Re-Inventing the Internet: Building Security In - PowerPoint PPT Presentation

About This Presentation
Title:

Re-Inventing the Internet: Building Security In

Description:

The current Internet is unreliable and vulnerable to ... IEEE Spectrum June 2005 ' ... System development tools that reduce the frequency and severity of bugs. ... – PowerPoint PPT presentation

Number of Views:47
Avg rating:3.0/5.0
Slides: 23
Provided by: josep325
Learn more at: http://users.ece.cmu.edu
Category:

less

Transcript and Presenter's Notes

Title: Re-Inventing the Internet: Building Security In


1
Re-Inventing the InternetBuilding Security In
  • CISE
  • National Science Foundationdlfisher_at_nsf.gov

2
Executive Summary
  • The current Internet is unreliable and vulnerable
    to attack.
  • Many of these vulnerabilities are inherently in
    design choices of the architecture
  • Yet critical infrastructures depend upon it.
  • We need to re-invent the Internet.
  • This time we need to design-in security,
    robustness, flexibility, manageability,
    evolvability, and

3
Internet Vulnerability and the Need to Re-invent
the Internet

4
2005 PITAC Report on CyberSecurity
  • Because much of this (IT) infrastructure
    connects one way or another to the Internet, it
    embodies the Internets original structural
    attributes of openness, inventiveness, and the
    assumption of good will.
  • These signature attributes have made the U.S. IT
    infrastructure an irresistible target for vandals
    and criminals worldwide
  • A broad consensus among computer scientists is
    emerging that the approach of patching and
    retrofitting networks, computing systems, and
    software to add security and reliability may be
    necessary in the short run but is inadequate for
    addressing the Nations cyber security needs.


5
Not a new problem

6
1987 An Agenda for Research in Networking and
Communications (NSF)
  • It is vital to devote much more research, both
    at the academic level and at the industrial
    level, to these survivability problems before a
    truly major catastrophe occurs.

7
1988 Toward a Network Research Network (NRC)
  • Privacy and security are issues that are
    especially important to consider early on
    privacy and security in data communications have
    been underappreciated and underprotected to date

8
1991 Computers at Risk Safe Computing in the
Information Age (NRC)
  • we cannot wait to see what a attackers may
    devise, or what accident may happen, before we
    start our defense. We must develop a long-term
    plan, based on our predictions of the future, and
    start now to develop systems that will provide
    adequate security and trustworthiness over the
    next decades.

9
1997 Critical Foundations Protecting Americas
Infrastructures(Presidents Commission on
Critical Infrastructure Protection)
  • The rapid proliferation and integration of
    telecommunications and computer systems have
    connected infrastructure to one another in a
    complex network of interdependence. This
    interlinkage has created a new dimension of
    vulnerability, which, when combined with an
    emerging constellation of threats, poses
    unprecedented national threat.
  • Potential cyber threats and associated risks
    range from recreational hackers to terrorists to
    national teams of information warfare
    specialists.
  • .

10
Not just technology
  • Economics
  • Privacy
  • Personal information and Identity theft
  • Surveillance (sensors cameras web activity,
    location)
  • Open society
  • Freedom of speech
  • Freedom of access
  • Reachability

11
IEEE Spectrum June 2005
  • If censorship technology flourishes in China, it
    will be easier and cheaper to take root
    elsewhere.
  • The features that China wants installed in
    intermediating devices and software will
    gradually find their way into all of the
    suppliers products, if only because it is
    cheaper that way.
  • The primary and most longstanding means of
    blocking is at the router level.

12
What should we do?

13
1999 Trust in Cyberspace (NRC)
  • Recommendation
  • It is time to challenge the paradigm of
    absolute security and move toward a model built
    on three axioms of insecurity insecurity exists
    insecurity cannot be destroyed and insecurity
    can be moved around.
  • Trustworthiness from untrusted components is a
    research area that deserves greater attention.

14
2003 Grand Research Challenges in Information
Systems (CRA)
  • Create Systems you can count on
  • System development tools that reduce the
    frequency and severity of bugs.
  • System administration tools that reduce the
    frequency and severity of configuration errors.
  • Understandable, deployable, and usable security.
  • New approaches to composition of modular
    elements.
  • New approaches to federation.
  • Pervasive audit trails.
  • Self-adaptive systems.
  • Architectural enhancements to processors (trusted
    HW)

15
2005 Overcoming Barriers to Disruptive
Innovation in Networking, (NSF)
  • in the thirty-odd years since its invention,
    new uses and abuses, along with the realities
    that come with being a fully commercial
    enterprise, are pushing the Internet into realms
    that its original design neither anticipated nor
    easily accommodates.
  • Such problems are numerous, and the Internets
    emerging centrality has made these flaws all the
    more evident and urgent. As a result, it is now
    widely believed that the Internet architecture is
    in need of substantial change.

16
2001 Looking over the Fence at Networks (NRC)
successful and widely adopted technologies are
subject to ossification, which makes it is hard
to introduce new capabilities or, if the current
technology has run its course, to replace it with
something better. Existing industry players are
not generally motivated to develop and deploy
disruptive technologies
17
2001 Looking over the Fence at Networks (NRC)
  • Networking research should more aggressively
    seek to develop new ideas and approaches.
  • To encourage thinking that is unconstrained by
    the current Internet, Plan B approaches should
    be pursued that begin with a clean slate and only
    later (if warranted) consider migration from
    current technology.

18
NeTS Planning Activities
  • Planning Grants FY04
  • Disruptive network innovations via network
    virtualization
  • Optical integration and implications on optical
    networking
  • Planning Grants FY05
  • Clean-slate network security
  • End to end network architecture
  • Wireless mobile and sensor networks
  • Distributed systems
  • Real time networked systems and CIP

19
Purpose of Planning Grants
  • Articulate a compelling research agenda
  • Articulate requirements for an experimental
    infrastructure
  • Get communities to work together
  • Network architects and security experts
  • Network architects and optical integration
    experts
  • Help NSF other agencies to fund and promote
    agenda

20
2006 NSF NeTS Research Agenda
  • Rethink/Reinvent the Internet
  • Keep the good, address limitations, create new
  • Clean-slate architecture
  • Include optical, wireless, sensor network, etc.
    technologies
  • Enable new applications
  • Build-in attributes of security, robustness,
    scalability, manageability, evolvability, etc.
  • Work together for a synergistic approach
  • Security, network architecture, realtime experts

21
Potential Outcomes of Initiative
  • Migrate functionality into Current Internet
  • Enable an Alterative Secure Internet for Critical
    Infrastructures
  • Replace of Internet under Catastrophic Failure

22
Your Role
  • Discuss how to build-in security into a clean
    slate architecture
  • Write a report
  • Research Agenda
  • Infrastructure Needs
  • Engage in joint research with networking and
    security researchers
Write a Comment
User Comments (0)
About PowerShow.com