Nytro Posted June 5, 2012 Report Posted June 5, 2012 Science of Cyber-SecurityJASONThe MITRE Corporation7515 Colshire DriveMcLean, Virginia 22102-7508(703)Contact: D, McMorrow - dmcmorro w@mi tre.orgNovember 2010Approved for public release; distribution unlimitedContents1 EXECUTIVE SUMMARY 12 PROBLEM STATEMENT AND INTRODUCTION 93 CYBER-SECURITY AS SCIENCE – An Overview 133.1 Attributes for Cyber-Security . . . . . . . . . . . . . . . . . . . . 143.2 Guidance from other Sciences . . . . . . . . . . . . . . . . . . . 153.2.1 Economics . . . . . . . . . . . . . . . . . . . . . . . . . 163.2.2 Meteorology . . . . . . . . . . . . . . . . . . . . . . . . 163.2.3 Medicine . . . . . . . . . . . . . . . . . . . . . . . . . . 173.2.4 Astronomy . . . . . . . . . . . . . . . . . . . . . . . . . 173.2.5 Agriculture . . . . . . . . . . . . . . . . . . . . . . . . . 183.3 Security Degrades Over Time . . . . . . . . . . . . . . . . . . . . 183.3.1 Unix passwords . . . . . . . . . . . . . . . . . . . . . . . 183.3.2 Lock bumping . . . . . . . . . . . . . . . . . . . . . . . 193.4 The Role of Secrecy . . . . . . . . . . . . . . . . . . . . . . . . . 203.5 Aspects of the Science of Cyber-Security . . . . . . . . . . . . . 223.6 Some Science . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233.6.1 Trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233.6.2 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . 233.6.3 Game theory . . . . . . . . . . . . . . . . . . . . . . . . 243.6.4 Model checking . . . . . . . . . . . . . . . . . . . . . . . 263.6.5 Obfuscation . . . . . . . . . . . . . . . . . . . . . . . . . 263.6.6 Machine learning . . . . . . . . . . . . . . . . . . . . . . 273.6.7 Composition of components . . . . . . . . . . . . . . . . 273.7 Applying the Fruits of Science . . . . . . . . . . . . . . . . . . . 283.8 Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313.9 The Opportunities of New Technologies . . . . . . . . . . . . . . 323.10 Experiments and Data . . . . . . . . . . . . . . . . . . . . . . . . 344 MODEL CHECKING 374.1 Brief Introduction to Spin and Promela . . . . . . . . . . . . . . . 384.2 Application to Security . . . . . . . . . . . . . . . . . . . . . . . 424.2.1 The Needham-Schroeder Protocol . . . . . . . . . . . . . 434.2.2 Promela model of the protocol . . . . . . . . . . . . . . . 454.3 Scaling Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49iii4.4 Extracting Models from Code . . . . . . . . . . . . . . . . . . . 524.5 Relationship to Hyper-Properties . . . . . . . . . . . . . . . . . . 535 THE IMMUNE SYSTEM ANALOGY 655.1 Basic Biology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655.2 Learning from the Analogy . . . . . . . . . . . . . . . . . . . . . 685.2.1 The need for adaptive response . . . . . . . . . . . . . . . 695.2.2 A mix of sensing modalities . . . . . . . . . . . . . . . . 705.2.3 The need for controlled experiments . . . . . . . . . . . . 715.2.4 Time scale differences . . . . . . . . . . . . . . . . . . . 735.2.5 Responses to detection . . . . . . . . . . . . . . . . . . . 745.2.6 Final points . . . . . . . . . . . . . . . . . . . . . . . . . 756 CONCLUSIONS AND RECOMMENDATIONS 77A APPENDIX: Briefers 85Download:http://www.fas.org/irp/agency/dod/jason/cyber.pdf Quote