world cyber security technology research summit

REPORT
WORLD CYBER SECURITY TECHNOLOGY
RESEARCH SUMMIT
BELFAST 2012
Belfast 2012 - Report
1
About CSIT
The Centre for Secure Information Technologies (CSIT) is an Innovation and Knowledge Centre (IKC) based at Queen's University of
Belfast's, Institute of Electronics, Communications and Information Technology (ECIT) in the Northern Ireland Science Park, Belfast. The
Centre has been awarded “Academic Centre of Excellence in Cyber Security Research” status by the UK’s GCHQ in partnership with the
Research Councils’ Global Uncertainties Programme (RCUK) and the Department for Business Innovation and Skills (BIS).
With total funding of over £30M, CSIT brings together research specialists in complementary fields such as data encryption, network
security, wireless enabled security and video analytics. CSIT is looking at both information and people security and is focused on: securing
the hyper-connected world, secure transport corridors and privacy and trust for financial markets.
About Belfast 2012
Belfast 2012: World Cyber Security Technology Research Summit brought together experts in the field of cyber security from industry,
government and leading research institutes throughout the world to develop a collective research strategy.
Photograph of attendees at Belfast 2012
Belfast 2012 - Report
1
Executive
summary
The second World Cyber Security
Technology Research Summit (Belfast
2012) further developed research themes
identified during Belfast 2011.
Keynote presentations from government
and industry leaders gave perspective
and context to four break-out sessions.
The keynotes addressed; a partnership
approach to tackling cyber crime,
government policies and initiatives,
industry challenges/opportunities, ongoing strategic research and the future
cyber security landscape.
The main output of the Summit was four
group-edited strategic roadmap
documents, produced to inform collective
research within applied research
institutes. These were based on the
following core themes:
1. Adaptive Cyber Security
Technologies
To be able to normalise and protect
systems, researchers should look at
systems engineering approaches of
safety critical systems and subsumption
architectures in robotics. Researchers
should also develop adaptive techniques
that use Big Data to their advantage and
harness nature inspired mechanisms to
deliver faster response and provide HiFidelity detection. Adaptive systems need
to be cognitive to address a moving
target and be able to verify, prove, explain
and justify system actions. Systems need
to self-learn and be able contribute to
and learn from the community.
2. Protection of Smart Utility Grids
Research should focus on the
standardisation of Smart Meters, their
platforms, authentication protocols,
sensing technologies, the Smart Meter as
a Platform (SMaaP) and reverse
integration with other devices and
multiple utilities within the home and
enterprise. Research should also focus
on mitigation of realistic threat scenarios,
including the convergence of physical
and cyber security, as well as the
enablement of rapid recovery from
network outages caused by malicious
attacks. Furthermore, research into
SCADA attack vectors is required to
ensure first, that the system can be
recovered and second, that the attack
surface is closed to prevent future
attacks.
Belfast 2012: Report
3. Security of Mobile Platforms and
Applications
Research in the mobile space should look
first of all at holistic security models, and
investigate common policies and
technologies that can be applied to all
components and players in the mobile
architecture. From the consumer point of
view, research should focus on trust
models, authentication and application
certification in order that consumers can
manage sensitive data and carry out
secure transactions with confidence.
From an enterprise perspective, research
should examine problems such as data
segregation, filtering, configuration and
control in order to enable corporations to
implement a BYOD model which is both
secure and reliable.
4. Multifaceted Approach to Cyber
Security Research
Many opportunities for a multifaceted
approach to cyber security research exist
around ownership, identity, privacy,
measuring trust, valuing digital
interactions and evaluating public
persuasion factors, however the group
identified specific and practical steps that
research organisations should take to
address the cyber security opportunities.
Social norms and users should be
studied to assess how to deliver cyber
security information. A framework should
be developed to allow policy makers to
understand the implications of their
policies and research should be identified
that can be used to inform cyber security
policies. Finally, public sector cyber
security needs and solutions should be
centralised and aggregated.
Conclusion
Key to a successful research roadmap is
having access to and demonstrating
solutions on real-world data. Applied
researchers need to work with
government and industry partners to
realise this, connect with the various
cyber ranges and aspire to have a
standard dataset within the community.
2
Introduction
The second World Cyber Security
Technology Research Summit (Belfast
2012) reconnected experts in the field of
cyber security from leading research
institutes, government bodies and
industry throughout the world to consider
cyber space, particularly the Internet of
5-10 years time, envision potential
security threats and mitigation tactics,
and put forward a strategy for future
cyber security research.
