1 Major and Remaining Challenges in Networking, Wireless, and Intelligent Systems Information Sciences Institute “We are the ‘&’ in R&D Information Sciences Institute Agent of Innovation: from visionary to viable Dr. Preston Marshall Director, Decision Systems, Information Sciences Institute, and Research Professor, Ming Hsieh Department of Electrical Engineering Viterbi School of Engineering, University of Southern California, Marina Del Rey, CA and Arlington, VA [email protected]Korean Computer Scientists and Engineers Association in America 11 th Annual Symposium 5 November, 2010
18
Embed
Major and Remaining Challenges in Networking, Wireless, and Intelligent Systems
Korean Computer Scientists and Engineers Association in America 11 th Annual Symposium 5 November, 2010. Information Sciences Institute “We are the ‘&’ in R&D. Information Sciences Institute Agent of Innovation: from visionary to viable. - PowerPoint PPT Presentation
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1
Major and Remaining Challenges in Networking, Wireless, and Intelligent
Systems
Information Sciences Institute
“We are the ‘&’ in R&D
Information Sciences Institute
Agent of Innovation: from visionary to viable
Dr. Preston MarshallDirector, Decision Systems, Information Sciences Institute, and
Research Professor, Ming Hsieh Department of Electrical EngineeringViterbi School of Engineering,
University of Southern California, Marina Del Rey, CA and Arlington, VA
and Schedule, Our Systems Leak Information, Innovation is Slowed or Blocked, …
2. Technology Built for Computing with 8K Core Memories is Being Used as the Infrastructure for a Mobile, Information Centric, Society— Would We Build the Internet this Way if we Built it
Today?3. We Have Created a Technological “Single Cause
Failure” that Threatens All our Infrastructure, Wealth, Commerce, … Simultaneously — Internet Security is Fundamental Risk to Citizens,
Institutions, Nations, and Critical National InfrastructureWe Seem to Accept and Rationalize All of these
Facts!
1. How We Program vs. How We Design?
• Problem Expression Still Basically in the 60’s ALGOL Era— If Computing is to be the Driver of the Economy, then How
can it Support the Long Development, Uncertain Costs, Atrocious Quality, …
• Consider the Evolution of Design Abstraction Level Between IC and Software Design
DesignAbstractions
IC’s
60-70’s Today
Parts of Transistors
Transistors and Logic Elements
Arithmetic Elements
Processor Units
Software ALOGOLFORTRAN
Lambda Calculus
JAVA?
ConstraintSolving Declarative?
2. Internet Technology
• The Internet is Clearly One of Our Most Successful Inventions
• But Way Different in Intent than What We Are Using it for:—It was Built to Connect Networks (“Internet”),
not Computers, much less 100’s of Devices within One House
—It Was Built for Fixed Nodes, Not Highly Migratory, Mobile, … Devices
—It’s Strength is the “Purity of Abstraction”, But Not Clear that is Solution for Media Convergence
Example: We Are On a Path to Replace Broadcast TV from One Transmitter with Literally Thousand of Individual Point to Point
Transfers!
Some Internet Questions
• No One Locates Books by a Hierarchy (i.e. Dewey Decimal or LC #)—Why Would we Organize Names and Numbers for
Internet Identity—Creating Thousands of Top Level Domains Hardly
Sees Like the Answer• Telephone Numbers Are Your Identity –
But IP Numbers Are a Location—So We have Had to Build (Kludge) Overlays,
such as Skype ID, Usernames, …—But Services Like IPSEC Fall Back on IP# =
Identity—Try to Roam across IP Nets using Skype or
IPSEC!!• Content Is All Centralized, Yet Access is
Decentralized and Highly Correlated
Some Internet Questions #2
(Security)• Does Anyone Believe We Are Making the
Internet More Secure?—We are Clearing a Mine Field by Stepping on Each
Mine!—There are More Mines than Mine Clearers!
In this Metaphor, Uncompromised Bank Accounts, Credit Cards, Identities, …
• More Important Question: Does Anyone Believe We Can Make the Current Network and O/S software Secure?—Then Why Aren’t We Investing in this Issue anything
Like What We Spend on Anti-Virus, Firewalls, Intrusion Detection?
—We Are Using our Energy to Bail Water, not Fix the Leak
• Market Proof: The Cost of a “Zero-Day” Worm has not Risen Despite Investments in Security
3. Internet Technology
“Put it on/over the Internet” Has Become an Elixir for All Budget/Service/Technology Problems—Our Community Built/Builds/Researches/Sells This
Technology, but:Our Obligation:1. Inform Decision Makers and External
Community of the Issues with this Technology
2. Find the Fundamental Research that Attacks the Big Issues—Not Just fund a Grad Student at a Time!
Internet Accountability
• Many Believe Internet Has Anonymity as a “Right”— Not in any RFC I Have Read— I Think the Creators Were Just Glad to Have it Work!
