US Federal Cyber Security Research Program. NITRD Program



Similar documents
US Federal Cybersecurity R&D Strategic Plan

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

June 9, Dear Colleagues:

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

How To Plan A Federal Cybersecurity Research And Development Program

Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?

Cyber Security Division Overview

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

No Free Lunch in Cyber Security

Testimony of. Before the. May 25, 2011

Actions and Recommendations (A/R) Summary

DoD Strategy for Defending Networks, Systems, and Data

Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif

National Initiative for Cyber Security Education

DHS S&T Cyber Security R&D Program

Vol. 19 No Building a national program for cybersecurity science. Globe at a Glance According to the Experts Pointers Spinouts

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Capabilities for Cybersecurity Resilience

DHS S&T Cyber Security R&D Programs

Big Data R&D Initiative

The Comprehensive National Cybersecurity Initiative

Kangas Cybersecurity strategy

Participants: Introduction:

TUSKEGEE CYBER SECURITY PATH FORWARD

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Bill Guenther, Chairman, CEO and Founder Mass Insight Global Partnerships. Robert F. Brammer, Ph.D., President and CEO Brammer Technology, LLC

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Cyber Security Research and Development a Homeland Security Perspective

EL Program: Smart Manufacturing Systems Design and Analysis

An Overview of Large US Military Cybersecurity Organizations

IEEE-Northwest Energy Systems Symposium (NWESS)

NICE and Framework Overview

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview

Meeting Cyber Security Challenges

Preventing and Defending Against Cyber Attacks June 2011

National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation

RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Middle Class Economics: Cybersecurity Updated August 7, 2015

Preventing and Defending Against Cyber Attacks November 2010

Cyber Security and Privacy - Program 183

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP

Implementing Program Protection and Cybersecurity

INCO-TRUST. INCO-TRUST: to set up a co-operation framework based on mutual interests & capabilities! Canada US S. Korea Japan.

Information Technology Strategic Plan

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Panel Session: Lessons Learned in Smart Grid Cybersecurity

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Addressing Human Behavior in Cyber Security

Cyber Security Research and Development: A Homeland Security Perspective

DOE Cyber Security Policy Perspectives

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

Building Security In:

Software Quality and Infrastructure Protection for Diffuse Computing

National Cyber Security Policy -2013

Cisco Advanced Services for Network Security

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

Transcription:

US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related policy making in the White House Office of Science and Technology Policy (OSTP) Scope Approximately $4B/year across 14 agencies, seven program areas Cyber Security and Information Assurance (CSIA) Human Computer Interaction and Information Management (HCI&IM) High Confidence Software and Systems (HCSS) High End Computing (HEC) Large Scale Networking (LSN) Software Design and Productivity (SDP) Social, Economic, and Workforce Implications of IT and IT Workforce Development (SEW) Established by the High-Performance Computing Act of 1991 2

NITRD Structure for US Federal Cybersecurity R&D Coordination OSTP OMB National Science and Technology Council National Coordination Office for NITRD NITRD Subcommittee Senior representatives from agencies conducting NIT R&D National security systems R&D Special Cyber Operations Research and Engineering (SCORE) Interagency Working Group Cybersecurity R&D Senior Steering Group Cyber Security and Information Assurance Interagency Working Group (CSIA IWG) Senior representatives from agencies with national cybersecurity missions Program managers with cybersecurity R&D portfolios 3 Coordinated Effort on Game-Changers Changers It s about trustworthiness of digital infrastructure Security, reliability, resiliency, privacy, usability How can we: Enable risk-aware safe operations in compromised environments Minimize critical system risk while increasing adversaries costs and exposure Support informed trust decisions, necessitating flexible security strategies, and allowing for effective risk/benefit analyses and implementations Strong commitment to focus on game-changing technologies for coordinated cybersecurity R&D agenda 4

Federal Cybersecurity R&D Strategic Plan Research Themes Science of Cyber Security Support for National Priorities Transition to Practice http://www.whitehouse.gov/blog/2011/12/06/fe deral-cybersecurity-rd-strategic-plan-released 5 R&D Coordination Through Themes Theme Hard Problem Themes provide shared vision of desired end state Themes compel a new way of operating / doing business Themes attack underlying causes to bring about changes Established through robust community discussion of what matters Themes recognize that independent thinking is vital to good research 6

Research Themes Tailored Trustworthy Spaces Supporting context specific trust decisions Moving Target Providing resilience through agility Cyber Economic Incentives Providing incentives to good security Designed-In Security Developing secure software systems Annually re-examine themes Enrich with new concepts Provide further definition or decomposition 7 7 Tailored Trustworthy Spaces In the physical world, we operate in many spaces with many characteristics Home, school, workplace, shopping mall, doctor s office, bank, theatre Different behaviors and controls are appropriate in different spaces Yet we tend to treat the cyber world as a homogenous, undifferentiated space The vision is of a flexible, distributed trust environment that can support functional, policy, and trustworthiness requirements arising from a wide spectrum of activities in the face of an evolving range of threats 8

