US Federal Cybersecurity R&D Strategic Plan



Similar documents
US Federal Cyber Security Research Program. NITRD Program

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)

Science or Security. George O. Strawn NSF & NITRD (retired)

Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity

June 9, Dear Colleagues:

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

Mary Ellen Seale National Protection and Programs Directorate May 16, 2012

Government Perspectives on the Future of Advanced Networking Technologies

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

Benefits of Collaborative Science and Innovation - Improve Cyber Security

No Free Lunch in Cyber Security

Testimony of. Cita M. Furlani Director

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Government-University-Industry Research Roundtable

Capabilities for Cybersecurity Resilience

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

DoD Strategy for Defending Networks, Systems, and Data

Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?

Actions and Recommendations (A/R) Summary

National Initiative for Cyber Security Education

How To Plan A Federal Cybersecurity Research And Development Program

Cyber Security Division Overview

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

DHS S&T Cyber Security Division (CSD) Overview

NICE and Framework Overview

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

TUSKEGEE CYBER SECURITY PATH FORWARD

NITRD CSIA IWG Cybersecurity Game-Change Research & Development Recommendations

Computing at a Cross-Roads: Big Data, Big Compute, and the Long Tail. William Gropp

An Overview of Large US Military Cybersecurity Organizations

Vol. 19 No Building a national program for cybersecurity science. Globe at a Glance According to the Experts Pointers Spinouts

Cybersecurity at the Nexus of a Hyper- Connected World

Testimony of. Before the. May 25, 2011

Introduction to NICE Cybersecurity Workforce Framework

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

EL Program: Smart Manufacturing Systems Design and Analysis

Big Data R&D Initiative

INFORMATION OPERATIONS & SECURITY SPRING REVIEW MTG

The Comprehensive National Cybersecurity Initiative

DHS S&T Cyber Security R&D Programs

FREQUENTLY ASKED QUESTIONS

Meeting Cyber Security Challenges

CyberSecurity Solutions. Delivering

DHS S&T Cyber Security R&D Program

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Software Quality and Infrastructure Protection for Diffuse Computing

Security Risk Management For Health IT Systems and Networks

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Network Mission Assurance

Thales Communications Perspectives to the Future Internet 2 nd June Luxembourg

MESSAGE FROM THE SECRETARY... ii EXECUTIVE SUMMARY... iii INTRODUCTION... 1 THE FUTURE WE SEEK... 5

Grand Challenges, Federal Priorities and Funding an NSF/CISE view

Nokia Networks. security you can rely on

NSF Activities in Cyber Trust

NSF Cyber Trust Report

Il Ruolo delle Università nelle politiche di sicurezza cibernetica e di protezione delle infrastrutture critiche per il Paese

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

Cyber Security Research and Development a Homeland Security Perspective

Symposium on the Interagency Strategic Plan for Big Data: Focus on R&D

Perspectives on Cybersecurity in Healthcare June 2015

Assumption Busters Workshop - Cloud Computing

National Cyber Security Policy -2013

IEEE-Northwest Energy Systems Symposium (NWESS)

Privacy and Security in Healthcare

Introduction. Opening Presentation. 1

VMware Response for: National Science Foundation Cyber Security Research and Development Strategic Plan RFI

Preventing and Defending Against Cyber Attacks October 2011

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C October 30, 2015

Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology

Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER

Welcome to the NSF Webinar on our newest solicitation on hardware security.

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Cybersecurity and internal audit. August 15, 2014

AT&T Cybersecurity Policy Overview

RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

WORK PROGRAMME Topic ICT 9: Tools and Methods for Software Development

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas

Qatar Computer Emergency Team

NICE Cybersecurity Workforce Framework Tutorial

How To Secure Cloud Computing

workforce operate and maintain protect and defend securely provision support investigate analyze operate and collect CYBERSECURITY framework

Cybersecurity Definitions and Academic Landscape

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

CYBERINFRASTRUCTURE FRAMEWORK FOR 21 st CENTURY SCIENCE AND ENGINEERING (CIF21)

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Enterprise Security Platform for Government

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Cyber Security and Privacy - Program 183

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

Methodology for Assessment of Security Properties

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Transcription:

