TIED: A Cluster of One. TIED: Trial Integration Environment DETER The DETER folks: Terry Benzel, Bob Braden, Ted Faber, John Hickey, Alefiya Hussain,

Slides:



Advertisements
Similar presentations
TIED: A Cluster of One TIED: Trial Integration Environment DETER built on.
Advertisements

This work was supported by the TRUST Center (NSF award number CCF ) 1. Setting up experiment on DETER testbed a)Created twelve pc backbone nodes.
Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
The Challenges of Repeatable Experiment Archiving – Lessons from DETER Stephen Schwab SPARTA, Inc. d.b.a. Cobham Analytic Solutions May 25, 2010.
Design Deployment and Use of the DETER Testbed Terry Benzel, Robert Braden, Dongho Kim, Clifford Informatino Sciences Institute
Information Sciences Institute Internet and Networked Systems Managing Security Policies for Federated Cyberinfrastructure Stephen Schwab, John Wroclawski.
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
Background information Formal verification methods based on theorem proving techniques and model­checking –to prove the absence of errors (in the formal.
Research topics Semantic Web - Spring 2007 Computer Engineering Department Sharif University of Technology.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
1 DETER Community Meeting January 31 – February 1 Terry V. Benzel Information Sciences Institute University of Southern California.
1 GENI: Global Environment for Network Innovations Jennifer Rexford Princeton University
1 GENI: Global Environment for Network Innovations Jennifer Rexford On behalf of Allison Mankin (NSF)
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Unified Modeling (Part I) Overview of UML & Modeling
Architectural Design Principles. Outline  Architectural level of design The design of the system in terms of components and connectors and their arrangements.
Nov. 14, 2007 Systems Engineering ä System ä A set or arrangement of things so related as to form a unity or organic whole. ä A set of facts, principles,
1 Objective of today’s lesson S oftware engineering occurs as a consequence of a process called system engineering. Instead of concentrating solely on.
Course Instructor: Aisha Azeem
Chapter 10: Architectural Design
[ §4 : 1 ] 4. Requirements Processes II Overview 4.1Fundamentals 4.2Elicitation 4.3Specification 4.4Verification 4.5Validation Software Requirements Specification.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
C OLUMBIA U NIVERSITY Lightwave Research Laboratory Embedding Real-Time Substrate Measurements for Cross-Layer Communications Caroline Lai, Franz Fidler,
Clinic Security and Policy Enforcement in Windows Server 2008.
Sponsored by the National Science Foundation TIED Spiral 2 Year-end Project Review USC/ISI PI: John Wroclawski Staff: Ted Faber, Mike Ryan August 30, 2010.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
A Research Agenda for Accelerating Adoption of Emerging Technologies in Complex Edge-to-Enterprise Systems Jay Ramanathan Rajiv Ramnath Co-Directors,
© Siemens AG, CT SE 1, Dr. A. Ulrich C O R P O R A T E T E C H N O L O G Y Research at Siemens CT SE Software & Engineering Development Techniques.
Chapter 6 System Engineering - Computer-based system - System engineering process - “Business process” engineering - Product engineering (Source: Pressman,
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
Digital Object Architecture
9/14/2012ISC329 Isabelle Bichindaritz1 Database System Life Cycle.
GEC3www.geni.net1 GENI Spiral 1 Control Frameworks Global Environment for Network Innovations Aaron Falk Clearing.
Programming Models & Runtime Systems Breakout Report MICS PI Meeting, June 27, 2002.
The Architecture Lecture September 2006 Cem Kaner CSE 1001.
GEC5 Security Summary Stephen Schwab Cobham Analytical Services July 21, 2009.
Software Architecture and Design Dr. Aldo Dagnino ABB, Inc. US Corporate Research Center October 23 rd, 2003.
A Federation Architecture for DETER Ted Faber, John Wroclawski, Kevin Lahey, John Hickey University of Southern California Information Sciences Institute.
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
Access Control for Federation of Emulab-based Network Testbeds Ted Faber, John Wroclawski 28 July 2008
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
Modeling Component-based Software Systems with UML 2.0 George T. Edwards Jaiganesh Balasubramanian Arvind S. Krishna Vanderbilt University Nashville, TN.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
DETER Testbed Status Kevin Lahey (ISI) Anthony D. Joseph (UCB) January 31, 2006.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Service Service metadata what Service is who responsible for service constraints service creation service maintenance service deployment rules rules processing.
Database Administration
Authorizing Slice Creation How ABAC Coordinates Distributed Authorization Alefiya Hussain 1.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
A Mediated Approach towards Web Service Choreography Michael Stollberg, Dumitru Roman, Juan Miguel Gomez DERI – Digital Enterprise Research Institute
Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
A Two-Constraint Approach to Risky CyberSecurity Experiment Management John Wroclawski, Jelena Mirkovic, Ted Faber, Stephen Schwab.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Formal Verification. Background Information Formal verification methods based on theorem proving techniques and model­checking –To prove the absence of.
A Portrait of the Semantic Web in Action Jeff Heflin and James Hendler IEEE Intelligent Systems December 6, 2010 Hyewon Lim.
Sponsored by the National Science Foundation GENI Cloud Security GENI Engineering Conference 12 Kansas City, MO Stephen Schwab University of Southern California.
Software Engineering Lecture 10: System Engineering.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Sponsored by the National Science Foundation 1 March 15, 2011 GENI I&M Update: I&M Service Types, Arrangements, Assembling Goals Architecture Overview.
Designing a Federated Testbed as a Distributed System Robert Ricci, Jonathon Duerig, Gary Wong, Leigh Stoller, Srikanth Chikkulapelly, Woojin Seok 1.
High Performance Computing Lab.
Module 8: Securing Network Traffic by Using IPSec and Certificates
OO Methodology OO Architecture.
TRUST:Team for Research in Ubiquitous Secure Technologies
Comparison to existing state of security experimentation
The Anatomy and The Physiology of the Grid
Presentation transcript:

