
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | September 11, 2015 |
Latest Amendment Date: | September 11, 2015 |
Award Number: | 1528099 |
Award Instrument: | Standard Grant |
Program Manager: |
Kevin Thompson
kthompso@nsf.gov (703)292-4220 CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | September 1, 2015 |
End Date: | August 31, 2019 (Estimated) |
Total Intended Award Amount: | $230,000.00 |
Total Awarded Amount to Date: | $230,000.00 |
Funds Obligated to Date: |
|
History of Investigator: |
|
Recipient Sponsored Research Office: |
660 S MILL AVENUE STE 204 TEMPE AZ US 85281-3670 (480)965-5479 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
P.O. Box 876011 Tempe AZ US 85287-6011 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | Secure &Trustworthy Cyberspace |
Primary Program Source: |
|
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
Almost every organization depends on cloud-based services. The backend of cloud-based services are designed for multiple tenants and reside in data centers spread across multiple physical locations. Network security and security management are major hurdles in such a complex, shared environment. This research investigates mitigating the security challenges by taking a moving target defense (MTD) approach. Continually adjusting the system resources such as the topology of the data center, bandwidth allocation and traffic flow policies makes it difficult for attackers to compromise the system. New evaluations methods will be developed to ensure that these MTD mechanisms work properly in practice. The outcome of this research is to have cloud services that are more secure and resilient to attacks. This research is a collaborative effort conducted by researchers from three different universities, Arizona State University, Duke University, and the University of Missouri-Kansas City. Graduate students will be trained to serve the growing need for educating professionals in cyber security. The results of the proposed research will be incorporated into several courses taught at the respective institutions.
The MTD approach in a multi-location, multi-tenant data center environment requires a complex level of coordination. This research investigates defense mechanisms in the data center's virtual networking environment based on programmable networking solutions so that proactive attack countermeasures can be deployed with considerations of the system resource consumption, software bugs/vulnerabilities, effectiveness of countermeasures, and impact on consumers running applications. The research outcomes can be employed for applications that require security situation-awareness variables accurately predicted at a very fine grain resolution, from a few milliseconds to a few seconds. This introduces additional challenges, namely, developing new performance models for networking, data collection, big data-enabled security processing, and control. To address these challenges, this project has two interdependent fundamental research thrusts: (a) investigate a dynamic and adaptive defensive framework at both networking and software levels; and (b) deploy an adaptive security-enabled traffic engineering approach to select optimal countermeasures by considering the effectiveness of countermeasures and network bandwidth allocations while minimizing the intrusiveness to the applications and the cost of deploying the countermeasures. The outcomes of this project will include a set of software APIs and tools to integrate the measurement system and analytical models in a transition to practice effort.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
PROJECT OUTCOMES REPORT
Disclaimer
This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.
The SRN project targets at developing new metrics, analytical models, and evaluation methods to dynamically adjust the virtual networking system according to the security events and vulnerabilities detected in the system. To this end, this research focused on modeling attack scenarios by using a systematic approach considering how to incorporate theoretical attack analysis models such as attack graphs into a real-time security decision procedure. In particular, software defined networking (SDN), network function virtualization (NFV), distributed firewall (DFW), service function chaining approaches are used as the fundamental building-block to provide a more agile and intelligent network security monitoring and management system. Moreover, this research investigates into game-based defense strategy solutions considering sophisticated attack scenarios such as Advanced Persistent Threats (APTs) and considering Moving Target Defense (MTD) approach to mitigate APTs.
To disseminate the research outcomes, at ASU, the research team has produced more than 20 peer-reviewed high-quality research publications, one half-day tutorials, and one professional book on SDN/NFV security. In addition to the conference presentations, the research team has delivered ten invited talks including research seminars, panels, and keynotes.
In order to promote transition to practice for this project, the research team at ASU had submitted one US patent application and build a startup company to investigate in the commercial opportunity of SDN security. The start-up company won the devil challenge venture funds to support the commercialization of SDN security research outcomes.
Through this project, at ASU, one postdoc, two PhD students, and one MS students have devoted their efforts to build their research agenda, PhD dissertations, and MS thesis, respectively. One course curriculum has been revised by incorporating moving target defense (MTD) related teach materials and a set of course projects have been setup in the area of SDN/NFV security. An online SDN/NFV security courses will be online on Coursera in spring 2020. Hands-on lab materials are delivered through ThoTh Lab that provides practical hands-on access for students and developers to practice SDN technologies.
Last Modified: 10/30/2019
Modified by: Dijiang Huang
Please report errors in award information by writing to: awardsearch@nsf.gov.