace TCP/IP stacks, he joined the Cloudflare DDoS team in London to help filter all the bad internet traffic.
The document summarizes a talk on container performance analysis. It discusses identifying bottlenecks at the host, container, and kernel level using various Linux performance tools. It then provides an overview of how containers work in Linux using namespaces and control groups (cgroups). Finally, it demonstrates some example commands like docker stats, systemd-cgtop, and bcc/BPF tools that can be used to analyze containers and cgroups from the host system.
Scikit learn: apprentissage statistique en PythonGael Varoquaux
Présentation au niveau sur "scikit-learn", un toolkit d'apprentissage statistique (machine learning) en Python.
Philosophie et strategie du projet, ainsi que API et très bref examples de code.
Vincent Van der Kussen discusses KVM and related virtualization tools. KVM is a kernel module that allows Linux to function as a hypervisor. It supports x86, PowerPC and s390 architectures. Key tools discussed include libvirt (the virtualization API), virsh (command line tool for libvirt), Qemu (runs virtual machines), and virt-tools like virt-install. The document provides an overview of using these tools to manage virtual machines and storage.
OpenShift Virtualization allows running virtual machines as containers managed by Kubernetes. It uses KVM with QEMU and libvirt to run virtual machines inside containers. Virtual machines are scheduled and managed like pods through Kubernetes APIs and can access container networking and storage. Templates can be used to simplify virtual machine creation and configuration. Virtual machines can be imported, viewed, managed, and deleted through the OpenShift console and CLI like other Kubernetes resources. Metrics on virtual machine resources usage are also collected.
Red Hat multi-cluster management & what's new in OpenShiftKangaroot
More and more organisations are not only using container platforms but starting to run multiple clusters of containers. And with that comes new headaches of maintaining, securing, and updating those multiple clusters. In this session we'll look into how Red Hat has solved multi-cluster management, covering cluster lifecycle, app lifecycle, and governance/risk/compliance.
Soutenance mémoire d'ingénieur CNAM de Gaël Duperrey sur la BCIGalsungen
Présentation de support pour la soutenance d'ingénieur CNAM de Gaël Duperrey, du 10 juin 2015. Sujet du mémoire : "Brain Computer Interaction (BCI)
étude des dispositifs, choix, installation et mise en œuvre d’un ensemble de cas d’étude et leur évaluation"
Red Hat Insights is a service that analyzes customer environments running Red Hat Enterprise Linux to identify and resolve configuration issues before they impact operations. It uses a lightweight agent that collects minimal data and sends it to Red Hat's rules engine for analysis against their knowledge base of over 30,000 solutions. The service provides a web interface where customers can view prioritized risks and get guidance on remediation. Using Insights with Technical Account Managers allows them to proactively help customers uncover vulnerabilities. Customers can acquire Insights through various Red Hat products or as standalone offerings.
Architecture Réseau des clouds privés avec Hyper-V et System Center Virtual M...Microsoft Technet France
SCVMM 2012 R2 joue désormais un rôle central dans la création et le déploiement des infrastructures de virtualisation Microsoft. Cette session aborde les différents points nécessaires à la définition des réseaux physiques et logiques et à leur déploiement, le déploiement de clusters au sein de SCVMM 2012 R2, Cette session est destinée aux techniciens et architectes en charge de la définition d'une infrastructure Cloud privé et disposant d'une bonne connaissance de la virtualisation et de SCVMM.
Speakers : Christophe Dubos (Microsoft), Cédric Bravo (Nware), Nicolas Escalas (Alfun)
ARCHITECTURE MICROSERVICE : TOUR D’HORIZON DU CONCEPT ET BONNES PRATIQUESSOAT
Les systèmes distribués ont largement évolués ces 10 dernières années, passant d’énormes applications monolithiques à de petits containers de services, apportant plus de souplesse et d’agilité au sein des systèmes d’information.
Le terme « Architecture microservice » a vu le jour pour décrire cette manière particulière de concevoir des applications logicielles.
Bien qu’il n’y ait pas de définition précise de ce style d’architecture, elles ont un certain nombre de caractéristiques communes basées autour de l’organisation de l’entreprise, du déploiement automatisé et de la décentralisation du contrôle du langage et des données.
Seulement, développer ces systèmes peut tourner au véritable casse-tête. Je vous propose donc un tour des concepts et différentes caractéristiques de ce type d’architecture, des bonnes et mauvaises pratiques, de la création jusqu’au déploiement des applications.
Management dans le Cloud ou sur site – quelle est la meilleure solution ?
