Complexity Science Challenges in Cybersecurity
|
|
|
- Hugh Stewart
- 10 years ago
- Views:
Transcription
1 SANDIA REPORT SAND Unlimited Release Printed March 2009 Complexity Science Challenges in Cybersecurity Robert C. Armstrong, Jackson R. Mayo, Frank Siebenlist Prepared by Sandia National Laboratories Albuquerque, New Mexico and Livermore, California Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under Contract DE-AC04-94AL Approved for public release; further dissemination unlimited.
2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: Thisreport wasprepared asan account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency thereof, nor any of their employees, nor any of their contractors, subcontractors, or their employees, make any warranty, express or implied, or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represent that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government, any agency thereof, or any of their contractors or subcontractors. The views and opinions expressed herein do not necessarily state or reflect those of the United States Government, any agency thereof, or any of their contractors. Printed in the United States of America. This report has been reproduced directly from the best available copy. Available to DOE and DOE contractors from U.S. Department of Energy Office of Scientific and Technical Information P.O. Box 62 Oak Ridge, TN Telephone: (865) Facsimile: (865) Online ordering: Available to the public from U.S. Department of Commerce National Technical Information Service 5285 Port Royal Rd Springfield, VA Telephone: (800) Facsimile: (703) Online ordering: DEPARTMENT OF ENERGY UNITED STATES OF AMERICA 2
3 SAND Unlimited Release Printed March 2009 Complexity Science Challenges in Cybersecurity Robert C. Armstrong Scalable Computing R&D Jackson R. Mayo Visualization & Scientific Computing Sandia National Laboratories, P.O. Box 969, Livermore, CA Frank Siebenlist, Mathematics & Computer Science Argonne National Laboratory, 9700 S. Cass Avenue, Argonne, IL Abstract Computers and the Internet are indispensable to our modern society, but by the standards of critical infrastructure, they are notably unreliable. Existing analysis and design approaches have failed to curb the frequency and scope of malicious cyber exploits. A new approach based on complexity science holds promise for addressing the underlying causes of the cybersecurity problem. The application of complexity science to cybersecurity presents key research challenges in the areas of network dynamics, fault tolerance, and large-scale modeling and simulation. We believe that the cybersecurity problem is urgent enough, the limits of traditional reductive analysis are clear enough, and the possible benefits of reducing cyber exploits are great enough, that the further development of cybersecurity-targeted complexity-science tools is a major research need. 3
4 1 Introduction Computers and networks of computers are indispensable to our everyday work because they are so powerful as information processing and communication tools. Partly as a result of this immense capability to do the things we want, computers will also do many things that we do not want. In fact, computers are increasingly doing the bidding of attackers, to the detriment of their owners. Complexity is not an incidental feature of cyber systems but an inextricable necessity due to the complex things they are required to do. Complexity allows serious vulnerabilities to exist in apparently benign code, and allows those who would exploit them to attack invisibly. To understand the cybersecurity problem, we must understand cyber complexity and model it with predictive simulation. To solve the cybersecurity problem, we must figure out ways to live with the inherent unpredictability of modern cyber systems. In the face of the essential unpredictability of software and the ability for attackers to remain unseen, there are three major approaches to mitigation, all of which will benefit from a more scientific approach: 1. Model checking, formal methods [12], and software analysis [22] detect errors and, in the case of very simple systems, rigorously verify behavior as long as the foundational assumptions are correct. Most realistic cyber systems are too complex for rigorous verification, but can benefit from non-exhaustive analysis that will find a few of the straightforward vulnerabilities. Applications are common in supervisory control and data acquisition (SCADA) and medical devices [14], where the systems are less complex and the consequences of faults more severe. 2. Encapsulation, sandboxing [5], and virtual machines [25] provide a way to surround otherwise unpredictable software, hardware, and networks with software or hardware that is more trusted. A common but often ineffective example is a network firewall. Other more effective examples are being developed [17] and this technology holds particular promise for environments unique to DOE (Section 4). 3. Complexity science [27] drawing on biological [11, 15] and other analogues [8] is the least exploited but possibly the most promising approach. Biological metaphors are part of the cyber lexicon: virus, worm, etc. Models of complex cyber systems and their emergent behavior are needed to understand the cybersecurity problem. In this paper we will concentrate mainly on item 3, complexity science, and secondarily, item 2, the encapsulation of complexity. Within the complexity arena, we recommend two basic research thrusts: 1. Confronting unpredictability in programs, machines, and networks and its impact on the cybersecurity problem. Whether it is considered a theoretical certainty or a pragmatic heuristic, it is impossible to formally ensure [16] that a realistic program or operating system is 4