US Federal Cybersecurity R&D Strategic Plan

NITRD (Program) Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related policy making in the White House Office of Science and Technology Policy (OSTP) Established by the High-Performance Computing Act of 1991 Scope Approximately $4B/year across 16 agencies, nine program areas Cyber Security and Information Assurance (CSIA) Human Computer Interaction and Information Management (HCI&IM) High Confidence Software and Systems (HCSS) High End Computing (HEC) Large Scale Networking (LSN) Software Design and Productivity (SDP) Social, Economic, and Workforce Implications of IT (SEW) Big Data Cyber-Physical Systems 2

Selected NITRD Agency Budgets in CSIA R&D Selected Agencies Cyber Security & Information Assurance (CSIA) R&D (Unclassified) FY 2012 Actual FY 2014 Request DARPA $223M $266M OSD, NSA and DoD Service Research Organizations $204M $243M NSF $99M $114M DHS S&T $49M $70M NIST $45M $68M DOE $33M $41M Total $653M $802M Source: NITRD Supplement to the President s Budget FY 2014, http://www.nitrd.gov/pubs/2014supplement/fy2014nitrdsupplement.pdf 3

Federal Cybersecurity R&D: National Dialogue 1999 NSA IA NSF Cyber Trust 2006 2007 2008 2009 DSB NCW SS SCW POTUS / DNI NCDI CNCI DoE Grassroots LA WS NCDI CI WS SSG NCLY RFI DoE RA DARPA IA Programs DTO/ IARPA IA House DoD Roadmapping CSIS/Comm. on CS for 44th DoD RA POTUS IRC HPL 1 IRC HPL 2 Senate DHS Roadmapping I3P DHS RA 4

Vision of R&D under CNCI Comprehensive National Cybersecurity Initiative (CNCI), Presidential Directive, 2008 to initiate coordinated set of Federal government activities over the next 10 years to: to transform the cyber infrastructure so that critical national interests are protected from catastrophic damage and our society can confidently adopt new technological advances. Leap-Ahead/Game-Change R&D Expand cybersecurity R&D in high-risk, high-return areas Coordination NITRD CSIA R&D SSG CSIA IWG SCORE 5

Coordinated Effort on Game-Changers It s about trustworthiness of digital infrastructure Security, reliability, resiliency, privacy, usability Strong commitment to focus on game-changing technologies for coordinated cybersecurity R&D agenda Comprehensive National Cybersecurity Initiative Presidential Cyberspace Policy Review President s Chief Technology Officer White House Cybersecurity Coordinator NITRD Cybersecurity R&D Senior Steering Group

NITRD Structure for US Federal Cybersecurity R&D Coordination White House OSTP OMB National Science and Technology Council National Coordination Office for NITRD NITRD Subcommittee Senior representatives from agencies conducting NIT R&D National security systems R&D Special Cyber Operations Research and Engineering (SCORE) Interagency Working Group Cybersecurity R&D Senior Steering Group Cyber Security and Information Assurance Interagency Working Group (CSIA IWG) Senior representatives from agencies with national cybersecurity missions Program managers with cybersecurity R&D portfolios 7

Federal Cybersecurity R&D Strategic Plan Research Themes Science of Cyber Security Support for National Priorities Transition to Practice http://www.whitehouse.gov/blog/2011/12/06/fed eral-cybersecurity-rd-strategic-plan-released 8

R&D Coordination Through Themes Hard Problem Lists Research Strategy Federal research strategy focuses on underlying causes of cyber in-security Themes provide shared vision of desired end state Themes compel a new way of operating / doing business Established through robust community discussion of what matters Themes recognize that independent thinking is vital to good research 9

Research Themes Tailored Trustworthy Spaces Supporting context specific trust decisions Moving Target Providing resilience through agility Cyber Economic Incentives Providing incentives to good security Designed-In Security Developing secure software systems Annually re-examine themes Enrich with new concepts Provide further definition or decomposition 10 10

Tailored Trustworthy Spaces Paradigm Users can select/create different environments for different activities satisfying variety of operating capabilities Confidentiality, anonymity, data and system integrity, provenance, availability, performance Users can negotiate with others to dynamically create new environments with mutually agreed characteristics and lifetimes Users can base trust decisions on verifiable assertions 11

