20 years of network and distributed systems security: the ... · 20 years of network and...

73
20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 February, 25,2013 Richard A. Kemmerer Computer Security Group Department of Computer Science University of California, Santa Barbara http://seclab.cs.ucsb.edu

Upload: others

Post on 24-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

20 Years of Network and Distributed Systems Security:

the Good, the Bad, and the Ugly

NDSS13                                                                                                            February,    25,2013  

Richard A. Kemmerer

Computer Security Group

Department of Computer Science

University of California, Santa Barbara

http://seclab.cs.ucsb.edu

Page 2: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Why  me?  

•  My  first  NDSS  was  2006  •  First  distributed  system  work  1967  

2

Page 3: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Distributed  in  the  Midwest  

Page 4: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Secure  Transport  Service  

Page 5: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Minute  III  ICBM  

Page 6: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&
Page 7: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

1970  Moved  to  UCLA  

7  

Page 8: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

SimulaNons  for  Arpanet  Protocols  

•  Packet  switching  •  Packet  switching  with  cut-­‐through  •  Aloha  (pure  and  sloTed)  •  Carrier  sense  mulNple  access  (CSMA)  

•  Packet  radio  

Page 9: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

HazelNne  portable  packet  radio  

•  This  mobile  field  radio  for  the  military  used  ARPA’s  pioneering  packet  radio  network.  Each  unit  created  a  new  node  that  extended  the  network.  

Page 10: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&
Page 11: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

SRI  truck  for  portable  packet  radio  experiments  

Page 12: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

VicNm  of  DEC  Spam  of  1978  

•  Sent  by  aggressive  DEC  marketer  to  every  Arpanet  address  on  the  west  coast  

•  Sent  from  SNDMSG  

•  Limited  space  for  To,  CC,  and  Subject  fields  

•  Manually  entered  addresses  starNng  in  the  Subject,  which  overflowed  into  the  To  header,  which  overflowed  into  the  CC  header,  which  overflowed  into  the  Body,  because  would  only  accept  320  addresses    

Page 13: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Header  Mail-­‐from:  DEC-­‐MARLBORO  rcvd  at  3-­‐May-­‐78  0955-­‐PDT  Date:    1  May  1978  1233-­‐EDT  From:  THUERK  at  DEC-­‐MARLBORO  Subject:  ADRIAN@SRI-­‐KL  To:      DDAY  at  SRI-­‐KL,  DAY  at  SRI-­‐KL,  DEBOER  at  UCLA-­‐CCN,  To:      WASHDC  at  SRI-­‐KL,  LOGICON  at  USC-­‐ISI,  SDAC  at  USC-­‐ISI,  To:      DELDO  at  USC-­‐ISI,  DELEOT  at  USC-­‐ISI,  DELFINO  at  USC-­‐ISI,  To:      DENICOFF  at  USC-­‐ISI,  DESPAIN  at  USC-­‐ISI,  DEUTSCH  at  SRI-­‐KL,  To:      DEUTSCH  at  PARC-­‐MAXC,  EMY  at  CCA-­‐TENEX,  DIETER  at  USC-­‐ISIB,  To:      DINES  at  AMES-­‐67,  MERADCON  at  SRI-­‐KL,  EPG-­‐SPEC  at  SRI-­‐KA,  To:      DIVELY  at  SRI-­‐KL,  DODD  at  USC-­‐ISI,  DONCHIN  at  USC-­‐ISIC,  To:      JED  at  LLL-­‐COMP,  DORIN  at  CCA-­‐TENEX,  NYU  at  SRI-­‐KA,  To:      DOUGHERTY  at  USC-­‐ISI,  PACOMJ6  at  USC-­‐ISI,  To:      DEBBY  at  UCLA-­‐SECURITY,  BELL  at  SRI-­‐KL,  JHANNON  at  SRI-­‐KA,  To:      DUBOIS  at  USC-­‐ISI,  DUDA  at  SRI-­‐KL,  POH  at  USC-­‐ISI,  To:      LES  at  SU-­‐AI,  EAST  at  BBN-­‐TENEX,  DEASTMAN  at  USC-­‐ECL,  To:      EBISU  at  I4-­‐TENEX,  NAC  at  USC-­‐ISIE,  ECONOMIDIS  at  I4-­‐TENEX,  To:      WALSH  at  SRI-­‐KL,  GEDWARDS  at  SRI-­‐KL,  WEDWARDS  at  USC-­‐ISI,  To:      NUSC  at  SRI-­‐KL,  RM  at  SU-­‐AI,  ELKIND  at  PARC-­‐MAXC,  