Hosted by the Centre for Secure
Information Technology (CSIT) at Queen's
University Belfast, Belfast 2012
explored the four research themes
identified during Belfast 2011 and
produced group-edited roadmap
documents to inform collective
research within applied research
institutes.
CSIT recognise that cyber security
research needs to be coordinated to
address envisaged future security threats,
and research should be influenced by
government policy and industry
capability. Belfast 2012 continued to
develop a 'Davos' style event for cyber
security, enabling sharing of information
on future cyber security matters, and
bringing cyber security experts together
to meet the challenge of safeguarding the
internet of tomorrow.
Professor Sir Peter Gregson,
President and Vice Chancellor,
Queen’s University Belfast
1.1 Opening Addresses
This year's Summit was again opened by
Professor SIr Peter Gregson, President
and Vice Chancellor of Queen's
University Belfast. He welcomed the
delegates to the second World Cyber
Security Technology Research Summit
and to the Centre for Secure Information
Technology at Queen's. He indicated the
importance of CSIT as part of the
University and as part of the NI Science
Park, providing not just a cyber security
research centre, but also a place to bring
together business, academia and
government in cyber security, reducing
the gap between research and
commercialisation. He then went on to
outline the scale of risks in cyber security
and discuss the topic of cyber security
health, linking this with world health and
challenging the Summit to look at cyber
security health in addition to the risks.
Dr Godfrey Gaston, Director of
CSIT, Queen’s University Belfast
Dr Godfrey Gaston, CSIT Director
thanked Professor Gregson and the
keynote speakers, welcomed delegates
to CSIT and discussed the agenda,
hopes and aspirations of the event.
Belfast 2012: Report
3
Keynotes
2.1 Keynote addresses
2.1.1 Prof B Silverman, UK Home
Office Chief Scientific Advisor
In these sessions government officials,
security analysts and industry leaders
delivered keynote addresses giving an
international perspective on emerging
cyber security issues and the vision of
tomorrow.
The presentation focussed on a
partnership approach to tackling cyber
security and crime. It was noted that
cyber security is a top government
priority and that one particular remit of
the Home Office is cyber crime. Fighting
general crime is a cooperative activity,
requiring the participation of everybody.
The same is true for cyber crime, fighting
this needs involvement from the
community, government, academia, and
individuals.
Various sources of cyber crime were
identified - rogue states, terrorists,
malicious individuals, organised crime. IT
provides new opportunities for
committing old crimes, e.g. the Internet
makes the exploitation of children easier,
the increase of e-commerce gives
increased opportunities for forgery, fraud
and theft, the ability to download music
from websites has enabled copyright
infringement from unauthorised sites. IT
also provides new opportunities for
committing new crimes, e.g. attacks by
groups such as Anonymous, and denial
of service attacks.
Police e-crime units are faced with a
huge volume of digital evidence, e.g. from
seized phones etc., and this has led to
the need for effective tools for assessing
the value of evidence. The role of Home
Office science is to act as the primary
interface between Home Office Ministers
policy formulation, the S&T supply base,
and frontline operational decision makers.
The Home Office Centre for Applied
Belfast 2012: Report
Science and Technology (CAST) aims to
reduce crime with the deployment of new
techniques, working with frontline
partners to ensure effective use of
science and technology, and setting
challenges and standards for industry. In
the cyber crime area, CAST is able to
provide real life challenges and tests for
industry and academia for the
assessment of new tools and
technologies. Future cyber crime targets
are many and include the cloud,
encryption, and face recognition. The
Government must be joined up
internationally and across sectors to
tackle cyber security and cyber crime
effectively.
2.1.2 Ms V Andrianavaly, European
Commission, Internet, Network and
Information Security Unit
This presentation described EU policies
for Network and Information Security
(NIS) and Critical Information
Infrastructure Protection (CIIP). The main
policy initiatives and milestones being:
• 2004: Establishment of European
Network and Information Security
Agency (ENISA),
• 2006: EC proposal - Strategy for a
Secure Information Society,
• 2009: EC Action Plan on CIIP,
• 2009: Adoption of revised Regulatory
Framework for e communications new security provisions,
• 2010: Digital Agenda for Europe - Trust
and Security chapter,
4
• 2011: Review of Action Plan for CIIP.
The Strategy for a Secure Information
Society encouraged the reinforcement of
ENISA's role in implementing NIS policy.
The Action Plan on CIIP for protecting
Europe from large scale cyber attacks
promoted resilience as a first line of
defence and enhanced CIIP
preparedness, and the need to work at
an international level as well as a national
level. The Review of the Action Plan for
CIIP revealed very positive results
achieved so far, with further efforts
needed to establish a network of
national/government CERTS, a European
cyber incident contingency plan, and
further global interaction.