• Many/Most of Internet Security Issues Derive from Lack of Accountability for Actions— DNS Poisoning, Attacks, Port Scanning, Spam, ID Theft, Bot Net
Control, . . .• As More National Infrastructure is Internet
Dependent, are We Willing to Place National Security/Economy/Society at Risk to Maintain Inherent Anonymity?— Dissidents Need Avenues for Speech, but at What Cost and
Risk to All Citizens of the World?• Broad Community Needs Understanding of Role for
Mechanisms to Enforce Accountability for Some Functions— Network Management, Financial, Economic News, …— Does Not Preclude Services (such as Chat Rooms, Blogs) from
Not Maintaining it
Common Cause Failure and Security
• During Cold War, Governments Understood Necessity to Ensure no Single Failure Could Deny Ability to Retaliate after and Attack on Our Society—Billions Spent in Redundant Communications, Weapons,
Command and Control, …—Billions Spent to Ensure Confidence in Identification of
Attack Source—Led to Fundamental Advances in Systems Theory,
Communications, Space, Computing, …• That Threat Went Away, But Others Emerged
—We Have Had More Cyber Attacks than Nuclear Ones!• Yet, These Basic Principles of Societal
Protection Have Not Been Applied to Our Current Infrastructure Because of Lack of Awareness of Technological Concentration
We Once Had a Diversity of Communications
TechnologiesAll Comm Services Are Converging
on IP as Core— Ex. FCC Has Proposed Public Safety D-
Block Spectrum Be Auctioned, and Public Safety Be Given LTE Services
— Utilities Building “Smart Grid” on IP, SCADA,
All Can Be Negated with a “Common Mode” Attack
— Fortunately No One Has Found (or Publically Used) it , but Why Are We Gambling Our Societies on Assumption One Does Not Exist?
Monocultures Lead to Massive Societal Failures
— Irish Potato Famine
InternetTechnologies
LTE
VOIP DNS, OSPF, BGP,
IP
VPN
Cyber Attack is Preferred Vector for non-Peer & Developing Nation State Attack on Otherwise Militarily Invisible Adversary
Public Safety
Cellular Management
(SS7)
CellularTraffic
Enterprise Nets
UtilityControl
Military
Plain Telephone
Independent Legacy Systems
Future Robotics,Medicine,
Earth Resources
Question to Our Community
• Importance of Accountability is Obvious After the Fact— Effective Response to the Sinking of the Cheonan Hampered
by Lack of ABSOLUTE Proof of Attack Source— Despite Physical Evidence
• Imagine the Difficulty in Responding to a Nation State Attack, when the Attack was Vectored through Multiple Botnets, Friendly Countries, non-State Actors, …
• How Many of Our National Decision-Makers Understand:— That Major Portions of Economic, Social, and Military
Infrastructure is Vulnerable to a Single Mechanism in the Internet Fabric?
— Can Not Only Negate a Single Element of the Economy and Response Capability, But to Negate Apparently “Redundant” Systems as Well?
— That there Will Likely be no “Actionable” Proof of the Source of Such Attacks?
• Dialog is Not One to be Decided by Science Community, but it Should be Raised by this Community
US and Korea Face Unique and Proven Threats
How Do Engineers and Scientists Contribute to
the Communications Vision?
• Engineers and Scientists Tend to Limit Publications/Presentations to Quantitative Material Backing Up Technical Contentions— Try to Get through Peer Review without MATLAB, SIMULINK,
MATHEMATICA, Equations, …!• We Need a Dialog about where things “Might” go!
— Bound by Physics, but Flexible on the Immediate Technology and Engineering
• For anyone Organizing a Conference, Have Some Science and Engineering Vision in the Agenda –— Otherwise the vision is written by Sociologists, Talk Show
Hosts, …— Make sure your TPC Understands!
Our Accountability
• We Are Developing and Deploying Technology Faster than Society Can Absorb it!
• Sociologists, Lawyers and Politicians Can Look at Impact After Deployment, But We Should Take Burden to Better Articulate these Issues Well Before they Are Apparent
• We Particularly Need to be Observant of Loss of Diversity in the Technology — Millions Worry about Loss of Natural Diversity— Should We Not Worry About the Effects of Loss of
Technologic Diversity?— One Networking Technology, One Search Technology, …
• Marketplace is Good Arbiter for Independent Decisions, but Can Not Deal with Technologic Correlation Across our Entire Society, “Black Swan”, Nation State Actions, …
Fundamental Change in the Internet
• We Owe Our Government, Economic and other Institutions Concerns That the Internet Has become So Critical to the Society, yet is Already Obsolete, and a Risk to Our Economy and Society
• Emphasize this is not Just an “Interesting” Research Topic for Comp Sci PhDs, or Academic Welfare, but Central to the Future of an Internet-Dependent World—Industry Hesitant to Raise Risks in Pointing Out Issues
with It’s Own Products and Investment Strategies—Lots of Small NSF Programs Will Not Fill This Need!
• Believe a Similar (Less Threatening) Condition Exists in Restraints on Innovation due to Programming Software-Based Products as they become More Risky and Product Cycles Extend
17
Thank You
Questions?
Information Sciences Institute
“We are the ‘&’ in R&D
Information Sciences Institute
Agent of Innovation: from visionary to viable
Dr. Preston MarshallDirector, Decision Systems, Information Sciences Institute, and
Research Professor, Ming Hsieh Department of Electrical EngineeringViterbi School of Engineering,
University of Southern California, Marina Del Rey, CA and Arlington, VA
Korean Computer Scientists and Engineers Association in America
11th Annual Symposium
5 November, 2010
The growth of the Internet has shown the flexibility of the underlying mechanisms to scale from small, University-oriented computer to computer connections, to a fabric that is fundamental to most of today's social, commercial, financial and Government structures. However, the fact that has been successfully scaled does not prove that it is the right network framework to address all of today's challenges. The growth of wireless, the transition of critical infrastructure systems to the Internet technology, increased vulnerability to cyber-attack and vulnerability of private information all are stresses unimagined only decades ago. Responses to these stresses have tended to be evolutionary, but it may be time for the science and technology community to make more effort to bring the need for revolutionary changes in the computing and networking infrastructure to the attention of policy, regulatory and funding organizations.
Some Major and Remaining Challenges in Networking, Wireless,