DHS S&T Cyber Security R&D Program



Similar documents
Cyber Security Research and Development a Homeland Security Perspective

Cyber Security Research and Development: A Homeland Security Perspective

Cyber Security Division Overview

DHS S&T Cyber Security Division (CSD) Overview

DHS S&T Cyber Security Division (CSD) Overview

DHS, National Cyber Security Division Overview

US Federal Cyber Security Research Program. NITRD Program

Actions and Recommendations (A/R) Summary

Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?

DHS S&T Cyber Security R&D Programs

DHS S&T Cyber Security Division (CSD) PREDICT Overview

Preventing and Defending Against Cyber Attacks June 2011

PREDICT: A Data Repository for Cyber Security Research

The Comprehensive National Cybersecurity Initiative

Preventing and Defending Against Cyber Attacks November 2010

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

How To Transition Research Into Practice

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

Homeland Open Security Technology HOST Program

New Era in Cyber Security. Technology Development

How To Improve Experimental Cybersecurity Research

Cyber Security Division FY 2012 Annual Report

Middle Class Economics: Cybersecurity Updated August 7, 2015

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

CYBER SECURITY GUIDANCE

Cybersecurity Resources

DHS S&T Cyber Security Division (CSD) Strategic Vision

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

network PRoteCtion and information L G S H a S P e R F o R M e D assurance networks R e D t e a M S e C U R i t Y

Intrusion Detection for Mobile Ad Hoc Networks

Douglas M. DePeppe Cyberlaw Attorney

Cyber Security and Privacy - Program 183

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

Critical Controls for Cyber Security.

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

National Cyber Security Policy -2013

National Communications System. December 6, 2007

Reliable, Repeatable, Measurable, Affordable

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC)

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

IPv6: Network Security and the Next Generation of IP Communication

Department of Homeland Security

Privacy and Security in Healthcare

Participants: Introduction:

DOE Cyber Security Policy Perspectives

Update On Smart Grid Cyber Security

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness

DHSR&D and Its Importance to the Military

TUSKEGEE CYBER SECURITY PATH FORWARD

Society, Law Enforcement and the Internet

Cyber Security Strategy(Information Security Policy Council, June 10, 2013)

ITL BULLETIN FOR JANUARY 2011

Meeting Cyber Security Challenges

Coordinating Attack Response at Internet Scale (CARIS)

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

Cyber Watch. Written by Peter Buxbaum

Northrop Grumman Cybersecurity Research Consortium

Essential Next Steps for the U.S. Government in the Transition to IPv6

US-CERT Overview & Cyber Threats

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

The DHS Small Business Innovation Research Program: Engaging Small Businesses to Meet DHS Needs and Achieving Results

CIO and Cyber Security Overview Argonne National Laboratory. Michael A. Skwarek CIO Matthew A. Kwiatkowski CISO Oct. 12, 2011

Transcription:

Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security R&D Program PSU NSRC Industry Day State College, PA October 17, 2006 Douglas Maughan, Ph.D. Program Manager, HSARPA douglas.maughan@dhs.gov 202-254-6145 / 202-360-3170 10/17/2006 1

National Strategy for Homeland Security The Department s strategic goals and objectives are directly linked to accomplishing the three objectives of the National Strategy: 1) Prevent terrorist attacks within the United States; 2) Reduce America s vulnerability to terrorism; and 3) Minimize the damage and recover from attacks that do occur. 10/17/2006 2

Homeland Security Mission Lead unified national effort to secure America Prevent terrorist attacks within the U.S. Respond to threats and hazards to the nation Ensure safe and secure borders Welcome lawful immigrants and visitors Promote free flow of commerce 10/17/2006 3

Department of Homeland Security Organization Chart (proposed end state) 10/17/2006 4

Science and Technology (S&T) Mission Conduct, stimulate, and enable research, development, test, evaluation and timely transition of homeland security capabilities to federal, state and local operational end-users. 10/17/2006 5

Crosscutting Portfolio Areas Chemical Biological Radiological Nuclear High Explosives Cyber Security Critical Infrastructure Protection (CIP) 10/17/2006 6

Customer Specific Portfolios Borders and & Transportation Security Emergency Preparedness and Response US Coast Guard US Secret Service State & Local Responders Threat & Vulnerability, Testing & Assessment 10/17/2006 7

HSARPA Mission Engage the Private Sector in R&D to satisfy homeland security needs Satisfy operational requirements Conduct rapid prototyping and commercial adaptation Research & develop revolutionary options 10/17/2006 8

