TRUST:Team for Research in Ubiquitous Secure Technologies



Similar documents
Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

Cyber Security at NSU

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

Meeting Cyber Security Challenges

Security Education for the new Generation

US Federal Cyber Security Research Program. NITRD Program

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

EC-Council. Certified Ethical Hacker. Program Brochure

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

A Systems Approach to Protecting the U.S. Air Traffic Control System Against Cyber-Terrorism

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Joint Master in Information Security and Data Management (ISDM)

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Cyber Security Research and Development: A Homeland Security Perspective

Information, Network & Cyber Security

Master of Science Service Oriented Architecture for Enterprise. Courses description

University of Maryland Cybersecurity Center (MC 2 )

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

Information Assurance Program at West Point

Bellevue University Cybersecurity Programs & Courses

Cybersecurity Definitions and Academic Landscape

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation

Educational Requirement Analysis for Information Security Professionals in Korea

NICE and Framework Overview

B.A. in Information Systems

CYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM

FS-ISAC CHARLES BRETZ

Center of Academic Excellence Cyber Operations Program 2013 Application

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Intrusion Detection for Mobile Ad Hoc Networks

Cyber Security VTT and the Finnish Approach

An Open Membership Consortium now 81 companies strong. IIC Founder Companies. As of

CIS 253. Network Security

Actions and Recommendations (A/R) Summary

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

Introduction to Cyber Security / Information Security

Cyber Security Metrics Dashboards & Analytics

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

SCADA Security Training

CESG Certification of Cyber Security Training Courses

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Cybersecurity Challenges and Research Direction NSF Research Activities in C

Cyber Security of the Power Grid

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Enterprise Cybersecurity: Building an Effective Defense

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC)

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

DOE Cyber Security Policy Perspectives

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience

Cyber-physical Systems Security An Experimental Approach

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

SCIENCE, TECHNOLOGY, ENGINEERING & MATHEMATICS (STEM)

TUSKEGEE CYBER SECURITY PATH FORWARD

Privacy and Security in Healthcare

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

The Evolution of Computer Security Attacks and Defenses. Angelos D. Keromytis Columbia University

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

Transcription:

TRUST:Team for Research in Ubiquitous Secure Technologies An Overview Shankar Sastry (Berkeley), Ruzena Bajcsy (Berkeley), Sigurd Meldal (SJSU), John Mitchell (Stanford), Mike Reiter (CMU), Fred Schneider (Cornell), Janos Sztipanovits (Vanderbilt), Steve Wicker (Cornell) http://trust.eecs.berkeley.edu

Attacks are growing in sophistication 2

Attack Incidents [Reports to CERT/CC] 3

The Internet in 1980 4

The Internet Today http://cm.bell-labs.com/who/ches/map/gallery/index.html 5

Bad Code + Big Networks = Problems Geographic spread of Sapphire worm 30 minutes after release Source: http://www.caida.org 6 CodeRed worm (Summer 2001) Infected 360,000 hosts in 10 hours (CRv2) Sapphire/Slammer worm (Spring 2003) 90% of Internet scanned in <10mins

Technology Generations of Information Assurance 1st Generation (Prevent Intrusions) Trusted Computing Base Access Control & Physical Security Multiple Levels of Security Cryptography Intrusions will Occur 2nd Generation (Detect Intrusions, Limit Damage) Some Attacks will Succeed Firewalls Intrusion Detection Systems Boundary Controllers VPNs PKI 7 3rd Generation (Operate Through Attacks) Intrusion Tolerance Graceful Degradation Big Board View of Attacks Real-Time Situation Awareness & Response Security Performance Hardened Core Functionality

TRUSTed Systems and Software 8 TRUST is more than resistance to information attack: Today s systems and networks are fragile, difficult-tocompose and maintain: Non-robust Non-adaptive Untrustworthy Point failures bring down systems Difficult, costly-to-compose useful systems from multiple components Poor or nonexistent means for building reliable systems from necessarily unreliable components Poor understanding of vulnerabilities of networks, performance under and uncharacterized attacks No clear history, pedigree on data, code

TRUST worthy Systems 9 More than an Information Technology issue Complicated interdependencies and composition issues Spans security, systems, and social, legal and economic sciences Cyber security for computer networks Critical infrastructure protection Economic policy, privacy TRUST: holistic interdisciplinary systems view of security, software technology, analysis of complex interacting systems, economic, legal, and public policy issues Goals: Composition and computer security for component technologies Integrate and evaluate on testbeds Address societal objectives for stakeholders in real systems