Vous ne savez pas si votre solution réseau gérée en local ou dans le Cloud est adaptée à vos besoins et à ceux de vos clients. Vous découvrirez dans ce webinar les deux options, en les appliquant à la fois à la sécurité mais aussi au sans fil. A la fin de ce webinar, vous connaitrez les avantages des deux solutions, et saurez comment appliquer la meilleure architecture pour les différents types de réseaux.
Présenté par Fanny CLAVEL, Chef de produit WiFi Zyxel France
Présentation animée au Devfest Nantes 2023 le 19/10/2023 sur la construction d'une pile réseau sur AWS multi comptes sécurisées et les travaux d'optimisations qui en découlent.
Entrez, suivez le lapin blanc 🐰 et venez découvrir les étapes qui nous ont permis de vaincre l’Agent Smith 🕵️🕵️ !
À bord du Nebuchadnezzar 🚀, vous aurez un aperçu des préconisations AWS pour mettre en œuvre une architecture multi-comptes et une segmentation forte de la couche réseau.
En suivant le Maître des Clés 🗝️, il vous expliquera comment ouvrir les portes de la Matrice grâce au SSO.
Quant à l'Oracle 🔮, elle vous prédira un avenir incertain sur les coûts.
Quelle pilule choisirez-vous ? 💊 Prenez la bleue, l'histoire s'arrête là. Vous vous réveillez dans votre lit, et vous continuez de suivre naïvement les recommandations AWS. Prenez la rouge, vous restez au Pays des Merveilles et nous vous montrons jusqu'où l’optimisation peut aller.
La formation complète est disponible ici:
http://www.alphorm.com/tutoriel/formation-en-ligne-hyper-v-et-scvmm-2008-r2-70-659
Avec cette formation pratique vous apprendrez Hyper-V dans Windows Server 2008 R2, créer et gérer des machines virtuelles et des hôtes, y compris les sauvegardes, la haute disponibilité, reprise après sinistre, la gestion des performances, des instantanés, et plus encore!
Une fois que vous avez terminé la formation, vous aurez toutes les compétences et l'expérience dont vous avez besoin pour complètement réaliser la conception, la spécification, l'architecture et l'implémentation d'une solution entièrement fonctionnelle sous Hyper-V dans votre entreprise.
Découvrez la dernière présentation Softlayer en Français qui s'est déroulée le 3 Avril à 11h.
Softlayer se distingue des autres fournisseurs de Cloud par des performances inégalées, un maximum de flexibilité et un contrôle total de sa plateforme IaaS. Les serveurs sont complètement modifiables, connectés grâce à un réseau privé global et sécurisé, managés par une interface unifiée; garantissant une expérience client incomparable. Depuis son rachat par IBM, Softlayer se fait une fierté de contribuer à la fois à l’innovation et à la transformation de vos infrastructures IT tout en vous garantissant un Cloud sans compromis.
S’il n’y avait que trois points à retenir sur softlayer ce seraient ceux là:
Softlayer est en effet leader du marché sur les Performances
Mais est également leader du marché sur la Flexibilité
Enfin Softlayer est enfin leader du marché sur le Contrôle des infrastructures Cloud
Mais softlayer c'est aussi : Automatisation, Certification, Sécurité, la mise à disposition immédiate des serveurs, ses 40 Datacenters à fin 2014 et la possibilité de disposer de Serveur Bare Metal à l’heure.
Enfin et c’est peux être le plus important peut être pour certains d’entre vous : Softlayer c’est Le Choix !
Qui chez Softlayer est tout le contraire du Lock In proposé par la concurrence.
Merci beaucoup de télecharger cette présentation.
Nicolas Verdier,
Commercial Cloud Entreprises Softlayer
+353-1-881-3887 / +353-8-94670549
nicolasv@ie.ibm.com
@IBMnicolas
http://ie.linkedin.com/in/nicolasverdier/
An introduction to similarity search and k-nn graphsThibault Debatty
Similarity search is an essential component of machine learning algorithms. However, performing efficient similarity search can be extremely challenging, especially if the dataset is distributed between multiple computers, and even more if the similarity measure is not a metric. With the rise of Big Data processing, these challenging datasets are actually more and more common. In this presentation we show how k nearest neighbors (k-nn) graphs can be used to perform similarity search, clustering and anomaly detection.