The 7th European Research Framework
Programme was described, which
comprises IT and cyber security themes.
The Competition and Innovation
Framework Programme was discussed,
which has a Jan 2012 adoption date, and
will establish a European wide pilot
platform for detecting and mitigating
botnets.
A European strategy for Internet security
is to be adopted by Q3 2012. The
objectives of this will be fostering of
cooperation and early warning between
Member States to ensure adequate
capacities for cyber attack response,
stimulation of efforts to reinforce the
security of products, networks and
services to ensure better security at the
user side, ensuring a strong response to
cyber crime, continuing cyber security
research investment and ensuring that
results reach the market and users.
Preliminary ideas for legal measures are
establishing a network of national
competent bodies and government
CERTS at a European level, developing a
European cyber incident contingency
plan, extending security breach
notification obligations to other sectors,
and mandatory security audits.
Preliminary ideas for measures to improve
NIS include incentives for private sectors
to improve security of products and
services, e.g. by EU procurement, to
increase transparency for users, stop the
spread of malware, and secure the IT
product supply chain.
Belfast 2012: Report
2.1.3 Mr R Samani, VP & Chief
Technology Officer, EMEA, McAfee
ambulance services, using IT in
healthcare can improve the service but
there is a need for the integration and
security of data.
McAfee have produced several research
reports in the area of cyber security,
including Night Dragon discussing targets
on the oil and gas sector and Shady RAT
documenting a 5 year campaign of
attacks on 'unrelated' organisations.
This presentation discussed the changing
times of cyber security, how the cyber
industry and use of technology has
changed, and how this fuels other
change, e.g. the use of social media in
the Arab spring.
These are times of uncertainty and
opportunity. Some people realise this
through criminal intent - they consider
that they can carry on crimes behind a
computer with impunity and without faceto-face victims. It is possible to classify
cyber attackers according to the
sophistication of the threat they pose and
the capability for damage of the threat.
Using these criteria attackers can be
ordered from hacktivists/terrorists to
cyber criminals to cyber espionage to
nation state coordinated cyber
operations.
Some statistics gathered by McAfee are
2m malicious websites launched per
month and 100,000 malware samples
received by McAfee per day - some
very complex, and some using the
psychology of influence to make the
attacks more effective. Other sources of
increased vulnerability were highlighted.
Lines of code are increasing in all
applications, e.g. there are 10m lines of
code in an average automobile.
Network devices are increasingly
connected to the Internet, producing
security and privacy issues. Critical
infrastructures are vulnerable to targeted
attacks such as Stuxnet. The area of
healthcare and security is worrying previously disconnected devices are
coming online, virus attacks on hospitals,
high demand poses a stress to
The future of security in the cyber space
was discussed - no longer black and
white in security, lots of grey, no one size
security solution fits all, contextual and
flexible security is needed, quantifying
security needs is crucial, understanding
the context and value of data and its
security requirements is important.
2.1.4 Mr J Bumgarner, CTO, US
Cyber Consequences Unit
It was put forward in this presentation
that the problem is the 'abyss' of cyber
security, which we are creating ourselves.
There are many examples of cyber crime
problems which have been produced by
lack of attention to security.
In the e-commerce industry, e.g. in
developing the chip and pin system,
account was not taken of all possible
attacks. Card readers have been
developed that can clone cards because
it is possible for the reader to tell the
cards to default to their minimum security
setting.
In the automobile industry, cars have
been developed that have 60-70
computers, e.g. for brakes, wipers etc.,
without attending to the cyber security of
5
the computers. Upgrades to automobile
software have been allowed via USB
drives, without anti virus detection in cars
to check for malware. In car-home area
networks, vendors have not thought
through the security of hand offs between
the car and the home.
In the medical industry, devices have
been developed that can be subjected to
cyber attacks. Bluetooth teeth may be
tracked by satellite and may be attacked
e.g. using noise signals. Some current
pacemakers can be hacked. Signals to
wireless devices can be jammed or EM
pulses sent to such devices.
In the smart utilities industry, there has
been failure of meters due to engineering
problems. There are various examples of
other engineering situations, e.g.
generators on dams that are without
security.
2.1.5 Dr D Maughan, Department of
Homeland Security
in security; transition to practice of cyber
security R&D - transition of technology to
commerce, test and evaluation; focus on
new national priorities - health IT, smart
grid, trusted identity strategy, cyber
security education and recruitment.
Federal investment is also available in
other, related, disciplines - big data and
analytics, cloud computing, cyber
physical security, software design, etc.
