Securing Hardware, Software and Data (SHSD) • Frank Siebenlist, Argonne National Laboratory • Len Napolitano, Sandia National Laboratories
Total Page:16
File Type:pdf, Size:1020Kb
Report of the Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability PNNL-16971 Report of the Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability i Acknowledgements The workshop chairs wish to thank Joree O’Neal and Rachel Smith for all their help and support with organizing the logistics and registration activities for this workshop; Sue Chin, Ted Tanasse, Barbara Wilson, and Stacy Larsen for their expert help with the assembly, text editing, and graphics for this report; and Lance Baatz for his masterful job as webmaster for this project. Finally, we wish to thank the Pacific Northwest National Laboratory for supporting the development and assembly of the final report. iii EXECUTIVE SUMMARY Protecting systems and users, while maintaining ease of access, represents the “perfect storm” of challenges in the area of cyber security. A fundamental tenet of every scientific investigation is the search for truth. Trust and integrity are immutable values that are fundamental to all research endeavors. By extension, the absolute integrity of information, encompassing systems, networks, and file systems is a critical requirement essential for promoting and facilitating discovery. These qualities are equally important for our nation’s critical energy infrastructure. To determine the cyber security research needs for open science and energy control systems, the U.S. Department of Energy’s (DOE) Office of Science (SC), in cooperation with the Office of Electricity Delivery and Energy Reliability (OE), organized a two-day workshop held July 23 and 24, 2007, at the Bethesda North Marriott Hotel in Bethesda, Maryland. This event brought together leading cyber security and infrastructure protection experts and researchers from academia, government laboratories, and industry. This group of experts identified seven long-term, priority research long-term thrust areas that would provide a significant technological capability impact on the assured integrity of the nation’s critical energy and science infrastructure. The research thrust areas are: 1) Future Open Science Security Architecture; 2) Research for the development of Adaptive, Autonomic, and Homeostatic Security and Response systems; 3) Tools for Situational Awareness; 4) Integrity and Pedigree; 5) Analysis Tools for Systems Design for Usability, Characterization, and Assessment; 6) Control Systems Designs and Systems Assurance Capabilities; and finally (7) Future of Cryptography capabilities. This reinforcing and synergistic research thrust approach will establish the scientific basis for transformation of our cyber security capabilities for the future. iv To promote and facilitate the development of future systems that are intrinsically secure, the research defined in these thrust areas will mandate fundamental changes in computer and systems architectures; operating systems and programming models; large-scale data management, analytics, and visualization; real-time network and traffic analytics; mathematics research for complexity, discrete analysis, and multi-dimensional graph theory; applied statistics for anomaly detection and network-based behavioral analysis ; and finally, research to develop flexible and scaleable approaches for data fusion and analysis to enable real time co-operative network analytics. Promotion of these research thrusts at a programmatic level will provide new capabilities for testing and implementations in both classified and open research environments. For this research to enable systemic and enduring change in the nation’s critical systems for both energy and science, a coordinated, collaborative effort among academia, government laboratories, and industry is necessary. Appropriate off-the-shelf technology is unlikely to address the broad base and unique applications of the science research enterprise without such an effort. At the core of these research thrusts is the recognition that now is the time to evolve beyond our current strategy that relies on forensics in a “catch-and-patch” approach to a strategy where cyber security is designed into critical systems and throughout all our cyber assets. Improving cyber security is a complex, especially daunting task in the Open Science environment, and there are obvious commonalities with the Energy Control Systems environment. But with a focus on scalability and flexibility in the research directions, the chairs and the attendees of the workshop believe that significant forward progress toward creating both usable and secure environments can be made in the next 5 to 10 years. The research directions suggested in this report will inspire new cyber security safeguards for both Open Science and Energy Control Systems. v TABLE OF CONTENTS EXECUTIVE SUMMARY ........................................................................................................... iv INTRODUCTION ...........................................................................................................................1 WORKSHOP LOGISTICS..............................................................................................................1 CROSSCUTTING FINDINGS AND CHALLENGES...................................................................2 PANEL FINDINGS AND PROPOSED RESEARCH....................................................................4 CYBER SECURITY CHALLENGES ............................................................................................6 THRUST AREAS..........................................................................................................................12 CYBER SECURITY DEFENSE TAXONOMY...........................................................................13 PRIORITY RESEARCH DIRECTIONS ......................................................................................14 Thrust Area 1: Future Open Science Security Architecture .......................................14 Thrust Area 2: Adaptive/Autonomic/Homeostatic Security and Response................18 Thrust Area 3: Situational Awareness ........................................................................20 Thrust Area 4: Integrity and Pedigree.........................................................................23 Thrust Area 5: Usability, Characterization, and Assessment ......................................26 Thrust Area 6: Control Systems..................................................................................29 Thrust Area 7: Future of Cryptography .......................................................................31 SPECIFIC RECOMMENDATIONS FOR A DOE CYBER SECURITY RESEARCH AGENDA.......................................................................................................................................33 CONCLUSION..............................................................................................................................35 Appendix A – Workshop Organizers...........................................................................................A.1 Appendix B – Workshop Participants..........................................................................................B.1 Appendix C – Workshop Charge.................................................................................................C.1 Appendix D – Panel Breakout Sessions and Reports ..................................................................D.1 FIGURES 1. Cyber Security Research Thrust Areas.. ..................................................................................5 2. Motivation for Enhanced Cyber Security.................................................................................6 3. Energy Control Systems and Our Critical Infrastructures........................................................8 4. How Cyber Attacks Occur .......................................................................................................9 5. Taxonomy of Cyber Security .................................................................................................13 6. Understanding Threat Behavior. ............................................................................................20 7. The “DOE Gold Seal of Approval” for Trusted Software. ....................................................23 8. Information Hierarchy............................................................................................................24 9. The Research Thrusts and Priority Research Directions Defining a Cyber Security Science Research Agenda. .....................................................................................................36 vi INTRODUCTION A fundamental tenet of every scientific investigation is the search for truth. Trust and integrity are immutable values that are fundamental to all research endeavors. By extension, the absolute integrity of information, encompassing systems, networks, and file systems, is a critical requirement for the effective conduct of science, essential to promoting and facilitating discovery. These qualities are equally important for our nation’s critical energy infrastructure. To determine the cyber security research needs for open science and energy control systems, the U.S. Department of Energy’s (DOE) Office of Science (SC), in cooperation with the Office of Electricity Delivery