new trends in cybersecurity - computer engineeringmorris/papers/13/itpro_from_the_editor_13.pdf ·...

2
FROM THE EDITORS 2 IT Pro July/August 2013 Published by the IEEE Computer Society 1520-9202/13/$31.00 © 2013 IEEE New Trends in Cybersecurity J. Morris Chang, Iowa State University T his year, cybersecurity might be one of the most widely discussed subjects among IT professionals, with three new trends emerging. The field is experiencing an in- crease in its workforce demand, expansion into broader areas, and more focus on mobile devices. Growing Workforce In January, the Washington Post re- ported that the Pentagon is plan- ning to expand its cybersecurity force from 900 to 4,000 over the next several years. 1 To expand the workforce, more students must be trained in this area. Not sur- prisingly, college faculty positions in computer science and engi- neering seem to have increased sharply this year, particularly in the area of cybersecurity. Under- graduate cybersecurity-related education programs (such as Information Assurance degree programs) are widely available in colleges, and more master’s de- gree programs in cybersecurity have been appearing over the last couple of years. These programs help produce a larger, stronger workforce. The US government has also increased research funding to address the growing number of cyberthreats. In particular, the National Science Foundation started the Secure and Trust- worthy Cyberspace program, and DARPA is supporting various cy- bersecurity programs as well. Expanded Research Confidentiality, integrity, and avail- ability are the three most com- monly addressed quality attributes in cybersecurity. These attributes are implemented through the hardware, programming language, operating system, network proto- cols, and applications. Encryption techniques are effective in ensuring confidentiality and have been stud- ied extensively over the past three decades. However, cybersecurity research has expanded into many disciplines of computer science and engineering, moving away from traditional security areas. For example, DARPA’s Active Authentication program is look- ing into continual authentication that goes beyond traditional pass- words and demands long, complex strings. The program intends to use multiple biometric modalities to detect imposters in the back- ground (invisible to users). These new research directions involve multiple technologies, including operating systems, machine learn- ing, and Web browsers. Moreover, the computation power of modern computers makes the overhead brought by continual monitoring manageable. Cybersecurity is also expanding into broader technical layers and application areas. Conventional approaches deal with communi- cation protocols when it comes to networking security. Techniques for physical, data-link, and IP layers are commonly addressed in the node-by-node scenario. Appar- ently, wireless network traffic has increased sharply as a result of us- ing mobile computing everywhere. To cope with the increasing likelihood of network compro- mise, DARPA’s Wireless Network Defense program looks to im- prove the robustness of wireless networks. The program intends to assess wireless network vulner- abilities and estimate information reliability. For example, detecting anomalous behavior in network traffic can help identify the source of security threats. It also encour- ages ambitious plans to modify the control protocols of wireless networks to improve robustness against attacks. Mobile Coverage The trend of focusing more on mobile devices is driven by the in- creasing popularity of using such devices to access the Internet. With more offices implementing Bring Your Own Device policies, new information security con- cerns are being introduced into the working environment. Phase 2 of DARPA’s Active Authentication program will focus on solutions for mobile devices. Additionally, DARPA’s Automated Program Analysis for Cybersecurity pro- gram focuses on automated tools to detect malicious codes from commercial mobile applications. This program aims to create mobile applications loaded with malicious codes based on existing

Upload: others

Post on 29-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: New Trends in Cybersecurity - Computer Engineeringmorris/papers/13/itpro_from_the_editor_13.pdf · New Trends in Cybersecurity J. Morris Chang, Iowa State University T his year, cybersecurity

From the editors

2 IT Pro July/August 2013 P u b l i s h e d b y t h e I E E E C o m p u t e r S o c i e t y 1520-9202/13/$31.00 © 2013 IEEE

New Trends in CybersecurityJ. Morris Chang, Iowa State University

This year, cybersecurity might be one of the most widely discussed subjects among IT professionals,

with three new trends emerging. The field is experiencing an in-crease in its workforce demand, expansion into broader areas, and more focus on mobile devices.

Growing WorkforceIn January, the Washington Post re-ported that the Pentagon is plan-ning to expand its cybersecurity force from 900 to 4,000 over the next several years.1 To expand the workforce, more students must be trained in this area. Not sur-prisingly, college faculty positions in computer science and engi-neering seem to have increased sharply this year, particularly in the area of cybersecurity. Under-graduate cybersecurity-related education programs (such as Information Assurance degree programs) are widely available in colleges, and more master’s de-gree programs in cybersecurity have been appearing over the last couple of years. These programs help produce a larger, stronger workforce.

The US government has also increased research funding to address the growing number of cyberthreats. In particular, the National Science Foundation started the Secure and Trust-worthy Cyberspace program, and DARPA is supporting various cy-bersecurity programs as well.

Expanded ResearchConfidentiality, integrity, and avail -ability are the three most com-monly addressed quality attributes in cybersecurity. These attributes are implemented through the hardware, programming language, operating system, network proto-cols, and applications. Encryption techniques are effective in ensuring confidentiality and have been stud-ied extensively over the past three decades. However, cybersecurity research has expanded into many disciplines of computer science and engineering, moving away from traditional security areas.

For example, DARPA’s Active Authentication program is look-ing into continual authentication that goes beyond traditional pass-words and demands long, complex strings. The program intends to use multiple biometric modalities to detect imposters in the back-ground (invisible to users). These new research directions involve multiple technologies, including operating systems, machine learn-ing, and Web browsers. Moreover, the computation power of modern computers makes the overhead brought by continual monitoring manageable.

Cybersecurity is also expanding into broader technical layers and application areas. Conventional approaches deal with communi-cation protocols when it comes to networking security. Techniques for physical, data-link, and IP layers are commonly addressed in

the node-by-node scenario. Appar-ently, wireless network traffic has increased sharply as a result of us-ing mobile computing everywhere.