In the Department of Homeland Security
(DHS) the R&D execution model
comprises pre R&D workshops and
solicitations, seeking to work on
requirements of real consumers, R&D
program support, and post R&D testing
and technology transfer. In the last 8
years, examples of commercialised
security products include: Ironkey secure USB; Komoku - rootkit detection
technology, bought by Microsoft;
Endeavor - malware analysis, acquired by
McAfee; Stanford - browser anti phishing
technologies.
The DHS cyber security programme
areas are:
1. Research Infrastructure to Support
Cyber Security - DETER experimental
research test bed, PREDICT research
data repository, SWAMP software
assurance market place.
2. Trustworthy Cyber Infrastructure DNS security, routing protocols security,
cyber security for process control
systems - oil and gas industries, Internet
measurement and attack modelling.
The Speaker presented the ongoing
cyber security situation in the USA,
referring to the Comprehensive National
Cyber Security Initiative, which has been
continued under President Obama. This
initiative works across several operations
and agencies, unclassified and classified,
offensive and defensive, and research.
A Federal Cyber Security R&D Strategic
Plan has been developed for the various
agencies in the US government that fund
research in cyber security. The Plan
includes: investigation of the science of
cyber security - basic research; research
themes - cyber economics, trusted
spaces, moving target defence, designed
Belfast 2012: Report
forensics, research to help law
enforcement, identity management and
data privacy technology.
The goals of the programme areas are to
develop new technologies, secure old
technologies and facilitate technology
transfer. Funding is available at research,
prototype and mature technology levels
and there is the ability to partner with
international research.
Mapping DHS R&D to CSIT themes:
adaptive cyber security technology,
moving target security and cyber health;
protection of smart grids; security of
mobile platform and applications; multi
faceted approach to cyber security, need
more non computer scientists in cyber
security research.
In summary, cyber security is a key area
of innovation which requires support,
more national and international
cooperation is essential to produce next
generation solutions, the DHS continues
an aggressive cyber security research
agenda working with academia, and a
continued strong emphasis on
technology transfer and deployment of
R&D is crucial.
2.1.6 Mr E Kaspersky, Chairman and
CEO, Kaspersky Labs
3. Cyber Technology Evaluation and
Transition - technology assessment and
evaluation, experiments and pilots,
transition to practice.
4. Foundational Elements of Cyber
Systems - HOST open source security
technology (open source can be as good
as commercial products especially when
commercial resources are decreased),
enterprise level security metrics, software
quality assurance, leap ahead
technologies, etc.
5. Cyber Security User Protection and
Education - user community education,
competitions, national initiative for cyber
security, national college competition,
high school challenges, cyber security
Five top questions in IT security were the
subject of this presentation.
1. Privacy: How much data is on the
Internet about you? Why are we forced to
post our data to obtain many computer
services? The provisions for privacy
which apply in the physical world should
be used in the digital world, e.g. when we
6
buy a CD with cash in a store, ID is not
needed, why can this not be the case for
iTunes? More government regulation is
needed for the protection of privacy in the
digital world.
2. Cyber crime: Cyber crime is changing
into different categories. There are
traditional criminals who attack random
computers - criminal to consumer or
'c2c'. With better resources for fighting
this, it could be under control in a few
years. There are also criminals who
attack specific targets - criminal to
business or 'c2b'. Military standards of
enterprise security are needed in these
types of targets, there is a lot of work to
do in this area.
3. Digital passports: Kids live in a digital
world, they are 'digital natives'. Their use
of the digital world is so great that, for
Belfast 2012: Report
example, if future digital voting is not
provided, they will not vote. There is
therefore a requirement for secure digital
passports. The current solutions, such as
cards or PINs, are not secure enough.
Biometrics are more secure, but the use
of these needs introduction to the
community.
4. Social networks/media: Digital and
social media is a very powerful tool for
the manipulation of people - not in all
countries, but in some. With increased
security in the social media field can
come the risk of decreased privacy.
5. Cyber war/weapons: Cyber space is
a very good tool/space to destroy or
damage your enemies. It is relatively
simple to develop cyber weapons
compared with conventional weapons.
Cyber war attacks can be against
communications, it is possible to infect
1m computers in a network, or enough
smart phones to disrupt a network, for a
relatively small amount of money. Cyber
war attacks can also be against critical
infrastructures. There is a need to
introduce secure operating systems to
these which will require a redesign of
operational software. In the next decade
we will live in a very insecure
environment, we need international
agreements for the control of cyber
weapons.
In closing “It is our responsibility to give
as secure as possible a digital world to
our digital successors.”
7
Collective
Research
Strategy
Following the keynote addresses a
facilitated group session to re-articulate
the themes developed at Belfast 2011
prepared the way for four breakout
sessions where a collective research
strategy for each was established.