TIED: A Cluster of One

TIED: Trial Integration Environment DETER The DETER folks: Terry Benzel, Bob Braden, Ted Faber, John Hickey, Alefiya Hussain, Anthony Joseph, Calvin Ko, Kevin Lahey, Jelena Mirkovic, Steve Schwab, Keith Sklower, Arun Viswanathan, John Wroclawski, … built on

The DETER Facility Cyber Security testbed at USC/ISI and UC Berkeley Funded by NSF and DHS, started in 2004 Based on Emulab software, with focus on security experimentation 200 Nodes at ISI (128 Dell 1850, 8 Sun V65x, 64 IBM Netfinity 4500R) 96 Nodes at UC Berkeley (64 Dell 1850, 32 Sun V60x) Many tools for experimenters: GUIs, traffic generators, simulators, traffic analyzers, etc.

DETER Project Goals Scientific methods and infrastructure for advancing security in identified hard problems Enhanced availability of validated information about security protection technology Enduring realistic testbed for security research Advances in testing methods and methodology for network security devices Suite of reusable network security tests including traffic data sets

(contributions to) Next-Gen Facilities - National Malware Collaboratory National Cyber Range (DARPA) GENI… Today’s DETER Testbed Key New Capabilities: Risky Experiment Management High Level User/Workflow Tools Experiment Health Management Dynamic Federation

On-demand creation of experiments spanning multiple, independently controlled facilities Why? Scale Unusual facilities Data & knowledge sharing Information hiding - multiparty scenarios (not just “Internat’l cooperation”) Researcher Controls experiment embedding Federants Control Resource Access Constrain Resource Use Related to (but not same as) experiment composition

Three Key Elements Establish federated experiment Create coherent distributed environment (embedding) Guide experimenter about potential choices and effects Manage federated resources within local policies Access / Authorization (who can use?)‏ Constrain use (how can they use?) Provide unified runtime environment to researcher and experiment Shared file system, etc. Events Control hooks Failure management model

DFA System Architecture Experiment Creation Tool Federator Testbeds Experiment Creation Tool Experiment Creation Tool Testbed Properties Experiment Requirements Experiment Topology CEDL “Assembly Code” Standard Experiment Representation Experiment Decomposition Tools Testbed Properties