Page 14: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Me  To:      KALTGRAD  at  UCLA-­‐ATS,  MARK  at  UCLA-­‐SECURITY,  RAK  at  SU-­‐AI,  To:      KASTNER  at  USC-­‐ISIB,  KATT  at  USC-­‐ISIB,  To:      UCLA-­‐MNC  at  USC-­‐ISI,  ALAN  at  PARC-­‐MAXC,  KEENAN  at  USC-­‐ISI,  To:      KEHL  at  UCLA-­‐CCN,  KELLEY  at  SRI-­‐KL,  BANANA  at  I4-­‐TENEX,  To:      KELLOGG  at  USC-­‐ISI,  DDI  at  USC-­‐ISI,  KEMERY  at  SRI-­‐KL,  To:      KEMMERER  at  UCLA-­‐ATS,  PARVIZ  at  UCLA-­‐ATS,  KING  at  SUMEX-­‐AIM,  To:      KIRSTEIN  at  USC-­‐ISI,  SDC  at  UCLA-­‐SECURITY,  To:      KLEINROCK  at  USC-­‐ISI,  KLEMBA  at  SRI-­‐KL,  CSK  at  USC-­‐ISI,  To:      KNIGHT  at  SRI-­‐KL,  KNOX  at  USC-­‐ISI,  KODA  at  USC-­‐ISIB,  To:      KODANI  at  AMES-­‐67,  KOOIJ  at  USC-­‐ISI,  KREMERS  at  SRI-­‐KL,  To:      BELL  at  SRI-­‐KL,  KUNZELMAN  at  SRI-­‐KL,  PROJX  at  SRI-­‐KL,  To:      LAMPSON  at  PARC-­‐MAXC,  SDL  at  RAND-­‐UNIX,  JOJO  at  SRI-­‐KL,  To:      SDC  at  USC-­‐ISI,  NELC3030  at  USC-­‐ISI,  To:      LEDERBERG  at  SUMEX-­‐AIM,  LEDUC  at  SRI-­‐KL,  JSLEE  at  USC-­‐ECL,  To:      JACOBS  at  USC-­‐ISIE,  WREN  at  USC-­‐ISIB,  LEMONS  at  USC-­‐ISIB,  To:      LEUNG  at  SRI-­‐KL,  J33PAC  at  USC-­‐ISI,  LEVIN  at  USC-­‐ISIB,  To:      LEVINTHAL  at  SUMEX-­‐AIM,  LICHTENBERGER  at  I4-­‐TENEX,  To:      LICHTENSTEIN  at  USC-­‐ISI,  LIDDLE  at  PARC-­‐MAXC,  To:      LIEB  at  USC-­‐ISIB,  LIEBERMAN  at  SRI-­‐KL,  STANL  at  USC-­‐ISIE,  

Page 15: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Overflow  into  CC  and  Body  To:      MASON  at  USC-­‐ISIB,  MATHIS  at  SRI-­‐KL,  MAYNARD  at  USC-­‐ISIC,  To:      MCBREARTY  at  SRI-­‐KL,  MCCALL  at  SRI-­‐KA,  MCCARTHY  at  SU-­‐AI,  To:      MCCLELLAND  at  USC-­‐ISI,  DORIS  at  RAND-­‐UNIX,  MCCLURG  at  SRI-­‐KL,  To:      JOHN  at  I4-­‐TENEX,  MCCREIGHT  at  PARC-­‐MAXC,  MCCRUMB  at  USC-­‐ISI,  To:      DRXTE  at  SRI-­‐KA  cc:      BPM  at  SU-­‐AI  

MCKINLEY@USC-­‐ISIB  MMCM@SRI-­‐KL  OT-­‐ITS@SRI-­‐KA  BELL@SRI-­‐KL  MEADE@SRI-­‐KL  MARTIN@USC-­‐ISI  MERRILL@BBN-­‐TENEX  METCALFE@PARC-­‐MAXC  JMETZGER@USC-­‐ISIB  MICHAEL@USC-­‐ISIC  CMILLER@SUMEX-­‐AIM  

