TRUST, Washington, D.C. Meeting January 9–10, 2006 TRUST :Team for Research in Ubiquitous Secure Technologies Overview Shankar Sastry, PI and Dir. Ruzena.

Slides:



Advertisements
Similar presentations
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Advertisements

This work was supported by the TRUST Center (NSF award number CCF ) 1. Setting up experiment on DETER testbed a)Created twelve pc backbone nodes.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
High Performance Computing Course Notes Grid Computing.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Introduction to Cyber Physical Systems Yuping Dong Sep. 21, 2009.
Open Workshop on e-Infrastructures, Helsinki October 4 – 5, 2006 Roadmap Parallel Session on last chapter of e-IRG Roadmap: Crossing the Boundaries of.
TRUST Retreat, October 8-9, 2006 EMR Project Vanderbilt (Sztipanovits, Karsai, Xue) Stanford (Mitchell, Datta, Barth, Sundaram) Berkeley (Bajcsy, Sastry)
02/12/00 E-Business Architecture
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Lecture 11 Intrusion Detection (cont)
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Securing Information Systems
A First Course in Information Security
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Project web site: old.libqual.org LibQUAL+™ from a Technological Perspective: A Scalable Web-Survey Protocol across Libraries Spring 2003 CNI Task Force.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
APC InfraStruxure TM Central Smart Plug-In for HP Operations Manager Manage Power, Cooling, Security, Environment, Rack Access and Physical Layer Infrastructure.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
TRUST September 13 th 2004NSF STC Site Visit TRUST :Team for Research in Ubiquitous Secure Technologies Shankar Sastry (Berkeley), Mike Reiter (CMU), Steve.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Web Services Igor Wasinski Olumide Asojo Scott Hannan.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
TRUST NSF Site Visit, Berkeley, March, 2007 Sensor Networks: Technology Transfer Stephen Wicker – Cornell University.
TRUST NSF Site Visit, Berkeley, April 27 th - 28 th, 2006 Trust Patient Portal Project – Real Time Patient Monitoring Josh Denny Mike Elkund Philip Kuryloski.
DOE 2000, March 8, 1999 The IT 2 Initiative and NSF Stephen Elbert program director NSF/CISE/ACIR/PACI.
Janos Sztipanovits Dr. Janos Sztipanovits E. Bronson Ingram Distinguished Professor of EECS Director of ISIS Vanderbilt University Nashville, TN Overview.
Dec 14 th, 2005Telecom Italia Strategy Meeting TRUST :Team for Research in Ubiquitous Secure Technologies Strategic and Implementation Plan overview Shankar.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
TRUST, Washington, D.C. Meeting January 9–10, 2006 Integrative Projects Status Report Janos Sztipanovits.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
9 Systems Analysis and Design in a Changing World, Fourth Edition.
8 July 2005MM Sprinkle UC Berkeley TRUST :Team for Research in Ubiquitous Secure Technologies An Overview Shankar Sastry (Berkeley), Ruzena Bajcsy (Berkeley),
TRUST : Team for Research in Ubiquitous Secure Technology National Science Foundation Site Visit February 24-26, 2009 │Berkeley, California Health Infrastructures.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Paul A. Strassmann, Copyright Stevens Institute of Technology The Structure of I.T. Spending as Measure of Organizational Disorder Paul A. Strassmann,
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
TRUST 2 nd Year Site Visit, March 19 th, 2007 TRUST Knowledge Transfer EMR Project Vanderbilt (Sztipanovits, Karsai, Ledeczi, Xue) Stanford (Mitchell,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IS3220 Information Technology Infrastructure Security
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Education and Human Resource development By Ruzena Bajcsy TRUST TRUST:Team for Research in Ubiquitous Secure Technologies September 13th 2004 NSF STC Review.
Resource Optimization for Publisher/Subscriber-based Avionics Systems Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee.
Educause/Internet 2 Computer and Network Security Task Force
TRUST Area 3 Overview: Privacy, Usability, & Social Impact
Joseph JaJa, Mike Smorul, and Sangchul Song
TRUST:Team for Research in Ubiquitous Secure Technologies Overview
TRUST:Team for Research in Ubiquitous Secure Technologies
INFORMATION SYSTEMS SECURITY and CONTROL
PLANNING A SECURE BASELINE INSTALLATION
ITB Identity Solutions.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

TRUST, Washington, D.C. Meeting January 9–10, 2006 TRUST :Team for Research in Ubiquitous Secure Technologies Overview Shankar Sastry, PI and Dir. Ruzena Bajcsy, Outreach Dir. Sigurd Meldal, Education Co-Dir. John Mitchell, co-PI Vijay Raghavan, Exec Dir Mike Reiter, co-PI Fred Schneider, Chief Sci. Janos Sztipanovits, co-PI and Education Co-Dir Steve Wicker, co-PI

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry2 Technology Generations of Information Assurance 1st Generation (Prevent Intrusions) Intrusions will Occur Some Attacks will Succeed Cryptography Trusted Computing Base Access Control & Physical Security Multiple Levels of Security 2nd Generation (Detect Intrusions, Limit Damage) Firewalls Intrusion Detection Systems Boundary Controllers VPNs PKI 3rd Generation (Operate Through Attacks) Big Board View of Attacks Real-Time Situation Awareness & Response Intrusion Tolerance Graceful Degradation Hardened Core Functionality Performance Security

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry3 TRUST worthy Systems More than an Information Technology issue Complicated interdependencies and composition issues – Spans security, systems, and social, legal and economic sciences – Cyber security for computer networks – Critical infrastructure protection – Economic policy, privacy TRUST : “holistic” interdisciplinary systems view of security, software technology, analysis of complex interacting systems, economic, legal, and public policy issues Trustworthiness problems invariably involve solutions with both technical and policy dimensions (theme of Schneider’s talk) Goals: – Composition and computer security for component technologies – Integrate and evaluate on testbeds – Address societal objectives for stakeholders in real systems

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry4 Faking – An that seems to be from a legitimate source Spoofing – A Web site that appears to be “official” Phishing – Luring users to provide sensitive data From Aucsmith, Microsoft Integrative Project: Identity Theft

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry5 Most people are spoofed – Over 60% have visited a fake or spoofed site People are tricked – Over 15% admit to having provided personal data – 2780 phishing websites in March 2005 alone Target for spoofing attacks – Banks, credit card companies, Web retailers, online auctions (E-bay) and mortgage companies. Economic loss – 1.2 million U.S. adults have lost money – The total dollar impact in first 6 months of 2005: $929 million, in all of 2003 $ 1.2B. Source: TRUSTe & Gartner PHISHING Impact Stats

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry6 Software that: – Collects personal information from you – Without your knowledge or permission Privacy – 15 percent of enterprise PCs have a keylogger Source: Webroot's SpyAudit – Number of keyloggers jumped three-fold in 12 months Source: Sophos Reliability – Microsoft Watson ~50% of crashes caused by spyware Support Costs – Dell, HP, IBM: Spyware causes ~30% of calls – Estimated support costs at $2.5m+ / year SPYWARE Impact Stats

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry7 ID Protection: Client Side Tools SpoofGuard: Stanford (NDSS ’04) – Alerts user when browser is viewing a spoofed web page. – Uses variety of heuristics to identify spoof pages. – A new type of anomaly detection problem. Dynamic Security Skins: Berkeley (SOUPS ’05) – Allows a remote web server to prove its identity in a way that is easy for human to verify and hard for attacker to spoof: uses a photograph to create trusted path PwdHash: Stanford (Usenix Sec ’05) – Simple mechanism for strengthening password web auth. SpyBlock: Stanford (under development) – Prevent Spyware from capturing sensitive data.

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry8 Tech Transfer from Phishing Work SpoofGuard: – Some SpoofGuard heuristics now used in eBay toolbar and Earthlink ScamBlocker. – Very effective against basic phishing attacks. PwdHash: – Collaboration with RSA Security to implement PwdHash on one-time RSA SecurID passwords. RSA SecurID passwords vulnerable to online phishing PwdHash helps strengthen SecurID passwords

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry9 Coordinated Research Agenda The TRUST center will develop and demonstrate science and technology in real-life testbeds. NSF core funding over 5 years plus option 5 years Possible support from US Air Force for IAS for GIG Network of partnerships with industry, infrastructure stakeholders NSF/US State Department would like to make partnerships with key international partners Coordinated research: eleven challenge areas across three key topics: – Security Science – Systems Science – Social Science

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry10 TRUST Structure Privacy Computer and Network Security Power Grid Testbed Network Security Testbed Secure Networked Embedded Systems Testbed Software Security Trusted Platforms Applied Crypto- graphic Protocols Network Security Secure Network Embedded Sys Forensic and Privacy Complex Inter- Dependency mod. Model-based Security Integration. Econ., Public Pol. Soc. Chall. Secure Compo- nent platforms HCI and Security Secure Info Mgt. Software Tools Technologies Societal Challenges Integrative Testbeds - Critical Infrastructure System Science Security Science Social Science Role: Connect societal challenges to technical agenda Integrate component technologies Measure progress in real-life context Objective: Information Assurance in a Systems Context

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry11 Security Science (1) Software Security (language based) Static Code Verification Dynamic Analysis Multi-lingual Security Software Design Trusted Platforms Composition – Security and Vulnerability – Minimal Software and Hardware Configurations Applied Cryptographic Protocols Protocol design methods Protocol analysis, testing, and verification

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry12 Security Science (2) Network Security – Focused on making the Internet more secure – Challenges Denial of service attacks Spoofed source addresses Routing security – Approaches: Structured overlay networks Better infrastructure Epidemic protocols Simulation and Emulation on DETER testbed

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry13 Cyber Defense Technology and Experimental Reseach Network: DETER Inadequate wide scale deployment of security technologies Lack of experimental infrastructure – Testing and validation in small to medium-scale private research labs – Missing objective test data, traffic and metrics Create reusable library of test technology for conducting realistic, rigorous, reproducible, impartial tests – For assessing attack impact and defense effectiveness – Test data, test configurations, analysis software, and experiment automation tools

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry14 Sample DETER Topologies

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry15 System Science (1) Complex Interdependency Modeling and Analysis – Four-fold approach to reducing vulnerability of interdependent systems to disruptive failure Modeling Strategies Analysis Techniques Design Technologies Operational Tools Secure Network Embedded Systems – Present unique security concerns Conventional end-to-end approaches break down New code must be propagated throughout the network – Focus areas: Automated design, verification, and validation Secure, composable, and adaptive software – Emphasis on sensor networking technology as high-impact application

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry16 Mote Evolution

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry17 Secure Network Embedded System Testbed (577 nodes) at Berkeley Software – TinyOS – Deluge Network reprogramming – Drip and Drain (Routing Layer) Drip: disseminate commands Drain: collect data – DetectionEvent Multi-moded event generator – Multi-sensor fusion and multiple-target tracking algorithms Other testbeds at Cornell, Vanderbilt (Wicker’s talk)

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry18 System Science (2) Model-Based Integration of Trusted Platforms – Supports system integration through embedded software Model-based design Model transformation technology QoS-enabled component middle-wareSecure Information Management Software Emphasis on new software tools for monitoring and controlling large sensor infrastructures – Combines peer-to-peer protocols with epidemic algorithms Highly scalable Rigorous semantics User-friendly APIs

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry19 Sample Application:The proposed DoD NCES/GIG architecture Basis is Web Services standard, although CORBA is likely to be used on server clusters Primary application platform will be Microsoft Windows NSA and DISA are playing key roles in mapping these components to military needs

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry20 Social Science Economics, Public Policy and Societal Challenges – From privacy to personal security – Liability and insurance are critical concerns – What are the benefits and costs of security policies? – What are the nature and size of transaction costs associated with security? Digital Forensics and Privacy – Privacy cuts across the trust/security issues that are the focus of TRUST – Common interfaces are needed for specifying privacy requirements – Emphasis on strong audit, selective revelation of information, and rule- processing technologies Human Computer Interfaces and Security – Security problems may arise through the mis-configuration of complex systems – Generally, humans lack many computational abilities that are conducive to securing networks and systems Strengthening standard passwords Using biometric information Using image recognition

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry21 Healthcare Information Technology Rise in mature population - Population of age 65 and older with Medicare was 35 million for 2003 and 35.4 million for 2004 New types of technology – Sensors for elderly assisted living Increased demand for health data – Health information technology Commercial use of health data Current Responses for Technology Assisting Healthcare: – Electronic Patient Records – Telemedicine – Remote Patient Monitoring Table compiled by the U.S. Administration on Aging based on data from the U.S. Census Bureau. United Nations ▪ “Population Aging ▪ 2002” 2050 Percentage of Population over 60 years old Global Average = 21%

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry22 Patient Portal Project Vanderbilt Patient Portal – Electronic healthcare records Include real-time monitoring of congestive heart failure patients – Heterogeneous sensor network for monitoring – Data integrated into patient portal Berkeley ITALH Testbed: seniors in Sonoma – Stationary sensors: Motion detectors, Camera systems – Wearable sensor: Fall sensors, Heart rate or pulse monitors

