Skip to Content.
Sympa Menu

regional-network-technical - 8/12/21 “Network Border Security at Scale at the U of MI" Webinar, 1:00 ET

Subject: Regional Technical Contacts

List archive

8/12/21 “Network Border Security at Scale at the U of MI" Webinar, 1:00 ET


Chronological Thread 
  • From: Linda Roos <>
  • To: "" <>, "" <>, "" <>
  • Subject: 8/12/21 “Network Border Security at Scale at the U of MI" Webinar, 1:00 ET
  • Date: Fri, 6 Aug 2021 17:38:14 +0000

Hi All,
The “Network Border Security at Scale at the University of Michigan" webinar will be held on Thursday, August 12 at 1pm ET. Dan Eklund, University of MI is presenting. We hope that you will be able to join us.
Registration Link: https://service5.internet2.edu/reg/events/i2cv-0812/registrations
Abstract: 

Information and Technology Services (ITS) provides and maintains the University of Michigan’s network (UMnet). UMnet is the core unifying technology connecting all schools, colleges, and institutes to each other and the internet. Further, it is the critical core technology enabler for the multitude of technologies U-M’s various missions depend on to operate.

UMnet directly connects to the internet with multiple redundant 100Gbps connections, offering U-M immense flexibility and the opportunity to collaborate with anyone, anywhere. However, no cost-effective solutions are available today to protect the network and so UMnet is still vulnerable to network security threats which could impact its availability to the U-M community.

As a response to this challenge, ITS completed a proof-of-concept for a custom network border security system that scales with the university’s network capacity needs and has deployed the full-scale, production solution. Based on a model pioneered by Lawrence Berkeley National Labs and adopted by Indiana, Ohio State, and Purdue, this solution includes a mix of vendor components and open-source software (Zeek). This solution uses various methods to classify network traffic as either a threat or not and then modifies access control lists on an inline device to stop the threat. When large research flows are detected, it passes the data through without further inspection, thus allowing the cluster to keep up with the flow of data.

SPEAKERS:

Daniel Eklund, University of Michigan 
Linda Roos
Sr Director, State and Regional Networks
Internet2

812-558-0615




  • 8/12/21 “Network Border Security at Scale at the U of MI" Webinar, 1:00 ET, Linda Roos, 08/06/2021

Archive powered by MHonArc 2.6.24.

Top of Page