Page 16: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

ZOLOTOW@SRI-­‐KL  ZOSEL@LLL-­‐COMP  DIGITAL  WILL  BE  GIVING  A  PRODUCT  PRESENTATION  OF  THE  NEWEST  MEMBERS  OF  THE  DECSYSTEM-­‐20  FAMILY;  THE  DECSYSTEM-­‐2020,  2020T,  2060,  AND  2060T.    THE  DECSYSTEM-­‐20  FAMILY  OF  COMPUTERS  HAS  EVOLVED  FROM  THE  TENEX  OPERATING  SYSTEM  AND  THE  DECSYSTEM-­‐10  <PDP-­‐10>  COMPUTER  ARCHITECTURE.    BOTH  THE  DECSYSTEM-­‐2060T  AND  2020T  OFFER  FULL  ARPANET  SUPPORT  UNDER  THE  TOPS-­‐20  OPERATING  SYSTEM.  THE  DECSYSTEM-­‐2060  IS  AN  UPWARD  EXTENSION  OF  THE  CURRENT  DECSYSTEM  2040  AND  2050  FAMILY.  THE  DECSYSTEM-­‐2020  IS  A  NEW  LOW  END  MEMBER  OF  THE  DECSYSTEM-­‐20  FAMILY  AND  FULLY  SOFTWARE  COMPATIBLE  WITH  ALL  OF  THE  OTHER  DECSYSTEM-­‐20  MODELS.  

WE  INVITE  YOU  TO  COME  SEE  THE  2020  AND  HEAR  ABOUT  THE  DECSYSTEM-­‐20  FAMILY  AT  THE  TWO  PRODUCT  PRESENTATIONS  WE  WILL  BE  GIVING  IN  CALIFORNIA  THIS  MONTH.    THE  LOCATIONS  WILL  BE:  

                             TUESDAY,  MAY  9,  1978  -­‐  2  PM                                        HYATT  HOUSE  (NEAR  THE  L.A.  AIRPORT)                                        LOS  ANGELES,  CA  

                             THURSDAY,  MAY  11,  1978  -­‐  2  PM                                        DUNFEY'S  ROYAL  COACH                                        SAN  MATEO,  CA  

Page 17: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Methodology  that  I  used  

•  Read  all  of  the  abstracts  for  all  of  the  papers  in  the  previous  20  years  of  NDSS  

•  Sent  a  quesNonnaire  to  some  of  the  key  players  in  the  network  and  distributed  systems  security  and  those  who  were  involved  in  NDSS  from  the  early  days  to  get  their  views  on  how  the  area  has  changed  over  the  past  20  years  and  what  the  future  looks  like  –  75%  response  rate  

•  What  I  present  today  is  my  personal  opinion  and  not  necessarily  the  view  of  the  University  of  California  nor  the  CIA  

Page 18: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Thanks  to  David  Balenson  Davide  Balzaro/  Tom  Berson  Ma3  Bishop  Dan  Boneh  David  Brumley  David  Evans  Virgil  Gligor  Tom    Hu3on  Steve  Kent  Angelos  KeromyAs  Engin  Kirda  Christopher  Kruegel  Wenke  Lee  Patrick  McDaniel  Dan  Nesse3  

Clifford  Neuman  Hilarie  Orman  Adrian  Perrig  Phil  Porras  Mike  Reiter  William  Robertson  Avi  Rubin  Richard  Schroeppel  Radu  Sion  Sal  Stolfo  Dawn  Song  Gene  Tsudik  Paul  Van  Oorschot  Giovanni  Vigna  Dan  Wallach  Brent  Waters  

Page 19: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Who  is  this  man?  

Dan  NesseT  

Page 20: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Privacy  and  Security  Research  Group  (PSRG)  

•  Subgroup  of  the  Internet  Research  Task  Force  •  Became  the  Program  CommiTee  for  1993  NDSS  Workshop  –  David  Balenson  –  MaT  Bishop  –  Russell  Housley  –  Steve  Kent  –  John  Lin  –  Dan  NesseT  –  Clifford  Neuman  –  Mike  Padlipsky  –  Jeff  Schiller  –  Robert  Shirey  

Page 21: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Original  Call  for  Papers  

•  Mostly  by  email  

•  July  issue  of  Computer  CommunicaNons  review  

“The  goal  of  this  workshop  is  to  bring  together  individuals  who  have  built,  are  building,  or  will  soon  build  so@ware  and  hardware  concerned  with  the  provision  of  network  or  distributed  system  security  services  .  It  is  intended  to  be  a  forum  for  those  interested  mainly  in  pracBcal  aspects  of  network  and  distributed  system  security,  rather  than  in  theory”  

