The Science of Cyber Security. Peter Weinberger (Google Inc) (based on a study for DDR&E s Steven King, with no any conneceon to Google at all)



Similar documents
Cyber Security and Science

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)

US Federal Cyber Security Research Program. NITRD Program

Science or Security. George O. Strawn NSF & NITRD (retired)

NSF Cyber Trust Report

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Firewalls. Steven M. Bellovin Matsuzaki maz Yoshinobu

The Changing Threat Surface in. Embedded Computing. Riley Repko. Vice President, Global Cyber Security Strategy

Network Security in Building Networks

Security is Not a Commodity: The Road Forward for Cybersecurity Research

Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages

Big Data R&D Initiative

Sunil A. Bhave Ph.D. (UC Berkeley, 2004)

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas

The University of California at Berkeley. A Brief Overview July 2007 For Presentation in Tokyo by Professor Stephen Cohen

CYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES. Strengthening Your Community at the Organizational Level

PCI-DSS Penetration Testing

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

2012 Application Security Gap Study: A Survey of IT Security & Developers

Moderator Shigeki Goto, Professor, Department of Computer Science and Engineering, Waseda University

Cyber Security Strategies for the Small Business Market

Cyber Security Strategies for the Small Business Market

NSF Activities in Cyber Trust

DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK.

End to End Defense against Rootkits in Cloud Environment Sachin Shetty

The Impact of Cybercrime on Business

"Industry Side Views of cyber security in Japan"

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Design Principles for Protection Mechanisms. Security Principles. Economy of Mechanism. Least Privilege. Complete Mediation. Economy of Mechanism (2)

Security Threats on National Defense ICT based on IoT

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

WHITE PAPER Security in M2M Communication What is secure enough?

Promoting Network Security (A Service Provider Perspective)

EECS 588: Computer and Network Security. Introduction January 14, 2014

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

The Importance of Cybersecurity Monitoring for Utilities

Cybersecurity Best Practices

B-10: Wireshark vs. The Cloud Thursday June 17, :45am -12:15pm

Project 25 Security Services Overview

Firewalls for small business

Security Education for the new Generation

Microgrid Technology: Enabling Energy Reliability and Security Opportunities in Campus, Commercial & Industrial Communities

TECH GUYS. Protect Your Practice with a Security Risk Assessment. HCTechGuys.com. HCTechGuys.com TECH GUYS

Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3

Train Like You Will Fight

TRUST:Team for Research in Ubiquitous Secure Technologies

The Internet of Things Risks and Challenges

National Cyber Security Month 2015: Daily Security Awareness Tips

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Reducing Application Vulnerabilities by Security Engineering

EECS 588: Computer and Network Security. Introduction

HOW TO GET A PH.D. IN MATHEMATICS IN A TIMELY FASHION

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

INFORMATION OPERATIONS & SECURITY SPRING REVIEW MTG

Overall Network Security. Daniel J. Nealis

PlanetLab: a Petri dish for the next Internet. Timothy Roscoe Intel Research at Berkeley

Top 10 Tips to Keep Your Small Business Safe

Are Second Generation Firewalls Good for Industrial Control Systems?

CLOUD COMPUTING SECURITY

Securing Internet Information Server (IIS) and Achieving Sarbanes-Oxley Compliance

Practical guide for secure Christmas shopping. Navid

Implemen'ng an Enterprise Framework for Secure Health Data Exchange

Homeland Open Security Technology HOST Program

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing

Joint Information Environment Single Security Architecture (JIE SSA)

The Importance of Cyber Threat Intelligence to a Strong Security Posture

Bridging the gap between COTS tool alerting and raw data analysis

Information Protection in Today s Changing Mobile and Cloud Environments

THE HACKERS NEXT TARGET

Society, Law Enforcement and the Internet

SOFTARE SECURTY OF WEB APPLICATION AND WEB ATTACKS

Getting real about cyber threats: where are you headed?

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Keeping an Unfair Advantage in a Globalized & Commoditized World

Family Leave Policy Proposal for Engineering and Public Policy Author: Rebecca Balebako

IS PRIVATE CLOUD A UNICORN?

