280 likes | 404 Views
Michigan Cyber Range. Don Welch Merit Network. Agenda. Problem Merit’s Contribution to the Solution Opportunities to Participate. Critical Infrastructure. Risk. Confidentially 2011 Sony 101,000,000 through two attacks one lawsuit $1 Billion CD 2012 Tricare $4.9 Billion USD
E N D
Michigan Cyber Range Don Welch Merit Network
Agenda • Problem • Merit’s Contribution to the Solution • Opportunities to Participate
Risk • Confidentially • 2011 Sony 101,000,000 through two attacks one lawsuit $1 Billion CD • 2012 Tricare $4.9 Billion USD • 2012 Utah Medicaid 78,000 accounts • Aug 2012 University of South Carolina 34,000 people • Aug 2012 Oxford and Cambridge • Integrity • 2010 Stuxnet destroyed Iranian centrifuges • Availability • 2009 Twitter denial of service attack • 2012 WikiLeaks • Aug 2012 AT&T DNS • Aug 2012 RasGas
Risk • Industrial-Control Systems (ICS) • Supervisor Control and Data Acquisition (SCADA)
Cyber-Attack Threat • “Cyber-Attacks Are the Biggest National Security Threat.” • Leon Panetta • “My greatest fear is that, rather than having a cyber –Pearl Harbor event, we will instead have this death of a thousand cuts.” • Richard Clarke • “Catastrophic Cyber Attack Possible” • Hon. Mike Rogers • “The worst part of my job is what I know.” • Mike Macedonia
Militia? Colonial Era: Militia supplemented the provincial Forces to provide defense and public safety
Developing an Effective Militia • Marksmanship • Fieldcraft • Organization
Cyber Defense - Crawl • Technical Skills • Understand communication links • Operating systems • Applications • Security fundamentals
Cyber Defense - Walk • Understand attacks • Vulnerabilities • Types of attacks • How to attack
Cyber Defense - Run • Learn how to defend • Understand system vulnerabilities • Assess the risk • Mitigate the risk • Adapt – outthink the adversary • Work as a team
Experience • Safe environment • Live opponent • As a team • Properly structured exercise • High quality feedback
Mission • The mission of the Michigan Cyber Range is to provide a state-of-the-art unclassified facility and program for world-class cybersecurity training and education. • The Michigan Cyber Range will be a center of excellence in how to best prepare people to defend our Nation’s critical infrastructure. • The Michigan Cyber Range will also be a center of excellence in cybersecurity.
Description • An unclassified physical facility that is overlaid on the Merit Network with safe access facilities • Initially 2 sites, each with the ability to support 1000 nodes each, but scalable to much larger configurations • Using virtualization, and actual systems the Range will be capable of modeling very complex networks • Nodes are servers, PCs, network security systems and other network enabled devices • A cybersecurity program that serves education, private industry, the national guard and government individuals and organizations
NIST NICE • National Institute of Standards and Technology • National Initiate for Cybersecurity Education • Knowledge, Skills and Abilities (KSA) and tasks for IT staff functions • Translates nicely to learning objectives • Build lessons, courses and training from these KSAs
Users • Education • Higher Education uses the Range as a regular component of course work • Research platform • Special K-12 programs, and competitions • Commercial • Operators • Ex: Utilities, Manufacturing, Finance, Health Care • Vendors • Hardware, Software and Security • Government • Federal, State, Local • National Guard
Architecture • Runs over the Merit Network • Separate from the production network • Initially 2, scalable to 10 sites with each site composed of • Management Rack and 1-10 Range Racks per site • Test Rack for non-standard equipment • Each Range Rack can host up to 1000 virtual machines • Virtual machines are: virtual servers, workstations, devices, switches, routers, etc. • Openflow switches • Uses layers to create specified network configurations • Allows for simultaneous use • Out of band control layer and monitoring layer • Traffic • Packet generation • Replay • Mirrored traffic
Architecture • Scenario Builder: CyberSMART – Utah State • Research, Organize, Create and Edit an exercise scenario • Matched with specific objectives • Guided and collaborative planning process
Exercise Engine • SAIC: CyberNEXS • More than keeping score: what really happened?
Range Map Additional Site/Classroom Ferris State University Additional Site/Classroom Camp Grayling Initial Access Classroom Merit Network Initial Site and Access Classroom Kellogg ANG Base Initial Site and Access Classroom Eastern Michigan University
Use Cases • Platform as a Service • Secure sandbox • Tools • Libraries • Turnkey • A complete course/exercise ready for execution • Training • Crawl, Walk and Run level training • Complete training experience – with a Red Team • Structured and instrumented to achieve specific learning objectives
Access • Residential • Access from a secure facility • Blended • Access from remote facilities with constraints • Distance • Unrestricted secure access
Partnerships • Federal • NIST, DHS, DoE, • State • Governor, Michigan State Police, Department of Technology Management and Budget, Michigan National Guard • Education • Universities, Community Colleges, K-12 • Industry • Users: Utilities, IT Service Providers, Financial, Health Care • Vendors: Security, Hardware, Software
Time Line • 2012 • Initial funding • Executive Director hired • Construction started • Staff hiring • Curriculum developed • 2013 • First training session • Used by EMU • Expanded training • Event program • Additional educational institutions • 2014 • New training facility • Add educational institutions, capacity and training events • 2015 • Full training portfolio • Self-sustaining
Summary • Cybersecurity is one of the major security challenges facing the nation • The majority of these challenges will be met by civilians working for private companies • Effective preparation demands • Exercises against live adversaries in a safe but realistic environment • Working as a team, preferably the company team • Continually building upon knowledge and experience • Based on a public-private partnerships • Operational January 2013 • May become a NET+ Service