Page 22: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

11  papers  in  1993    

•  Very  pracNce  oriented  •  3  papers  on  PEM  

•  1  for  Unix,  1  for  VMS,  1  on  protecNng  the  integrity  of  PEM  

•  2  papers  discussed  large  real  networks  •  NREN  and  IT2000  

•  1  distributed  PKM  (discussed  PEM),  1  secure  distributed  voNng,  1  distributed  electronic  document  authorizaNon  (Workflow.2000)  

•  3  distributed  system  security  –  pracNcal  access  control,  rights  delegaNon,  and  secure  file  sharing  (this  one  used  PEM)  

Page 23: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

15  papers  in  1994  

•  Main  areas  of  concern  were  authenNcaNon,  secure/private  email,  secure  transport,  and  connecNng  to  external(untrusted)  networks  

•  7  papers  on  authenNcaNon  •  3  secure/private  email  •  3  Kerberos  •  2  firewall  •  Lots  of  cryptography,  cerNficates,  and  digital  signatures  •  Surprisingly  

•  3  talked  about  dial-­‐up/telephone  connecNons  or  modems  •  2  zero-­‐knowledge  proofs  

Page 24: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  10  menNon  PEM,  CEM,  or  PGP  in  the  abstract  

0%  

5%  

10%  

15%  

20%  

25%  

30%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

PEM,CEM,  or  PGP  

Page 25: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  10  menNon  PEM,  CEM,  or  PGP  in  the  abstract  

•  51  menNon  Privacy  

0%  

10%  

20%  

30%  

40%  

50%  

60%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

PEM  or  PGP  

Privacy  

Page 26: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  70  menNon  AuthenNcaNon  in  the  abstract  

0%  

10%  

20%  

30%  

40%  

50%  

60%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

AuthenNcaNon  

Page 27: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  70  menNon  AuthenNcaNon  in  the  abstract  

•  21  menNon  AuthorizaNon  

0%  

10%  

20%  

30%  

40%  

50%  

60%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

AuthenNcaNon  

AuthorizaNon  

Page 28: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  12  menNon  Kerberos  in  the  abstract  

0%  

5%  

10%  

15%  

20%  

25%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

Kerberos  

Page 29: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  12  menNon  Kerberos  in  the  abstract  

•  75  menNon  Crypto  

0%  

5%  

10%  

15%  

20%  

25%  

30%  

35%  

40%  

45%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

Crypto  

Page 30: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  29  menNon  Signatures  in  the  abstract  

0%  

5%  

10%  

15%  

20%  

25%  

30%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

Signatures  

Page 31: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  25  menNon  CerNficates  in  the  abstract  

0%  

5%  

10%  

15%  

20%  

25%  

30%  

35%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

CerNficates  

Page 32: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  25  menNon  Firewalls  in  the  abstract  

0%  

5%  

10%  

15%  

20%  

25%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

Firewalls  

Page 33: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

More  Trends  

•  Protocols  have  always  been  a  popular  topic  –  rouNng,  encrypNon,  authorizaNon,  authenNcaNon,  etc.  

– 60%  of  the  papers  discussed  protocols  in  1997  

Page 34: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  96  menNon  Protocols  in  the  abstract  

0%  

10%  

20%  

30%  

40%  

50%  

60%  

70%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

Protocols  

Page 35: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

More  Trends  

•  Intrusion  DetecNon  Systems  (IDS)    – first  appeared  in  1995  and  they  were  more  like  network  monitors  

– peaked  in  2005    – soon  aser  it  became  unfashionable  

Page 36: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  14  menNon  Intrusion  DetecNon  in  the  abstract  

0%  

2%  

4%  

6%  

8%  

10%  

12%  

14%  

16%  

18%  

20%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

Intrusion  DetecNon  

Page 37: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  14  menNon  Intrusion  DetecNon  in  the  abstract  

•  50  menNon  DetecNon  

0%  

5%  

10%  

15%  

20%  

25%  

30%  

35%  

40%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

Intrusion  DetecNon  

DetecNon  

Page 38: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

More  Trends  

•  ATack  papers  really  started  to  dominate  in  1998  – 5  of  12  papers  explicitly  presented  a  new  aTack  