To cope with the increasing likelihood of network compro-mise, DARPA’s Wireless Network Defense program looks to im-prove the robustness of wireless networks. The program intends to assess wireless network vulner-abilities and estimate information reliability. For example, detecting anomalous behavior in network traffic can help identify the source of security threats. It also encour-ages ambitious plans to modify the control protocols of wireless networks to improve robustness against attacks.

Mobile CoverageThe trend of focusing more on mobile devices is driven by the in-creasing popularity of using such devices to access the Internet. With more offices implementing Bring Your Own Device policies, new information security con-cerns are being introduced into the working environment. Phase 2 of DARPA’s Active Authentication program will focus on solutions for mobile devices. Additionally, DARPA’s Automated Program Analysis for Cybersecurity pro-gram focuses on automated tools to detect malicious codes from commercial mobile applications. This program aims to create mobile applications loaded with malicious codes based on existing

Page 2: New Trends in Cybersecurity - Computer Engineeringmorris/papers/13/itpro_from_the_editor_13.pdf · New Trends in Cybersecurity J. Morris Chang, Iowa State University T his year, cybersecurity

computer.org/ITPro 3

Guest Editors’ Introduction

This special issue starts with this From the Editors department, focused on cybersecurity trends. Then, Richard P. Guidorizzi,

program manager in the Information Innovation Office at DARPA, introduces the Active Authentication project. His piece is followed by eight short articles related to the project.

We also have two additional articles related to security in this special issue. In “Conflicts Among the Pillars of Information Assurance,” Kelce S. Wilson talks about interactions and trade-offs among central concepts of security and how such trade-offs affect implementers. Confidentiality, integrity, availability, authentication, and nonrepudiation can interact in complex ways, depending on the application, and Wilson provides an approach to analyzing this complexity.

In “Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs,” Mitsuaki Akiyama, Takeshi Yagi, and Takeo Hariu address the problem of filtering for malicious URLs. Blocking known malicious URLs is only partially effective, because URLs can be short-lived or slightly mutated to avoid detection, but a novel approach based on similarities and neighborhood analysis can be effective in identifying this type of malware.

We hope you enjoy this special issue on security and the related articles on active authentication research.

— Wes Chou, Richard Kuhn, and Linda Wilbanks, Guest Editors

Android malware as the target. The newly developed tools will be evaluated based on the rate of false alarms and missed detections in identifying malicious code.

Common approaches rely on static program analysis to detect malicious code, but it’s also pos-sible to exploit the run-time in-formation from the mobile OS (for example, Dalvik in the Android platform) to facilitate program analysis. These all show that cy-bersecurity issues are growing more complex and often require significant knowledge of the un-derlining mechanisms.

Cybersecurity isn’t just an is-sue for IT professionals. In early June, in a meeting in

California between the presidents of the US and China, cybersecu-rity was a key topic. According to a New York Times article, “Both presidents said their countries and

others must work to develop what Mr. Obama called ‘common rules’ for cybersecurity to protect econo-mies and militaries globally.”2 Al-though cybersecurity is currently in the spotlight, it will be interest-ing to see how it evolves over time. Over the years, other fields similarly appearing in the spotlight include parallel processing, artificial intel-ligence, multimedia, mobile ad hoc networks, and sensor networks, resulting in an array of new appli-cations. This is definitely an excit-ing time for those involved in the development of cybersecurity.

References 1. J. Vijayan, “Pentagon to Add

Thousands of New Cybersecu-rity Jobs,” Computer World, 29 Jan. 2013; www.computerworld.com/s/article/9236289/Pentagon_to_add_ thousands_of_new_cybersecurity_jobs.

2. J. Calmes and S.L. Myers, “Obama and Xi Tackle Cybersecurity as Talks

Begin in California,” The New York Times, 7 June 2013; www.nytimes.com/2013/06/08/us/politics/obama-and-xi-open-informal-meetings-in-california.html?pagewanted=all&_r= 0.

J. Morris Chang is an associate pro-fessor of electrical and computer engi-neering at Iowa State University. His technical interests include cybersecurity, wireless networks, object-oriented pro-gramming languages, and embedded computer systems. Chang has a PhD in computer engineering from North Caro-lina State University. Contact him at [email protected].

Selected CS articles and

columns are available for free at

http://ComputingNow.computer.org.

hibu, Inc. is seeking a Systems Engineer II position for its King of Prussia, PA office.

Responsibilities:• Provide hands on system administration and

support of various SAP systems within hibu. • Participate in business critical projects com-

pleting complicated build work and supervise junior team members.

• Complete detailed project plans and archi-tectural drawings and drive best practices in the implementation and execution of support processes.

• Act as subject matter expert in the SAP BASIS ECC6 space, advising management in the areas of SAP architecture and service improvement.

• Analyze business requirements for SAP in-tegration and identify and plan opportunities for consolidating production systems as part of any upgrade or redesign of systems.

• Responsible for correction and transport management (TMS/CTS/CTS+).

• Subject to a biweekly rotation to cover 24/7 SAP system support.

Requirements:• Bachelor’s Degree in Information Technolo-

gy, Computer Science, or Mathematics• 5 years of SAP BASIS experience with an

emphasis in configuration, analysis, and troubleshooting in Netweaver 2004S systems.

• Experience with any of the following SAP systems: ECC/BI/PI/EP/SolMan.

• Experience in installation, configuration, and maintenance with SRM/MDM in Windows/SQL required.

• Must have demonstrated knowledge of ECC 6.0.

To apply, please send resumes to [email protected]