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

Understanding and evaluating risk to information assets in your software projects

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

efolder White Paper: Three Network Security Tools to Block Dropbox in the Workplace

1 Introduction. 2 What is Cloud Computing?

HIPAA Compliance for Mobile Healthcare. Peter J. Haigh, FHIMSS Verizon

CERT's role in national Cyber Security: policy suggestions

Managing the Unpredictable Human Element of Cybersecurity

Mobile Devices and Malicious Code Attack Prevention

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities

Software Quality and Infrastructure Protection for Diffuse Computing

Basic Computer Security Part 2

Voice Over IP Technology. Zlatko Jovanovic. International Academy of Design and Technology

2010 White Paper Series. Layer 7 Application Firewalls

Transcription:

The Science of Cyber Security Peter Weinberger (Google Inc) (based on a study for DDR&E s Steven King, with no any conneceon to Google at all)

Sponsor arranged a workshop S. King (OSD, sponsor) F. Schneider (Cornell) J. McLean (NRL) S. Forrest (UNM) G. Wagner (NSA) R. Meushaw (NSA) K. Jabbour (AFOSR) R. Rivest (MIT) D. Dean (DARPA) J. Mitchell (Stanford) J. Shamma (Georgia Tech) C. Landwehr (NSF) J. Manferdelli (MicrosoR) M. MarEn (U Penn) G. Holzmann (JPL) J. Chuang (UC Berkeley) R. Maxion (CMU) S. Savage (UCSD) P. Gallison (Harvard) 2

One View of the Problem Internet security problems are becoming more conspicuous with each passing day Online informaeon such as pornography and obsceniees are seriously harming the physical and mental health of minors. Criminal aceviees such as online fraud and ther are seriously harming public security. Computer viruses and hacker azacks are posing serious threats to the security of the operaeon of the Internet. Leaking of secrets via the Internet is posing serious threats to naeonal security and interests. : 关 April 29, 2010 On the development and management of the internet in our country hzp://www.ce.cn/xwzx/gnsz/gdxw/201006/08/ t20100608_21493632.shtm (or hric.org) 3

Is There a Science of Cyber Security Of course, but what sort of science? Stay tuned (but it s not going to look like relaevity) Cyber world is made by humans, as is the threat MathemaEcs will be important Will it solve the problem? Science doesn t solve problems, applying it might What problems? (definieons are key to progress) Desperate need to make research tools accessible Whose problem is this?

Funny Science Human adversaries AdapEve adversaries: clinical medicine, crops Analogies can be misleading; deterrence possible Can only manage the problem, never finish Human made world (mathemaecal essence) What is it about? (unpleasant surprises?) Define security? Good properees, bad properees, incomplete list

Issues Data and experiments The point of data is generalizability The peculiar nature of secrecy CivilizaEon vs the barbarians, the advantages: Take advantage of global knowledge Take advantage of computaeonal power

A few (two) recommendaeons Establish muleple cyber security base centers and projects within universiees and other research centers These programs should have a long Eme horizon and periodic reviews of accomplishments Apply the science, reduce it to pracece Review papers E.g., what problem does X not solve?

Good Things, e.g. Theory (clarify concepts and their relaeons) E.g., Impossibility theorems Model checking (viewed broadly) EffecEve bug finding in specificaeons at any level Machine learning (conenual adapeng)

Areas Where Science and Empirics Might Be Mutually Reinforcing Systems that present more uncertainty to azackers Can the defense adapt faster than azackers? (randomizaeon, virtualized rapid restart, heterogeneity) (Internal firewalls, war mode defenses) Building secure systems out of insecure components (muleple paths, audieng, checkpoints, virtualizaeon) Knowing the security state of a system by observaeon (external, embedded) (trivial: are you doing what you claim to be?) (tripwire and similar ways of looking separated in Eme or space) 9

New Technologies Bring New OpportuniEes New azacks, new defenses, new problems, grist for science Cell phones IP radios and ad hoc networks; WiFi access points Power meters and smart grid (not all problems are DoD problems) MulE core CPU architectures Cloud (whichever definieon you use) (new opportuniees for observaeon) Browsers and Web 2 Many nasty azacks and issues A kind of virtual machine that is sell malleable (standards based, moderate/separable backwards compaebility issues) Could apply knowledge and techniques too radical for lower layers [Akhawe, Barth, Lam et al 2010] 10