3.1 Group Session
During this session the group facilitators
revisited the core themes identified during
Belfast 2011 which were as follows:
1. Adaptive Cyber Security
Technologies
Adaptive cyber security technologies are
necessary to address the 'moving target'
nature of cyber threats. Such
technologies need to be flexible, agile
and responsive, enabling them to cope
with the network bandwidth of 5-10 years
time and be more successful against
zero-day attacks. Research objectives in
this area would include the development
of cyber security technologies which have
self-learning capabilities; self-awareness
in cyber systems enabling early attack
detection and self-configuration to defend
against an attack; the establishment of
feedback in cyber systems providing the
capability of learning from cyber attacks.
2. Protection of Smart Utility Grids
Smart utility grids have, for a variety of
reasons such as their size and
accessibility, a raised susceptibility to
cyber attacks. Such attacks can destroy
national critical infrastructure and the
need for smart grid cyber security is
therefore imperative. Suggested research
aims in this field could comprise: smart
grid requirements gathering
methodology; protection technologies for
components of smart grids such as
smart meters; secure technologies for
communications in smart grids;
integration of smart grids with home area
networks (HAN) that provides for the
privacy and security of collected
information; development of smart grid
standards.
introduced by the configuration and use
of mobile networks. Such problems
include network availability as this can be
compromised, mobile web browsers as
these have limited security guarantees,
lost and stolen phones as current remote
wipe technologies are limited and caller
authentication as this is not strong.
4. Multi-faceted Approach to Cyber
Security Research
It is realised that technology alone will not
suffice in the defence against cyber
attacks - other facets of the cyber
security issue must be considered. Next
generation cyber security research must
take into account social, political, legal
and economic aspects of this space.
Social behavioural norms in cyber space
need to be investigated, societal desires
such as trust, safety, freedom and privacy
must be examined, and attitudes to cyber
security in source countries of cyber
attacks should be studied. Cyber space
policies, generated and set down by
governments, need to be incorporated
into cyber security research. Such
research should also be used to influence
the development of these policies and
cyber space use regulations. The impact
of cyber and other legislation should be
taken into account in researching cyber
security and again cyber security
research needs to influence the
development of such legislation. The
economics of cyber security is important,
development of effective security may
only take place if it is economical to do
so, this facet of cyber space needs to be
studied and solutions suggested.
3. Security of the Mobile Platform
and Applications
In mobile technology, security is a rapidly
increasing issue, due to convergence in
mobile architectures, mobile phones
becoming the dominant web platform
and the expanding number of mobile
users - 50 billion mobile devices in use by
2020. Research in this space should
target not only malicious applications, but
also mobile cyber security problems
Belfast 2012: Report
Session Moderator:
Mr Richard Stiennon, Chief Research Analyst, IT-Harvest
8
3.2 Adaptive Cyber
Security Technology
It was highlighted that a systems view
should be taken, considering People,
how they generate Data, which feed
Applications, running on Devices
connecting to the Cloud and Internet. A
process needs to be followed where an
Audit is taken, to inform techniques that
Protect, Detect and React to threats,
and then allows systems to Log and
Learn from events. There are multiple
control loops within this process on
multiple levels and they need to interact
sensibly. Consensus was reached that
Adaptive Technologies are a fundamental
area of future research and there are
opportunities to use Adaptive Techniques
within each phase of this process.
Humanity adapts and changes constantly
and systems need to be able to
recognise and deal with an adapting
society. Adaptive techniques will produce
some of the most effective methods of
threat detection/prevention. In fact, some
threats such as Insider Threat and
Identity Masquerading will potentially only
be caught by using adaptive techniques.
Adaptive techniques will also introduce
opportunity for efficiency in terms of
minimising the cost of security where,
depending on a given scenario and
resources available, the most effective
mix of techniques can be utilised for the
most efficient result. Adaptive techniques
can also provide simplified and efficient
reports to users and operators.
There are some risks from using adaptive
technologies and aspiring to have
autonomous systems. Adaptive
techniques could introduce a ‘digital judo’
phenomenon or introduce new
vulnerabilities. There is a risk of systems
learning the wrong thing and Swarm
Technologies and Herd Mentality theory
was highlighted. However, in general it
was felt that adaptive techniques were
not only useful but necessary. The group
identified three main areas of opportunity.
