The Center for Cloud and Autonomic Computing: Vision and - - PowerPoint PPT Presentation

the center for cloud and autonomic computing vision and
SMART_READER_LITE
LIVE PREVIEW

The Center for Cloud and Autonomic Computing: Vision and - - PowerPoint PPT Presentation

NSF Industry/University Cooperative Research (I/UCRC) Program The Center for Cloud and Autonomic Computing: Vision and Capabilities Salim Hariri, Director NSF Center for Cloud and Autonomic Computing The University of Arizona


slide-1
SLIDE 1

The Center for Cloud and Autonomic Computing: Vision and Capabilities

NSF Industry/University Cooperative Research (I/UCRC) Program

Salim Hariri, Director

NSF Center for Cloud and Autonomic Computing The University of Arizona nsfcac.arizona.edu email: hariri@ece.arizona.edu (520) 977-7954

slide-2
SLIDE 2

NSF IUCRC in US

slide-3
SLIDE 3

National Science Foundation

  • ~$7.5B Budget
  • 220+ Nobel Laureates supported
  • Overall: ~362,000 researchers,

postdoctoral fellows, trainees, teachers, and students supported

  • ~400 startups/small businesses funded

each year

NSF’s Vision - NSF’s vision is a nation that creates and exploits new concepts in science and engineering and provides global leadership in research and education

slide-4
SLIDE 4

NSF Funded Centers – A key investment

STC: Science and Technology Centers MRSEC: Materials Research Science and Engineering Centers CCI: Centers for Chemical Innovation ERC: Engineering Research Centers IUCRC: Industry/University Cooperative Research Centers

STC MRSEC CCI

ERC

IUCRC

Basic Research Applied Use-inspired 1973 1987 1994, ‘98 1985

slide-5
SLIDE 5

What is an IUCRC?

  • A Partnership: A mechanism to enable industrially-relevant, pre-competitive

research via a sustained partnership among industry, universities, and government.

  • Centers bring together

(1) IUCRC Sites (Academic Institutions)

  • Faculty and students from different academic institutions

(2) IUCRC Industry Members

  • Companies, State/Federal/Local government, and non-profits
  • Focus

– Perform cutting-edge pre-competitive fundamental research in science, engineering, technology area(s) of interest to industry and that can drive innovation and the U.S. economy. – Members guide the direction of Center research through active involvement and mentoring.

slide-6
SLIDE 6

Advanced Electronics and Photonics (7 centers) Advanced Manufacturing 6 Advanced Materials 11 Biotechnology 6 Civil Infrastructure Systems 1 Energy and Environment 12 Health and Safety 6 IT, Communication, and Computing 24 (CAC) System Design and Simulation 3

75+ IUCRC Centers 225 University sites, 876 Industry members

Broad Research Themes

*Data from 2015

slide-7
SLIDE 7

75+ IUCRC Centers and Growing!

NSF Funding

  • ~$20.6M in Program Funding
  • ~ 4:1 Leveraging of NSF funds

Students nearly 30% of graduates are hired by members on an annual basis) 6 International Sites Belgium, Finland, Germany, Russia, India (2) Members ~ 875 unique industry members involved (17 on Average per Center) ~ 42:1 leveraging of member funds Senior Research Investigators Close to 1100 senior research investigators involved (~17 on average involved per center)

*Data from 2015

Now 7 with CAC@Mexico

slide-8
SLIDE 8

8

A Multidisciplinary Center of Excellence in Cloud and Autonomic Computing Research fostering collaborative partnerships among

– Industry, Academe and Government

To discover, share and leverage synergies of concepts, technologies and resources needed by industry-relevant autonomic computing research To educate a diverse body of students on the interdisciplinary field

  • f cloud and autonomic computing

To accelerate the creation and transfer of knowledge and technology for cloud and autonomic computing and commercial products To support startup companies developing new cloud and autonomic computing technologies and services

Goals of the Center

slide-9
SLIDE 9

9

Collaboration with faculty, graduate students, post-doctoral researchers and other Center partners. Choice of project topics to be funded by members’ own contributions Formal periodic project reviews along with continuous informal interaction and timely access to reports, papers and intellectual property generated by the Center Access to unique world-class equipment, facilities and other CAC Infrastructure Recruitment opportunities among excellent graduate students Leveraging of investments, projects and activities by all CAC members Professional networking with new customers or partners for competitive funding opportunities

Benefits of Membership

slide-10
SLIDE 10
  • Autonomic Cyber Security (ACS)
  • Tactical Cyber Immune System (TCIS)
  • Autonomic Monitoring, Analysis and Protection (AMAP)
  • Anomaly based Detection of Attacks on Wireless Ad Hoc Networks
  • Resilient Cloud Services
  • Hacker Web: Securing Cyber Space: Understanding the Cyber Attackers and

Attacks via Social Media Analytics

  • IoT Security Framework
  • Big Data Analytics
  • Big Data Cybersecurity
  • Heart Modeling, Analysis, Diagnosis and Prediction
  • High Performance Distributed Computing and Applications
  • Just-In-Time Architecture (JITA) for Composable High Performance Data Centers
  • Heart Cyber Expert System (HeartCyPert)
  • Well Data Analytics and Protection (WDAP)
  • Hurricane Continuous Modeling and Simulation Environment

On Going UA CAC Projects

slide-11
SLIDE 11
  • Autonomic Management of IT Mining Resources and

Applications

  • Dynamic resource allocation and provision to improve performance,

reduce cost, and increase security

  • Resilient IT Services
  • Modeling and Analysis of IoT Resources and Applications
  • IoT Threat Modeling, Analysis and Protection
  • High Performance Parallel and Distributed Computing
  • Big Data Analytics
  • Big Data Cybersecurity

Suggested Projects for CAC@Mexico

slide-12
SLIDE 12

UA TESTBEDS

slide-13
SLIDE 13

CAC Cybersecurity Test-beds

!

