Research to Support Robust Cyber Defense - PowerPoint PPT Presentation

1 / 34
About This Presentation
Title:

Research to Support Robust Cyber Defense

Description:

Research to Support. Robust Cyber Defense. Fred B. Schneider. Study commissioned for Dr. Jay Lala ... Teresa Lunt, Palo Alto Research Center. Mike Reiter, ... – PowerPoint PPT presentation

Number of Views:38
Avg rating:3.0/5.0
Slides: 35
Provided by: FBs4
Category:

less

Transcript and Presenter's Notes

Title: Research to Support Robust Cyber Defense


1
Research to SupportRobust Cyber Defense
  • Fred B. Schneider
  • Study commissioned for Dr. Jay Lala
  • DARPA
  • Information Technology Office

2
Study Committee
  • Jim Anderson, University of North Carolina
  • Stephanie Forrest, University of New Mexico
  • Carl Landwehr, National Science Foundation
  • Teresa Lunt, Palo Alto Research Center
  • Mike Reiter, Carnegie-Mellon University
  • Fred B. Schneider, Cornell University (chairman)
  • Kishor Trivedi, Duke University

3
Study Process
  • Two meetings in Washington, DC
  • Briefings from subject-matter experts
  • Tarek Abdelzaher, Univ Virginia
  • Massoud Amin, EPRI
  • Anish Arora, Ohio State Univ
  • Steve Bellovin, ATT
  • Ken Birman, Cornell Univ
  • Alan Demers, Cornell Univ
  • Steve Goddard, Univ Nebraska
  • Mohamed Gouda, Univ Texas
  • Ted Herman, Univ Iowa
  • Erica Jen, Santa Fe Institute
  • Chandra Kintala, Avaya
  • Simon Levin, Princeton Univ
  • Alfred Spector, IBM Rsch
  • Wietse Veneme, IBM Rsch

4
Study Goals
Identify research areas to enable the design and
implementation of networked computer systems that
tolerate attacks and failures by automatically
changing state or structure during execution.
  • Strategy for defense
  • Prior Prevention eliminates vulnerabilities.
  • Near term Render ongoing attacks ineffective
    through dynamic changes to state.
  • Longer term Alter vulnerabilities (viz
    co-evolution).
  • Eventually Self-repair of identified problems.

5
Presentation Outline
  • Where is industry heading.
  • A characterization of robustness.
  • New points of leverage.
  • Complementary research.

6
Industry Context IBM
  • IBM perceived customer concerns
  • Total Cost of Ownership.
  • Solution self-managing / self configuring
    systems
  • Emphasis on Quality of Service.
  • Solution self-optimizing / scalability
    isolation
  • Flexibility to deploy new applications.
  • New IBM initiative autonomic computing
  • Not concerned with Byzantine failures or highly
    malicious attacks.

7
Industry Context Microsoft
  • Microsoft perceived customer concerns
  • Total Cost of Ownership.
  • Solution automatic patch and upgrade
  • Harness the network.
  • Solution interoperability and transparency
  • Security Bill Gates internal memo on
    Trustworthy Computing, approx Jan 16, 2002
  • Trade assurance for bugs and complexity (?)
  • New Microsoft initiative .NET
  • Not concerned with Byzantine failures or highly
    malicious attacks.

8
Industry Context Power Grid
  • EPRI perceived concerns
  • Reliability of grid
  • Propagation of effect.
  • Operation with reduced capacity cushion.
  • Move to decentralized, market-based control.
  • Separate delivery channel and control channels.
  • Little concern about about hostile attacks
    (either in delivery channel or control channel).

9
SummaryIndustry versus DoD Needs
DoD Needs
Industry Direction
malicious
Attacks
random
benign
Byzantine
Failures
10
Addressing DoD NeedsDimensions of Robustness
S. Levin
Diversity
Robustness
Redundancy
Modularity
The time is right to exploit new opportunities!
11
Addressing DoD NeedsNew Research Opportunities
  • Temporal and spatial run-time diversity.
  • Scalable redundancy.
  • Self-stabilization.
  • Natural robustness via biological metaphors and
    systemic effects.