5 vulnerability free. Research is needed to understand how this complexity asymmetrically favors the attacker in current systems, and how it can instead be leveraged against the attacker to the defender s advantage. Theories and algorithms are needed that use complexity to increase the effort required of attackers and reduce their likelihood of success. Here existing work from the fields of fault tolerance and high-reliability systems can be helpful. 2. Modeling the emergent behavior of programs, machines, and networks to understand what they are doing and predict what they will do, to the extent permitted by the underlying complexity. This type of modeling is largely unfamiliar to scientific computing but enjoys wide acceptance in systems analysis (e.g., war gaming, social simulation, business operations). Agent-based and discrete-event simulation methods are commonly used in this area and have already been applied to network and computer system modeling on a small scale. Large-scale modeling and simulation relevant to Internet proportions are needed to understand how the emergent behavior of large numbers of computers, routers, and network links can either mitigate or exacerbate the cybersecurity problem. Understanding the emergent behavior of cyber systems can also enable a broader approach to reliability and fault tolerance. 2 Confronting unpredictability in programs, machines, and networks Complexity of computers and software is an artifact of the complex things we require them to do. Their capacity for computation is inextricably connected to the fact that they are also unpredictable, or rather capable of unforeseen emergent behavior. Vulnerabilities 1 are one of those behaviors. A complex system s emergent behavior cannot be predicted from even a perfect knowledge of the constituent parts from which it is composed, a ramification of undecidability [4] and Turing Completeness. This means that a sufficiently complex system has emergent behavior that cannot be predicted ahead of running it, or alternatively, simulating that system with sufficient fidelity (and complexity) to see the emergent behavior [27] (Section 3). Concretely, this is why cyber systems that are composed of elements like programs, processors, and routers, each of which we presumably understand, are nonetheless constantly surprising us with the consequences of previously unknown vulnerabilities. 2.1 Origins of the cybersecurity problem in complexity Even though most realistic applications are too complex, there are programs and systems that are simple enough to be analyzed by formal methods and other reductive tools. In those cases, boundedness properties of the code can be asserted and proved, making the behavior well-understood 1 By vulnerability we mean some flaw in the system that can be exploited by a malicious actor to cause an effect not desired by the operator of the system. Note that the malicious actor could actually be a programmer or designer of the system with the intent of subverting a user. 5
6 under a wide variety of circumstances. Formal verification [12] is accomplished by automatically following all salient execution paths to understand their consequences. However, probably the vast majority of codes are of the sort that are too complex for this analysis, the number of paths soon grows beyond the capacity of even the largest machines. In this section we consider systems that are undecidable and for which vulnerabilities can only be discovered anecdotally but not thoroughly. Because their containing programs are unanalyzable, these vulnerabilities cannot be guaranteed to be found by any means. Because the defender cannot be certain to find all of the vulnerabilities in a system, and because only one vulnerability is needed for it to be compromised, the cards are asymmetrically stacked in the attacker s favor. 2.2 Fault tolerance and high-reliability systems A vital emergent behavior of many real-world complex systems, particularly biological ones, is robustness to disturbances. The concept of highly optimized tolerance [11] describes highly engineered systems that take on an organic structure after many design cycles promoting robustness similar to biological evolution. Usually confined to medical devices [14] and aerospace avionics [26], fault-tolerant systems use diverse redundant systems and vote the answers to common input, detecting faults 2 as outliers. An example is the set of identical computers on board the Space Shuttle [26]. If we recognize that a vulnerability is just a fault that is exploited, it is clear that cybersecurity too has much to gain from employing diversity [24]. To achieve robustness to such failures through redundancy, the replicated components can employ diverse implementations of the same functionality. In this way, exploits that trigger deviations from the intended behavior are unlikely to affect more than a small fraction of components at a time, and can be detected by voting the outputs [10, 18, 21]. Diversity need not involve complete replication of cyber systems but may be applied creatively, possibly in analogy to the way RAID encoding [2] allows any one element of a disk array to fail and still maintains integrity of the data. If a program s vulnerabilities are unknowable, then some form of diversity is likely necessary to detect, deter, and otherwise leverage complexity against an attacker. Research is needed to formulate measures of diversity and model it in cyber systems to assess its effectiveness. Key challenges include Developing quantifiable models of fault-tolerant and vulnerability-tolerant architectures Quantifying the benefits of implementation diversity Understanding the scaling of attacker and defender effort in fault-tolerant systems 2 By fault we mean any anomalous output of the system. All vulnerabilities are faults, but not all faults are vulnerabilities. 6
7 Developing theories and metrics for diversity among variant implementations of the same software, particularly with respect to vulnerabilities (there is the potential to apply this to hardware and networks in modified form) Using agent-based models to engineer or discover emergent robustness as a topological property of the graph or network of large collections of cyber subsystems Using the above to suggest programming models and network/computer architectures that are inherently more secure 3 Modeling the behavior of programs, machines, and networks Complex systems pose challenges for a reductionist approach to modeling, with a system s global behavior frequently not being readily deducible from even a detailed understanding of its constituent parts. An additional confounding feature of complex systems is their adaptive nature: Such systems can evolve, often in a coordinated manner, to accomplish system-level imperatives. Such behaviors are said to be emergent (they emerge as a consequence of the interactions of the constituents) and being able to reproduce them using appropriate constituent models has often been a matter of trial and error. 3.1 Complex systems modeling The connections among computers that constitute the Internet, the interactions among virtual components in software systems, and the wiring of logic circuits in microchips can all be represented at an abstract level by graphs and networks. Large numbers of entities with discrete interaction patterns, resulting in unpredictable emergent behavior, form what are known as entity-based complex systems approachable from agent-based or discrete-event algorithms [9, 13]. The emergent behaviors of such systems can, however, be understood and predicted in certain global aspects. Specifically, if we are aware of the impact of these networks and graphs on the emergent behavior of the system, they can be crafted to possibly produce desired emergent behavior like robustness to attack. Because cybersecurity issues are rooted in complexity, modeling that complexity with fidelity is paramount. Key challenges include Understanding the global network dynamics of prototypical complex systems Investigating the emergent behavior of idealized complexity models, such as cellular automata [8, 27] and Boolean networks [15] Extending the results to classify the emergent behavior of more general agent-based models 7
8 Relating realistic software architectures to the results of complexity science, in particular robustness to attack, resilience after attack, etc. Designing more general and efficient fault-tolerant architectures using distributed redundancy with emergent robustness, rather than more resource-intensive replication with a single voter Predicting the dynamics and spread of malicious software on physical computer networks Developing agent-based monitoring and cyber forensic capabilities to detect intrusions based on anomalous dynamics 3.2 Large-scale modeling and simulation The application of complexity science to real-world cyber systems requires the ability to model and simulate these systems in a rigorous and validated manner. Just as in traditional science and engineering, coarse-grained models that describe a tractable subset of degrees of freedom are crucial for predictive understanding. But due to the undecidability of complex systems, such reduced models can in general describe only overall features, rather than details, of emergent behavior. The validation of such models thus requires particular care. An important avenue for controlled cyber experiments, enabling exploration of emergent behavior and validation of models, is provided by large-scale emulation an especially realistic form of simulation. Emulation allows a physical computer cluster, through creation of numerous virtual machines and virtual network connections, to trace efficiently and with high realism the behavior of a much larger network of computers. In addition, we need virtual machine managers (VMMs) that allow us to monitor ad-hoc the application s detailed resource access inside the virtual machines in real time, such as network connections, message communication, and CPU/disk/network usage [6]. The advantage of this approach is that the monitoring can be applied transparently to the applications. This monitored data will be part of the emulation or simulation s result set and possibly fed back into our emulation models. Through the same VMMs, we can also enforce fine-grained policies on resource access by the applications, such that we can change and fine-tune our model parameter values in real time, again transparently to the applications themselves. Key challenges include Developing techniques to derive coarse-grained models of complex systems Using renormalization methods from theoretical physics to construct predictive models that preserve key emergent behaviors Applying coarse-grained models to characterize robustness to attack Understanding the relations among different levels of modeling and their ability to predict emergent behavior 8
9 Quantifying tradeoffs between cost and accuracy of models to achieve effective simulations of complex systems Using emergent behavior classifications to guide the choice of appropriate agent-based models Extending network emulation/simulation capabilities to Internet scale Combining insights from modeling and simulation to offer potential improvements to existing software and network protocols Enhancing virtual machine manager implementations to accomodate the detailed monitoring and fine-grained policy enforcements needed for real-time simulation of our models 4 Role of the Department of Energy The Department of Energy has particular needs not currently being answered by the commercial or research cybersecurity community, as well as unique capabilities to advance the state of the art in cybersecurity research. 4.1 Need for securing DOE s unique open resources High performance computing (HPC) platforms and attendant software are geared for performance, and any added controls, such as cybersecurity measures, that inhibit performance are unlikely to be adopted. In the Office of Science these platforms and their computational results need to be given the widest possible access to authorized researchers that can be safely achieved. Yet these platforms and attendant simulations are as complex as any in the commercial world and likely heir to the same frailties. Couple this with the fact that some percentage of the university researchers will be using these HPC resources from (unknowingly) compromised platforms and this makes for a particularly challenging problem. Because neither the outside (university researcher s platform) nor the inside (DOE HPC simulation) can be trusted, some sort of virtual machine with sandboxed proxy for the simulation must be considered. The proxy may take the form of a remote method invocation system [3] or even a web-based protocol. The virtual machine within which it executes must enforce a security policy that disallows unsafe operations originating from either side [23]. This policy and attendant enforcement code will benefit from software analysis and formal methods to ensure correctness so that the virtual machine sandbox itself cannot be compromised. More advanced research that allows more flexible and adaptable allocation of potentially dangerous capabilities should be considered as well. The recent, promising research results on creating more secure and safer execution environments for JavaScript and Java, using capability-based techniques and enforced best-practices [17, 19, 20], may be applicable to a virtual machine sandbox environment with fine-grained access control policy enforcement on resource usage and message passing. A wide range of ideas should be considered that enables the DOE-unique environment where both openness is permitted and performance is uninhibited. 9
10 4.2 Use of DOE s unique capabilities for cybersecurity research As discussed previously, large-scale emulation and simulation hold great promise for understanding cybersecurity (Section 3.2). While this is not a new concept [1], DOE is in a unique position to take advantage of it. Within high-performance clusters and Leadership Class Computing (LCC), a virtual Internet can be constructed for emulating and simulating routers, web farms, terminal nodes, etc., and the malefactors that prey on them. Both in scale and speed, LCC machines present an opportunity not found elsewhere for the emulation and simulation of the Internet at a nationstate scale, enabling computer experiments for phenomena that require a global view to understand, such as botnets [7]. Key challenges include Researching novel architectures for preserving an open computing and collaboration framework while maintaining a secure environment for DOE-held assets Investigating simulation and emulation environments that are enabled by current DOE HPC resources 10