TTS Research TTS Characterization Identify and specify elements that describe TTS Translate operational requirements into policies Define tailoring requirements Translate tailoring requirements into executable rules Trust Negotiation Frameworks, methods, techniques to establish trust between system components TTS Operations Dynamically create, tailor, join, split, merge, dismantle TTS TTS and Privacy Fine-grained tailoring to support establishing the context for interactions 12

TTS R&D Program Examples NIST Security Content Automation Protocol (SCAP) Program Common framework and language for specifying instructions for security-related configuration ONR FABRIC Program Software development environment for establishing security guarantees based on explicitly stated security policies for distributed systems with complex and changing trust between participants 13

TTS R&D Program Examples (2) Trusted foundation for cyberspace operations [OSD and Service Labs] Content and Context Aware Trusted Router (C2TR) [AFRL] Access Control Policy Machine [NIST] Trusted Hardware/Secure Processor Program [AFRL] Trust Management for Optimal Network Performance Program [ARL] Hardware-Enabled Trust Program [DHS] Security and Privacy Assurance Research (SPAR) Program [IARPA] 14

TTS R&D Program Examples (3) Security and Privacy Assurance Research (SPAR) Program [IARPA] Develop techniques for exchanging data that protect security & privacy interests of each party Application areas include database queries, publish/subscribe systems, outsourced data storage systems Follow up to IARPA Automatic Privacy Protection (APP) program 15

Moving Target Paradigm All systems are compromised; perfect security is unattainable Objective is to continue safe operation in a compromised environment, to have systems that are defensible, rather than perfectly secure MT provides controlled change across multiple system dimensions to: Increase uncertainty and apparent complexity for attackers, reduce their windows of opportunity, and increase their costs in time and effort Increase resiliency and fault tolerance within a system 16

Moving Target Research Frameworks Novel approaches for managing systems employing MT mechanism Techniques Techniques that modify system characteristics in one or more dimensions, e.g. policies, system of systems, data, networks, software, system, hardware Scientific Foundations for MT Analysis of the effectiveness of MT mechanisms 17

MT R&D Program Examples DARPA Clean-slate design of Resilient Adaptive Secure Hosts (CRASH) Computer systems that are resistant to cyber-attacks, adaptive, and self-repairing Clean-slate, biologically-inspired thrusts Innate Immunity: eliminate common technical vulnerabilities; focus on HW, OS, middleware, formal methods Adaptive Immunity: identify, diagnose, and recover from new attacks Dynamic Diversity: diversity across computers and diversity in each computer over time DARPA Mission-oriented Resilient Clouds (MRC) Programs Detect, diagnose, respond to attacks in cloud computing systems Use cloud resources to Relocate computations Induce artificial diversity across hosts Group resources to provide collective defense Automatically develop workarounds and patches 18

MT R&D Program Examples (2) ONR Robust Autonomic Host Program Develop computing systems that are self-healing, able to operate under attack with reduced capabilities, employ artificial diversity to increase resilience, and engage in disinformation Research in efficient and adaptive data acquisition and monitoring, machine intelligence, machine reasoning and strategic planning, automated diagnostic, artificial diversity, and automated strategic deception 19

MT R&D Program Examples (3) IARPA Securely Taking On New Executable Software Of Uncertain Provenance (STONESOUP) Program Automate detection and mitigation of security vulnerabilities in software applications Diversify the program code, so that any residual vulnerabilities are harder to exploit Develop novel techniques for randomizing, rewriting, and monitoring software application code so that an adversary will not be able to predict the location of instructions or data needed to launch exploits 20

MT R&D Program Examples (4) AFRL Polymorphic Machines and Enclaves Program Develop techniques to continuously change computer, system, and network characteristics, presenting a shifting target space to an attacker AFRL Active Repositioning in Cyberspace for Synchronized Evasion (ARCSYNE) Program Employ IP address hopping to create an agile and stealthy network where the network identity of hosts changes rapidly DHS-funded expansion of the technology Network appliance unit operating at 10 Gbit/sec IP address changes in the network at 10 times/sec 21

