NSF Industry/University Cooperative Research (I/UCRC) Program The Center for Cloud and Autonomic Computing: Vision and Capabilities Salim Hariri, Director NSF Center for Cloud and Autonomic Computing The University of Arizona nsfcac.arizona.edu email: hariri@ece.arizona.edu (520) 977-7954
NSF IUCRC in US
National Science Foundation NSF’s Vision - NSF’s vision is a nation that creates and exploits new concepts in science and engineering and provides global leadership in research and education ~$7.5B Budget • 220+ Nobel Laureates supported • Overall: ~362,000 researchers, • postdoctoral fellows, trainees, teachers, and students supported ~400 startups/small businesses funded • each year
NSF Funded Centers – A key investment STC : Science and Technology Centers MRSEC : Materials Research Science and Engineering Centers CCI : Centers for Chemical Innovation ERC : Engineering Research Centers IUCRC : Industry/University Cooperative Research Centers Basic Applied Research Use-inspired MRSEC ERC STC IUCRC CCI 1973 1987 1985 1994, ‘98
What is an IUCRC? • A Partnership: A mechanism to enable industrially-relevant, pre-competitive research via a sustained partnership among industry , universities , and government . • Centers bring together (1) IUCRC Sites (Academic Institutions) • Faculty and students from different academic institutions (2) IUCRC Industry Members • Companies, State/Federal/Local government, and non-profits • Focus – Perform cutting-edge pre-competitive fundamental research in science, engineering, technology area(s) of interest to industry and that can drive innovation and the U.S. economy. – Members guide the direction of Center research through active involvement and mentoring.
75+ IUCRC Centers 225 University sites, 876 Industry members Broad Research Themes Advanced Electronics and Photonics (7 centers) Advanced Manufacturing 6 Advanced Materials 11 Biotechnology 6 Civil Infrastructure Systems 1 Energy and Environment 12 Health and Safety 6 IT, Communication, and Computing 24 (CAC) System Design and Simulation 3 *Data from 2015
75+ IUCRC Centers and Growing! 6 International Sites Belgium, Finland, Germany, Russia, India (2) Now 7 with CAC@Mexico NSF Funding • ~$20.6M in Program Funding • ~ 4:1 Leveraging of NSF funds Members ~ 875 unique industry members involved (17 on Average per Center) ~ 42:1 leveraging of member funds Students nearly 30% of graduates are hired by members on an annual basis) Senior Research Investigators Close to 1100 senior research investigators involved (~17 on average involved per center) *Data from 2015
Goals of the Center A Multidisciplinary Center of Excellence in Cloud and Autonomic Computing Research fostering collaborative partnerships among – Industry, Academe and Government To discover, share and leverage synergies of concepts, technologies and resources needed by industry-relevant autonomic computing research To educate a diverse body of students on the interdisciplinary field of cloud and autonomic computing To accelerate the creation and transfer of knowledge and technology for cloud and autonomic computing and commercial products To support startup companies developing new cloud and autonomic computing technologies and services 8
Benefits of Membership Collaboration with faculty, graduate students, post-doctoral researchers and other Center partners. Choice of project topics to be funded by members’ own contributions Formal periodic project reviews along with continuous informal interaction and timely access to reports, papers and intellectual property generated by the Center Access to unique world-class equipment, facilities and other CAC Infrastructure Recruitment opportunities among excellent graduate students Leveraging of investments, projects and activities by all CAC members Professional networking with new customers or partners for competitive funding opportunities 9
On Going UA CAC Projects • Autonomic Cyber Security (ACS) • Tactical Cyber Immune System (TCIS) • Autonomic Monitoring, Analysis and Protection (AMAP) Anomaly based Detection of Attacks on Wireless Ad Hoc Networks • • Resilient Cloud Services • Hacker Web: Securing Cyber Space: Understanding the Cyber Attackers and Attacks via Social Media Analytics • IoT Security Framework • Big Data Analytics • Big Data Cybersecurity • Heart Modeling, Analysis, Diagnosis and Prediction • High Performance Distributed Computing and Applications • Just-In-Time Architecture (JITA) for Composable High Performance Data Centers • Heart Cyber Expert System (HeartCyPert) • Well Data Analytics and Protection (WDAP) • Hurricane Continuous Modeling and Simulation Environment
Suggested Projects for CAC@Mexico • Autonomic Management of IT Mining Resources and Applications • Dynamic resource allocation and provision to improve performance, reduce cost, and increase security • Resilient IT Services • Modeling and Analysis of IoT Resources and Applications • IoT Threat Modeling, Analysis and Protection • High Performance Parallel and Distributed Computing • Big Data Analytics • Big Data Cybersecurity
UA TESTBEDS
CAC Cybersecurity Test-beds Industrial Process Control Test-bed Private Cloud Smart Building GPU Cluster !
ACL Smart Devices Testbed Raspberry PI, Microduino and Arduino ZigBee, WiFi, blue tooth, Ethernet Modbus, DNP3, Backnet NI Grid
Smart Car Testbed • An Arduino and Raspberry Pi based testbed. • Onboard camera that allows video streaming to the controller. • Onboard proximity sensor that is used for collision avoidance. • Car controlled using Wi-Fi network. • Attacks have been developed that cause the controller to loose control of the car and cause a car crash
UA AUTONOMIC CYBER SECURITY (ACS) METHODOLOGY
Autonomic Cyber Security (ACS) Analogous to Human autonomic nervous system ACS continuously monitors, analyzes, and diagnoses the user-cyber behavior and then takes proactive actions
IoT Threat Modeling Framework UA Researchers: Salim Hariri and Ali Akoglu UNISON Researchers: Jesus Horacio Pacheco-Ramirez and Victor Hugo Benitez Baltazar Appli- Applications Attack Impact Mitigation Priority cations Model Surface Services Attack Services Impact Mitigation Priority Model Surface Communi- Communica- Attack Impact Mitigation Priority cations tions Model Surface End End Devices Attack Impact Mitigation Priority Devices Model Surface
Intelligent Cybersecurity Assistant Architecture Detect Cyber Identify Infrastructure Anomaly Behavior Analysis Continuous Monitoring Resource Resource (ABA) Resource Footprint and Filtering Data Data Footprint Data Application Application Application s Footprint User Cyber Users User Footprint External External Data External Data Footprint Intelligent Recommender Protect Recommender Context Learned Response Prediction from Analytics Aware Models Learned Model Recover Recommendation and Hypothesis Evidence Analysis Confidence and Scoring Generation
Cybersecurity Operation Process App produces an alert based on a Alert Analysis Process Monitoring policy violation 3 Analyzes alert and 2 Infrastructure conditions based on 1 Alert Generated Context and Domain App 1 Knowledge 4 Alerts f(1) Priority f(1) Determines if alert is Resp Dept f(1) Access f(1) normal or abnormal Alert Generated Data App 2 Aggregate 5 and Determines course of Alert Generated Correlator action App 3 App Cybersecurity Alert Generated 6 Analyst App 4 Applies course of action Alert Generated App n 7 Verifies if course of action mitigated the conditions
What is the Internet of Things? If we put every things on the internet, and get them connected, we end up with what we call “the Internet of Things” (IoT) or Internet of Everything (IoE)
IoTs Applications Management Education Retail IoT Applications Food Logistics Pharmaceuticals http://www.youtube.com/watch?v=nDBup8KLEtk
The Rising Problem/Opportunity - 1 • Smart devices are proliferating with the promise to make human lives better. Everything from smart wearables, phones, watches to shoes, glasses and many other accessories. • The machines are monitoring almost every aspect of our lives. Problems arise because these technologies use proprietary underlying infrastructure that enforces brand controls. • Security in all these devices are after thought, never was one a primary design issue
The Rising Problem/Opportunity – Smart Cities Smart Government Smart Smart Healthcare Homes Command/Control Smart Smart Center Building Grid Smart Smart Auto Services Technology Data Smart Critical Infrastructure Command
Smart Infrastructures Smart Smart Management Human Smart Smart Govern- Health- ment care Smart Smart Social Homes Programs Runtime Command & Control Center Smart Smart Industry Energy Smart Smart Trans- Water portation Data / Command Smart Critical Infrastructure
Smart Power Grid
Autonomic Management of IT Mine Resources • UA Researchers: Salim Hariri, Greg Ditzler and Cihan Tunc • UNISON Researchers: Jesus Pacheco, Victor Benitez, Gerardo Sanchez and Luis Velazquez
Digital Patient DPA Assistant (DPA) Patient 1 Portal DPA DPA Management Services Patient 2 DPA Patient n Person C
Recommend
More recommend