Vsebina predavanj

Vsebina predavanj SINOG 5.0 srečanja – 7. in 8. junij 2018

Ron Broersma
IPv6, the Cloud, and a bit of Internet history

Testing of cybersecurty appliances to measure IPv6 functionality show a wide range of maturity, and some examples will be given. IPv6 deployment in some parts of the U.S. Federal Government are going well, while others are not. Why? Migration to the commercial Cloud is accelerating, but how well do the Cloud Service Providers support IPv6? There will also be some reflections on Internet history.

Sara V. Marcolla
The European Cybercrime Centre: joining forces and expertise to combat cyber threats

The European Cybercrime Centre (EC3 ), established at Europol in 2013, has rapidly grown to become the focal point in the fight against cybercrime in the Union, pooling cross-sectorial cybercrime expertise to support Member States and Third Parties’ cybercrime investigations and providing a collective voice of European cybercrime investigators across law enforcement and the judiciary. EC3 here presents a series of issues LEAs are facing with regards of CGN and IPv6 transitioning.

Andy Mindnich
IPv6@IBM – An enterprise journey

How do you embrace IPv6 in a global enterprise, with tens of thousands of network devices, delivery teams all around the globe and no real shortage on IPv4 space? This presentation will talk about the introduction of IPv6 inside IBM’s own network over the past few years, the challenges we’ve seen and some outlook for the road ahead of us. As enterprises
in general seem to be more behind IPv6 than ISPs or carriers, this session is aimed to help those who still need to build a case within their own company.

Ivan Pepelnjak
Real-life Network Automation

While vendor marketers keep confusing customer engineers with buzzwords like “software-defined” and “intent-driven”, an increasing number of network- and security engineers decided to go another way and solve their problems the way system administrators did years ago: by combining simple tools into a system that delivers real-life solutions to real-life problems. The talk will focus on several simple use cases.

The talk will describe real-life use cases implemented in production networks, including:

  • Configuration management and version control;
  • Information gathering and reporting;
  • Automatic deployment of data center fabrics and associated services;
  • Automatic generation and deployment of firewall rules;
  • Network state validation;
  • Compliance reports

Davida Starina in Rok Kosem
Pomen blockchaina za varnost in zaupanje med IoT napravami

Tehnologija veriženja podatkovnih blokov oz. blockchain se je v širši svetovni javnosti razširila v zadnjem letu ali dveh z razmahom t. i. kriptovalut. A kriptovalute predstavljajo le majhen delež uporabnosti te tehnologije, ki se je pred desetimi leti razvila za namen decentralizacije plačilnih sredstev. V predavanju bomo predstavili osnove tehnologije veriženja podatkovnih blokov. Razložili bomo, kako blockchain omogoča nespremenljivo shranjevanje podatkov s pomočjo konsenza med uporabniki ter vam predstavili nekaj algoritmov konsenza. Predstavili vam bomo razliko med javnim in zasebnim blockchainom ter pokazali uporabnost odprtokodne platforme Hyperledger Fabric za podporo decentralizaciji poslovnih omrežij. Poskusili bomo prikazati, kako blockchain prispeva k večji varnosti in zaupanju med IoT napravami.

Gregor Leban
Use of AI for automatic detection of world events using Event Registry

There are daily over 1 million news articles written by news publisher globally. They are intended to inform the public about the current affairs. This information can however also be collected and analyzed by computers in order to extract from the content relevant information. Event Registry is a system that we developed that can automatically collect publicly accessible news content produced by news sources globally and identify actual events that occurred in the world, which are being mentioned in the news. Using the semantic technologies we can extract also key information such as what happened, where, who was involved, etc. The extracted events provide us with a structured view of the world and it can be used to find specific types of events, find chains of related events, see how the same information is presented in different languages and much more. Extensive list of visualizations also allows the user to aggregate thousands of results in a single view in order to gain valuable insights.

Nathalie Trenaman
“Just give me a button! – Challenges of Routing Security”

In a world were Routing Security is seen by network engineers as difficult, but more and more hijacks are happening, Nathalie shines a light on the value of two Routing Security tools that RIPE NCC provides.
In this presentation we will discuss the pros and cons of IRR and RPKI, the data quality and the road ahead. 
 
Klaus Samardžič
Virtualne funkcije omrežja (VNF)

Klaus Samardžić, produktni vodja, Smart Com bo podal odgovore na ključna vprašanja, ki se porajajo predno se podamo v virtualizacijo omrežnih funkcij (VNF):

  • Zakaj bi potrebovali VNF v vašem omrežju?
  • Kako bi lahko implementirali to funkcionalnost?
  • Kdaj je pravi trenutek za spremembo pri ponujanju storitev v vašem omrežju?

Odgovore na vprašanja bo podkrepil s konkretnimi primeri virtualizacije omrežnih funkcij.

Marko Tišler
Ne vstopaj v moje omrežje!

Razvoj varnostnih mehanizmov v omrežjih poganja nenehno tekmovanje med industrijo in posamezniki in organizacijami, ki jih poskušajo zaobiti. Predavanje pokriva zgdovinski razvoj varnostnih mehanizmov v brezžičnih omrežjih skupaj z vse bolj naprednimi metodami poskusa vdora v omrežje ter kako se na to odziva industrija, vključno z vpogledom v novi varnostni standard WPA3.

Peter Zalar
Kako načrtovati obstoječe in neobstoječe WiFi omrežje in optimalno preživeti

Danes se s samoumevnostjo WiFi povezovanja in naraščajočim številom priključenih naprav oža načrtovalska svoboda s pomočjo profesionalnih programskih orodij.
Predavanje se bo dotaknilo žgoče problematike zavedanja pomena izhodiščnih zahtev za načrtovanje in razporeditev brezžičnih WiFi točk v kompleksnih okoljih. Obstoječa WiFi omrežja se lahko z novimi prijemi izboljšajo in njihovo uporabnost podaljša.
Od načrtovalca in uresničevalca se zahteva več. Z jasnimi zahtevami in željami je sodobno brezžično omrežje kos pokritju predvidenih lokacij in številu uporabnikov. V kratkem predavanju bodo predstavljeni problemi in rešitve na primerih.

Tom Puc, Robert Ambrož – “Internet stvari” konkretno (v živo, brez Gartnerjevih grafov)

Pred dobrim letom smo prenesli prve podatke iz vipavskega vinograda preko prosto dostopnega LPWAN omrežja brez naročnin. To je bil majhen prispevek k (eksplozivni) rasti števila “stvari”, a vsak pohod se začne s prvim korakom. Predavatelja vam bova predstavila, kako smo ustanovili skupnost Iot.novagorica.eu, se pridružili “The Things Network”, ki gradi globalno omrežje interneta stvari s tehnologijo LoRaWAN in nabirali izkušnje na ruralnih ter urbanih projektih.