SlideShare a Scribd company logo
1 of 7
Download to read offline
© 2012 Polar Star Consulting, LLC 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
Cyber Resiliency
Technology, Architecture, and Practical
Validation
This paper proposes an approach to creating pervasive cyber resiliency. It reviews key
technologies, identifies and illustrates architecture components, and proposes to use
academic infrastructure to validate cyber infrastructure.
Author: Steve Goeringer, Director and Senior Network Engineer
P a g e | 2 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
Introduction
Traditional information assurance techniques have relied on defense-in-depth and a variety of
anomaly detection techniques to identify attacks where threats are expected to achieve Cyber
Resilience. These techniques have been expensive in terms of both recurring (operational) and
non-recurring (development and capital) costs. Moreover, they have not kept pace with the rapid
development of IT infrastructure enabling critical mission environments where networks and
information resources are highly fluid and continually evolving. Moreover, current threat
mitigation and attack management techniques tend to be mission disruptive – the resources
under attack are often made unavailable until defensive mechanisms are placed. The result is
contrary to the goal – rather than achieving Cyber Resilience, the architectures supporting our
missions remain brittle to determined, sustained attacks.
Cyber Resilience needs to be redefined to include the ability for critical infrastructures to
continue to operate even while under attack and essential information to remain available to
those in need. This is possible using emerging technologies:
 Pervasive data collection from servers, clients, network elements, and application aware
sensors at line rates up to even 100Gbps.
 Strong packet manipulation capabilities at rates up to 10Gpbs that leverage deep packet
inspection to assess data flows in real-time and filter, modify, and route as appropriate.
 Dynamic multi-layer and multi-technology centralized control to manage threat exposure
as attacks are detected.
 Intelligent network architecture that focuses on mission effectiveness rather than basic
resource availability.
This paper proposes the application of these Commercial-Off-The-Shelf (COTS) based
technologies at scale leveraging distributed resources in combination with traditional lab-based
sandboxes. This will provide an environment where mission specific Cyber Resilience solutions
(COTS, proprietary, and government provided methods and techniques) can be researched,
designed, developed, tested, evaluated, implemented and demonstrated.
The ideas are presented in two sections. The first addresses technologies and architectures that
can be investigated to explore Cyber Resilience in depth, achieving the goal to greatly enhance the
cyber resilience and performance posture of mission networks. The second part addresses how
Cyber Resilience solutions can be developed at scale leveraging national resources while also still
enabling development and investigation in sandbox environments.
P a g e | 3 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
Cyber Resilience Technology and Architecture
Over the past three years, several new technologies have become generally available that provide
new opportunities for enhanced Cyber Resilience. Several of these may not be obvious to most
technologists as related to robust cyber design for IT architecture.
Application performance management – You can’t manage something you can’t measure. Several
suites of COTS software and hardware are providing a breadth and depth of Application
Performance Management (APM) capabilities not possible just a few years ago. The result is the
ability to develop pervasive visibility throughout an IT enterprise.
 Deep packet inspection – One of the enabling technologies for APM is deep packet
inspection that is integrated into highly available, high performance sensors. However, the
benefits of Deep Packet Inspection (DPI) go far beyond APM. DPI enables the ability to
inspect, manipulate (change), and route packet in new and innovative ways. This enables
custom network design that leverages COTS DPI solutions.
 Control plane architectures – Telecommunications equipment and software
manufactures have worked with academia for over a decade to develop new solutions for
managing today’s advanced networks. Several components have been developed
throughout the industry including the IETF’s Generalized Multi-Protocol Label Switching
protocol (GMPLS) and the ITU’s Autonomously Switched Optical Network (ASON)
standard. The result is a wide range of standards and commercial capabilities, each
designed to satisfy a specific niche need. BBN’s PHAROS, developed initially for DARPA,
extends these capabilities to support multi-layer and multi-technology architectures as
appropriate for a given mission environment.
 Application delivery controllers – Traditional optical transport and packet routers and
switches provide robust capabilities to get bits across networks. However, they are fairly
limited when network services need to be application aware. Traditional load balancers
have evolved and are now a new breed of network element – the application delivery
controller. Available from many manufacturers with a wide range of features, the
Application Delivery Controller (ADC) incorporates traditional routing and switching
capabilities and new application aware IT features that enable new service architectures.
 OpenFlow – As stated on the OpenFlow website (www.openflow.org), “OpenFlow enables
networks to evolve, by giving a remote controller the power to modify the behavior of
network devices, through a well-defined ‘forwarding instruction set.” The growing
P a g e | 4 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