TTS Paradigm Users can select/create different environments for different activities satisfying variety of operating capabilities Confidentiality, anonymity, data and system integrity, provenance, availability, performance Users can negotiate with others to create new environments with mutually agreed characteristics and lifetimes Basing trust decisions on verifiable assertions 9 TTS R&D Program Examples Trusted foundation for cyberspace operations [OSD and Service Labs] High assurance security architectures [NSA, ONR, AFRL, NIST] Content and Context Aware Trusted Router (C2TR) [AFRL] Information Security Automation Program [NIST, NSA, DHS] Security Content Automation Protocol (SCAP) Access Control Policy Machine [NIST] Military Networking Protocol (MNP) program [DARPA] High-Level Language Support for Trustworthy Networks [NSF] 10

Moving Target Controlled change across multiple system dimensions to: Increase uncertainty and apparent complexity for attackers, reduce their windows of opportunity, and increase their costs in time and effort Increase resiliency and fault tolerance within a system 11 Moving Target Paradigm All systems are compromised; perfect security is unattainable Objective is to continue safe operation in a compromised environment, to have systems that are defensible, rather than perfectly secure Shift burden of processing onto attackers 12

MT R&D Program Examples Polymorphic Enclaves and Polymorphic Machines [AFRL] Self Regenerative, Incorruptible Enterprise that Dynamically Recovers with Immunity [AFRL] Clean-slate design of Resilient, Adaptive, Secure Hosts (CRASH) [DARPA] Cyber Camouflage, Concealment, and Deception [DARPA] Morphing Network Assets to Restrict Adversarial Reconnaissance (Morphinator) [Army] Defensive Enhancements for Information Assurance Technologies (DEFIANT) [Army] Robust Autonomic Computing Systems [ONR] 13 Cyber Economics & Incentives A focus on what impacts cyber economics and what incentives can be provided to enable ubiquitous security: New theories and models of investments, markets, and the social dimensions of cyber economics Data, data, and more data with measurement and analysis based on that data Improved SW development models and support for personal data ownership 14

CEI Paradigm Promotion of science-based understanding of markets, decision-making and investment motivation Security deployment decisions based on knowledge, metrics, and proper motivations Promote the role of economics as part of that understanding Creation of environments where deployment of security technology is balanced Incentives to engage in socially responsible behavior Deterrence for those who participate in criminal and malicious behavior 15 CEI R&D Program Examples Secure and Trustworthy Cyberspace (SaTC) Program (FY12 Solicitation) NSF Computer & Information Science & Engineering Directorate + NSF Social, Behavioral & Economic Sciences Directorate 16

Designed-In Security Designing and developing SW systems that are resistant to attacks Generating assurance artifacts to attest to the system s capabilities to withstand attacks 17 Designed-In Security Paradigm Require verifiable assurance about system s attack-resistance to be natively part of the SW design, development, and evolution lifecycle Enable reasoning about a diversity of quality attributes (security, safety, reliability, etc.) and the required assurance evidence Stimulate further developments in methods and tools for detecting flaws in SW 18

DIS R&D Program Examples Survivable Systems Engineering [OSD/SEI CERT] Trusted Computing [DARPA, NSA, OSD, NIST] Software Development Environment for Secure System Software & Applications [ONR] META (flows, tools, and processes for correctby-construction system design) [DARPA] Software Assurance Metrics And Tool Evaluation (SAMATE) [DHS, NIST] 19 Strategic Thrusts Research Themes TTS, MT, CEI, DIS Science of Cyber Security Support for National Priorities Transition to Practice 20

Science of Cyber Security A major research initiative on the science of security that Organizes the knowledge in the field of security Investigates fundamental laws Results in a cohesive understanding of underlying principles to enable investigations that impact large-scale systems. Enables repeatable experimentation Supports high-risk explorations needed to establish such a scientific basis Forms public-private partnerships of government agencies, universities, and industry 21 Some Potential Science of Security Research Topics Methods to model adversaries Techniques for component, policy, and system composition A control theory for maintaining security in the presence of partially successful attacks Sound methods for integrating the human in the system: usability and security Quantifiable, forward-looking, security metrics (using formal and stochastic modeling methods) Measurement methodologies and testbeds for security properties Development of comprehensive, open, and anonymized data repositories 22

Science of Security Program Examples AFOSR 2011 Science of Security MURI Stanford, Berkeley, Cornell, CMU, U of Penn NSA Science of Security Lablets UIUC, NC State, CMU NSF TRUST Program components Berkeley, CMU, Cornell, San Jose SU, Stanford, Vanderbilt 23 Support for National Priorities Goals Maximize cybersecurity R&D impact to support and enable advancements in national priorities Examples of Supported National Priorities Health IT Smart Grid Financial Services National Strategy for Trusted Identities in Cyberspace (NSTIC) National Initiative for Cybersecurity Education (NICE) 24

Transition ion to Practice Concerted effort to get results of federally funded research into broad use Integrated demos Conferences and workshops Matchmaking efforts Among Agencies Between research and product Potential funding for last mile 25 Drivers for next-generation solutions Basing trust decisions on verifiable assertions Shifting burden of processing onto attackers SW (system) lifecycle must natively incorporate verifiable assurance about system s attack-resistance 26

For More Information Tomas Vagoun, PhD CSIA IWG Technical Coordinator National Coordination Office for Networking and Information Technology Research and Development Suite II-405, 4201 Wilson Blvd. Arlington, VA 22230 Tel: (703) 292-4873 vagoun@nitrd.gov http://www.nitrd.gov http://cybersecurity.nitrd.gov 27