11 References [1] DARPA BAA for Cyber Test Range. and_as.pdf. [2] RAID. [3] Remote method invocation. basic/rmi. [4] Rice s theorem. s_theorem. [5] Sandbox for computer security. security). [6] shype: Hypervisor security architecture. systems_department/projects/hypervisor/. [7] Storm botnet. [8] P. Bak, C. Tang, and K. Wiesenfeld. Self-organized criticality: An explanation of 1/ f noise. Physical Review Letters, 59: , [9] P. Brantley, B. L. Fox, and L. E. Schrage. A Guide to Simulation. Springer-Verlag, New York, [10] S. S. Brilliant, J. C. Knight, and N. G. Leveson. Analysis of faults in an N-version software experiment. IEEE Transactions on Software Engineering, 16: , [11] J. M. Carlson and J. Doyle. Highly optimized tolerance: A mechanism for power laws in designed systems. Physical Review E, 60: , [12] E. M. Clark, O. Grumberg, and D. A. Peled. Model Checking. MIT Press, [13] W. J. Dally and B. Towles. Principles and Practices of Interconnection Networks, pages Elsevier, San Francisco, [14] High Confidence Software and Systems Coordinating Group. High-Confidence Medical Devices: Cyber-Physical Systems for 21st Century Health Care, pages Networking and Information Technology Research and Development Program (NITRD), nitrd.gov/about/meddevice-final1-web.pdf. [15] S. A. Kauffman. The Origins of Order: Self-Organization and Selection in Evolution. Oxford University Press, [16] T. W. Körner. The Pleasures of Counting, pages Cambridge University Press, Cambridge, UK, [17] B. Laurie. Access control. 11
12 [18] B. Littlewood, P. Popo, and L. Strigini. Modeling software design diversity. ACM Computing Surveys, 33: , June [19] A. Mettler and D. Wagner. The Joe-E language specification (draft). Technical Report UCB/EECS , U.C. Berkeley, May html. [20] M. S. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay. Caja: Safe active content in sanitized JavaScript. Technical report, June com/files/caja-spec pdf. [21] J. Oberheide, E. Cooke, and F. Janhanian. CloudAV: N-version antivirus in the network cloud. In Proceedings of the 17th USENIX Security Symposium, San Jose, CA, July [22] D. Quinlan. ROSE: Compiler support for object-oriented frameworks. In Proceedings of Conference on Parallel Compilers (CPC2000), Aussois, France, January [23] R. Sahita and D. Kolar. Beyond Ring-3: Fine grained application sandboxing. In W3C Workshop on Security for Access to Device APIs from the Web, London, December [24] B. Salamat, T. Jackson, A. Gal, and M. Franz. Intrusion detection using parallel execution and monitoring of program variants in user-space. In Proceedings of EuroSys 09, Nürnberg, Germany, April [25] S. Santhanam, P. Elango, A. Arpaci-Dusseau, and M. Livny. Deploying virtual machines as sandboxes for the grid. In Proceedings of Second Workshop on Real, Large Distributed Systems, [26] J. R. Sklaroff. Redundancy management technique for Space Shuttle computers. IBM Journal of Research and Development, 20:20 28, [27] S. Wolfram. A New Kind of Science. Wolfram Media, Champaign, IL,
13 v1.31
14
Penetration Testing of Industrial Control Systems
SF-1075-SUR (8-2005) SANDIA REPORT SAND2005-2846P Unlimited Release Printed March, 2005 Penetration Testing of Industrial Control Systems David P. Duggan Prepared by Sandia National Laboratories Albuquerque,
Dynamic Vulnerability Assessment
SANDIA REPORT SAND2004-4712 Unlimited Release Printed September 2004 Dynamic Vulnerability Assessment Cynthia L. Nelson Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore,
IDC Reengineering Phase 2 & 3 US Industry Standard Cost Estimate Summary
SANDIA REPORT SAND2015-20815X Unlimited Release January 2015 IDC Reengineering Phase 2 & 3 US Industry Standard Cost Estimate Summary Version 1.0 James Mark Harris, Robert M. Huelskamp Prepared by Sandia
Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems
PNNL-19266 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems SV Singh AI Thronas January
Laser Safety Audit and Inventory System Database
SAND REPORT SAND2003-1144 Unlimited Release Printed May 2003 Laser Safety Audit and Inventory System Database Arnold L. Augustoni Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185
Situated Usability Testing for Security Systems
PNNL-20201 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Situated Usability Testing for Security Systems FL Greitzer February 2011 DISCLAIMER This report was prepared as an
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
Energy Systems Integration
Energy Systems Integration A Convergence of Ideas Ben Kroposki, Bobi Garrett, Stuart Macmillan, Brent Rice, and Connie Komomua National Renewable Energy Laboratory Mark O Malley University College Dublin
The Production Cluster Construction Checklist
ARGONNE NATIONAL LABORATORY 9700 South Cass Avenue Argonne, IL 60439 ANL/MCS-TM-267 The Production Cluster Construction Checklist by Rémy Evard, Peter Beckman, Sandra Bittner, Richard Bradshaw, Susan Coghlan,
Help for the Developers of Control System Cyber Security Standards
INL/CON-07-13483 PREPRINT Help for the Developers of Control System Cyber Security Standards 54 th International Instrumentation Symposium Robert P. Evans May 2008 This is a preprint of a paper intended
NEAMS Software Licensing, Release, and Distribution: Implications for FY2013 Work Package Planning
ORNL/TM-2012/246 NEAMS Software Licensing, Release, and Distribution: Implications for FY2013 Work Package Planning Preliminary Report (NEAMS Milestone M4MS-12OR0608113) Version 1.0 (June 2012) David E.