OpenFlow ecosystem now includes routers, switches, virtual switches, and access points
from a range of vendors.” Enterprise IT operators can leverage OpenFlow to enable
routing and switching behaviors as they desire rather than the general practices enabled
by traditional routing and switching equipment manufacturers.
 Flow optimization – The suite of Internet protocols has existed for decades. A wide range
of implementations have existed for some time to optimize IP performance. However,
these have not been generally incorporated into network elements, servers, and
application software. Consequently, data networks continue to show poor performance
and little resilience to network disruption, even to moderate changes in latency due to
path fault recovery. WAN optimization solutions provide the opportunity to increase
network “good put” by utilizing existing bandwidth. Moreover, the same mechanisms used
to improve network utilization, throughput, and responsiveness often provide improved
resilience against network disruption.
Common enablers through all of these technologies include high speed, low power packaged as
ASICs and FPGAs, faster and larger storage (high performance memory and Solid State Drives),
standardized processors (such as network processors and systems on a chip) that provide
modularity beneficial to open source software development, and continued evolution of
networking and application algorithms and best practices.
These new technologies and components can be leveraged collectively to create innovative IT
enterprise architectures enable new techniques and establish new best practices for Cyber
Resilience. This enables a transformation of IT environments to flow based, application aware,
converged architectures that leverage distributed architecture and intelligent control to
dynamically dilate exposure the cyber threats while managing mission effectiveness. This
potential architecture is illustrated on the following page.
P a g e | 5 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
P a g e | 6 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
Cyber Resilience Validation
Validation of Cyber Resilience can be performed in three progressive stages. The first stage should
be application of traditional operation research techniques and analysis such as Reliability,
Availability, Maintainability, and Survivability (RAMS) assessment. Unfortunately, the entire area
of information assurance has not received adequate attention in these circles, so techniques of
analytically treating Cyber Resilience must be developed.
Given the principles developed through operations research, the next progressive stage is
verification in controlled environments (loosely referred to as “labs”). Verification of cyber
resilience in a lab environment must be approached as a multidisciplinary endeavor. Traditional
functional and performance testing techniques must be integrated with information assurance
testing practices. In this way, performance of equipment in various configurations (architectures)
can be evaluated while under attack. Most resources for such an environment are expensive, but
generally available as COTS.
Unfortunately, the nature of cyber threats is continually evolving. Moreover, it can be difficult to
simulate real network behavior at scale in a laboratory environment. In addition, access to
researchers can be difficult as the national subject matter experts are distributed geographically
among different stakeholders. This leads to the need for a final stage that Cyber Resilience
validation – testing and evaluation of Cyber Resilience architectures on real networks.
This must be more than the typical “honey pot”. Real networks used for non-sensitive missions
should be used. This is readily achievable using networks such GENI, DREN, and other NSF or
academic networks. Selection of which resource is appropriate for a given implementation is
technology and mission dependent.
GENI provides the ability to virtualize a network environment in a way as to not interfere with
other network users. OpenFlow can be leveraged to provide advanced network routing and
switching while GENI “stacks” can be used to create application clusters. As GENI is a real world
network, performance will be more indicative of actual expected performance in some mission
environments. Additional resources and attack vectors can be applied as necessary.
If the nature of research is sensitive or requires technologies not readily integrated into GENI,
DREN may provide a more suitable validation architecture. Other network architectures can be
approached as well. National and international scale networks, such as Internet2, provide the
capability to explore optical networking resilience in combination with routed networks.
Several techniques and methods will be necessary. Exposure to real world (aka, “zero day”) threats
can be managed using “walled gardens”. Network degradations can be managed using laboratory
grade devices such as Apposite’s Linktrop-10G to create a variety of fault modes. Attacks can be
“solicited” using honey pot techniques, or injected using COTS and GOTS exploitation tools.
P a g e | 7 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
Finally, intelligent control can be applied to both develop techniques to avoid threat or attack
points while also mitigating exposure to attacks using dynamic filtering and rating limiting on a
per flow basis. This may be the essential definition of what it means to be Cyber threat resilient.
Citations
PHAROS: I. Baldine, A. Jackson, J. Jacob, W. Leland, J. Lowry, W. Miliken, P.Pal, R. Ramanathan,
K. Rauschenbach, C. Santivanez, and D. Wood, “PHAROS: An Architecture for Next-Generation
Core Optical Networks,” pp. 154-179, Next-Generation Internet Architectures and Protocols, Ed. by
Byrav Ramamurthy, George N. Rouskas, and Krishna Moorthy Sivalingam, Cambridge University
Press, 2011.
GENI: www.geni.net