12
Research ThrustRun-time Diversity
  • Limited success to date
  • Obtaining diversity manually is expensive.
  • Multiplies costs associated with
  • design
  • implementation
  • test
  • Integration and interoperation expensive.
  • Obtaining diversity automatically has not been
    explored aggressively.
  • Modern compiler technology could help here.
  • Run-time environments also possible leverage
    points

13
Creating Diversity at Run-time
  • Run-time diversity is associated with
  • randomness -or-
  • non-determinacy.
  • The impact will depend on where it is applied
  • application level programs
  • system level programs
  • generation of application/system.

14
Run-time Diversity in Cryptography
  • Recent crypto advances introduce
  • Spatial diversity Different components hold
    different, but related, secrets.
  • Compromising one doesnt compromise all.
  • Temporal diversity Secret state changed from
    time to time.
  • Limits adversarys abilities after compromises.

15
Example of Spatial Diversity in
CryptographyFunction Sharing
m
s4
s3
s2
pr1
pr2
pr3
server
service
sig ? combine(pr1, pr2, pr3) verify(K, m, sig)
succeeds
16
Example of Temporal Diversity in
CryptographyForward-Secure Signatures
Private key
Time period
Public key
i
ki
K
(roll forward)
i1
K
ki1
verify(K, m, i1, sign(ki1, m))
succeeds verify(K, m, i, sign(ki1, m)) fails
17
Example of Spatial and Temporal
DiversityProactive Function Sharing
service
server
s4
s3
s2
t4
t3
t2
t1
Public K / private k t1, t2, t3, t4
18
Run-time Diversity in CryptographyNext Steps
  • Deploy principles of crypto run-time diversity
    (both spatial and temporal) in the construction
    of distributed services.
  • Leverage existing crypto diversity more broadly
  • Practical multi-party computation?
  • ( Spread-spectrum computing.)

19
Research ThrustScalable Redundancy
  • Redundancy has been widely studied as a method to
    achieve fault tolerance
  • Replication of servers
  • Redundant routing
  • The key problem now is scalability.

20
Scalable RedundancyCentral Challenge
  • Scalable methods for handling redundancy provide
    newoften weakertypes of guarantees
  • Probabilistic
  • Eventual consistency
  • Monotonic convergence
  • How to build systems with these new guarantees?
  • Transform weak guarantees into stronger ones?
  • Settle for combinations of the new guarantees?

21
Example of Scalable RedundancyEpidemic and
Gossip Protocols
  • Key characteristic Information exchanges involve
    randomly or opportunistically chosen gossip
    partners.
  • Resulting protocols are
  • fault-tolerant
  • scalable, and
  • self-organizing
  • The few actual deployments are promising
  • Xerox PARC Clearinghouse Replicated Database
  • MIT Lazy Replication
  • Xerox Bayou database system
  • Astrolabe distributed spreadsheet

22
Example of Scalable RedundancyQuorum Systems
quorum
quorum
  • Key characteristic Operations access quorums of
    servers. Quorums can be a subset of all servers.

23
Scalable RedundancyNext Steps
  • Accommodate weaker properties of scalable
    redundancy technologies in higher-level apps.
  • Use realistic network topologies
  • Irregularity in interconnection.
  • Clustering and non-uniform link bandwidths.
  • Understand and exploit interactions with QoS
  • Implement QoS guarantees using gossip protocols.
  • Leverage existing QoS guarantees in gossip
    protocols.
  • Understand and exploit threshold phenomena.

