Top Banner
Re-Inventing the Internet: Building Security In CISE National Science Foundation [email protected]
22

Re-Inventing the Internet: Building Security In CISE National Science Foundation [email protected].

Dec 20, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

Re-Inventing the Internet:Building Security In

CISE

National Science [email protected]

Page 2: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

2

Executive Summary

• The current Internet is unreliable and vulnerable to attack.

• Many of these vulnerabilities are inherently in design choices of the architecture

• Yet critical infrastructures depend upon it.

• We need to re-invent the Internet.

• This time we need to design-in security, robustness, flexibility, manageability, evolvability, and…

Page 3: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

3

Internet Vulnerability and the Need to Re-invent the Internet

Page 4: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

4

2005 PITAC Report on CyberSecurity

“Because much of this (IT) infrastructure connects one way or another to the Internet, it embodies the Internet’s original structural attributes of openness, inventiveness, and the assumption of good will.

These signature attributes have made the U.S. IT infrastructure an irresistible target for vandals and criminals worldwide”

“A broad consensus among computer scientists is emerging that the approach of patching and retrofitting networks, computing systems, and software to “add” security and reliability may be necessary in the short run but is inadequate for addressing the Nation’s cyber security needs.”

Page 5: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

5

Not a new problem

Page 6: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

6

1987 An Agenda for Research in Networking and Communications

(NSF)

“It is vital to devote much more research, both at the academic level and at the industrial level, to these [survivability] problems before a truly major catastrophe occurs.”

Page 7: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

7

1988 Toward a Network Research Network (NRC)

“Privacy and security are issues that are especially important to consider early on… privacy and security in data communications have been underappreciated and underprotected to date”

Page 8: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

8

1991 Computers at Risk: Safe Computing in the Information Age

(NRC)

“…we cannot wait to see what a attackers may devise, or what accident may happen, before we start our defense. We must develop a long-term plan, based on our predictions of the future, and start now to develop systems that will provide adequate security and trustworthiness over the next decades.”

Page 9: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

9

1997 Critical Foundations: Protecting America’s Infrastructures

(President’s Commission on Critical Infrastructure Protection)

“The rapid proliferation and integration of telecommunications and computer systems have connected infrastructure to one another in a complex network of interdependence. This interlinkage has created a new dimension of vulnerability, which, when combined with an emerging constellation of threats, poses unprecedented national threat.”

“Potential cyber threats and associated risks range from recreational hackers to terrorists to national teams of information warfare specialists.”

.

Page 10: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

10

Not just technology• Economics

• Privacy– Personal information and Identity theft– Surveillance (sensors; cameras; web activity,

location)

• Open society– Freedom of speech– Freedom of access– Reachability

Page 11: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

11

IEEE Spectrum June 2005

• “If censorship technology flourishes in China, it will be easier and cheaper to take root elsewhere.”

• “The features that China wants installed in intermediating devices and software will gradually find their way into all of the suppliers’ products, if only because it is cheaper that way.”

• “The primary and most longstanding means of blocking is at the router level.”

Page 12: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

12

What should we do?

Page 13: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

13

1999 Trust in Cyberspace (NRC)

Recommendation:

“It is time to challenge th[e] paradigm of ‘absolute security’ and move toward a model built on three axioms of insecurity: insecurity exists; insecurity cannot be destroyed; and insecurity can be moved around.”

“’Trustworthiness from untrusted components’ is a research area that deserves greater attention.”

Page 14: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

14

2003 Grand Research Challenges in Information Systems (CRA)

Create Systems you can count on:• System development tools that reduce the frequency

and severity of bugs.• System administration tools that reduce the frequency

and severity of configuration errors.• Understandable, deployable, and usable security.• New approaches to composition of modular elements.• New approaches to federation.• Pervasive audit trails.• Self-adaptive systems.• Architectural enhancements to processors (trusted HW)

Page 15: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

15

2005 Overcoming Barriers to Disruptive Innovation in Networking, (NSF)

“… in the thirty-odd years since its invention, new uses and abuses, along with the realities that come with being a fully commercial enterprise, are pushing the Internet into realms that its original design neither anticipated nor easily accommodates.”

“Such problems are numerous, and the Internet’s emerging centrality has made these flaws all the more evident and urgent. As a result, it is now widely believed that the Internet architecture is in need of substantial change.”

Page 16: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

16

2001 Looking over the Fence at Networks (NRC)

“… successful and widely adopted technologies are

subject to ossification, which makes it is hard to

introduce new capabilities or, if the current

technology has run its course, to replace it with

something better. Existing industry players are not

generally motivated to develop and deploy disruptive

technologies … “

Page 17: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

17

2001 Looking over the Fence at Networks (NRC)

“Networking research should more aggressively seek to develop new ideas and approaches.”

“To encourage thinking that is unconstrained by the current Internet, ‘Plan B’ approaches should be pursued that begin with a clean slate and only later (if warranted) consider migration from current technology.”

Page 18: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

18

NeTS Planning Activities

• Planning Grants FY04– Disruptive network innovations via network

virtualization

– Optical integration and implications on optical networking

• Planning Grants FY05: – Clean-slate network security

– End to end network architecture

– Wireless mobile and sensor networks

– Distributed systems

– Real time networked systems and CIP

Page 19: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

19

Purpose of Planning Grants

• Articulate a compelling research agenda

• Articulate requirements for an experimental

infrastructure

• Get communities to work together

– Network architects and security experts

– Network architects and optical integration experts

– …

• Help NSF & other agencies to fund and promote

agenda

Page 20: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

20

2006 NSF NeTS Research Agenda

• Rethink/Reinvent the Internet– Keep the good, address limitations, create new

• Clean-slate architecture– Include optical, wireless, sensor network, etc.

technologies– Enable new applications

• Build-in attributes of security, robustness, scalability, manageability, evolvability, etc.

• Work together for a synergistic approach– Security, network architecture, realtime experts …

Page 21: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

21

Potential Outcomes of Initiative

• Migrate functionality into Current Internet

• Enable an Alterative Secure Internet for Critical Infrastructures

• Replace of Internet under Catastrophic Failure

Page 22: Re-Inventing the Internet: Building Security In CISE National Science Foundation dlfisher@nsf.gov.

22

Your Role

• Discuss how to build-in security into a clean slate architecture

• Write a report—– Research Agenda – Infrastructure Needs

• Engage in joint research with networking and security researchers