Title: CNS
1CNS Perspective on TONCKarl Levittklevitt_at_nsf.g
ov
- CNS overview
- More details on Cyber Trust
- GENI/FIND
- Maybe GENI/FIND is not needed -- Steve Kents
perspective - Challenges
- How TONC can play
2Computer and Network Systems Division (CNS)
- Computer Systems Helen Gill, Brett Fleisch
- Distributed systems embedded and hybrid systems
middleware parallel systems - Network Systems Darleen Fisher, Guru Parulka,
David Goodman, David Du - Network research broadly defined wireless
systems networks of sensors FIND (Future
Internet ) - Cyber Trust Karl Levitt Bill Steiger others
- Security for FIND cryptography the world
- Computing Research Infrastrcture
- Education and Workforce
- Create exciting curricula for CS Acting on the
perceived enrollment and CS image problems
3Cyber Trust Projects
- Computer and Network Security Research Grants
primarily supports single investigator and teams
conducting research in computer security - Computer and Network Security Research Centers
primarily large-scale grants conducting research
towards new technology often with important
applications of the technology the Centers
include four being funded under the Cyber Trust
program - University of Illinois (TCIP) Security for
Critical Infrastructures - UC San Diego Large scale worm defense
- Johns Hopkins E-Voting
- Carnegie Mellon Third generation secure systems
- Stanford, Yale, Stevens PORTIA
- DETER/EMIST security testbed
- Centers give us visibility, but so can important
theoretical results
4Technology Generations of Information Assurance
1st Generation (Prevent Intrusions)
5An additional Center-Level Project
- UC Berkeley (with Stanford, Cornell, Vanderbilt,
Carnegie Mellon) TRUST, which includes security
for critical infrastructures
6Cyber Security at NSF (cont.)
- Computer and Network Security Capacity
Building facility improvement, support for
education - Graduate Traineeships in Computer and Network
Security Research - Scientific and Advanced Technology Act of
1992 trains programmers and technicians who will
be the workforce that supports U.S. Government
and industry organizations addressing the current
security threats
7Research Areas for Cyber Trust
- assure authenticity of digital media
- develop automated defense against malicious code
attacks, including viruses, worms, adware and
spyware - extract valuable information from networks and
large databases without compromising individual
privacy - protect large enterprises from denial-of-service
attacks - safeguard on-line transactions of minors by
increasing parental consent - enable hardware support for security enhancements
- create new programming language features that
support the development of secure systems by
preventing many kinds of attacks - develop workbenches to help developers evaluate
their systems against realistic threats and in
the presence of realistic background traffic - make eavesdropping on digital channels more
difficult - assess computer systems for the presence of
vulnerabilities
8Cyber Trust Research Areas (cont.)
-
- trace attacks that exploit vulnerabilities in
Voice-over IP through the Internet - reason about the effectiveness of security
components, including intrusion detection systems
- develop new defenses against attacks on
distributed sensor networks - develop secure RFID systems through lightweight
cryptograph - Digital forensics
9GENI Global Environment for Networking
Investigations
- CISE
- National Science Foundationdlfisher_at_nsf.gov
10Education
Communication
Internet Transforming Infrastructure
SEResearch
InformationSharing
11Looking Ahead
Applications
Capabilities
Technologies
12Emerging Disruptive Technologies
13Sensor and Sensor Networks
New Machines
14Software Radios
- Software Radio
- Wide operational frequency supports use of
multiple bands - Multiple waveforms in a single hardware unit
provides interoperability - Impact
- Dynamic spectrum management helps prevent
interference - Adaptable to local current situation flexible
frequency use provides opportunities for quality
of service - Rapid deployment and service creation
- Enables new network architectures through
flexible dynamic connectivity
- Systems and networking issues remain unexplored
and unexploited!
Thanks to Joe Evans
15Mobile Wireless Devices
- PDAs Cell Phones Laptops iPODs
- Each one is an end-node on the network
- 2B cell phones sold every year
- Range of mobility
- Data, VOIP, IPTV,
16Photonics Integration
17System on a Chip IXP 2850
3 RDRAM channels
2 encryption engines
10 Gb/s IO
4 QDR SRAM channels
16 32 bit processors 8K ctl. memory
- gt20 GIPs (peak)
- 16 i/B for 10 Gb/s traffic
Thanks to Jon Turner
18Emerging Applications
19Digital Living 2010
Tomorrows users will be surrounded by pervasive
devices, embedded sensors and systems all
connected to the Internet.
