Nick Buraglio

Nick Buraglio

Urbana-Champaign Area
2K followers 500+ connections

About

Wanna-be artist, full time kid in a grown up body. I work on big networks, IPv6, internet…

Activity

Join now to see all activity

Experience

  • Energy Sciences Network (ESnet) Graphic

    Energy Sciences Network (ESnet)

    Berkeley, CA via Champaign, IL

  • -

  • -

  • -

  • -

  • -

  • -

  • -

    Remote

  • -

    https://www.modem.show

  • -

    Urbana-Champaign, Illinois Area

  • -

    Urbana-Champaign, Illinois Area

  • -

  • -

  • -

Education

Licenses & Certifications

  • MOR Leaders Program Graphic
  • ITILF v3 Graphic

    ITILF v3

    EXIM

    Issued
  • JNCIA

    Juniper Networks

    Issued
  • BCNE

    Brocade Networks

    Issued
  • CCDA

    Cisco Systems

    Issued
  • Inet+

    CompTIA

    Issued
  • CCNA

    Cisco Systems

    Issued
  • MCSE NT4

    Microsoft, Inc

    Issued

Volunteer Experience

  • US Department of Commerce, NTIA Graphic

    Panel Reviewer

    US Department of Commerce, NTIA

    - 4 months

    Science and Technology

    Provide expertise and review grant proposals for various broadband funding programs

  • National Science Foundation (NSF) Graphic

    Panel Reviewer

    National Science Foundation (NSF)

    - 3 years 1 month

    Science and Technology

    Provide domain expertise, review grant proposals for security and networking solicitations.

  • Consulting IT Architect; Advisory Board Member

    New Mexico Internet Exchange (NMIX)

    - Present 5 years 1 month

    Science and Technology

    Provide technical and strategic advisement to the New Mexico Internet Exchange (NMIX).

  • Technical advisory board member

    IPSpace AG

    - Present 8 years 11 months

    Science and Technology

  • General help

    UIUC College of Vet Med Wildlife Medical Clinic

    - 3 years

    Animal Welfare

    Assist UIUC College of Vet Med Wildlife Medical Clinic with feeding and care of resident and patient animals.

Publications

  • Toward live inter-domain network services on the ExoGENI testbed

    IEEE INFOCOM 2018

    A key dimension of reproducibility in testbeds is stable performance that scales in regular and predictable ways in accordance with declarative specifications for virtual resources. We contend that reproducibility is crucial for elastic performance control in live experiments, in which testbed tenants (slices) provide services for real user traffic that varies over time. This paper gives an overview of ExoPlex, a framework for deploying network service providers (NSPs) as a basis for live…

    A key dimension of reproducibility in testbeds is stable performance that scales in regular and predictable ways in accordance with declarative specifications for virtual resources. We contend that reproducibility is crucial for elastic performance control in live experiments, in which testbed tenants (slices) provide services for real user traffic that varies over time. This paper gives an overview of ExoPlex, a framework for deploying network service providers (NSPs) as a basis for live inter-domain networking experiments on the ExoGENI testbed. As a motivating example, we show how to use ExoPlex to implement a virtual software-defined exchange (vSDX) as a tenant NSP. The vSDX implements security-managed interconnection of customer IP networks that peer with it via direct L2 links stitched dynamically into its slice. An elastic controller outside of the vSDX slice provisions network links and computing capacity for a scalable monitoring fabric within the tenant vSDX slice. The vSDX checks compliance of traffic flows with customer-specified interconnection policies, and blocks traffic from senders that trigger configured rules for intrusion detection in Bro security monitors. We present initial results showing the effect of resource provisioning on Bro performance within the vSDX.

