Presentation is loading. Please wait.

Presentation is loading. Please wait.

TRUST:Team for Research in Ubiquitous Secure Technologies

Similar presentations


Presentation on theme: "TRUST:Team for Research in Ubiquitous Secure Technologies"— Presentation transcript:

1 TRUST:Team for Research in Ubiquitous Secure Technologies
DETER; Cyber Defense Technology Evaluation Research testbed Terry Benzel (USC-ISI), Anthony Joseph, Shankar Sastry NSF STC Review September 6, 2004

2 DETER Testbed Goals Facilitate scientific experimentation
Establish baseline for validation of new approaches Provide a safe platform for experimental approaches that involve breaking network infrastructure Create researcher- and vendor-neutral environment Provide access for wide community of users NSF STC Review November 12, 2018

3 Architectural Plan Construct a homogeneous emulation cluster based upon University of Utah’s Emulab Implement network services – DNS, BGP Add containment, security, and usability features to the software Add (controlled) hardware heterogeneity Evaluate usefulness of other testbed approaches – esp. overlays like Planetlab NSF STC Review November 12, 2018

4 Basic Testbed Architecture
Cyber Defense Experiments run on Virtual Internet Network Traces UC Berkeley Internet ISI-East ISI-USC NSF STC Review November 12, 2018

5 ISI Cluster Node Architecture
NSF STC Review November 12, 2018

6 UCB DETER Testbed Cluster Architecture
Internet To ISI Control Network Cache Boss Server Firewall Experiment VPN Server Control VPN Server Serial Line & Power Control Server Control Hardware VLAN Control Network VLAN 160 APC Power Controllers PC PC PC 32 x Data ports Switch Control Interface Programmable Patch Panel (VLAN switch) NSF STC Review November 12, 2018

7 Status Developed Draft Policy and Procedures
Experiment Definition Experiment Review Board Security Isolation Argument Architecture Design Report ISI and UCB Node Operational Held first set of Experiments June 8, 2004 NSF STC Review November 12, 2018

8 Experimentation Scenarios for TRUSTees
Deploy prototype technology in testbed Research and classroom laboratory tools Provides repeatable experiments Training Validation other researchers’ work Comparing new methods to old approaches NSF STC Review November 12, 2018

9 Summary Critical infrastructures continue to be vulnerable to cyber attack The urgent education about and application of cyber defense technologies is required State of the art in evaluation of network security mechanisms must be improved DETER/EMIST are a significant contribution towards this goal, and a significant enabler for TRUST NSF STC Review November 12, 2018


Download ppt "TRUST:Team for Research in Ubiquitous Secure Technologies"

Similar presentations


Ads by Google