NIS WG3 3rd meeting, April 29th
description
Transcript of NIS WG3 3rd meeting, April 29th
![Page 1: NIS WG3 3rd meeting, April 29th](https://reader036.fdocuments.net/reader036/viewer/2022081517/56816938550346895de09d1a/html5/thumbnails/1.jpg)
NIS Platform WG3 Secure ICT Research & Innovation
NIS WG3 3rd meeting, April 29th
WG3 Secure ICT Research & Innovation
![Page 2: NIS WG3 3rd meeting, April 29th](https://reader036.fdocuments.net/reader036/viewer/2022081517/56816938550346895de09d1a/html5/thumbnails/2.jpg)
NIS Platform WG3 Secure ICT Research & Innovation
NIS WG3 Meeting
Secure ICT Landscape DeliverableMari Kert, Javier Lopez
Evangelos Markatos, Bart Preneel
8 April 2014
![Page 3: NIS WG3 3rd meeting, April 29th](https://reader036.fdocuments.net/reader036/viewer/2022081517/56816938550346895de09d1a/html5/thumbnails/3.jpg)
SECURE ICT LANDSCAPE
DELIVERABLE
![Page 4: NIS WG3 3rd meeting, April 29th](https://reader036.fdocuments.net/reader036/viewer/2022081517/56816938550346895de09d1a/html5/thumbnails/4.jpg)
• Describe State of the Art• In Cyber Security
• What are the Treats? • What are the Existing Defenses for each
threat?• What are the Research Challenges? • What are the Existing Tools?
What is it?
![Page 5: NIS WG3 3rd meeting, April 29th](https://reader036.fdocuments.net/reader036/viewer/2022081517/56816938550346895de09d1a/html5/thumbnails/5.jpg)
• Created 4 Groups:• @steering• @contributors• @wg3• @stakeholders
How did we do it?
![Page 6: NIS WG3 3rd meeting, April 29th](https://reader036.fdocuments.net/reader036/viewer/2022081517/56816938550346895de09d1a/html5/thumbnails/6.jpg)
• @steering created a Table of Contents• Asked for feedback from @wg3 and
@stakeholders• In parallel,
• those who gave feedback (and wanted)• became part of @contributors
How did we do it?
![Page 7: NIS WG3 3rd meeting, April 29th](https://reader036.fdocuments.net/reader036/viewer/2022081517/56816938550346895de09d1a/html5/thumbnails/7.jpg)
Magnus Almgren, Chlamers University of TechnologyElias Athanasopoulos, FORTHHenk Birkholz, Fraunhofer SITHugh Boyes, University of WarwickHervé Debar, Télécom SudParisSotiris Ioannidis, FORTHRoy Isbell, University of Warwick Nicola Jentzsch, DIWWouter Leibbrandt, NXP SemiconductorsJoachim Posegga, University of PassauMichalis Polychronakis, Columbia UniversityVassilis Prevelakis, Technical University, BraunschweigAli Rezaki, TubitakRodrigo Roman, University of MalagaCarsten Rudolph, Fraunhofer SITBjornar Solhaug, SINTEFChristophe Sprenger, ETH ZurichTheo Tryfonas, University of BristolPaulo Verissimo, University of LisbonTim Watson, University of Warwick
Contributors
![Page 8: NIS WG3 3rd meeting, April 29th](https://reader036.fdocuments.net/reader036/viewer/2022081517/56816938550346895de09d1a/html5/thumbnails/8.jpg)
• @steering• created an “example” section
• to be used by the rest of the contributors
• assigned the sections to authors • and reviewers as well
• Text has been steadily flowing• Some is still trickling
The procedure
![Page 9: NIS WG3 3rd meeting, April 29th](https://reader036.fdocuments.net/reader036/viewer/2022081517/56816938550346895de09d1a/html5/thumbnails/9.jpg)
• Introduction • Basic Technologies• Internet of Things - Cloud• Application Domains • Conclusions
Structure
![Page 10: NIS WG3 3rd meeting, April 29th](https://reader036.fdocuments.net/reader036/viewer/2022081517/56816938550346895de09d1a/html5/thumbnails/10.jpg)
• Basic Structure of Each section:• Introduction
• What is it?• Current Status
• What has been done?• Research Challenges
• What needs to be done?• Existing Tools (if applicable)
Structure
![Page 11: NIS WG3 3rd meeting, April 29th](https://reader036.fdocuments.net/reader036/viewer/2022081517/56816938550346895de09d1a/html5/thumbnails/11.jpg)
• Quality assurance • Receive Feedback • Complete Reviews
• Address some of the Research challenges
Next Steps
![Page 12: NIS WG3 3rd meeting, April 29th](https://reader036.fdocuments.net/reader036/viewer/2022081517/56816938550346895de09d1a/html5/thumbnails/12.jpg)
• Introduction • Rule-based, Anomaly-based
• Current Status• Research Challenges
• The Changing Security Paradigm• No more perimeter security
• Speed • Whole System Image
• Not only network image• New models for attack patterns
• String matching and automata are not enough
Example Section: Intrusion Detection Systems
![Page 13: NIS WG3 3rd meeting, April 29th](https://reader036.fdocuments.net/reader036/viewer/2022081517/56816938550346895de09d1a/html5/thumbnails/13.jpg)
• Secure ICT Landscape Deliverable • Have mobilized the community • At several different levels
• @contributors, @wg3, @stakeholders
• Text flows in• Quality assurance runs in parallel
Summary