Category

Criticality

Difficulty

Time Scale for R&D for Significant Progress and Deployment

Language technologies

High

Difficult

1-4 years

Image and video processing

High

Difficult

5-9 years

Evidence combination

Medium

Difficult

1-4 years

Privacy and Confidentiality

High

Difficult

1-4 years

Planning for the Future

Medium

Difficult

10+ years

likely. Software flaws, lax procedures for creating and guarding passwords, compromised insiders, and nonsecure entry points all lead to the conclusion that watertight perimeters cannot be assumed. Nevertheless, strengthening defensive perimeters is helpful, and this section deals with methodologies (those of today and tomorrow) that can detect or confine an intruder and, if necessary, aid in recovery from attack by taking corrective action. (Box 5.2 describes some of the fundamental principles of defensive strategy.) The technology discussed here, as in other parts of this IT chapter, is applicable both to cyberterrorism and cybercrime. In addition, many advances in information and network security can improve computer systems’ inherent reliability and availability, which are perennial concerns even under ordinary, nonthreat conditions. Such dual-use capability could help generate broader interest in research and development on defensive technology, as well as motivate its incorporation into industry products.

Research to minimize the damage caused by a cyberattack can be grouped in three generic areas: detection and identification, containment, and recovery.

Authentication, Detection, and Identification

Given that an intruder may gain access to a conventional system or, with significantly more effort, a highly secure system, what technology can be deployed to detect and identify the intruder? Similarly, how do we detect a denial-of-service attack and track its originator?17

Detection of an intruder or a denial-of-service attack is more difficult than it

17  

CSTB (1999c), pp. 144-152; CSTB (1999b). A denial-of-service attack is one in which a target is flooded with a huge number of requests for service, thus keeping it busy servicing these (bogus) requests and unable to service legitimate ones.



The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement