INTEL MEETING
February 10, 1999
1131 ENG II
12:00-1:30 p.m.
In attendance:
Karl Levitt (KL), Steven Templeton (ST) and Jim Hoagland (JH)
TOPICS
Last Meeting
Converting LaSCO to GrIDS
Policy
Cyber Army
Center of Security
Application Security
Next Meeting
-
Last Meeting
-
Plan to visit in May or June
-
Configuring firewall
-
Converting LaSCO to GrIDS
-
JH: Trying to get GrIDS running
-
The objective is to translate LaSCO rulesets to GrIDS
-
Policy
-
Baiju interested in communication policy – look at Jim Hoagland’s policy
language paper
-
Policy too broad for Baiju – interested in low-level encryption
-
Intel interested in a way to state acceptable protocol policy at a high
level
-
ST: When setting up connections, assume that data is labeled with a security
class
-
JH: Provisions for negotiating connections ST: Rankings
-
JH: Receiver chooses whichever way is easiest for them.
-
ST: Pick method that has the greatest utility for everyone.
-
JH: Large domain over different configurations – integrity, confidentiality,
where try to hide connections going on.
-
ST: Service on a certain port – strong integrity or list algorithms
-
Feeling about encryption method can change
-
Encryption algorithm done indirectly
-
Map it down to protocols, key length, implementation level
-
ST: Communication list of protocols – matrix with fixed fields or context
specific? JH: All context-specific
-
KL: Consider multi-party negotiations?
-
ST: Streaming video is a big security problem
-
Cyber Army
-
US government wants to create a branch of cyber soldiers that protect the
computer infrastructure, look for hackers.
-
$3 million in scholarships to train people in computer security
-
Center of Security
-
Create an interdisciplinary Center of Security
-
Invite lecturers from various disciplines (math, law school, psychology
criminology, medical school, industry)
Talk to Kevin Smith – vice chancellor for research
-
Application Security
-
ST: Internet, fooling sniffers, traffic analysis, real-time virus checking,
cryptographic file system or constantly defragmenting files in the background
-
Encryption engine on hard drive
-
ST: Web browsers
-
Look at policy, tracking and description of web sites
-
Can do anomaly detection to determine if user is using/accessing inappropriate
sites
-
Look at worker’s job description to determine if accessing inappropriate
sites
-
Block inappropriate websites
-
Browse sites through a free internet "nanny"
-
Watch server and see if people can get to sites that they shouldn’t be
able to get to
-
Log in with someone else’s password
-
Next Meeting
-
Jim Hoagland to present his paper on a policy language
-
Invite Prem, Michael Gertz, Christina Chung to next meeting