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry23 LARGE INTEGRATIVE PROJECTS My Health Portals for Electronic Patient Records: Vanderbilt, Berkeley, Cornell (Sztipanovits’ talk) Phishing, Spyware, Identity Theft: Stanford, Berkeley (Mitchell’s talk) Secure Sensor Networks: Berkeley, CMU, Cornell, Vanderbilt (Wicker’s talk) DoD GIG IAS: Cornell, Vanderbilt, Berkeley (Birman’s talk) Cybersecurity Educational Modules: SJSU, Vanderbilt, Stanford (Meldal’s talk)

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry24 ProviderPatient PayerSociety Primary care Specialists Ancillaries Immediate Family Extended Family Community Support Friends Legally Authorized Reps Admin. Staff Claims Processors Subcontractors Clearinghouses Insurers Public Health State Licensure Boards Law Enforcement Internal QA External accreditation orgs Clinical Trials Sponsors Fraud Detection Medical Information Bureau Business Consultants National Security Bioterrorism Detection Healthcare Information Access Privacy and Security Everywhere

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry25 Sensor Networks in Public Places Protecting Infrastructure – Opportunities for embedding sensor networks Transportation Water and Fuel Power Grid – TRUST is emphasizing development of supporting technology for randomly distributed sensors Buildings – Combine surveillance with energy control – Integrate into building materials Open Spaces (parks, plazas, etc.) – Combine surveillance with environmental monitoring – Line-of-sight surveillance technologies

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry26 EDUCATIONAL INITIATIVES Meldal, Sztipanovits and Bajcsy will speak in detail about the repositories, course work development, summer school and other educational initiatives under way Policy, Technology, Psychological Motivations of Terrorism: Maurer (Berkeley), Lazowska (Washington), Savage (UCSD) and Microsoft, Fall – Lampson, “Accountability and Freedom – Varian “Economics and Computer Security” – Maurer “The Third Wave of Terrorism” – Aucsmith “Crime on the Internet” Samuelson, Mulligan, Wicker, and Goldberg: Video Privacy in Public Places? Capacity Building program for HBCU, HIS: Reiter TRUST Summer School (TSS) in June 2006

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry27 Outreach Initiatives BFOIT - Berkeley Foundation for Opportunities in Information Technology SUPERB-IT - Summer Undergraduate Program in Engineering Research at Berkeley - Information Technology SIPHER - Summer Internship Program in Hybrid and Embedded Software Research Pennsylvania Area HBCU Outreach - Historically Black Colleges and Universities Women’s Institute in Summer Enrichment (WISE) to be kicked off in July 2006

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry28 SUMMARY TRUST has been successfully launched: research, education, outreach programs under way Hallmark of TRUST: Grand Challenge Projects – Large Integrative Projects Identity Theft Secure Network Embedded Systems Secure Electronic Patient Records Portal DoD Global Information Grid Security – Education: Large Projects Repositories: Evaluation using Learning Theory Modules for existing courses TRUST Summer School – Outreach: Comprehensive BFOIT, SUPERB, SIPHER Capacity Building Program for HBCU/HSI WISE outreach to women researchers

TRUST, Washington, D.C. Meeting January 9–10, 2006 BACKUPS

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry30 Systems Science TeamsSocial Science Teams Security Technology Teams Software Security Trusted Platforms Applied Cryptographic Protocols Network Security Complex Interdependency Modeling and Analysis Secure Network Embedded Systems Model-based Integration of Trusted Components Secure Information Management Software Economics, Public Policy and Societal Challenges Digital Forensics and Privacy Human Computer Interfaces and Security Integrative Projects Patient Portals VUMC System/Sec CoDesign Boeing+Raytheon Sensor Networks ORNL Education Program Summer School Curriculum Learning Science & Technology Insertion Repository Project Structure

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry31 Example Experiment: Bandwidth-limited Scanning Worm Experiment ICSI and PSU: characterization, modeling and scale- down simulation of Slammer SQL worm’s propagation through the Internet: ICSI+PSU WORM’04 paper. Development of virtual nodes that model the response of sub-networks or whole Internet to a worm attack for the purposes of scale-down – 1/64 th scale Internet Near term activity: – Other worm attack recreations in the near term – Collaborative defenses under test – Large-scale enterprise network simulation

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry32 NEST Final Experiment: Demo

TRUST, Washington, D.C. Meeting January 9–10, 2006"Overview", Shankar Sastry33 Overview of Agenda Schneider “Technology + Policy” Sztipanovits “Patient Medical Records Portals” Wicker “Secure Sensor Networks and Network Embedded Systems Mitchell “PwdHash, Spoofguard, Spyware, Botnets” Birman “Global Information Grid” POSTERS with 3 minute introductions Meldal, Sztipanovits and Bajcsy, Education and Outreach Activities Tygar, Technology Transition Strategy