MT R&D Program Examples (5) Self Regenerative, Incorruptible Enterprise that Dynamically Recovers with Immunity [AFRL] Cyber Camouflage, Concealment, and Deception [DARPA] Morphing Network Assets to Restrict Adversarial Reconnaissance (Morphinator) [Army] Defensive Enhancements for Information Assurance Technologies (DEFIANT) [Army] Moving Target Defense Program [DHS] 22

Designed-In Security Paradigm Designing and developing SW systems that are resistant to attacks Require verifiable assurance about system s attack-resistance to be natively part of the SW lifecycle Enable reasoning about a diversity of quality attributes (security, safety, reliability, etc.) and the required assurance evidence Stimulate further developments in methods and tools for detecting flaws in SW 23

Designed-In Security Research Software Development and Verification Environments Automatically recognize vulnerabilities in code; suggest corrections; generate SW without codebased vulnerabilities Assurance Evidence and Synthesis Synthesis of system functional specifications, safety and security policies, resource constraints, HW specification, and operational environmental descriptions to develop systems with provable security properties Tools Secure coding standards, compilers, etc. 24

DIS R&D Program Examples ONR Software Efficiency Reclamation Program Enhance software execution security and efficiency by reducing unnecessary SW complexity while preserving programmer s productivity Reduce indirection, perform automatic program de-layering and program specialization, resulting in a compact and efficient codes/executable, with much reduced attack surface 25

DIS R&D Program Examples (2) DARPA High-Assurance Cyber Military Systems (HACMS) Program Construct high-assurance, cyber-physical systems via a clean-slate, formal methods-based approach that enables semi-automated code synthesis from executable, formal specifications Develop a synthesizer capable of producing a machine-checkable proof that the generated code satisfies functional specifications, and security and safety policies Develop techniques to ensure that proofs are composable, allowing the construction of highassurance systems out of high-assurance components 26

DIS R&D Program Examples (3) Secure Coding Initiative [OSD/SEI] Survivable Systems Engineering [OSD/SEI] Trusted Computing [DARPA, NSA, OSD, NIST] META (flows, tools, and processes for correct-by-construction system design) [DARPA] Software Assurance Metrics And Tool Evaluation (SAMATE) [DHS, NIST] 27

Cyber Economic Incentives A focus on what impacts cyber economics and what incentives can be provided to enable ubiquitous security: Promotion of science-based understanding of markets, decision-making and investment motivation Theories and models of the social dimensions of cyber economics Data, data, and more data with measurement and analysis based on that data Improved SW development models 28

CEI R&D Program Examples NSF Secure and Trustworthy Cyberspace (SaTC) Program (FY12 Solicitation) NSF Computer & Information Science & Engineering Directorate + NSF Social, Behavioral & Economic Sciences Directorate; 18 CEI awards DHS Cyber Economics Incentives Program (2011 BAA) ONR Infiltration of BOTNET command-and-control and support ecosystems MURI Techniques for infiltration of botnet command and control structures Automated analysis of malware binaries Natural-language processing of human communications that support the botnet ecosystem 29

Strategic Thrusts Research Themes TTS, MT, DIS, CEI Science of Cyber Security Support for National Priorities Transition to Practice 30

Science of Cyber Security A major research initiative on the science of security that Organizes the knowledge in the field of security Investigates fundamental laws Results in a cohesive understanding of underlying principles to enable investigations that impact large-scale systems Enables repeatable experimentation Supports high-risk explorations needed to establish such a scientific basis 31

Science of Security Program Examples AFOSR 2011 Science of Security MURI Stanford, Berkeley, Cornell, CMU, U of Penn NSA Science of Security Lablets UIUC, NC State, CMU ARL Science for Cyber Portfolio Program NSF TRUST Program components Berkeley, CMU, Cornell, San Jose SU, Stanford, Vanderbilt 32

Science of Security Examples (2) OSD Cyber Measurement Campaign Develop a suite of metrics to define hypothesisdriven experiments that measure key cyber security capabilities AFRL Foundations of Trust and Assurance Program Develop mathematical algebra to represent missions, applications, and cyber infrastructure for provably correct mission characterizations in contested environments 33

Maximizing Research Impact Goals Maximize cybersecurity R&D impact to support and enable advancements in national priorities Support for National Priorities (examples) Health IT Smart Grid Financial Services National Strategy for Trusted Identities in Cyberspace (NSTIC) National Initiative for Cybersecurity Education (NICE) Integrating Research Efforts (examples) OSD Cyber Applied Research and Advanced Development Program Journal of Sensitive Cybersecurity Research and Engineering (JSCoRE) by ODNI 34

