julian.kunkel@gwdg.de | |
PGP | 1468 1A86 A908 D77E B40F 45D6 2B15 73A5 9D39 A28E |
Address | RZGö, Burckhardtweg 4, Georg-August Universität Göttingen, room 4.111 |
Telephone | +49 551/39-30144 |
Dr. Kunkel is a Professor in High-Performance Computing at the University of Göttingen, a Deputy Head of the GWDG and group leader of the working group Computing. Previously, he was a Lecturer at the Computer Science Department at the University of Reading and a postdoc in the research department of the German Climate Computing Center (DKRZ).
He manages several research projects revolving around High-Performance Computing and particularly high-performance storage. Julian became interested in the topic of HPC storage in 2003, during his studies of computer science. Besides his main goal to provide efficient and performance-portable I/O, his HPC-related interests are data reduction techniques, performance analysis of parallel applications and parallel I/O, management of cluster systems, cost-efficiency considerations, and the software engineering of scientific software. Dr. Kunkel is a member of many international program committees, he is a founding member of the IO500 benchmarking effort, the Virtual Institute for I/O, and the HPC Certification Forum. He is committed to excellence in research and teaching.
Objective: The objective of this thesis is to develop and evaluate methods and tools to harden OpenStack environments for customers and improve their security. Tasks: Vulnerability analysis: Perform a detailed analysis of OpenStack environments to identify open ports, unused services and other potential vulnerabilities. This can be done with tools such as Nmap, Nessus or OpenVAS. Automatic detection of security vulnerabilities: Development of an automated process for the detection of security vulnerabilities in OpenStack environments. This can be done by using tools such as Ansible, SaltStack or Puppet. Wazuh for CVE detection: Integration of Wazuh, an open source security information and event management system (SIEM), into the OpenStack environment to detect Common Vulnerabilities and Exposures (CVEs) to track common vulnerabilities and exposures. Hardening of OpenStack components: Perform hardening measures for OpenStack components such as Nova, Neutron, Cinder and Keystone to improve their security. Security policy development: Develop security policies and procedures for security policies and procedures for the OpenStack environment to ensure that all security measures are implemented consistently and effectively. Methodology: Literature review: Conduct a comprehensive literature review on OpenStack security, hardening and CVE detection. Experimental work: Conducting experiments and tests in a lab environment to evaluate the developed methods and tools. Case study: Performing a case study in a real OpenStack environment to demonstrate the practicability of the developed methods and tools.
All publications as BibTex