What do we need in a future data framework

0
0
1329 days ago, 517 views
PowerPoint PPT Presentation
Affirmations. Caltech: John Doyle, Lun LiAT

Presentation Transcript

Slide 1

´╗┐What do we need in a future data framework? David Alderson Engineering and Applied Science, Caltech alderd@cds.caltech.edu MS&E 91SI November 18, 2004

Slide 2

Acknowledgments Caltech: John Doyle, Lun Li AT&T: Walter Willinger CISAC: Kevin Soo Hoo, Mike May, David Elliott, William Perry MS&E 91SI: Dan, Martin, Keith

Slide 3

The Internet* has turned into a basic data framework. People Private companies Governments Other national foundations

Slide 4

The Internet* has turned into a basic data framework. Individual correspondence email, IM, IP communication, document sharing Business correspondence Customers, providers, accomplices Transaction handling Businesses, buyers, government Information get to and dispersal web, blog

Slide 5

The Internet* has turned into a basic data framework. Our reliance on the Internet is just going to increment. This will be opened up by an essential change in the way that we utilize the system.

Slide 6

What do we need in a future data framework? In what manner will we utilize the system?

Slide 7

Communications and registering Store Communicate Compute Communicate Courtesy: John Doyle

Slide 8

Store Communicate Compute Communicate Act Sense Environment Courtesy: John Doyle

Slide 9

Control Computation Communication Devices Dynamical Systems Courtesy: John Doyle

Slide 10

From Software to/from Human on the up and up To Software to Software Full robotization Integrated control, comms, processing Closer to physical substrate Store Communicate Compute Communicate Computation New abilities & power New fragilities & vulnerabilities Communication Devices Control Dynamical Systems Courtesy: John Doyle

Slide 11

Store Communicate Compute Communicate Are we prepared? This speaks to a tremendous change, the effect of which is not completely refreshing Few, assuming any, encouraging strategies for tending to this full issue Even extremely exceptional cases have had restricted hypothetical bolster Computation New capacities & heartiness New fragilities & vulnerabilities Communication Devices Control Dynamical Systems Courtesy: John Doyle

Slide 12

The Internet* has turned into a basic data framework. The Internet is a control framework for observing and controlling our physical condition. Commandeering the Internet can be significantly more destroying than interfering with it. The Internet has turned into a kind of open utility (like power or telephone benefit) that underlies numerous essential open and private administrations. Web disturbances have a "progressively outstretching influence" over the economy.

Slide 13

What do we need in a future data foundation? What components or traits would we like it to have?

Slide 14

Is the Internet* strong? What is power?

Slide 15

working definition vigor = the steadiness of some component/trait within the sight of some aggravation. must indicate the element/trait must determine the unsettling influence

Slide 16

Is the Internet* strong? What would we be able to state in light of its engineering?

Slide 17

Routers Hosts

Slide 18

Links Sources

Slide 19

Network conventions. HTTP TCP IP Links Sources

Slide 20

Files HTTP Hidden from the client Sources

Slide 21

Network conventions. Records Files HTTP TCP IP bundles parcels bundles parcels Links Sources

Slide 22

Network conventions. Each layer can advance autonomously gave: Follow the guidelines Everyone else does "sufficient" with their layer HTTP TCP Vertical deterioration Protocol Stack IP Links Sources

Slide 23

Network conventions. HTTP Individual segments can fizzle (gave that they "bomb off") without upsetting the system. TCP IP Horizontal disintegration Each level is decentralized and offbeat Links Sources

Slide 24

The Internet hourglass Applications Web FTP Mail News Video Audio ping kazaa Transport conventions TCP SCTP UDP ICMP IP Ethernet 802.11 Power lines ATM Optical Satellite Bluetooth Link advances

Slide 25

The Internet hourglass Applications Web FTP Mail News Video Audio ping kazaa TCP IP Ethernet 802.11 Power lines ATM Optical Satellite Bluetooth Link innovations

Slide 26

IP on everything The Internet hourglass Applications Everything on IP Web FTP Mail News Video Audio ping kazaa TCP IP Ethernet 802.11 Power lines ATM Optical Satellite Bluetooth Link advances

Slide 27

The Internet hourglass Applications Web FTP Mail News Video Audio ping napster TCP vigorous to changes delicate to changes IP Ethernet 802.11 Power lines ATM Optical Satellite Bluetooth Link advances

Slide 28

Internet Vulnerabilities On brief time scales: Robust to loss of segments ("flop off") Fragile to getting out of hand parts On long time scales: Robust to changes in application or physical layer advances Fragile to changes in hourglass "midriff" (IP) Is there a viable state of mind about the greater part of this with regards to cybersecurity? (i.e., a scientific classification for interruptions?)