Thanks to David Kotz at Dartmouth
20Networked Embedded Systems
Thanks to Paulo Verssimo
21NEONNational Ecological Observatory Network
22Network Centric Critical Infrastructures
Essential Utilities
Transportation
Telecommunications Banking Finance
23And many more
- Mapping the physical world into virtual world
- Networked embedded systems
- Large scale data grid and vast personal data
- Pervasive computing with mobile wireless
- Disaster recovery
- SE Applications
- And others that we cannot guess today
24Looking Ahead
Applications
Capabilities
Technologies
25Current Internet Evolution?
26Internet Security Limitations
- Because much of this (IT) infrastructure
connects one way or another to the Internet, it
embodies the Internets original structural
attributes of openness, inventiveness, and the
assumption of goodwill. - These signature attributes have made the US IT
infrastructure an irresistible target - A broad consensus among computer scientists is
emerging that the approach of patching and
retrofitting networks, computing systems, and
software to add security and reliability may be
necessary in the short run but is inadequate for
addressing the Nations cyber security needs. -
PITAC Report on CyberSecurity
27- in the thirty-odd years since its invention,
new uses and abuses, along with the realities
that come with being a fully commercial
enterprise, are pushing the Internet into realms
that its original design neither anticipated nor
easily accommodates. - Freezing forevermore the current architecture
would be bad enough, but in fact the situation
is deteriorating. These architectural
barnaclesunsightly outcroppings that have
affixed themselves to an unmoving architecture
may serve a valuable short-term purpose, but
significantly impair the long-term flexibility,
reliability, security, and manageability of the
Internet. - Overcoming Barriers to Disruptive Innovation in
Networking, NSF Workshp Report, 05.
28Future Internet?
Distributed Systems and Services?
Network and Protocol Architectures?
New Paradigms?
NetworkCapabilities
EnablingTechnologies
Applications UserRequirements
- Need a clean-slate approach
29GENI Initiative
- Research -- Refocus existing programs
- NeTS gt FIND
- Cyber Trust
- CSR
- CRI
-
- Experimental Facility
- Exploring different possibilities including MREFC
- Up to 300M
30Future Internet
- Must
- Be worthy of our societys trust
- Even for managing and operating critical
infrastructures - Provide a bridge between physical and virtual
worlds - Via instrumented and managed sensorized physical
environment - Support pervasive computing
- From wireless devices to supercomputers
- From wireless channels to all optical light-paths
- Enable further innovations in SE research
- Seamless access to networked instruments,
supercomputers, storage,
31Future InternetMust Be A Platform for Innovations
32NSF Community Collaboration
Disruptive Innovations
GENI Initiative
Optical Technologies
Planning Grants and Workshops FY04-05
www.nsf.gov/cise/geni/
33NSF Community Collaboration
Research Experimental Facility
Disruptive Innovations
GENI Initiative
Optical Technologies
Planning Grants and Workshops FY04-05
www.nsf.gov/cise/geni/
34Research Community stepping up to create Future
Internet -- Internet for the 21st Century
35Scope of Research
- Core functionalities
- Security and robustness
- Privacy and accountability
- Manageability and usability
- Economics viability
- Theoretical foundations
- Communications during crisis
- High level conceptualization
- Support for applications design
- Large scale storage management
- Social needs
Networking and distributed systems broadly defined
36What is Different This Time?
