11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

23. Cyber Security Research Workshop• Conversion of data into knowledge. We convert raw data to information,i.e., “data in the context of other data,” and then information toknowledge, i.e., “information in the context of other information.” Onlythe latter provides us with understanding. Since not all processes canbe automated with current technology, we need systems that can alwayscreate knowledge without relying on human intervention.• Nontechnical constraints. These include– the need to protect private information,– usability and cost-effectiveness, e.g., law compliance, and– economic concerns.• The inadequacy of perimeter defenses in the networked world. Insteadof protecting individual components of systems, we should developsecurity as an integral part of the entire hardware-software combinations.23.2 Research Directions IdentifiedTo overcome the obstacles, and address the hard problems in cyber security,the experts devised a few game-changing themes. They aim to change thefoundations of cyber security R&D. The three concepts that emerge from themare as follows:• Moving target (MT) defense for providing resilience through agility.MT systems have the means to change in multiple dimensions so as toincrease the degree of both uncertainty and complexity for attackers, aswell as the resilience and fault tolerance within a system. As a result,attackers need to increase their costs and efforts in order to cause harm.Example MTs include dynamic networking, just-in-time compilation, andnon-persistent virtual machines. In order to build MT systems, one mightalso randomize instruction sets and data, obfuscate operations by varyingaddresses, paths, and topologies, or decentralize cryptographic protectionfor c<strong>red</strong>entials. Research challenges include ensuring scalability,performance, and energy consumption.Despite their inherent complexity, MT systems should be also easy touse, so they require management and configuration capabilities. Finally,the MT mechanisms must adapt quickly to diminish the window ofopportunity for attackers, so they rely on innovative strategies to supportreal-time selection of MT protections.• Tailo<strong>red</strong> trustworthy spaces (TTSs). Since cyberspace blurs the boundariesbetween traditional spaces in the physical world, a TTS serves as a138

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!