Research Agenda 10 Security Science (Schneider) Software Security (Mitchell) Trusted Platforms (Boneh) Applied Cryptography Protocols (Wagner) Network Security (Joseph) Systems Science (Schmidt) Interdependency Modeling and Analysis (Anantharam) Secure Network Embedded Systems (Wicker) Model Based Integration of Trusted Components (Sztipanovits) Secure Information Management Tools (Birman) Social, Economic and Legal Considerations (Samuelson) Economics, Public Policy and Societal Challenges (Varian) Digital Forensics and Privacy (Tygar) Human computer Interfaces and Security (Reiter)

Broad Research Vision Critical Infrastructure Privacy Societal Challenges Computer and Network Security TRUST will address social, economic and legal challenges Power Grid Testbed Network Security Testbed Integrative Testbeds Secure Networked Embedded Systems Testbed Specific systems that represent these social challenges. 11 Trusted Platforms Applied Crypto - graphic Protocols Network Security Software Security Complex Inter - Dependency mod. Secure Network Embedded Sys Model -based Security Integration. Secure Compo - nent platforms Component Technologies HCI and Security Econ., Public Pol. Soc. Chall. Forensic and Privacy Secure Info Mgt. Software Tools Component technologies that will provide solutions

Integration of Research Agenda 12 Four testbeds chosen to be responsive to national needs: Computer and network security, Critical infrastructure protection, Privacy (Sztipanovits coordinator) Integration testbed Secure Network Embedded Systems Planet Lab (Culler) Cyber Defense Technology Experimental Research testbed (DETER) (Benzel/Joseph/Sastry) Technical Management Plan through time sensitive internal deliverables of software, systems among team members Exchange of scientific personnel among team members

Education Program Vision 13 Security must be consciously engineered into new and legacy critical infrastructure systems Every component level needs rethinking and education: need to build in TRUST: security science, systems science and social, legal, economic considerations into every course in undergrad and grad curricula ( liberal technologically literate education) Summer school, hallmark of TRUST for hottest new research Repositorying content developed Evaluation of Effectiveness

Education Evaluation Metrics Goal Objective Metrics Frequency K-12 Education K-6 education School visits, Educational material, Teacher education 6-12 education Science fairs, Trust lectures, University visits Bi-annual Bi-annual Undergrad Education Security Modules Education Materials, Repository, Classroom testing Annual Security Course Education Materials, Repository, Classroom testing Annual Capstone Course Education Materials, Repository, Classroom testing, Cyber Clinic usage Annual 14 Graduate Education Security Course Education Materials, Repository, Classroom testing Annual Seminar Courses Respository Bi-annual

Outreach Vision and Goals 15 It is an oft quoted adage that security is as strong as the weakest link. Our aim is to have no weak links left in the education of our society about the technical, compositional, privacy, economic and legal aspects of trusted information systems. We will begin locally but spread our outreach as far as we can along as many diverse axes as we can. Current outreach and diversity efforts are piecemeal. We have a comprehensive solution K-6, 6-12 school outreach Summer research for HBCU/HSIfaculty Curriculum development for HBCU/HSIfaculty Undergrad Research Opportunities Grad Research Opportunities Summer Immersion Institute for women Community Outreach

Knowledge Transfer Vision: TRUST as a Public Private Partnership 16 TRUST as trusted intermediary between industry, government, non-profit and academia for answering hard questions: Who will pay for security Should the Feds play the role of market maker Roadmaps for guiding investment The role of regulation/insurance Open dissemination of research: Publications and software Short courses Public lectures and forums Curriculum development and courses

Key Infrastructures Chosen for Transition 17 Electric Power Infrastructures: SCADA networks and their evolution, wireless sensor network testbed at Oak Ridge, DoE s DC net Financial Infrastructures: key partnerships with Secret Service and Treasury, USPS and financial institutions DoD s Global Information Grid (GIG): key partnerships with Air Force (JBI), Command and Control (Constellation) networks

Leadership and Outreach to other groups 18 EU-IST and US partnerships in dependability and TRUST OSTP/DHS/Treasury/DoE/DoD workshops Workshops for venture partners Special issues of ACM/IEEE/ ESCHER, a non-profit for repositorying TRUST software ACM-SIGBED Partnerships with Singapore (Nanyang) and Taiwan (National Chiao Tong and National Taiwan University)