Maximizing Research Impact International Cooperation Examples DOD The Technical Cooperation Program (TTCP) MOU among Australia, Canada, New Zealand, UK, and US Command, Control, Communications, Information Systems (C3I) Group / Technical Panel 11 focus on information assurance and defensive information warfare DoD Network and Information Sciences International Technology Alliance (ITA) research alliance between the UK Ministry of Defense and US ARL ONR Global Division International science and technology office, Prague, Czech Republic, 2010 DHS S&T 2011 Cyber BAA Includes jointly-funded projects with US partners: Australia, UK, Canada, Netherlands, Sweden, Germany, and Israel US-Israel Binational Science Foundation NSF support for US-Israel collaborative research in computer science and cybersecurity 35

Transition to Practice Concerted effort to get results of federally funded research into broad use Integrated demos Conferences and workshops Matchmaking efforts Among Agencies Between research and product Potential funding for last mile 36

Transition to Practice Examples DHS S&T Transition to Practice (TTP) Program DHS S&T Integrator and IT Company Forums NIST National Cybersecurity Center of Excellence (NCCoE) NSA s Applied Research Prototypes Program NSF SaTC Program Transition to Practice Perspective AFRL Next-Generation Cyber Warriors Initiative 37

Drivers for game-change solutions Basing trust decisions on verifiable assertions Shifting burden of processing onto attackers SW (system) lifecycle must natively incorporate verifiable assurance about system s attack-resistance Facilitating sound cybersecurity incentives and enabling effective business & personal cybersecurity decisions 38

It advanced the technology, but it s not a game changer. Credit: Lee Lorenz The New Yorker

Contact Information Tomas Vagoun, PhD Cyber Security and Information Assurance IWG Technical Coordinator National Coordination Office for Networking and Information Technology Research and Development Suite II-405, 4201 Wilson Blvd. Arlington, VA 22230 Tel: (703) 292-4873 vagoun@nitrd.gov http://www.nitrd.gov http://cybersecurity.nitrd.gov 40

Examples of Trust Research Tailored Trustworthy Spaces Theme Trust Evidence as a critical enabling element OSD/ASD(R&D) Cyber Research Program Foundations of Trust research area AFRL Cybersecurity S&T Strategic Goals Strategic Goal #4: Invent Foundations of Trust and Assurance AFRL Trusted Hardware/Secure Processor Program ARL Trust Management for Optimal Network Performance Program DHS Hardware-Enabled Trust Program 41

OSD/ASD(R&D) Cyber Research Program Program Areas Assuring effective missions Cyber agility Cyber resilience Foundations of trust Modeling, simulation, and experimentation Embedded, mobile, and tactical 42

OSD/ASD(R&D) Foundations of Trust Develop foundational trust services to assess, compose, and deploy cyber elements with known and predictable confidence in their identity, functionality, and content Cyber elements include hardware and software; users and their roles; processes, data, interconnections, and services Measurable and predictable levels of trust to enable a quantitative approach to design, tradeoff analysis, and risk mitigation 43

AFRL Cyber S&T Strategic Goals Assure and Empower the Mission Create Next-Generation Cyber Warriors Enhance Agility and Resilience Invent Foundations of Trust and Assurance 44

AFRL Invent Foundations of Trust and Assurance Cyber S&T Strategic Goal Areas of emphasis Scientific Foundations of Mission Assurance Develop mathematical representation of functions within a mission, and algebra to reason about the security properties of information handling within each function across the information lifecycle Scientific Foundations of Trust Develop capabilities to quantify the security, reliability, and assurance of complex interconnected systems Supply Chain Trust 45

ARL Trust Management for Optimal Network Performance Program Understand the role trust plays in networks of large systems with complex interactions between communication, information, and social networks Quantify and model the dynamics of trust in networks Explore socio-cognitive models of trust for achieving fast trust emergence, propagation, and high sustainability Initial application in areas such as traffic routing through nodes with varying levels of trustworthiness, or detection of cyber-compromises by collaborative assessment of trust by multiple nodes in the network 46