More Related Content

What's hot

NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
Javier Guillermo, MBA, MSc, PMP
 
OIF-plenary-Jan-20-2015_SDN-WAN-Loukas_oif2015.083
OIF-plenary-Jan-20-2015_SDN-WAN-Loukas_oif2015.083OIF-plenary-Jan-20-2015_SDN-WAN-Loukas_oif2015.083
OIF-plenary-Jan-20-2015_SDN-WAN-Loukas_oif2015.083
Loukas Paraschis
 
Utilities: TDM to IP
Utilities:  TDM to IPUtilities:  TDM to IP
Utilities: TDM to IP
Avtec Inc.
 
Miami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handoutMiami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handout
Arthur Sanchez
 
Daniel Senior Resume
Daniel Senior ResumeDaniel Senior Resume
Daniel Senior Resume
Daniel Senior
 

What's hot (20)

NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
 
Netsoft 2020 S4SI Workshop Panel
Netsoft 2020 S4SI Workshop PanelNetsoft 2020 S4SI Workshop Panel
Netsoft 2020 S4SI Workshop Panel
 
Joseph Witt
Joseph WittJoseph Witt
Joseph Witt
 
Design of network
Design of networkDesign of network
Design of network
 
Resume_George
Resume_GeorgeResume_George
Resume_George
 
Resume_George
Resume_GeorgeResume_George
Resume_George
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
 
OIF-plenary-Jan-20-2015_SDN-WAN-Loukas_oif2015.083
OIF-plenary-Jan-20-2015_SDN-WAN-Loukas_oif2015.083OIF-plenary-Jan-20-2015_SDN-WAN-Loukas_oif2015.083
OIF-plenary-Jan-20-2015_SDN-WAN-Loukas_oif2015.083
 
Vamsi_Resume
Vamsi_ResumeVamsi_Resume
Vamsi_Resume
 
Utilities: TDM to IP
Utilities:  TDM to IPUtilities:  TDM to IP
Utilities: TDM to IP
 
Building converged plantwide ethernet architectures
Building converged plantwide ethernet architecturesBuilding converged plantwide ethernet architectures
Building converged plantwide ethernet architectures
 
Miami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handoutMiami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handout
 
Design and emulation tools for serverless edge computing
Design and emulation tools for serverless edge computingDesign and emulation tools for serverless edge computing
Design and emulation tools for serverless edge computing
 
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsSpace Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
 
Daniel Senior Resume
Daniel Senior ResumeDaniel Senior Resume
Daniel Senior Resume
 
PacketsNeverLie
PacketsNeverLiePacketsNeverLie
PacketsNeverLie
 
Low-latency distributed computation offloading for pervasive environments
Low-latency distributed computation offloading for pervasive environmentsLow-latency distributed computation offloading for pervasive environments
Low-latency distributed computation offloading for pervasive environments
 
LTE Self Organizing Network Projects
LTE Self Organizing Network ProjectsLTE Self Organizing Network Projects
LTE Self Organizing Network Projects
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?
 

Viewers also liked

The dark is rising dan hohmann
The dark is rising dan hohmannThe dark is rising dan hohmann
The dark is rising dan hohmann
Rochesspp
 
As irmandades da fala2
As irmandades da fala2As irmandades da fala2
As irmandades da fala2
ShelleyAlvAlv
 
Jack lapean the genius files never say genius
Jack lapean the genius files never say geniusJack lapean the genius files never say genius
Jack lapean the genius files never say genius
Rochesspp
 
ふくおか未来フォーラム構想Ver.001
ふくおか未来フォーラム構想Ver.001ふくおか未来フォーラム構想Ver.001
ふくおか未来フォーラム構想Ver.001
Hiroki Shimono
 
Lauren Platou The Hunger Games
Lauren Platou The Hunger Games Lauren Platou The Hunger Games
Lauren Platou The Hunger Games
Rochesspp
 

Viewers also liked (20)

The dark is rising dan hohmann
The dark is rising dan hohmannThe dark is rising dan hohmann
The dark is rising dan hohmann
 
Martina Carlino Portfolio2013
Martina Carlino Portfolio2013Martina Carlino Portfolio2013
Martina Carlino Portfolio2013
 