Industrial Process Control Test-bed Private Cloud Smart Building GPU Cluster

slide-14
SLIDE 14

Raspberry PI, Microduino and Arduino

ACL Smart Devices Testbed

ZigBee, WiFi, blue tooth, Ethernet Modbus, DNP3, Backnet

NI Grid

slide-15
SLIDE 15

Smart Car Testbed

  • An Arduino and Raspberry Pi

based testbed.

  • Onboard camera that allows

video streaming to the controller.

  • Onboard proximity sensor that

is used for collision avoidance.

  • Car controlled using Wi-Fi

network.

  • Attacks have been developed that cause the controller to

loose control of the car and cause a car crash

slide-16
SLIDE 16

UA AUTONOMIC CYBER SECURITY (ACS) METHODOLOGY

slide-17
SLIDE 17

Autonomic Cyber Security (ACS)

Analogous to Human autonomic nervous system ACS continuously monitors, analyzes, and diagnoses the user-cyber behavior and then takes proactive actions

slide-18
SLIDE 18

IoT Threat Modeling Framework

UA Researchers: Salim Hariri and Ali Akoglu UNISON Researchers: Jesus Horacio Pacheco-Ramirez and Victor Hugo Benitez Baltazar

Appli- cations Services Communi- cations End Devices Applications Model Services Model Communica- tions Model End Devices Model Attack Surface Attack Surface Attack Surface Attack Surface Impact Impact Impact Impact Mitigation Mitigation Mitigation Mitigation Priority Priority Priority Priority

slide-19
SLIDE 19

Intelligent Recommender

Hypothesis

Generation

Recommendation and

Confidence

Evidence Analysis and Scoring

Continuous Monitoring and Filtering

Resource Footprint Data Footprint Application Footprint User Cyber Footprint Resource Data Application s Users External Data External Data Footprint

Cyber Infrastructure Identify

Anomaly Behavior Analysis (ABA) Resource Data Application User External

Learned Models Context Aware Recommender Analytics Prediction from Learned Model

Intelligent Cybersecurity Assistant Architecture

Detect Protect Response Recover

slide-20
SLIDE 20

Alert Analysis Process Monitoring Infrastructure App 1

Alerts f(1) Priority f(1) Resp Dept f(1) Access f(1)

Cybersecurity Operation Process

Alert Generated

Analyzes alert and conditions based on Context and Domain Knowledge Determines if alert is normal or abnormal Determines course of action Applies course of action Verifies if course of action mitigated the conditions App 2

Alert Generated

App 3

Alert Generated

App 4

Alert Generated

App n

Alert Generated

Data Aggregate and Correlator App

1 2 3 4 5 6 7

App produces an alert based on a policy violation

Cybersecurity Analyst

slide-21
SLIDE 21

What is the Internet of Things?

If we put every things on the internet, and get them connected, we end up with what we call “the Internet of Things” (IoT) or Internet of Everything (IoE)

slide-22
SLIDE 22

IoTs Applications

Education Food Pharmaceuticals Management IoT Applications Retail Logistics

http://www.youtube.com/watch?v=nDBup8KLEtk

slide-23
SLIDE 23

The Rising Problem/Opportunity - 1

  • Smart devices are proliferating with

the promise to make human lives

  • better. Everything from smart

wearables, phones, watches to shoes, glasses and many other accessories.

  • The machines are monitoring almost

every aspect of our lives. Problems arise because these technologies use proprietary underlying infrastructure that enforces brand controls.

  • Security in all these devices are after

thought, never was one a primary design issue

slide-24
SLIDE 24

The Rising Problem/Opportunity – Smart Cities

Smart Technology Smart Government Smart Healthcare Smart Grid Smart Building Smart Homes Smart Auto Services Smart Critical Infrastructure Command/Control Center

Data Command

slide-25
SLIDE 25

Smart Infrastructures

Smart Management Smart Human Smart Critical Infrastructure Data / Command Smart Water Smart Govern- ment Smart Homes Smart Energy

Runtime Command & Control Center

Smart Trans- portation Smart Industry Smart Social Programs Smart Health- care

slide-26
SLIDE 26

Smart Power Grid

slide-27
SLIDE 27

Autonomic Management of IT Mine Resources

  • UA Researchers: Salim Hariri, Greg Ditzler and Cihan

Tunc

  • UNISON Researchers: Jesus Pacheco, Victor Benitez,

Gerardo Sanchez and Luis Velazquez

slide-28
SLIDE 28

Person C

Digital Patient Assistant (DPA) Portal DPA Management Services

DPA

Patient 1

DPA

Patient 2

DPA

Patient n

slide-29
SLIDE 29
slide-30
SLIDE 30

CLaaS Architecture

XSS Exp. VMs DNS Attack Exp. VMs DDOS Exp. VMs Buffer Overflow Exp. VMs

slide-31
SLIDE 31

Active CTMs Training Topics

CLaaS

Cybersecurity Experiments Test-beds

Operating System Security Experiments Network Security Experiment s Application Security Experiment s Web Security Experiment s Mobile Security Experiment s Industrical Control Security Experiments

Public Cloud Test-bed DETER Test-bed Other Security Test-beds

slide-32
SLIDE 32

Questions?

Contact Dr. Hariri at hariri@ece.Arizona.edu