    Other authors
    See publication
  • CoreFlow: Enriching Bro security events using network traffic monitoring data

    INDIS Workshop

    Attacks against network infrastructures can be detected by Intrusion Detection Systems (IDS). Still reaction to these events are often limited by the lack of larger contextual information in which they occurred. In this paper we present CoreFlow, a framework for the correlation and enrichment of IDS data with network flow information. CoreFlow ingests data from the Bro IDS and augments this with flow data from the devices in the network. By doing this the network providers are able to…

    Attacks against network infrastructures can be detected by Intrusion Detection Systems (IDS). Still reaction to these events are often limited by the lack of larger contextual information in which they occurred. In this paper we present CoreFlow, a framework for the correlation and enrichment of IDS data with network flow information. CoreFlow ingests data from the Bro IDS and augments this with flow data from the devices in the network. By doing this the network providers are able to reconstruct more precisely the route followed by the malicious flows. This enables them to device tailored countermeasures, e.g. blocking close to the source of the attack. We tested the initial CoreFlow prototype in the ESnet network, using inputs from 3 Bro systems and more than 50 routers.

    Other authors
    See publication
  • NSF CICI Award #1642142 Secure and Resilient Architecture: Creating Dynamic Superfacilities the SAFE Way

    National Science Foundation

    Operate as a key collaborator on awarded NSF proposal #1642142

    The SAFE Superfacilities project brings together researchers and IT support organizations from RENCI/UNC Chapel Hill, Duke University and DOE/ESnet. The goal of this project is to generalize support for stitching dynamic network circuits by providing the authorization and security monitoring necessary to enable general, dynamic, and safe interconnections as a foundational building block for Science DMZ, Software Defined…

    Operate as a key collaborator on awarded NSF proposal #1642142

    The SAFE Superfacilities project brings together researchers and IT support organizations from RENCI/UNC Chapel Hill, Duke University and DOE/ESnet. The goal of this project is to generalize support for stitching dynamic network circuits by providing the authorization and security monitoring necessary to enable general, dynamic, and safe interconnections as a foundational building block for Science DMZ, Software Defined Exchanges (SDX), and superfacilities. One element of the project focuses on using the SAFE logical trust system to authorize dynamic stitching of network links in two systems developed, deployed, and operated by the researchers and their collaborators: the ExoGENI testbed and Duke's Software-Defined Science Network (SDSN) campus network exchange. A second element addresses dynamic out-of-band security monitoring of traffic over these links. The project serves as a model for improving security while maintaining high-performance friction-free network paths between campus scientists and remote facilities.

    Other authors
    See publication
  • Bro IDS: an intruduction

    Enhancing CyberInfrastructure by Training and Education

    High level introduction to the Bro Intrusion detection system.

    See publication
  • Secure Layer 3 SDX Concept (Interdomain SDN)

    ChiNOG 05

    ChiNOG 05 presentation on Secure interdomain SDN for the SDX/IX and traditional autonomous system.

    Other authors
    See publication
  • Securing the SDN WAN

    Other authors
    See publication
  • Securing a Science DMZ or open perimeter network

    A framework for securing a network or set of systems when traditional firewalls and security appliances are not an option.

    See publication
  • BGP still lacks security foundation

    Tech Target

    Thoughts on the shortcomings and lack of good, functional security in the border gateway protocol (BGP4).

    See publication
  • OpenFlow as a network control protocol goes deeper than data center

    Tech Target

    Discussion of OpenFlow as a network control protocol that pushes past Layer 2 to transform the WAN and optical transport layer of the network.

    See publication
  • NSF CC-NIE award 1341025

    National Science Foundation

    Co-PI on CC-NIE Network Infrastructure grant award.

    See publication
Join now to see all publications

Patents

  • Data driven, machine learning augmented dynamic path optimization

    Filed 63/276,148

    Other inventors

Languages

  • English

    Native or bilingual proficiency

  • Spanish

    Elementary proficiency

  • Italian

    Limited working proficiency

Organizations

  • SCinet

    Volunteer

    -

    2003, 2005, 2006, 2009, 2011, 2012, 2014 - 2019 Participate in SCinet working group in various roles including wireless, routing, network security and UNIX services. Lead SDN group 2016, 2018. Group lead for experimental networks group, 2019

Recommendations received

More activity by Nick

View Nick’s full profile

  • See who you know in common
  • Get introduced
  • Contact Nick directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses