Title: Cyber Security: Research, Results, and Opportunities
1Cyber Security Research, Results, and
Opportunities
- Larry Korba
- Information Security Group
- Institute for Information Technology
- Larry.Korba_at_nrc-cnrc.gc.ca
MITACS Cybersecurity Workshop, Nov 29-30, 2004
2Agenda
- Caveats
- IIT
- Information Security Group
- Projects
- Research Results Opportunities
- Conclusions
3Caveats
- Opportunities Focus
- Research mostly over the last 3-4 years
- Some of IITs Cyber Security Research
- Information Security Group (Mostly)
- PST Team
4IIT Cybersecurity
E-Business Focus
IIT Atlantic 61
Information Security 7
PST Team
Interactive Information 11
IIT Gatineau 15
IIT Ottawa
Integrated Reasoning 15
High Performance Computing 6
Interactive Language Technologies
Computational Video 10
Software Engineering 12
Visual Information Technologies 21
5Information Security Group Background
Short History
- IITs Research Startup in Security and Privacy
- 2001 1 Researcher2004 (February) 6
Researchers, 2 GW2004 4 Researchers, 1 CS, 4
GW, 2 Students - Security Privacy Enhancing Technologies for
Distributed Systems
Security and Privacy without Complexity
6ISG Projects
- Privacy Incorporated Software Agent (2001-2004)
- EU 5th Framework (4.3 Million EU, 6 Countries)
- Develop Privacy Enhancing Technologies for
Agent-Based E-Commerce - Taiwan-NRC Collaborations (2001-2004)
- Privacy and Security for
- E-Learning
- E-Manufacturing
- SME Involvement
- Security Privacy for On-line Gambling
- Other Government Departments
7Research Cyber Security
- Trustable HCI
- Network-Based Privacy
- Scalability of Distributed Security Applications
- Critical Infrastructure Interdependencies
- Managing Rights
- Privacy Testing Profiles
- Agent-Based Security Intelligence
8Network Confidentiality (PISA)
- Analysis of well known network anonymization
approaches - 10 different attacks
- Agent-Based Network Confidentiality Prototype
implemented - Research into self-managed network
confidentiality
9Network ConfidentialityImplementation
- JADE Environment
- Two Agent Types
- Onion Routing Agent
- Onion Monitor Agent
- Self-Managed System
10Topology Diagram
Agent 2
Agent 1
OMA
Platform Messaging Channel
ONA
11Opportunity Ad Hoc Network Privacy
- For Wireless Short-Range Communication
- Secure Routing and Message Delivery
- Non-source based Routing.
12Opportunities
- Secure Protocol Research
- Improve insecure protocols NetBIOS, NFS, NIS,
etc.
13HCI and PRIVACY PROTECTION
From Privacy Legislation to Interface Design
Building Trust Reducing Risk
HCI Requirements for Legislative Compliance and
Usable Design
Just-In-Time Click-Through Agreements Informed,
Unambiguous Consent
14Opportunities
- Context-Based Interaction
- User Interface, Visualization Techniques
integrate - User culture, preferences, temperament
- Time/Space/Other Dependencies
- Recovery Techniques
- Targets
- Help quickly identify problems
- Help make appropriate decisions dealing with
Cyber Security Events - Applications in other domains
15Scalability of Privacy Security Technologies
(PISA)
- For Security aspects Privacy Enhancing
Technologies - Agent-based (JADE)
- Measurement
- Modeling
- Simulation
16Critical Infrastructure Interdependencies
- New research focus in PST Team (IIT)
- Multidisciplinary approach
- From Scenarios, to Multidimensional Models, and
Training Simulations - Agent-Based Approach
From Rinaldi et al.
17Opportunities
- Modeling of Security Systems
- Threat Analysis
- Development
- Testing
- Discover System holes
18Privacy Management
- Adapt DRM Architecture to provide functions
required by Data Directive - Provides Privacy Rights Management
- Started with Privacy Principle Analysis
19Entity Relationships
20DRM Adapted for PRM
21PRM-Style Privacy Management
- Includes the ability to negotiate privacy
policies - Service Provisioning
- Automated/Semi-Automated Policy
Negotiation/Setting
22Opportunities
- Policy-based security policy negotiation
- Secure Software Engineering
- Modeling Tools
- Code Analysis/Inspection Tools
- Automated Testing
23Privacy Testing Profiles
- Players Information Privacy Commission of
Ontario, EDS, Cyberrun, others. - From CSA Fair Information Practices Develop a
threat model and testing methodology for any
privacy technology - Extend Common Criteria
- Target Privacy Assessment lt 50K
24Opportunities
- Privacy testing technologies
- Database or application leaks of personal data
- Threat model-based
- Privacy Monitoring Technologies/Services
- Similar to security monitoring technologies
25Agent-Based Security IntelligenceSocial Network
Analysis
- Distributed Computer Activity Monitoring
- Automated Social Network Analysis
- Determine Inappropriate Behaviour
26Opportunities
- Threat Discovery
- Graph-based relational learning
- Link Mining
- Multi-Relational Data mining
- Behavioural Modeling
- Privacy-Preserving Data Mining
- Cryptographic Techniques
- Secure distributed logs/databases
27Summary Opportunities
- Secure Software Engineering Technologies
- Privacy Technologies
- Privacy-Preserving Data Mining
- Active Data Control
- Privacy Testing/Monitoring/Enforcement
- Automated Security Management
- Modeling approaches
- Non-linear, multi-dimensional approaches
- Applied to Security Systems
- Securing Weak Communication Protocols
- Contextual Data/Knowledge Visualization
- Help make effective decisions
- More Secure Protocols
28Thank You
http//www.iit-iti.nrc-cnrc.gc.ca
- Contact Larry Korba
- Group Leader, Information Security
- Institute for Information Technology
- Larry.Korba_at_nrc-cnrc.gc.ca
29Network Confidentiality