TRUST:Team for Research in Ubiquitous Secure Technologies DETER; Cyber Defense Technology Evaluation Research testbed Terry Benzel (USC-ISI), Anthony Joseph, Shankar Sastry NSF STC Review September 6, 2004
DETER Testbed Goals Facilitate scientific experimentation Establish baseline for validation of new approaches Provide a safe platform for experimental approaches that involve breaking network infrastructure Create researcher- and vendor-neutral environment Provide access for wide community of users NSF STC Review November 12, 2018
Architectural Plan Construct a homogeneous emulation cluster based upon University of Utah’s Emulab Implement network services – DNS, BGP Add containment, security, and usability features to the software Add (controlled) hardware heterogeneity Evaluate usefulness of other testbed approaches – esp. overlays like Planetlab NSF STC Review November 12, 2018
Basic Testbed Architecture Cyber Defense Experiments run on Virtual Internet Network Traces UC Berkeley Internet ISI-East ISI-USC NSF STC Review November 12, 2018
ISI Cluster Node Architecture NSF STC Review November 12, 2018
UCB DETER Testbed Cluster Architecture Internet To ISI Control Network Cache Boss Server Firewall Experiment VPN Server Control VPN Server Serial Line & Power Control Server Control Hardware VLAN Control Network VLAN 160 APC Power Controllers PC PC PC 32 x 4 @1000bT Data ports Switch Control Interface Programmable Patch Panel (VLAN switch) NSF STC Review November 12, 2018
Status Developed Draft Policy and Procedures Experiment Definition Experiment Review Board Security Isolation Argument Architecture Design Report ISI and UCB Node Operational Held first set of Experiments June 8, 2004 NSF STC Review November 12, 2018
Experimentation Scenarios for TRUSTees Deploy prototype technology in testbed Research and classroom laboratory tools Provides repeatable experiments Training Validation other researchers’ work Comparing new methods to old approaches NSF STC Review November 12, 2018
Summary Critical infrastructures continue to be vulnerable to cyber attack The urgent education about and application of cyber defense technologies is required State of the art in evaluation of network security mechanisms must be improved DETER/EMIST are a significant contribution towards this goal, and a significant enabler for TRUST NSF STC Review November 12, 2018