R&D Execution Model Post R&D Customers * NCSD * NCS * OCIO * USSS * National Documents Customers Other Sectors e.g., Banking & Finance Prioritized Requirements Pre R&D Critical Critical Infrastructure Infrastructure Providers Providers Outreach Venture Community & Industry Experiments and Exercises R&D Coordination Government & Industry Workshops CIP Sector Roadmaps DNSSEC R&D SPRI Solicitation Preparation Cyber Security Assessment Rapid Prototyping Emerging Threats External (e.g., I3P) Supporting Programs BAAs SBIRs DETER PREDICT 10/17/2006 9

Cyber Security Program Areas Information Infrastructure Security Domain Name System Security (DNSSEC) Secure Protocols for the Routing Infrastructure (SPRI) Cyber Security Assessment Cyber Security Research Tools and Techniques Cyber Security Testbed (DETER) Large Scale Datasets (PREDICT) Experiments and Exercises Next Generation Technologies BAA 04-17 Other Activities (SBIR, RTAP, I3P, Emerging Threats, ITTC, Outreach, Government Coordination) 10/17/2006 10

Information Infrastructure Security (IIS) 10/17/2006 11

Information Infrastructure Security Motivation The National Strategy to Secure Cyberspace (2003) recognized the DNS and BGP as critical weaknesses of the Internet infrastructure NSSC called for the Department of Homeland Security to coordinate public-private partnerships to encourage the adoption of improved security protocols, such as DNSSEC and Secure BGP The security and continued functioning of the Internet will be greatly influenced by the success or failure of implementing more secure and more robust BGP and DNS. The Nation has a vital interest in ensuring that this work proceeds. The government should play a role when private efforts break down due to a need for coordination or a lack of proper incentives. 10/17/2006 12

DNSSEC Initiative Activities Roadmap published in February 2005 http://www.dnssec-deployment.org/roadmap.php Multiple workshops held world-wide (ICANN, IETF, RIRs) DNSSEC testbed developed at NIST http://www-x.antd.nist.gov/dnssec/ Involvement with numerous deployment pilots Publicity and awareness plan DNSSEC Newsletter Working with U.S. Civilian government (.gov) to develop policy and technical guidance for secure DNS operations and beginning deployment activities at all levels. Working with the operators of the.us and.mil zones towards DNSSEC deployment and compliance 10/17/2006 13

Secure Protocols for the Routing Infrastructure (SPRI) BGP is the routing protocol that connects ISPs and subscriber networks together to form the Internet BGP does not forward subscriber traffic, but it determines the paths subscriber traffic follows The BGP architecture makes it highly vulnerable to human errors and malicious attacks against Links between routers The routers themselves Management stations that control routers Work with industry to develop solutions for our current routing security problems and future technologies 10/17/2006 14

SPRI Way Ahead Working with ARIN to clean up existing database and legacy address space problem Pre-1997 IP Addresses are not accounted for Working with ARIN and APNIC to deploy PKI between ICANN/IANA and registry and between registry and ISPs/customers Working with ISPs to identify remaining R&D and necessary tools for secure routing management 10/17/2006 15

Cyber Security Research Tools and Techniques (RTT) 10/17/2006 16

DHS / NSF Cyber Security Testbed Justification and Requirements for a National DDOS Defense Technology Evaluation Facility, July 2002 We still lack large-scale deployment of security technology sufficient to protect our vital infrastructures Recent investment in research on cyber security technologies by government agencies (NSF, DARPA, armed services) and industry. One important reason is the lack of an experimental infrastructure and rigorous scientific methodologies for developing and testing next-generation defensive cyber security technology The goal is to create, operate, and support a researcher-andvendor-neutral experimental infrastructure that is open to a wide community of users and produce scientifically rigorous testing frameworks and methodologies to support the development and demonstration of next-generation cyber defense technologies 10/17/2006 17

DETER Experimenters Community User Organizations Bell Labs Boeing Phantom Works Columbia University Cs3 Inc. Dalhousie University Federated Investors Flux Group, University of Utah George Mason University HP Labs ICSI / LBNL Information Sciences Institute IntruGuard Devices, Inc. Juniper Lehigh University McAfee Research National Cyber-Forensics and Training Alliance Naval Postgraduate School Network Associates Laboratories New Jersey Institute of Technology Penn State University Princeton University Purdue University Rutgers University Sandia National Laboratories Secure64 Software Corp SPARTA, Inc. SRI International Telcordia Technologies Technical University Berlin The SANS Institute UC Berkeley UC Davis UC Irvine UC Santa Cruz UC San Diego Univ. of North Carolina at Charlotte University of Delaware University of Illinois, Urbana-Champaign University of Maryland University of Texas at Austin Warrior LLC Washington University in St. Louis Western Michigan University 10/17/2006 18