1. Normalising/Protecting Systems
Systems need to be able to measure
within a closed loop; however the
potential dangers of in-band control
signalling were highlighted. Adaptive
security technologies need to carry out
behavioural analytics and behaviouralbased trust. In doing so, security
mechanisms should be designed to a)
Belfast 2012: Report
minimise interference with normal
operation b) control the degradation of
systems performance and c) maintain a
minimum Quality of Service. In
normalising / protecting systems
researchers should look at what can be
learned from safety critical systems and
their approach to architectures and
systems engineering. In decomposing
complicated intelligent behaviour,
researchers should look at Brooks’ work
on robotics and subsumption
architectures.
to have a standard dataset within the
community.
Group facilitators:
2. Hi-Fidelity Detection
Adaptive systems are needed to reduce
false positives and false negatives in
current detection techniques.
Researchers should use big data to their
advantage, separate the data from the
system, isolate what can change and
what is static, and carry out content level
analysis. Researchers should look to
apply adaptive cyber security
technologies to reduce the cognitive
burden on humans and harness natureinspired mechanisms that can deliver
faster-than-human response.
Mr Ulf Lindqvist, Program Director,
SRI International
3. Intelligence Gathering/Learning/
Information Sharing
Adaptive systems will need to be
cognitive and have some level of selfawareness, self-learning and selfexplanation to be able to address a
moving target. There will need to be
some predictability based on past data
that essentially allows the database to be
able to reason about the future, run ‘what
if scenarios’ and learn from wrong
decisions. Adaptive systems will need to
be able to verify, prove, explain and justify
system actions. Researchers should look
to employ out-of-band management
communications, look at new techniques
of visualisation, and develop systems that
can not only self-learn but will contribute
to and learn from the community.
Autonomous systems should be
developed that automatically learn from
attacks and share this learning to a
network for all. In turn, this open source
information will allow the autonomous
systems to profile and mitigate potential
attackers and deliver early warnings of
hostile reconnaissance.
!Mr Igor Muttik, Senior Architect,
McAfee
Contributors:
Chris Meenan - IBM, Tim Parsons Selex, Michael McVeigh - Seven
Technologies, Tim Watson - De
Montfort University, Stig Bang Napatech, Richard Choi – ETRI, Paul
Kearney - BT, John Bumgarner – US
Cyber Consequences Unit, Duncan
Curry - Qosmos, Tony Dyhouse - ICT
KTN, Colin Kerry - BAE Systems, Brian
Honan - BH Consulting, Michael
Loughlin - CSIT, Phil O’Kane - CSIT,
Colin Burgess - CSIT, John Hurley CSIT, Stephen Wray - CSIT
Key to a research roadmap is having
access to and demonstrating solutions
on real-world data. Applied researchers
need to work with government and
industry partners to realise this, connect
with the various cyber ranges and aspire
9
3.3 Protection of Smart
Utility Grids
The group discussion focused on where
opportunities exist to provide solutions to
security challenges faced by Smart Utility
Grids and Smart Metering with respect to
emerging and expected future security
threats. Threats discussed included both
cyber and physical security threats and
potential for technological threat
mitigation and rapid recovery from
attacks. These threats could be malicious
or innocuous in origin but still have the
potential for major impact up to and
including ‘black out’.
Group members discussed how future
applied research might include new forms
of converged security technology,
policies, standardisation, retrofitting and
sun setting regimes for such technologies
in an environment where components are
expected to last up to 30 or 50 years.
Other opportunities and research drivers
highlighted included the integration of
dispersed generation sources,
consolidation of utility providers (energy,
water, gas), management of the ‘last
mile’, the European target of 2022 for
complete smart metering household
coverage and the move from closed
SCADA systems to those which are more
integrated. Current firewall technology
generally assumes an active regime of
end point updating/patching which is not
necessarily the case with smart meters
and smart grid components.
The group recognised that there are
many areas that should have a place on
this applied research roadmap. Three of
these practical steps are:
1. Smart Meter as a Platform
Solutions in the area of smart grids, smart
metering and the protection of such
technologies from cyber-attacks are in
the first phase of uptake. Research
needs to focus on the next generation of
smart meters, the standardisation of such
devices and platforms, authentication
protocols, sensing technologies, Smart
Meter as a Platform (SMaaP) and reverse
integration with other devices and
multiple utilities within the home and
enterprise.
problem for utility companies in addition
to emerging cyber threats. Smart grid
protection requires further research into
the mitigation of realistic threat scenarios,
including the convergence of physical
and cyber security, as well as the
enablement of rapid recovery from
network outages caused by malicious
attacks. Research around intelligent
surveillance systems and a different class
of intrusion protection systems should
also be taken forward.
