in (Northcutt and Novak, 2002). However, beside the
pure technical aspects involved in such implementa-
tions, it is necessary to consider the supervision of an
IT infrastructure as a full operational project.
Figure 1 displays the flow of security events
among multiple sites which are connected under one
administrative domain (AD). These security informa-
tion contains all the suspected threats which incurred
in an AD. The mechanism of security information
flow is similar in all the other ADs.
2.2.5 Secure Virtual Organization Box
Secure Virtual Organization Box (SVOBox) job is to
collect all the correlated security alerts (SA) gener-
ated in different administrative domains (AD) which
consists of multiple sites. SVOBox assigns certain
security level (SL) value using simple metric for real-
time security level evaluation which represents three
values indicated in colors (red, orange and green).
Green indicates no threat occurring in the network,
orange indicates that threats are occurring but not
critical at this time and red indicates intrusions are
in progress which can lead to critical security prob-
lems(Ganame, 2008). In addition to this method we
have added another step which will be performed at
Global Intrusion Data Base (gidb) of every Adminis-
trative Domain (AD). According to this step the gidb
deployed in an AD will forward this security informa-
tion to SVOBox where the SVOBox will assign secu-
rity level value to each AD (see figure 2) as follows,
• If all the sites having green status in an AD that
will be placed in security level 1 which is most
secure than SL 2 and SL 3.
• If any one site in an AD having status indicating
orange that AD will be placed in security level 2
which is more secure than SL 3.
• If any one site in an AD having status indicat-
ing red that AD will be placed in security level
3 which is the least secure level.
After the security level (SL) assignment to all the
ADs which are now the part of this grid. Before start
sharing the resources every AD of this grid would like
to have a global view of the security, for global view
they must need to share the security information with
other ADs in the grid. To share the security alerts
among ADs two methods are employed.
First method is to send security alerts to the ad-
ministrative domains (ADs) of the different security
levels (1,2 and 3). In each AD there exists a gidb
which contains three different kinds of security alerts
(SA) (see figure 3). From top to bottom, the first sec-
tion collects security alerts from the lesser secure lev-
els. The middle section is for holding security alerts
from its local sites which are residing in the same SL.
The third section collects security alerts from the most
secure levels. Finally, the last section is used to store
alerts which an AD do not want to share with others
(private alerts). For example, in figure 3, gidb of AD
3 and AD 4 which are in SL 2 can share their security
alerts with AD 1, AD 2 at SL 1, and AD 5, AD 6 at
SL 3, whereas AD 3 and AD 4 can share their security
alerts using the middle section which is reserved for
their local sites security alert information as they lies
in the same security level that is SL 2. When security
alerts are being shared among ADs the two following
fields will be appended with each security alert mes-
sage:
1. Direction of security alert field which directs the
security alert to move in the upper or lower direc-
tion depending upon the security level value.
2. Time to Live (TTL) field which is used to define
the authorized propagation of the security alert.
For example, if AD 1 which is in SL 1, wants to
share its security alerts only with ADs of SL 2,
it will put an upper direction with a TTL set to 1.
The TTL will be decreased when the security alert
arrives at SL2 so it will not be propagated till SL
3.
Similarly AD 1 and AD 2 can share security alerts
with AD 3, AD 4 and between themselves also. AD
5 and AD 6 can share their security alerts with AD
3, AD 4 respectively. This sharing of security alerts
will present an updated global view of security of the
entire grid. Now each AD can decide according to
its organization policies that sharing of resources can
be done with the most or least secured AD. This is
the objective which we will going to be achieved by
using gSOC, as it gives the global view of the entire
grid without sharing of all the data (see figure 3).
The second method, is to allow a remote network
administrator to query gidb of other administrative
domains. The gidb of an AD will connect with gidb
of other AD and the remote network administrators
of both the ADs will be allowed to query each others
gidb to see the security alerts. After the inspection
of security alerts by each network administrator they
can decide for the sharing of resources. This solution
is also possible but the drawback is that it requires a
constant monitoring and constant execution of queries
on gidb which is not an efficient solution in case of
major attacks like DoS/DDoS attack.
These two kinds of sharing of security information
present some advantages and drawbacks, but they can
be used alternatively depending on the type of net-
work and number of generated security alerts.
MANAGING SECURITY OF GRID ARCHITECTURE WITH A GRID SECURITY OPERATION CENTER
405