An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/
An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at
MEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
Complexity theory in Cyber Security
Complexity theory in Cyber Security It is the mark of an educated mind to be able to entertain a thought without accepting it. Aristotle, Metaphysics 1. Introduction With computer systems becoming ubiquitous
Mathematical Challenges in Cybersecurity
SANDIA REPORT SAND 2009-0805 Unlimited Release Printed February 2009 Mathematical Challenges in Cybersecurity Daniel M. Dunlavy, Bruce Hendrickson, and Tamara G. Kolda Prepared by Sandia National Laboratories
How To Manage A Security System
SANDIA REPORT SAND2008-81438143 Unclassified Unlimited Release Printed December 2008 Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures Calvin D. Jaeger,
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment
SANDIA REPORT SAND2007-7328 Unlimited Release November 2007 Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Raymond C. Parks Prepared by Sandia National Laboratories Albuquerque,
MEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
Measurement of BET Surface Area on Silica Nanosprings
PNNL-17648 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Measurement of BET Surface Area on Silica Nanosprings AJ Karkamkar September 2008 DISCLAIMER This report was prepared
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Optical Blade Position Tracking System Test
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Optical Blade Position Tracking
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
Concept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
Network Mission Assurance
Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT
Energy Research and Development Division FINAL PROJECT REPORT CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Prepared for: Prepared by: California Energy Commission KEMA, Inc. MAY 2014 CEC
Climate-Weather Modeling Studies Using a Prototype Global Cloud-System Resolving Model
ANL/ALCF/ESP-13/1 Climate-Weather Modeling Studies Using a Prototype Global Cloud-System Resolving Model ALCF-2 Early Science Program Technical Report Argonne Leadership Computing Facility About Argonne
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
Process for Selecting Engineering Tools Applied to Selecting a SysML Tool
SANDIA REPORT SAND2010-7098 Unlimited Release February 2011 Process for Selecting Engineering Tools Applied to Selecting a SysML Tool Kent de Jong, Mark J. De Spain, Marjorie E. Hernandez, Debbie S. Post,
This document was prepared in conjunction with work accomplished under Contract No. DE-AC09-96SR18500 with the U. S. Department of Energy.
This document was prepared in conjunction with work accomplished under Contract No. DE-AC09-96SR18500 with the U. S. Department of Energy. DISCLAIMER This report was prepared as an account of work sponsored
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
A High Performance Computing Scheduling and Resource Management Primer
LLNL-TR-652476 A High Performance Computing Scheduling and Resource Management Primer D. H. Ahn, J. E. Garlick, M. A. Grondona, D. A. Lipari, R. R. Springmeyer March 31, 2014 Disclaimer This document was
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access
Drupal Automated Testing: Using Behat and Gherkin
PNNL-23798 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Drupal Automated Testing: Using Behat and Gherkin Thomas Williams [email protected] Carolyn Wolkenhauer [email protected]
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
An Old Dog Had Better Learn Some New Tricks
ANALYST BRIEF An Old Dog Had Better Learn Some New Tricks PART 2: ANTIVIRUS EVOLUTION AND TECHNOLOGY ADOPTION Author Randy Abrams Overview Endpoint protection (EPP) products are ineffective against many
Building CHAOS: an Operating System for Livermore Linux Clusters
UCRL-ID-151968 Building CHAOS: an Operating System for Livermore Linux Clusters Jim E. Garlick Chris M. Dunlap February 21, 2002 Approved for public release; further dissemination unlimited DISCLAIMER
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
Big Data - Infrastructure Considerations
April 2014, HAPPIEST MINDS TECHNOLOGIES Big Data - Infrastructure Considerations Author Anand Veeramani / Deepak Shivamurthy SHARING. MINDFUL. INTEGRITY. LEARNING. EXCELLENCE. SOCIAL RESPONSIBILITY. Copyright
CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014)
CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014) CSTA Website Oracle Website Oracle Contact http://csta.acm.org/curriculum/sub/k12standards.html https://academy.oracle.com/oa-web-introcs-curriculum.html
Doctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
Early Fuel Cell Market Deployments: ARRA and Combined (IAA, DLA, ARRA)
Technical Report NREL/TP-56-588 January 3 Early Fuel Cell Market Deployments: ARRA and Combined (IAA, DLA, ARRA) Quarter 3 Composite Data Products Jennifer Kurtz, Keith Wipke, Sam Sprik, Todd Ramsden,
New Era in Cyber Security. Technology Development
New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
Systems Engineering Management Plans
SANDIA REPORT SAND2009-7836 Unlimited Release Printed October 2009 Systems Engineering Management Plans Tamara S. Rodriguez Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore,
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Improving a Gripper End Effector
PNNL-13440 Improving a Gripper End Effector OD Mullen CM Smith KL Gervais January 2001 Prepared for the U.S. Department of Energy under Contract DE-AC06-76RL01830 DISCLAIMER This report was prepared as
Small PV Systems Performance Evaluation at NREL's Outdoor Test Facility Using the PVUSA Power Rating Method
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Small PV Systems Performance
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif
Cloud Resilient Architecture (CRA) -Design and Analysis Glynis Dsouza Hamid Alipour Salim Hariri Youssif-Al-Nashif NSF Center for Autonomic Computing University of Arizona Mohamed Eltoweissy Pacific National
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Proposal: Application of Agile Software Development Process in xlpr ORNL- 2012/41412 November 2012
Proposal: Application of Agile Software Development Process in xlpr ORNL- 2012/41412 November 2012 Prepared by Hilda B. Klasky Paul T. Williams B. Richard Bass This report was prepared as an account of
Understanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.