CEDL Canonical Experiment Description Language Standard Experiment Representation - “Assembly Code” Output of all tools / input to Federator Expressiveness (today): Core semantics: Logical {nodes, links, elements} topology (Emulab/ns2)‏ Annotations: Logical attributes - eg, node type Type information: router, switch, etc. Physical selection: map to specific instance Physical attributes “Escapes” to allow physical configuration of hardware CEDL is related to one form/use of “RSpecs”

DFA Access Control Architecture (Today) Based on single-Emulab model: Projects control resource access User's project membership determines access DETER federation architecture - three level model: Users, projects, testbeds have global names Federants honor accesses based on: Proof of name Attested facts (evaluated wrt name)‏ Local information bound to name Once accepted, federants assign accepted sub-experiments to local projects for resource control

TIED

Philosophical Diversion “MREFC GENI” One Testbed to Rule Them All “FlexiGENI” Still One, but Fun “Common Standards, Many Uses” “Managed GENI”“Peer to Peer GENI” Analogy with IP protocols: One protocol family, many network types Public Internet, Managed Enterprise, Home, …. …that differ in many dimensions: operational, security, performance, … requirements ????

Authorization for Dynamic Federated Testbed Environments (With Steve Schwab, SPARTA) Decentralized, collaborative/competitive environment. Alliances form/break frequently Semantics appropriate for testbed federation Explicit, visible decision making Corollary: clear auditing and understanding Multiple trust models, independent of mechanism Examples: Hierarchical PKI, PGP web of trust, etc. Minimize unnecessary communication For disconnected operation Control and limit revelation of info (credentials, etc.) Corollary: potential multi-step negotiation

Attribute Based AC We build on Attribute-Based Access Control Work by Winsborough, Li, Mitchell, others in turn Basic model: Principals In our work, user’s identity established by local authority’s local means - Kerberos, certs, passwords, … Principals have attributes Established by digitally signed credentials… … through which credential issuers assert judgments about the attributes of principals Expressed in a formal language Attributes and Rules drive a reasoning engine Authorization decisions are based on applying rules to attributes of the requestor

Expressivity Decentralized attributes: “University Registrar says Dan is a full time student” Delegation of attribute authority “University delegates to its Registrar the determination of who is a full time student” Inference of attributes “University considers a student to be full time if s/he is [has the attribute of] a PhD candidate” Attribute-based delegation of attribute authority Delegate to strangers who’s trustworthiness is determined based on their own attributes. Key to scalability. “University delegates to the graduate officers of all departments the authority to determine who is PhD candidate” Words from “Toward Practical Automated Trust Negotiation”, W. Winsborough and N. Li, IEEE 3 rd Int’l. Workshop on Policies for Distributed Systems and Networks

Details.. Today DETER accessible as an Emulab Federation (DFA) in use across DETER, demo’d with Emulab and WAIL SEER in use as a low-level user interface GUI Basic DFA authorization is not ABAC- based 6 months DFA available for Emulab/GENI slice based experiments Internal ABAC prototype 1 Year Control system based on DFA and ABAC available Federation with DETER facility available through GENI interfaces SEER available as experiment management tool Interconnect with national DCNs

Technical Elements

Model Two-stage approach: Unconstrained malware / experiment behavior Constrained malware / experiment behavior Assured / constrained external behavior Malware / Experiment behavior constraint transform: T1 Testbed behavior constraint transform: T2 “Experiment Containment”  Risky Experiment Management Classical Formulation Focus on isolation De facto emphasis of earlier testbed work No bad stuff Bad stuff Containment Boundary More accurate formulation Key issue: Not “isolation and containment” but “understanding and assurance” World Experiment Controlled interaction with outside environmen t Experiment Control Observation and monitoring Behavioral composition model: External behavior == T2(T1(experiment))‏

Experiment Methodology and The SEER Facility Experimenters select from a palette of predefined elements: Topology, Background and Attack Traffic, and Packet Capture and Instrumentation Methodology Engine frames standard, systematic questions that guide an experimenter in selecting and combining the right elements Experiment Automation increases repeatability and efficiency by managing the experiment within the DETER testbed environment PALETTES METHODOLOGY & GUIDANCE EXPERIMENT AUTOMATION TOPOLOGY TRAFFIC ATTACK DATA-CAPTURE ?