Slide 29

A Simplified Taxonomy Network Services (the end-to-end benefits that give essential client usefulness to the system) Network Infrastructure (the equipment/programming required to empower the development of information over the system)

Slide 30

A Simplified Taxonomy Network Services (the end-to-end benefits that give essential client usefulness to the system) Network Infrastructure Fundamental Protocols Vertical decay Operating Systems Physical Hardware

Slide 31

A Simplified Taxonomy Network Services (the end-to-end benefits that give essential client usefulness to the system) Network Infrastructure Fundamental Protocols Fundamental Protocols Operating Systems Operating Systems Physical Hardware Physical Hardware Network "Center" Network "Edge" Horizontal deterioration

Slide 32

Infrastructure in Network Core Network Services (the end-to-end benefits that give fundamental client usefulness to the system) Fundamental Protocols Operating Systems Physical Hardware Network "Center"

Slide 33

Fundamental Protocols (TCP, IP, BGP) Operating Systems (Cisco IOS) Physical Hardware (links, switches, switches) Infrastructure in Network Core Network Services (the end-to-end benefits that give essential client usefulness to the system) Disruptions Stakeholders Standards Orgs (e.g. IETF) ISPs IP caricaturing BGP misconfigs Cisco IOS assault? Sellers (e.g. Cisco) ISPs Physical assaults Network "Center"

Slide 34

Infrastructure at Network Edge Network Services (the end-to-end benefits that give essential client usefulness to the system) Fundamental Protocols Operating Systems Physical Hardware Network "Edge"

Slide 35

Fundamental Protocols (TCP, IP, DNS) Operating Systems (Windows, Linux, MacOS) Physical Hardware (desktops, portable workstations, servers) Infrastructure at Network Edge Network Services (the end-to-end benefits that give essential client usefulness to the system) Disruptions Stakeholders IP mocking DNS assaults Standards Orgs (e.g. IETF) Users Fundamental Protocols (TCP, IP, DNS) Most infection/worm assaults Operating Systems Vendors (e.g. Microsoft, Dell) Users (Corporate, Individual, Government) (Microsoft, Linux, MacOS) Physical Hardware Physical assaults (desktops, portable PCs, servers) Network "Edge"

Slide 36

Network Services Network Services (the end-to-end benefits that give essential client usefulness to the system) Fundamental Protocols Fundamental Protocols Operating Systems Operating Systems Physical Hardware Physical Hardware Network "Center" Network "Edge"

Slide 37

Types of Network Services Public Services (determination and utilize is unreservedly accessible) Private Services (detail and additionally utilize is limited or exclusive) Fundamental Protocols Fundamental Protocols Operating Systems Operating Systems Physical Hardware Physical Hardware Network "Center" Network "Edge"

Slide 38

Other Infra-structures Remote Access (Telnet) File Transfer (FTP, P2P) Financial Networks (FedWire ) SCADA Systems WWW (HTTP ) E-Mail (SMTP ) Types of Network Services Public Services (particular and utilize is uninhibitedly accessible) Private Services (particular as well as utilize is confined or restrictive) Fundamental Protocols Fundamental Protocols Operating Systems Operating Systems Physical Hardware Physical Hardware Network "Center" Network "Edge"

Slide 39

Private Public S E R V I C E S Financial Networks (FedWire ) Other Infra-structures Remote Access (Telnet) File Transfer (FTP, P2P) SCADA Systems E-Mail (SMTP ) WWW (HTTP ) Fundamental Protocols Fundamental Protocols Operating Systems Operating Systems Physical Hardware Physical Hardware Network "Center" Network "Edge"

Slide 40

Private Public A S E T S (Information, Money) S E R V I C E S Financial Networks (FedWire ) Other Infra-structures Remote Access (Telnet) File Transfer (FTP, P2P) SCADA Systems E-Mail (SMTP ) WWW (HTTP ) Technology Dependence Disruptions Fundamental Protocols (TCP, IP, DNS) Fundamental Protocols (TCP, IP, BGP) Operating Systems (Cisco OS) Operating Systems (Windows, Linux, MacOS) Network CORE Network EDGE Physical Hardware (links, switches, switches) Physical Hardware (desktops, tablets, servers) E L E C T R I C I T Y & O T H E R P H Y S I C A L I N F R A S T R U C T U R E S

Slide 41

Open Questions Is an Internet monoculture a critical danger to the security of the internet? Understanding into the fix/worm issue? Who are the partners and what are their financial motivations? How does misalignment of financial motivating forces add to weakness? What exactly degree are the mechanical, financial, social, and legitimate figures the current digital framework to fault for the generally speaking (in)security of the framework? Step by step instructions to plan

SPONSORS