Blockchain is a distributed database that records transactions in chronological order in digitally signed blocks. Each block contains a cryptographic hash linking it to the previous block, forming a chain. Miners on the network verify and record new transactions in blocks, which are then broadcast to the network. While branching can occur, the blockchain resolves it automatically by continuing on the longest branch. Tampering with past transactions requires overcoming the main branch through computational power. The first blockchain application was Bitcoin, which uses this structure to record ownership of digital currency through public/private key cryptography.
Building a Cyber Range for training Cyber Defense Situation AwarenessThibault Debatty
The document discusses building a cyber range for training cyber defense situation awareness. It outlines that cyber defense training requires simulating complex networks and situations while training more than just technical skills. It recommends training using the Boyd and Endsley decision making model, which involves three levels - perception, comprehension, and projection. The cyber range implementation involves text scenarios, variable trainee numbers, vagrant images to configure virtual machines, and examples of individual and team cyber situation awareness training.
A comparative analysis of visualisation techniques to achieve CySA in the mi...Thibault Debatty
This document presents a comparative analysis of different visualization techniques for achieving cyber situational awareness (CySA) in the military. It discusses a 3D operational picture and a Cyber Common Operational Picture (CyCOP) that were modeled using a fictional scenario of physical nodes and cyber elements. The analysis looks at the complementarity, multi-format representations, reporting capabilities, data feeds, granularity, decision support, and mission orientation of each technique. Future work is proposed to validate the techniques using experiments, develop objective CySA measures, and improve the visualizations using data classification and artificial intelligence.
The document describes a webshell detector system that analyzes files and directories for malicious webshells. It uses multiple detection techniques including entropy analysis, checking for dangerous system routines, obfuscation detection, signature matching, and fuzzy hashing. The system is implemented as a Composer library that can also be run as a command line tool to analyze files and directories and detect webshells.
This document discusses graph-based detection of advanced persistent threats (APTs) that rely on HTTP traffic. It proposes building a graph linking each HTTP request to its parent using proxy logs, and pruning the weighted graph to isolate APT activity. An experimental evaluation uses real network logs injected with simulated APT traces to rank suspicious domains, with parameters tuned using cross-validation. Challenges include differentiating APTs from content delivery networks and other legitimate multi-site domains.
This document discusses building k-nearest neighbor graphs from large text data. It presents a method called CTPH that uses locality-sensitive hashing to efficiently construct k-nn graphs at scale. The method was tested on datasets of 200k to 800k spam subject lines. Results showed CTPH was up to 10x faster than alternative map-reduce approaches while achieving reasonable recall, though recall was limited. Future work to improve recall and evaluate graph quality was discussed.
This document describes a MapReduce algorithm for determining the optimal k value in k-means clustering. It presents the G-means algorithm, which uses recursive k-means clustering and normality testing to split clusters until all points are normally distributed around cluster centers. The document outlines challenges in implementing G-means in MapReduce, and describes solutions to reduce I/O, jobs, maximize parallelism and limit memory usage. It compares the proposed MapReduce G-means approach to existing multi-k-means methods, finding it has better quality and comparable speed on synthetic datasets.
The document discusses parallelizing spam clustering using Apache Hadoop. It presents an implementation of k-means clustering on a dataset of 1 million spam emails distributed across Apache Hadoop. The implementation abstracts the k-means algorithm and defines mappers and reducers to run the algorithm in parallel. Benchmark results show the Hadoop implementation is faster than a sequential approach and scales well with additional nodes. Analysis of overhead shows sorting to be the largest contributor. The document concludes there is room for further optimization of the system.
3. PLAN DE LAPRESENTATION
3
CYBER RANGE
o INTRODUCTION AU CYBER RANGE
o FONCTIONNEMENT D’UN CYBER RANGE
o PRESENTATION DE QUELQUE SOLUTIONS CYBER RANGE
o CONCLUSION
o SIMULATION DE LA SOLUTION SOUS VMware
5. I INTRODUCTION
5
CYBER RANGE
Cyber Range Offre :
• des conditions d’entrainement proches du réel
• Une parfaite reconstitution des topologies réseau
19. Bibliothèque de topologies et scénarios
19
Avantages Inconvénients
Indépendant d’une application cliente Chaque utilisateur ne peut exécuter d’un
laboratoire
Possibilité d’exécuter plusieurs laboratoire
simultané port TCP pour la session telnet :128
Le nombre de nœuds par laboratoire :63Capture locale avec Wireshark
Client local Telnet et VNC Absence de Threat Intelligence / générateur
De trafic.
Absence d’un système de Suivi des utilisateurs
Bibliothèque de topologies et scénarios
Possibilité d’avoir trois types d’utilisateurs
déploiement sur Cloud public en mode IaaS