•  Denial-­‐of-­‐Service  papers  started  in  1999  •  Spam  in  2003  

•  Malware  in  2006  

•  Phishing  in  2007  •  SNll  conNnues  today  

Page 39: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  149  menNon  ATacks  in  the  abstract  

0%  

10%  

20%  

30%  

40%  

50%  

60%  

70%  

80%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

ATacks  

Page 40: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  149  menNon  ATacks  in  the  abstract  

•  42  menNon  Exploits  

0%  

10%  

20%  

30%  

40%  

50%  

60%  

70%  

80%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

ATacks  

Exploit  

Page 41: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  149  menNon  ATacks  in  the  abstract  

•  42  menNon  Exploits  

0%  

10%  

20%  

30%  

40%  

50%  

60%  

70%  

80%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

ATacks  

Exploit  

ATack  or  Exploit  

Page 42: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  21  menNon  Denial-­‐of-­‐Service  in  the  abstract  

0%  

2%  

4%  

6%  

8%  

10%  

12%  

14%  

16%  

18%  

20%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

DoS  

Page 43: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  21  menNon  Denial-­‐of-­‐Service  in  the  abstract  

•  10  menNon  Spam  

0%  

2%  

4%  

6%  

8%  

10%  

12%  

14%  

16%  

18%  

20%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

DoS  

Spam  

Page 44: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  23  menNon  Malware  in  the  abstract  

Page 45: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Topics  •  359  papers  in  the  proceedings  

•  23  menNon  Malware  in  the  abstract  

•  7  menNon  Phishing  

0%  

5%  

10%  

15%  

20%  

25%  

30%  

35%  

1993   1994   1995   1996   1997   1998   1999   2000   2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012  

Malware  

Phishing  

Page 46: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Last  few  years  

•  Mobile  devices  •  Smartphones  

•  Social  networks  •  Cloud  compuNng  

•  Searchable  encrypted  data  •  LocaNon  privacy  

Page 47: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Overarching  Trend  

•  The  papers  started  becoming  more  general  around  2003  – operaNng  systems    – buffer  overflows  –  language  tools  

•  The  trend  conNnues  •  Today  NDSS  topics  are  very  similar  to  what  you  find  at  S&P,  CCS,  or  Usenix  Security  –  results  in  a  closed  publicaNon  circle  

Page 48: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

One-­‐Off  Topics  

•  2  all-­‐opNcal  network  papers  in  1998  

Page 49: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

What’s  in  a  word?  

•  Raise  your  hand  if  you  have  used  or  recognize  any  of  these  systems/technologies:  

MANIAC  BAfirewall  NERD  SNIF  RUSSEL  SESAME  Yaksha  PEMToolkit  SURF  SKEME  

PGRIP  CellCase  TESLA  TRICERT  PAMINA  SiRiUS  DOMINO  SpoofGuard  OsNa  MOVE  

DIRA  Fig  PEAPOD  RICH  GAPA  OPTWALL  Halo  PRECIP  AutoFormat  HookFinder  

BotSniffer  SybilInfer  Spectogram  RB-­‐Seeker  K-­‐Tracer  RAINBOW  IntScope  CSAR  

Page 50: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

Future  Trends  

•  Mobile  devices,  smartphones,  social  networks,  cloud  compuNng  will  conNnue  

•  More  pervasive  and  complex  systems  –  Embedded  (automobile/airplane)  systems/networks  – Ubiquitous  compuNng  

•  New  network  paradigms  –  Content-­‐centric  networking  – Named-­‐data  networking  –  Sosware-­‐defined  networking  

•  Internet  of  things  

Page 51: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

51  

QuesNons?  

Page 52: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

1993  

Page 53: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

1994  

Page 54: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

1995  

Page 55: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

1996  

Page 56: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

1997  

Page 57: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

1998  

Page 58: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

1999  

Page 59: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

2000  

Page 60: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

2001  

Page 61: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

2002  

Page 62: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

2003  

Page 63: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

2004  

Page 64: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

2005  

Page 65: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

2006  

Page 66: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

2007  

Page 67: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

2008  

Page 68: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

2009  

Page 69: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

2010  

Page 70: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

2011  

Page 71: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

2012  

Page 72: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

All  Years  (top  100  words)  

Page 73: 20 Years of Network and Distributed Systems Security: the ... · 20 Years of Network and Distributed Systems Security: the Good, the Bad, and the Ugly NDSS13 & &&&&&February,&&25,2013&

All  Years  (top  50  words)