Challenges of Cybersecurity Research in a Multi-User Testbed
THOMAS EDGAR, THOMAS E. CARROLL, AND DAVID MANZ
Pacific Northwest National Laboratory Richland, WA
May 4, 2012 NIST Cybersecurity for Cyber-Physical Systems 2012 1
Challenges of Cybersecurity Research in a Multi-User Testbed THOMAS - - PowerPoint PPT Presentation
Challenges of Cybersecurity Research in a Multi-User Testbed THOMAS EDGAR, THOMAS E. CARROLL , AND DAVID MANZ Pacific Northwest National Laboratory Richland, WA May 4, 2012 NIST Cybersecurity for Cyber-Physical Systems 2012 1 Cyber-Physical
Pacific Northwest National Laboratory Richland, WA
May 4, 2012 NIST Cybersecurity for Cyber-Physical Systems 2012 1
Demand exceeds supply
May 4, 2012 2 NIST Cybersecurity for Cyber-Physical Systems 2012
May 4, 2012 3 NIST Cybersecurity for Cyber-Physical Systems 2012
Proof-of-Concept: Purpose-built for demonstration Multi-User: Shared resource pool
Be dynamic, flexible, and remotely configurable
Researcher-friendly configuration Libraries of scenarios, templates
Support concurrent experiments Have broad and diverse pool of real world equipment Be modular, extensible, and scalable Support the research community and open science
May 4, 2012 4 NIST Cybersecurity for Cyber-Physical Systems 2012
GUI are adequate for small scale experiment ...inefficient when experiments comprise hundreds of components
May 4, 2012 5 NIST Cybersecurity for Cyber-Physical Systems 201
Concurrently running experiments
Separate management from experiment Support infrastructure, services duplicated per experiment CPS equipment reserved for a single experiment Virtual machine monitors per experiment
E.g., Network infrastructure CPS devices, cannot separate the management from experiment
May 4, 2012 6 NIST Cybersecurity for Cyber-Physical Systems 2012
Architecture and design are often considered proprietary Data often contains system state information
Paul Ohm’s law: "data can either be useful or perfectly anonymous but never both." Several examples of anonymous data that were re-attributed
May 4, 2012 7 NIST Cybersecurity for Cyber-Physical Systems 2012
What resources were used Initial configuration Connectivity between devices, characteristics of links Operating system images, device firmware Logs and serial, network traffic capture Parameters for simulated components
May 4, 2012 8 NIST Cybersecurity for Cyber-Physical Systems 2012
Procure broad and diverse set of equipment Federate with other testbeds to gain access to additional resources Emulate and simulate other components
May 4, 2012 9 NIST Cybersecurity for Cyber-Physical Systems 2012
Web application Configure using GUI/declarative language
DS, SONET, dial-up, wireless
9 PMUs from multi-vendor/ 1 PMU development platform 1 Hardware PDC/Many software PDCs possible
10
More than 250 virtual nodes possible
3 nodes with SSDs and Infiniband interconnects Scale experiments to thousands of nodes
11
12
13
14
DATA DATA
Project A
DATA
Project B Project A
DATA
Project A Project B Project C
DATA
Project A Project B
DATA
Project C
DATA DATA
Project A Project C
DATA DATA
Project C
Initial device configuration and impediments Provide templates and scenarios
May 4, 2012 22 NIST Cybersecurity for Cyber-Physical Systems 2012
…including virtual machine monitors
Leverage multiple NICs in devices
May 4, 2012 23 NIST Cybersecurity for Cyber-Physical Systems 2012
Try hard to store data in standard formats Sometimes restrictions on images/firmware
Storage experimental designs, configurations, and data
May 4, 2012 24 NIST Cybersecurity for Cyber-Physical Systems 2012
May 4, 2012 25 NIST Cybersecurity for Cyber-Physical Systems 2012
Scientifically valid approaches for simulating devices and physical processes, synthesizing normal activity and data Access to real data …Scientifically valid approach, with acceptable risk, for anonymizing data
May 4, 2012 26 NIST Cybersecurity for Cyber-Physical Systems 2012