Computer Crime Research Center

Consortium pushes for cybersecurity R&D

(By Grant Gross)

A consortium of 23 security research institutions is calling on the government and private companies to put more research and development muscle into cybersecurity. Among other things, the group would like to see more effort put into the development of code vulnerability scanners and technology for scanning individual computers for sources of attacks.

The Institute for Information Infrastructure Protection (I3P), a group of colleges and U.S. research laboratories, didn't ask for a specific budget today. But it challenged the U.S. government and private industry to spend money in eight cybersecurity areas it feels are underresearched.

I3P Chairman Michael Vatis jokingly denied starting last weekend's Slammer worm attack on the Internet as a way of bringing attention to R&D needs in cybersecurity. "We're reminded of our vulnerabilities daily -- and how vulnerable we are to attacks," he said. "There's a critical piece of this problem that to date has not received the attention and focus that is needed, and that is research and development."

I3P, based at Dartmouth College in Hanover, N.H., and funded through the U.S. Department of Commerce's National Institute of Standards and Technology, released a 55-page R&D agenda today (download PDF).

The I3P's initial cybersecurity report calls for more R&D in eight general areas: enterprise security management; trust among distributed autonomous parties; discovery and analysis of security properties and vulnerabilities; secure system and network response and recovery; traceback, identification and forensics; wireless security; metrics and models; and law, policy and economics.

The report goes into detail about what the organization wants, and the I3P brought experts to talk about each item during a kick-off event in Washington.

I3P member Wayne Meitzler, cybersecurity R&D program manager at the U.S. Department of Energy's Pacific Northwest National Laboratory, called for more research into vulnerability scanners that could test for weaknesses in object code and source code.

Meitzler said he's not aware of any good object-code vulnerability scanners that customers ranging from home users to corporations could use to detect bad code on their computers.

"We have these new pieces of software we install on our computers, and we really don't know the pedigree of that particular software," he said. "Someone could easily embed malicious code in that particular software. The level of trust of the software that we pick up on a CD and put on our machine we really don't understand, and we really don't know."

One audience member suggested that the use of more open-source software could help solve the problem of unknown source code. Meitzler said the I3P would be open to any software development models that could enhance security, including the open-source model.

Victoria Stavridou, director of the System Design Laboratory at SRI International in Menlo Park, Calif., suggested that R&D also needs to focus on early-warning systems for attacks. One way to accomplish that would be to scan individual computers, though she acknowledged that setting up technological sentries for individual computers would raise privacy concerns. "We need to make sure we build the system to respect not only the privacy of individuals but also of companies," she said.

But Stavridou said computer networks need a better system of detecting when attacks are coming, instead of catching up after an attack has been launched. "Our networks are very large, they are open to all, and they are controlled by no one," she said. "Our response operates at human speed. The problem is the attacks are not happening at human speed, they're happening at cyberspeed."

The panel also addressed wireless security as a continuing concern for many companies. More scientific methods are needed to understand wireless security issues, and more R&D is needed for technologies to address specific wireless problems, such as distributed denial-of-service attacks, said Bob Hutchinson, manager of network systems survivability and assurance at Sandia National Laboratories.

"The bottom line is that modern pressures are pushing users to adopt this technology rapidly with an unknown risk," he said. "We need wireless-specific research to address deficiencies and to create an adequately secure information infrastructure."

The I3P, launched in September 2001, hopes its report will generate discussion about cybersecurity R&D needs, Vatis said. The group plans to issue follow-up reports addressing what problems have been fixed and what new problems appear, he said, and I3P hopes to set up a common laboratory where companies can test cybersecurity products.

While R&D budgets weren't a big part of the discussion, Vatis and others said they hope the report will spur the U.S. Congress to increase funding for cybersecurity research. Sharon Hays, deputy associate director for the Technology Office at the White House Office of Science and Technology Policy, said the report will help the White House decide which areas of R&D to focus on.

Catherine Allen, CEO of BITS, the technology arm of the Washington-based Financial Services Roundtable, urged the I3P to make business cases for each of the recommendations. But she and others attending the kick-off event praised the report as a good start to a national dialogue about cybersecurity research.

Harris Miller, president of the Information Technology Association of America, said his organization may disagree with some of the specifics in the report, but "at least there is now an agenda people can react to and talk about."


Home | What's New | Articles | Links
Library | Staff | Contact Us

Copyright Computer Crime Research Center 2001, 2002 All Rights Reserved.
Contact the CCRC Office at +38 061 220 12 83