Group facilitators:
3. Open SCADA
Opportunities exist to research threats
enabled by a move from closed SCADA
systems to those which are more
integrated and open to access from less
secure environments. Furthermore,
research into SCADA attack vectors is
required to ensure first, that the system
can be recovered and second, that the
attack surface is closed to prevent future
attacks. When SCADA systems are
taken down many utilities still depend on
human intervention to physically man
nodes. Research into autonomous
recovery systems should be undertaken.
Key to the progression of this research
roadmap is the commitment of all
players; academic, solution providers and
utilities, to participate in an open
exchange of real world data and threat
scenarios as well as granting access to
testing facilities and proving grounds and
technology to ensure the application and
commercialisation of findings quickly and
to the benefit of all.
Professor Sakir Sezer, Research
Director, CSIT
Ms Barbara Fraser, Director,
Innovation, Connected Energy
Networks, Cisco
Contributors:
Alasdair Rose - EPSRC, Graeme Bell PSNI, Kurt Neumann - Qosmos, Iain
Rankin - Seven Technologies, Fabian
Campbell-West - CSIT, Gorman Hagan
- Northern Ireland Electricity, Michael
Baume - Risk Management
International, Eul Gyu Im - Hanyang
University, Maire O’Neill -CSIT, You
Sung Kang - ETRI, Kerry Norton British Consulate-General - Atlanta,
Shane O’Neill - CSIT, Paul Miller - CSIT,
Kieran McLaughlin - CSIT, Liang LuCSIT, David Crozier - CSIT
2. Intelligent smart grid protection
Breach of physical access security,
especially theft, continues to be a major
Belfast 2012: Report
10
3.4 Security of the Mobile
1. Holistic Mobile Security Models
Platform and Applications
Security breaches in the mobile
ecosystem can have many sources,
including handset vulnerabilities,
operating system flaws, malicious
applications and even network availability.
As a result, no single player in the
ecosystem can have sole responsibility
for security. Research in the mobile space
should look first of all at holistic security
models, and investigate common policies
and technologies that can be applied to
all components and players in the mobile
architecture.
The group discussion began with a
discussion about the scope of the brief,
and the acknowledgement by all the
delegates that the mobile ecosystem is a
very broad one, with many players
including, at the very least, the consumer,
handset manufacturer, OS vendor,
application vendor and mobile operator. It
was agreed that in such a diverse
environment, there was no one group
who could, or should, take responsibility
for security. Each player had a valuable
contribution to make, and the security
must be dealt with in a holistic manner.
Some discussion then followed on how it
might be possible to incentivise the
various stakeholders to take security
seriously. Discussions included the
possibility of legislation to enforce good
security practice, but conceded that the
borderless nature of the mobile internet
might give rise to questions of
jurisdiction. The introduction of some
form of ‘health check’ to assess a
consumer’s behaviour and security
practices, and the concept of some form
of ‘security insurance policy’ were also
discussed. This latter suggestion
recognised that the ability to assess and
quantify risk was a potentially difficult
area.
On the consumer front, there was a
broad discussion around location-based
services, m-wallet services and mobile
banking. Of particular concern was the
handling of sensitive data and privacy.
The issue of cross-application use of data
was discussed, as was the concept of
multiple, throw-away ‘personas’, where a
consumer could create a ‘persona’ with a
data profile for use by a specific
application, or for a restricted period of
time.
There followed some discussion in the
area of enterprise mobility, centred on the
Bring Your Own Device (BYOD)
philosophy. While acknowledging that this
approach might be essential to help
organisations attract young talent, there
were a number of serious issues raised
including question over the control of
device features, the cross-contamination
of personal and business data, and
methods of addressing the physical
security of the device.
Group facilitators:
2. Trust models for the consumer
The issue of trust has a significant impact
on consumer confidence regarding the
management of their confidential data
and the uptake of applications like secure
mobile banking. From the consumer point
of view, there are still dangers inherent in
the transmission of private transactions
and the storing of sensitive data by
service providers. Research should focus
on trust models, authentication and
application certification in order that
consumers can manage sensitive data
and carry out secure transactions with
confidence.
Dr Frank Stajano, Senior Lecturer,
University of Cambridge
3. Enterprise Mobile Security
For businesses, the distribution of data
across the mobile ecosystem and into the
enterprise also creates questions of
ownership, responsibility and control.
This is compounded by the complexity of
a Bring Your Own Device (BYOD)
environment, where such issues extend
to both the data and the device. From an
enterprise perspective, research should
examine problems such as data
segregation, filtering, configuration and
control in order to enable corporations to
implement a BYOD model which is both
secure and reliable.
The key to success in this area is that any
research must consider the views and
needs of all stakeholders in the
ecosystem, as well as the input of
consumers, businesses, legislators and
regulators.