Indices 05 aug2013055239
Indices 05 aug2013055239Indices 05 aug2013055239
Indices 05 aug2013055239
 
As irmandades da fala2
As irmandades da fala2As irmandades da fala2
As irmandades da fala2
 
Indices 03 jan2013045404
Indices 03 jan2013045404Indices 03 jan2013045404
Indices 03 jan2013045404
 
Material de Laboratori
Material de LaboratoriMaterial de Laboratori
Material de Laboratori
 
Indices 20 aug2013082020
Indices 20 aug2013082020Indices 20 aug2013082020
Indices 20 aug2013082020
 
Indices 04 jul2013073804
Indices 04 jul2013073804Indices 04 jul2013073804
Indices 04 jul2013073804
 
BIG CHRISTMAS REUNION
BIG CHRISTMAS REUNIONBIG CHRISTMAS REUNION
BIG CHRISTMAS REUNION
 
Jack lapean the genius files never say genius
Jack lapean the genius files never say geniusJack lapean the genius files never say genius
Jack lapean the genius files never say genius
 
No Panic
No PanicNo Panic
No Panic
 
Susan fleury networking presentation aug 2015
Susan fleury networking presentation aug 2015Susan fleury networking presentation aug 2015
Susan fleury networking presentation aug 2015
 
ふくおか未来フォーラム構想Ver.001
ふくおか未来フォーラム構想Ver.001ふくおか未来フォーラム構想Ver.001
ふくおか未来フォーラム構想Ver.001
 
Finalaya BSE/NSE indices snapshot for 27 August 2014
Finalaya BSE/NSE indices snapshot for 27 August 2014Finalaya BSE/NSE indices snapshot for 27 August 2014
Finalaya BSE/NSE indices snapshot for 27 August 2014
 
Indices 12 dec2012060827
Indices 12 dec2012060827Indices 12 dec2012060827
Indices 12 dec2012060827
 
Lauren Platou The Hunger Games
Lauren Platou The Hunger Games Lauren Platou The Hunger Games
Lauren Platou The Hunger Games
 
Indices 16 aug2013062420
Indices 16 aug2013062420Indices 16 aug2013062420
Indices 16 aug2013062420
 
Indices 05 sep2013054649
Indices 05 sep2013054649Indices 05 sep2013054649
Indices 05 sep2013054649
 
Pres historic royal palaces
Pres historic royal palacesPres historic royal palaces
Pres historic royal palaces
 
Indices 20 feb2013052950
Indices 20 feb2013052950Indices 20 feb2013052950
Indices 20 feb2013052950
 

Similar to Cyber Resiliency 20120420

OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323
Les Williams
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
Angela Hays
 

Similar to Cyber Resiliency 20120420 (20)

IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
 
SDN Introduction
SDN IntroductionSDN Introduction
SDN Introduction
 
OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323
 
Next Generation Automation Final
Next Generation Automation FinalNext Generation Automation Final
Next Generation Automation Final
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
 
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceEnabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure Resistance
 
Mobile World Congress 2017 - Creating Agility & Efficiency at Scale: New Econ...
Mobile World Congress 2017 - Creating Agility & Efficiency at Scale: New Econ...Mobile World Congress 2017 - Creating Agility & Efficiency at Scale: New Econ...
Mobile World Congress 2017 - Creating Agility & Efficiency at Scale: New Econ...
 
Protocol Choices for Virtual Infrastructure
Protocol Choices for Virtual InfrastructureProtocol Choices for Virtual Infrastructure
Protocol Choices for Virtual Infrastructure
 
FINAL VER - 2015_09
FINAL VER - 2015_09FINAL VER - 2015_09
FINAL VER - 2015_09
 
Juniper Networks MetaFabric Architecture
Juniper Networks MetaFabric ArchitectureJuniper Networks MetaFabric Architecture
Juniper Networks MetaFabric Architecture
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud Computing
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
 
chapter 5.docx
chapter 5.docxchapter 5.docx
chapter 5.docx
 
chapter 5.pdf
chapter 5.pdfchapter 5.pdf
chapter 5.pdf
 
Primendi Visiooniseminar 2014 - Simplivity Omnicube
Primendi Visiooniseminar 2014 - Simplivity OmnicubePrimendi Visiooniseminar 2014 - Simplivity Omnicube
Primendi Visiooniseminar 2014 - Simplivity Omnicube
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
En35793797
En35793797En35793797
En35793797
 
E018113036
E018113036E018113036
E018113036
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 