- Clean-slate approach
- To overcome Internet ossification
- A comprehensive coordinated effort
- Ability to try different approaches
- Ability to experiment at scale
- With real users and applications
37Case for GENI Facility
Shared DeployedInfrastructure
Need for Large experimental testbed/infrastructur
e
This chasm represents a majorbarrier to
realization of GENI
Small Scale Testbeds
Maturity
ResearchPrototypes
Foundations Research
Funded by CISE Programs
Time
38High Level Goals
- Enable exploration of new network architectures
and distributed system capabilities - A shared facility that allows
- Embedding within itself a broad range of
experimental networks and distributed services - Interconnection among these experimental networks
and with the Internet - Users and applications to opt-in
- Observation, measurement, and recording of the
resulting experimental outcomes
39Facility Goals and Key Concepts
Goal shared platform that promotes innovations
Key Concepts Slicing, Virtualization,
Programmability
40Details of the Facility
41Global and Local Software
42Recognize Four Groups
- Baseline GENI facility providers
- Provide baseline GENI with appropriate
capabilities and hooks - Network architects and distributed systems
builders research teams - Deploy new networks and services on the baseline
facility - Application providers research teams
- Build and deploy example applications
- End users
- Use applications for their benefit and in the
process test
43Expected GENI Deliverables
- Deep insight about
- Various proposed architectures
- Various engineering trade-offs
- A new class of
- Network platforms switches/routers/APs/Optical
Systems/? - Control and management planes
- Distributed system infrastructures
- Embedded measurement and instrumentation
infrastructure - Optical transport systems and networks
- An operational infrastructure
- new architecture(s) secured, robust, scalable,
manageable, and evolvable - New and old applications with real users
- Accelerate innovations and continued growth
44Many teams across the nation to
participateCurrent snapshot of our collective
thinking -- will most likely evolve
45Success Scenarios
- Internet evolution influenced by clean-slate
approach - Alternate infrastructure emerges
- Single architecture emerges and dominates
- Virtualization becomes the norm with plurality of
architectures - Alternate infrastructure becomes the mainstream
over time - Many other payoffs
- Some unexpected
46GENI
- MREFC (Major Research Equipment and Facilities
Construction) Funding - NOT research funding
- Idea is Think Big? more research funding to
promising area
47Community Input
- GENI Town Hall Meetings
- March 10 Crystal City VA (near Reagan Airport)
- West Coast and Central US TBD
- See www.geni.net for current plan
- Join GENI discussion list
- Email/call Guru or me
- NeTS FIND proposals submit 2 page facility needs
48Does Everyone in the Research Community Agree
with GENIs Goals?
49Challenges to Re-inventing the Internet
- Dr. Stephen Kent
- Chief Scientist - Information Security
50How the Internet Came About (v1)
- Vint Cerf ande Bob Kahn (and, of course, Al Gore)
invented the Internet - No attention was paid to security concerns
- Tim Berners-Lee invented the Web, moving the
Internet beyond e-mail, FTP, and Telnet - Marc Andreesen invented the browser, making the
web accessible to everyone, and making him rich - Google indexed the web, making it all accessible
- We all live happily ever after
51How the Internet Came About (v2)
- Vint Bob invented IP TCP
- Vint and Bob went to ARPA and spent lots of RD
money to evolve Internet technology - Security was a concern KDC system built and
tested 5 years before Kerberos, MLS e-mail
prototypes, IPSO, - Vint Bob provided active technical leadership
for these Internet RD projects - Vint Bob made the DoD a major client, which
helped stimulate vendors to support IP - Vint created the IAB to oversee the Internet
architecture - The IETF was formed to create Internet standards
- This enabled the web, browsers, Google, etc. to
come about
52The Original Internet Competition
- Data communication options circa 1978-85
- Leased lines
- SNA
- X.25
- DecNet
- OSI
- Proprietary LANs
- Significant investment by some businesses, all
major computer vendors, a few service providers,
very, very few individual users
53The Competition Today
- The Internet as we know it!
- It evolves to support new apps, higher
performance, new media, bigger scale, - Enormous investment in the current technology by
- Businesses in all areas
- Local, state, and federal governments
- All computer vendors (fewer than there used to
be!) - Thousands of service providers
- Hundreds of millions of individual users
- The scope of affected organizations and people,
and the magnitude of the investment in the
current Internet is enormous
54What Motivated the Internet Transition?
- Significantly reduced cost to communicate
- Network scope
- Significantly improved functionality
- Competitive advantage
- But, these factors have to be balanced against
- Capital costs for hardware software
- Training costs for users, system administrators,
- Service disruption for customers, internal users,
-
55Do We Need to Replace the Internet?