Mr Mark Crosbie, Security Architect,
IBM
Contributors:
Andrew Tyrer - TSB, Brendan Smyth Cybersource, Ian Bryant - MOD, Chris
Ramptom - Home Office, Gavin
McWilliams - CSIT, Dong Kyue Kim Hanyang University, Jeff Peel Quadriga, Rob Heathman - EPSRC,
Graham Florence - Motorola, Jim Clark
- Waterford IT, Ben Green - SAP, Philip
Mills - CSIT, Benoit Duspaquier - CSIT,
Suleiman Yerima - CSIT
The broad group discussion can be
summarised under the following topics:
Belfast 2012: Report
11
3.5 Multi-faceted
Approach to Cyber Security
Research
Top opportunities in cyber security , i.e.
things that would be good to do even if
difficult, were identified and included:
1. Ownership and Responsibility for
Security - these concepts are different in
cyber security space and physical space,
they vary with differences in cultures and
social norms, how much people believe
they can protect themselves is important,
a key challenge is how can people be
encouraged to take responsibility for their
own security and do current cyber
technologies allow us to exercise
responsibility.
2. Identity and Privacy - the former
concept is key as a great deal of
behaviour in cyber space depends on
who we think we are interacting with,
trust in online identity is very important.
Mechanisms for providing identity need to
be publicly acceptable and need to
consider privacy. For example, is
identification necessary for identity and is
it possible to have pseudo private
identities i.e. a trusted identity online
which is different from that in the physical
domain?
3. Measurement of Trust - trust in
cyber space is very important but how
can trust be measured? Is it possible to
develop acceptable trust metrics and
cyber security features that increase
trust? Trust and assurance sources are
key, e.g. assurance from the source of
friends is much more likely to influence
people to take-up security features.
4. Valuation of Digital Interactions can different levels of security be
developed for different interactions
involving differently-valued assets, e.g.
different personal information assets, it
would be necessary to identify the
importance of and the value of assets
and classify the security required for an
asset based on its value, development of
an asset currency e.g. personal
information currency.
be developed for different levels of asset
value.
Group facilitators:
6. Useable and Useful Security
Solutions - evaluation of public
persuasion factors is important, are there
public information strategies that will
allow people to learn about cyber
security?
Future technologies required to tackle the
opportunities in cyber security included
various machine learning techniques for
cyber space to build trust, model attacks,
isolate attacks and attack recovery.
Practical steps that research
organisations can take to address the
cyber security opportunities were
discussed and included:
Professor Virgil Gligor, Director, Cylab
1. Studies of social norms particularly
internationally and studies with users to
assess how to deliver cyber security
information.
2. Development of requirement/problem
definitions that allow them to be solved.
3. Identification of policies based on
results, identification of research that can
be used to inform cyber security policies,
development of a framework for allowing
policy makers to understand the
implications of their policies.
4. Bringing together of public sector that
have cyber security needs and research
and commercial players that have
developed security solutions, emulate the
health sector in looking at areas where
behaviour is restricting cyber security
improvement.
Dr. David Callaghan, Technical
Director - Radio Communications
Products, Thales
Contributors:
Brian Arlow - Brian Arlow PR, Dwayne
Burns - CSIT, Gareth Douglas - CSIT,
Graeme Bell - Police Service of
Northern Ireland, Grainne Kirwan Institute of Art, Design & Technology,
Dun Laoghaire, James Firth - Open
Digital, Gerald McQuaid - Vodafone,
Jennifer Betts - CSIT, John Skipper - PA
Consulting, Jon Browning - Cabinet
Office, Office of Cyber Security &
Information Assurance, Josh Davis GTRI, Mark Wiley - Espion Group,
Tristram Riley-Smith - Centre for
Science, Knowledge & Innovation,
Volkmar Lotz - SAP, Rosi Armstrong CSIT
5. Policy Development - there is a need
to create policies or rules for various
aspects of cyber security, a policy that
underpins trust in cyber space could
deliver a security safety net which allows
autonomy within it to be creative and
innovative, different privacy policies could
Belfast 2012: Report
12
Notes
Belfast 2012 - Report
13
Notes
Belfast 2012: Report
14
Normalising Protecting Systems Hi-Fidelity Detection Intelligence Gathering Learning Information Sharing Smart Meter as a Platform Intelligent Smart Grid Protection Open SCADA
Holistic Mobile Security Models Trust Models
for the Consumer Enterprise Mobile Security
Ownership and Responsibility for Security
Identity and Privacy Measurement of Trust
Valuation of Digital Interactions Policy Development Useable and Useful Security Solutions