A Protected REpository for Defense of Infrastructure against Cyber Threats PREDICT Program Objective To advance the state of the research and commercial development (of network security products ) we need to produce datasets for information security testing and evaluation of maturing networking technologies. Rationale / Background / Historical: Researchers with insufficient access to data unable to adequately test their research prototypes Government technology decision-makers with no data to evaluate competing products End Goal: Improve the quality of defensive cyber security technologies 10/17/2006 19

Data Collection Activities Classes of data that are interesting, people want collected, and seem reasonable to collect Netflow Packet traces headers and full packet (context dependent) Critical infrastructure BGP and DNS data Topology data IDS / firewall logs Performance data Network management data (i.e., SNMP) VoIP (1400 IP-phone network) Blackhole Monitor traffic 10/17/2006 20

Experiments and Exercises Experiments U.S. / Canada Secure Blackberry Experiment PSTP-agreed upon deployment activity Oil and Gas Sector Working with industry, labs, researchers, and vendors Department of Treasury Exercises FS ISAC, FSSCC, Numerous sector participants National Cyber Security Exercise (Cyber Storm) DETER Testbed 10/17/2006 21

US-CAN Secure Wireless Trial Objective Test effectiveness of US/Canadian crossborder secure wireless architecture to cope with real-time communication in variety of scenarios Technologies PKI (S/MIME), Identity-based encryption, enforcement of policy and compliance Trial Activity July 2005: U.S.-only initial four-day test period October 2005: Four-day test period with 35 activities and with 40+ participants acting out homeland security scenarios using BlackBerry devices 10/17/2006 22

Partnership Project LOGIIC is a model for government-industry technology integration and demonstration efforts to address critical R&D needs Industry contributes Requirements and operational expertise Project management Product vendor channels DHS S&T contributes National Security Perspective on threats Access to long term security research Independent researchers with technical expertise Testing facilities 10/17/2006 23

Overview Opportunity: Reduce vulnerabilities of oil & gas process control environments by correlating and analyzing abnormal events to identify and prevent cyber security threats Approach: Identify new types of security sensors for process control networks Adapt a best-of-breed correlation engine to this environment Integrate in testbed and demonstrate Transfer technology to industry External Events Business Network Attack Indications and Warnings LOGIIC Correlation Engine Process Control Network 10/17/2006 24

Next Generation Cyber Security Technologies (NGT) 10/17/2006 25

HSARPA Cyber Security Broad Area Announcement (BAA 04-17) The goals of the Cyber Security Research and Development (CSRD) program are: To perform research and development (R&D) aimed at improving the security of existing deployed technologies and to ensure the security of new emerging systems; To develop new and enhanced technologies for the detection of, prevention of, and response to cyber attacks on the nation s critical information infrastructure. To facilitate the transfer of these technologies into the national infrastructure as a matter of urgency. http://www.hsarpabaa.com 10/17/2006 26

BAA Technical Topic Areas (TTAs) System Security Engineering Vulnerability Prevention Vulnerability Discovery and Remediation Cyber Security Assessment (i.e., Metrics) Security of Operational Systems Security and Trustworthiness for Critical Infrastructure Protection Wireless Security Investigative and Prevention Technologies Network Attack Forensics (e.g., Traceback) Technologies to Defend against Identity Theft 10/17/2006 27

BAA Program / Proposal Structure NOTE: Deployment Phase = Test, Evaluation, and Pilot deployment in (DHS) customer environments Type I (New Technologies) New technologies with an applied research phase, a development phase, and a deployment phase (optional) Funding not to exceed 36 months (including deployment phase) Type II (Prototype Technologies) More mature prototype technologies with a development phase and a deployment phase (optional) Funding not to exceed 24 months (including deployment phase) Type III (Mature Technologies) Mature technology with a deployment phase only. Funding not to exceed 12 months 10/17/2006 28

Other Activities: SBIR RTAP I3P Emerging Threats ITTC Outreach R&D Coordination 10/17/2006 29

Small Business Innovative Research (SBIR) FY04 Cross-Domain Attack Correlation Technologies Real-Time Malicious Code Identification FY05 Hardware-assisted System Security Monitoring FY06 Network-based Boundary Controllers Botnet Detection and Mitigation 10/17/2006 30

Rapid Technology Application Program (RTAP) - Cyber Security Topics BOTNET Detection and Mitigation Tool Customer: NCSD Exercise Scenario Modeling Tool Customer: NCSD DHS Secure Wireless Access Prototype Customer: S&T OCIO 10/17/2006 31

The Institute for Information Infrastructure Protection (I3P) The I3P is a consortium of 30 academic and not-forprofit research organizations The I3P was formed in September 2001 and funded by congressionally appropriated funds assigned to Dartmouth College ($17.8M) Two major research programs Process Control (PCS) and Supervisory Control and Data Acquisition (SCADA) systems Economic and policy issues associated with cyber security deployment 10/17/2006 32