- Spam is very annoying, but so are all the phone
calls I receive on behalf of charities - Most phishing looks like spam to me, and largely
is a social engineering concern - Network availability is good enough to do
billions of dollars of transactions daily - Network performance is good enough for VoIP, web
surfing, etc. IF you have good local access
(i.e., the core is OK) - Security for end systems is NOT intrinsically a
network problem, although the net can help - Real time and control applications are not
reliably handled by the Internet
56Can NSF Develop a New Internet?
- NSFs model for program funding and management is
very different from DARPA - Grants to faculty, leadership by faculty,
graduate student labor, minimal industry
involvement, most grants are modest by DARPA
standards - NSFNET was a big exception to this model but
still modest in scale vs. DARPAs investment - The scope of the public Internet is
international, the investment is enormous, the
number of affected users staggering, - Convincing users, vendors, and service providers
that the new Internet is worth the transition
costs will be very, very hard
57The Report of the Internets Death was an
Exaggeration
58Challenges
- How do incorporate security into GENI?
- To protect it against external attacks
- To protect it against experimental malware
- To protect applications from a potentially
malicious GENI - Does GENI provide the mechanisms to support
interesting new ideas from TONC? - Network Coding
-
- The clean slate for FIND is mostly about a new
network. What should be in the new network to
support - Wireless computing location services,
- Security traceability, forensics,
- It has been conjectured that Denial of Service
attacks can be neither prevented or mitigated.
Prove this wrong. - For what disruptions will the Internet recover?
How long will it take?
59More Challenges
- View GENI as a step towards Big Computer-Science
- What theories can be validated with GENI?
- Time for a worm to propagate through the Internet
-- under varying assumed conditions - Can a worm defense keep up with a fast moving
worm?
60More Challenges
- Can the next Internet be designed for real-time
computations (Wei Zhao) - What are the limitations of formal methods?
- Model checking to prove properties of
configurations - Identify vulnerabilities in source and object
code - Prove security properties of protocols
- Can data be sanitized for use by experimenters?
- This might be a special case of the
transfomation of research data to achieve
confindentiality and usability (Dwork, and many
others)
61Toolkit architecture
Security Properties
Integrated error report
Program
Toolkit
Raw error report
Intermediate representation
Analysis engines
Report engines
Parsers
Model checking (MOPS)
HTML report generator
C parser
Type inference (Cqual)
C parser
Java parser
Range analysis (BOON)
62Analysis engines
- MOPS pushdown model checking
- Privilege elevation bugs
- Race condition bugs
-
- Cqual type inference
- Format string bugs
- User/kernel pointer bugs
-
- BOON integer range analysis
- Buffer overrun bugs
63Experience checking critical servers
Program Lines of code Running time Bugs found Bugs found
Program Lines of code Running time Total Real
Apache HTTPD 2.0.40-21 229K 233 6 2
At 3.1.8-33 6K 025 7 1
BIND 9.2.1-16 279K 315 4 0
OpenSSH 3.5p1-6 59K 329 24 5
Postfix 1.1.11-11 94K 653 6 0
Samba 2.2.7a-7.9.0 254K 4533 8 2
Sendmail 8.12.8-4 222K 1834 11 0
VixieCron 3.0.1-74 4K 027 4 3
Total 1147K 8109 70 13
64Experience checking the entire RedHat Linux 9
- RedHat Linux 9
- 839 packages
- More than 60 million lines of code
- Experiments
- Checked 6 properties
- Found 79 new bugs so far
65Can Security be Achieved using Simple Paradigms?
- Accountability
- Partitioning of data into trusted and untrusted
sets - Virtualization throughout
- Diversity to thwart attacker
- Control theory for security
- Currency needed for each packed issued
- Can security be predicted or measured, perhaps if
simple paradigms are used?
66Diversity System Functional Architecture
Address randomization does not remove
vulnerability but makes effect of attack
unpredictable
Normal user inputs work
Attacker
Modifications transform original stored program
User Inputs
Other System Resources
Original Program
Modified PE File, Loader System Calls
Optional Annotation File
Transformed In-memory program
Some attacks fail because vulnerability is not at
assumed address
Other attacks fail because injected commands are
wrong
PRNG
Pseudo-Random Number Generator
67More Challenges
- Can anonymity and authorized monitoring co-exist?