Cyber Resiliency 20120420

  • 1. © 2012 Polar Star Consulting, LLC 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770 Cyber Resiliency Technology, Architecture, and Practical Validation This paper proposes an approach to creating pervasive cyber resiliency. It reviews key technologies, identifies and illustrates architecture components, and proposes to use academic infrastructure to validate cyber infrastructure. Author: Steve Goeringer, Director and Senior Network Engineer
  • 2. P a g e | 2 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770 Introduction Traditional information assurance techniques have relied on defense-in-depth and a variety of anomaly detection techniques to identify attacks where threats are expected to achieve Cyber Resilience. These techniques have been expensive in terms of both recurring (operational) and non-recurring (development and capital) costs. Moreover, they have not kept pace with the rapid development of IT infrastructure enabling critical mission environments where networks and information resources are highly fluid and continually evolving. Moreover, current threat mitigation and attack management techniques tend to be mission disruptive – the resources under attack are often made unavailable until defensive mechanisms are placed. The result is contrary to the goal – rather than achieving Cyber Resilience, the architectures supporting our missions remain brittle to determined, sustained attacks. Cyber Resilience needs to be redefined to include the ability for critical infrastructures to continue to operate even while under attack and essential information to remain available to those in need. This is possible using emerging technologies:  Pervasive data collection from servers, clients, network elements, and application aware sensors at line rates up to even 100Gbps.  Strong packet manipulation capabilities at rates up to 10Gpbs that leverage deep packet inspection to assess data flows in real-time and filter, modify, and route as appropriate.  Dynamic multi-layer and multi-technology centralized control to manage threat exposure as attacks are detected.  Intelligent network architecture that focuses on mission effectiveness rather than basic resource availability. This paper proposes the application of these Commercial-Off-The-Shelf (COTS) based technologies at scale leveraging distributed resources in combination with traditional lab-based sandboxes. This will provide an environment where mission specific Cyber Resilience solutions (COTS, proprietary, and government provided methods and techniques) can be researched, designed, developed, tested, evaluated, implemented and demonstrated. The ideas are presented in two sections. The first addresses technologies and architectures that can be investigated to explore Cyber Resilience in depth, achieving the goal to greatly enhance the cyber resilience and performance posture of mission networks. The second part addresses how Cyber Resilience solutions can be developed at scale leveraging national resources while also still enabling development and investigation in sandbox environments.
  • 3. P a g e | 3 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770 Cyber Resilience Technology and Architecture Over the past three years, several new technologies have become generally available that provide new opportunities for enhanced Cyber Resilience. Several of these may not be obvious to most technologists as related to robust cyber design for IT architecture. Application performance management – You can’t manage something you can’t measure. Several suites of COTS software and hardware are providing a breadth and depth of Application Performance Management (APM) capabilities not possible just a few years ago. The result is the ability to develop pervasive visibility throughout an IT enterprise.  Deep packet inspection – One of the enabling technologies for APM is deep packet inspection that is integrated into highly available, high performance sensors. However, the benefits of Deep Packet Inspection (DPI) go far beyond APM. DPI enables the ability to inspect, manipulate (change), and route packet in new and innovative ways. This enables custom network design that leverages COTS DPI solutions.  Control plane architectures – Telecommunications equipment and software manufactures have worked with academia for over a decade to develop new solutions for managing today’s advanced networks. Several components have been developed throughout the industry including the IETF’s Generalized Multi-Protocol Label Switching protocol (GMPLS) and the ITU’s Autonomously Switched Optical Network (ASON) standard. The result is a wide range of standards and commercial capabilities, each designed to satisfy a specific niche need. BBN’s PHAROS, developed initially for DARPA, extends these capabilities to support multi-layer and multi-technology architectures as appropriate for a given mission environment.  Application delivery controllers – Traditional optical transport and packet routers and switches provide robust capabilities to get bits across networks. However, they are fairly limited when network services need to be application aware. Traditional load balancers have evolved and are now a new breed of network element – the application delivery controller. Available from many manufacturers with a wide range of features, the Application Delivery Controller (ADC) incorporates traditional routing and switching capabilities and new application aware IT features that enable new service architectures.  OpenFlow – As stated on the OpenFlow website (www.openflow.org), “OpenFlow enables networks to evolve, by giving a remote controller the power to modify the behavior of network devices, through a well-defined ‘forwarding instruction set.” The growing