Emerging Threats Virtual Machine Environment - Detection and Escape Prevention Vulnerability Discovery and Defenses for Virtual Machines Next Generation Crimeware Defenses Research new techniques for defending against next generation malicious software Botnet Command & Control Detection and Mitigation Examine defenses needed to counter new methods of Botnet C&C 10/17/2006 33

ITTC The DHS-SRI Identity Theft Technology Council ITTC is an expanded Silicon Valley expert group originally convened by the U.S. Secret Service Experts and leaders from Government Financial and IT sectors Venture capital Academia and science ITTC works closely with The Anti-Phishing Working Group (APWG) http://www.anti-phishing.org ITTC Coordinator: Robert Rodriguez, retired head of the Secret Service Field Office in San Francisco The ITTC was formed in April 2005, and has four active working groups: Reports / Studies Phishing Technology Crimeware Data collection and sharing Future threats Development and deployment 10/17/2006 34

Commercial Outreach Strategy Assist commercial companies in providing technology to DHS and other government agencies Emerging Security Technology Forum (ESTF) Assist DHS S&T-funded researchers in transferring technology to larger, established security technology companies DHS Mentor / Protégé program, System Integrator Forum (Jan. 17, 2007 WDC) Partner with the venture capital community to transfer technology to existing portfolio companies, or to create new ventures Cyber Entrepreneurs Workshop (Mar. 14, 2007 Stanford) Government Funder/Customer Established Commercial Companies DHS Researchers Emerging Commercial Companies Commercial Customers 10/17/2006 35

NITRD Program Coordination White House Executive Office of the President Office of Science and Technology Policy National Science and Technology Council U.S. Congress NITRD Agency Authorization and Appropriations Legislation Committee on Technology Committee on Homeland and National Security National Coordination Office (NCO) for Networking and Information Technology Research and Development Subcommittee on Networking and Information Technology Research and Development (NITRD) Subcommittee on Infrastructure High End Computing (HEC) Interagency Working Group Cyber Security and Information Assurance (CSIA) Interagency Working Group Large Scale Networking (LSN) Coordinating Group High Confidence Software and Systems (HCSS) Coordinating Group Human Computer Interaction and Information Management (HCI&IM) Coordinating Group Software Design and Productivity (SDP) Coordinating Group Social, Economic, and Workforce Implications of IT and IT Workforce Development (SEW) Coordinating 10/17/2006 Group36

Federal Plan for Cyber Security and Information Assurance (CSIA) R&D Overarching categories Functional Cyber Security Needs Needs for Securing the Infrastructure Cyber Security Assessment and Characterization Foundations for Cyber Security Domain-Specific Security Needs Enabling Technologies for Cyber Security and Information Assurance R&D Advanced and Next-Generation Systems and Architecture for Cyber Security Social Dimensions of Cyber Security http://www.nitrd.gov 10/17/2006 37

IRC Hard Problem List (HPL) Topics 1. GLOBAL SCALE IDENTITY MANAGEMENT 2. INSIDER THREAT 3. AVAILABILITY OF TIME-CRITICAL SYSTEMS 4. BUILDING SCALABLE SECURE SYSTEMS 5. ATTACK ATTRIBUTION AND SITUATIONAL UNDERSTANDING 6. INFORMATION PROVENANCE 7. SECURITY WITH PRIVACY 8. ENTERPRISE LEVEL SECURITY METRICS http://www.infosec-research.org/documents 10/17/2006 38

Other Areas of Interest Cyber Situational Awareness Indications & Warnings Attack Data Visualization Insider Threat Detection & Mitigation Information Privacy Technologies Secure operating systems (open source) Network modeling and simulation security policy reconfiguration impact on networks 10/17/2006 39

Tackling Cyber Security R&D Challenges: Not Business as Usual Strong mission focus (avoid mission creep) Close coordination with other Federal agencies Outreach to communities outside of the Federal government Building public-private partnerships (the industrygovernment *dance* is a new tango) Strong emphasis on technology diffusion and technology transfer Migration paths to a more secure infrastructure Awareness of economic realities 10/17/2006 40

Summary DHS S&T is moving forward with an aggressive cyber security research agenda Working with the community to solve the cyber security problems of our current infrastructure DNSSEC, Secure Routing Working with academe and industry to improve research tools and datasets DHS/NSF Cyber Security Testbed, PREDICT Looking at future RDT&E agendas with the most impact for the nation BAA 04-17, SBIRs, RTAP, Emerging Threats 10/17/2006 41

Douglas Maughan, Ph.D. Program Manager, HSARPA douglas.maughan@dhs.gov 202-254-6145 / 202-360-3170 For more information, visit http://www.cyber.st.dhs.gov 10/17/2006 42