KVM and Hypervisor Security David Shepard and Matt Gaston CMU/SEI Cyber Innovation Center February 2012 2012 by Carnegie Mellon University. Published SEI PROPRIETARY INFORMATION. Distribution: Director
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Risk and Security Assessment. Zbigniew Kalbarczyk
Risk and Security Assessment Zbigniew Kalbarczyk 1 TCIPG Cluster Arrangement Communication and Data Delivery for Wide-Area Monitoring and Control Trustworthy cyber infrastructure and technologies for wide-area
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Building Resilient Systems: The Secure Software Development Lifecycle
Building Resilient Systems: The Secure Software Development Lifecycle Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT [email protected]
The scalability impact of a component-based software engineering framework on a growing SAMR toolkit: a case study
The scalability impact of a component-based software engineering framework on a growing SAMR toolkit: a case study Benjamin A. Allan and Jaideep Ray We examine a growing toolkit for parallel SAMR-based
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
How To Secure Cloud Computing
Resilient Cloud Services By Hemayamini Kurra, Glynis Dsouza, Youssif Al Nasshif, Salim Hariri University of Arizona First Franco-American Workshop on Cybersecurity 18 th October, 2013 Presentation Outline
Anti-Virus Power Consumption Trial
Anti-Virus Power Consumption Trial Executive Summary Open Market Place (OMP) ISSUE 1.0 2014 Lockheed Martin UK Integrated Systems & Solutions Limited. All rights reserved. No part of this publication may
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
Visualizing Threats: Improved Cyber Security Through Network Visualization
Visualizing Threats: Improved Cyber Security Through Network Visualization Intended audience This white paper has been written for anyone interested in enhancing an organizational cyber security regime
LEADERSHIP DEVELOPMENT STUDY
SANDIA REPORT SAND 25-28 Unlimited Release Printed April 25 LEADERSHIP DEVELOPMENT STUDY Success Profile Competencies and High-Performing Leaders at Sandia National Laboratories Deborah R. Mulligan, Ph.
IBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration.
IBM Global Technology Services March 2008 Virtualization for disaster recovery: Page 2 Contents 2 Introduction 3 Understanding the virtualization approach 4 A properly constructed virtualization strategy
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
Abstract. 1. Introduction. 2. Threat Model
Beyond Ring-3: Fine Grained Application Sandboxing Ravi Sahita ([email protected]), Divya Kolar ([email protected]) Communication Technology Lab. Intel Corporation Abstract In the recent years
Threat Analysis Framework
SANDIA REPORT SAND2007-5792 Unlimited Release September 2007 Threat Analysis Framework David P. Duggan and John T. Michalski Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore,
So#ware Tools and Techniques for HPC, Clouds, and Server- Class SoCs Ron Brightwell
So#ware Tools and Techniques for HPC, Clouds, and Server- Class SoCs Ron Brightwell R&D Manager, Scalable System So#ware Department Sandia National Laboratories is a multi-program laboratory managed and
Security Metrics for Process Control Systems
SANDIA REPORT SAND2007-2070P Unlimited Release September 2007 Security Metrics for Process Control Systems Annie McIntyre, Blair Becker, Ron Halbgewachs Prepared by Sandia National Laboratories Albuquerque,
Regional Field Verification Operational Results from Four Small Wind Turbines in the Pacific Northwest
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Regional Field Verification Operational
A New Approach to Nuclear Computer Security
A New Approach to Nuclear Computer Security By George Chamales The current, attack centric approach to computer security is incapable of adequately defending nuclear facilities. This paper introduces a
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