  • 4. P a g e | 4 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770 OpenFlow ecosystem now includes routers, switches, virtual switches, and access points from a range of vendors.” Enterprise IT operators can leverage OpenFlow to enable routing and switching behaviors as they desire rather than the general practices enabled by traditional routing and switching equipment manufacturers.  Flow optimization – The suite of Internet protocols has existed for decades. A wide range of implementations have existed for some time to optimize IP performance. However, these have not been generally incorporated into network elements, servers, and application software. Consequently, data networks continue to show poor performance and little resilience to network disruption, even to moderate changes in latency due to path fault recovery. WAN optimization solutions provide the opportunity to increase network “good put” by utilizing existing bandwidth. Moreover, the same mechanisms used to improve network utilization, throughput, and responsiveness often provide improved resilience against network disruption. Common enablers through all of these technologies include high speed, low power packaged as ASICs and FPGAs, faster and larger storage (high performance memory and Solid State Drives), standardized processors (such as network processors and systems on a chip) that provide modularity beneficial to open source software development, and continued evolution of networking and application algorithms and best practices. These new technologies and components can be leveraged collectively to create innovative IT enterprise architectures enable new techniques and establish new best practices for Cyber Resilience. This enables a transformation of IT environments to flow based, application aware, converged architectures that leverage distributed architecture and intelligent control to dynamically dilate exposure the cyber threats while managing mission effectiveness. This potential architecture is illustrated on the following page.
  • 5. P a g e | 5 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770
  • 6. P a g e | 6 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770 Cyber Resilience Validation Validation of Cyber Resilience can be performed in three progressive stages. The first stage should be application of traditional operation research techniques and analysis such as Reliability, Availability, Maintainability, and Survivability (RAMS) assessment. Unfortunately, the entire area of information assurance has not received adequate attention in these circles, so techniques of analytically treating Cyber Resilience must be developed. Given the principles developed through operations research, the next progressive stage is verification in controlled environments (loosely referred to as “labs”). Verification of cyber resilience in a lab environment must be approached as a multidisciplinary endeavor. Traditional functional and performance testing techniques must be integrated with information assurance testing practices. In this way, performance of equipment in various configurations (architectures) can be evaluated while under attack. Most resources for such an environment are expensive, but generally available as COTS. Unfortunately, the nature of cyber threats is continually evolving. Moreover, it can be difficult to simulate real network behavior at scale in a laboratory environment. In addition, access to researchers can be difficult as the national subject matter experts are distributed geographically among different stakeholders. This leads to the need for a final stage that Cyber Resilience validation – testing and evaluation of Cyber Resilience architectures on real networks. This must be more than the typical “honey pot”. Real networks used for non-sensitive missions should be used. This is readily achievable using networks such GENI, DREN, and other NSF or academic networks. Selection of which resource is appropriate for a given implementation is technology and mission dependent. GENI provides the ability to virtualize a network environment in a way as to not interfere with other network users. OpenFlow can be leveraged to provide advanced network routing and switching while GENI “stacks” can be used to create application clusters. As GENI is a real world network, performance will be more indicative of actual expected performance in some mission environments. Additional resources and attack vectors can be applied as necessary. If the nature of research is sensitive or requires technologies not readily integrated into GENI, DREN may provide a more suitable validation architecture. Other network architectures can be approached as well. National and international scale networks, such as Internet2, provide the capability to explore optical networking resilience in combination with routed networks. Several techniques and methods will be necessary. Exposure to real world (aka, “zero day”) threats can be managed using “walled gardens”. Network degradations can be managed using laboratory grade devices such as Apposite’s Linktrop-10G to create a variety of fault modes. Attacks can be “solicited” using honey pot techniques, or injected using COTS and GOTS exploitation tools.
  • 7. P a g e | 7 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770 Finally, intelligent control can be applied to both develop techniques to avoid threat or attack points while also mitigating exposure to attacks using dynamic filtering and rating limiting on a per flow basis. This may be the essential definition of what it means to be Cyber threat resilient. Citations PHAROS: I. Baldine, A. Jackson, J. Jacob, W. Leland, J. Lowry, W. Miliken, P.Pal, R. Ramanathan, K. Rauschenbach, C. Santivanez, and D. Wood, “PHAROS: An Architecture for Next-Generation Core Optical Networks,” pp. 154-179, Next-Generation Internet Architectures and Protocols, Ed. by Byrav Ramamurthy, George N. Rouskas, and Krishna Moorthy Sivalingam, Cambridge University Press, 2011. GENI: www.geni.net