24
Research ThrustSelf-Stabilization
  • Key characteristic System eventually transitions
    to normal operating states in response to
    arbitrary transitions (to arbitrary states).
  • Self-stabilization expands the diversity of
    states from which a system can operate.
  • More states
  • Fewer assumptions.
  • Fewer vulnerabilities.

fault/attack
bad
good
25
Self-StabilizationHallmarks of Systems
  • Highly decentralized Convergence is an emergent
    property and error states are tolerated without
    being detected.
  • Forgetful State is regenerated old state is
    forgotten.

26
Self-StabilizationPromise of Success
  • The few actual deployments are promising
  • SUNs Netra Proxy Server
  • MS Research Aladdin Lookup Service
  • DEC/Compaq Autonet Configuration Protocols
  • Self-stabilization well suited to network
    protocols, where transient disruptions are
    already tolerated by upper system levels.

27
Self-StabilizationNext Steps
  • How might self-stabilization be extended?
  • Convergence from only some configurations.
  • Distinguish state components (e.g. keys, secrets,
    models of reality) and have only some converge.
  • Scalability?
  • System size, convergence time, severity of
    transient.
  • Dimensions of containment
  • Space bound infection / contamination.
  • Time speed for convergence.
  • Safety how badly is function degraded during
    repair.
  • Composition and control
  • Go beyond control structure to abstract data
    types, etc.
  • Develop basis for compositional construction.

28
Research ThrustNatural Robustness
  • Biological and other robustness metaphors
  • Work at multiple levels
  • Time scale (lifetime of organism vs species).
  • Structure (cell vs organism vs eco-system).
  • Hallmarks of such robustness
  • Robustness at one level translates into
    robustness at a different level.
  • Highly decentralized Convergence is an emergent
    property.
  • Widespread use of diversity.
  • Adaptive and always evolving.
  • Use disposable components.

29
Natural RobustnessLeveraging Systemic Effects
  • Natural robustness gains much from systemic
    effects. So can we.
  • Epidemiology
  • Logarithmic delays
  • Percolation theory
  • Critical point phenomena
  • Bimodal behaviors
  • Graph theory
  • Small-world phenomena

30
Natural RobustnessPromise of Success
  • The few actual deployments are promising
  • Artificial immunology applied to cyber-security,
    robotics, and data mining.
  • Convergence biology ? computing
  • Trends in computing have biological
    interpretations
  • Software Rejuvenation (e.g. Apache web server).
  • Biology making greater use of computing
  • Gene-expression analysis, phylogenetic tree
    reconstruction, cell signaling models, minimal
    cell project, smart matter.

31
Natural RobustnessNext Steps (1)
  • Pair new results from biology with robustness
    challenges in computer networks.
  • Exploit information about software evolution.
  • E.g., Phylogenetic trees for predicting
    vulnerabilities.
  • Intra-cellular signaling and cascades
    (chemostaxis).
  • Inter-cellular signaling networks (e.g., immune
    systems).
  • Genetics
  • Genetic buffering.
  • Individual gene repairs.
  • Evolutionary mechanisms (genotype/phenotype
    mappings).
  • Ecosystem modeling
  • Diversity, keystone species, patch models,
    allometry, resource flows.

32
Natural RobustnessNext Steps (2)
  • Further utilize systemic effects in networked
    systems
  • Epidemic and gossip protocols.
  • Survivability of computer networks.
  • Propagation of power failures in electrical
    grids.
  • Epidemiological approaches to computer viruses.

33
Robust Cyber Defense Complementary research (1)
  • Support for on-the-fly system change
  • Software rejuvenation (refresh data or
    environment)
  • Control structure/data rep change
  • Adaptive fault-tolerance (ftol asmpt change)
  • Self-healing real-time schedulers
  • Enhanced detection
  • Growing memory size, enables rollback to a
    previous state
  • Application-specific monitoring

34
Robust Cyber Defense Complementary Research (2)
  • Machine learning
  • Reinforcement learning (to adjust parameters in
    accordance with new information or feedback).
  • Genetic programming (to evolve small software
    components).
Write a Comment
User Comments (0)
About PowerShow.com