Risk
1/14/2011
03:07 PM
50%
50%

DHS Invests $16M In Cybersecurity Testbed

The DETECT project will make improvements over the next five years to the Information Sciences Institute's DETERLab at the University of Southern California.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters

The Department of Homeland Security (DHS) will invest 16 million over the next five years to expand a cybersecurity testbed at the University of Southern California (USC).

The new project, DETECT, will make improvements to USC's Information Sciences Institute's existing DETERlab, which provides an isolated 400-node mini-Internet hosted by USC and the University of California Berkeley that security researchers use to simulate the real Internet.

DETERlab is based upon a mesh of clusters of experimental nodes, each one based on the University of Utah's Emulab hardware and software, according to a white paper on the design of the testbed published online. In addition to support from the DHS, the National Science Foundation also provides funding for DETERlab.

Researchers from around the world use the testbed as a safe, controlled environment to investigate malware and other security threats without danger of infecting the actual Internet. DETERLab also is used in computer-security classroom exercises for 400 students in 10 universities and colleges.

DETECT will expand the capability of DETERlab through the development and support of new methodologies and tools for advanced cyber security research, experimentation and testing, according to USC.

DETECT also will aim to foster a cyber research community by helping other cybersecurity research sites use the DETERlab software system, according to USC. Ultimately, the plan for the project is to create an interconnected cybersecurity testbed system that can be accessed and use across academic institutions, industries, and government agencies.

Some of that community outreach has already begun. In November, the Cyber Security and Information Assurance (CSIA) Interagency Networking and Information Technology Research and Development (NITRD) working group- a collaboration of more than a dozen federal research and development agencies -- endorsed the DETER cyber science framework.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0547
Published: 2015-07-04
The D2CenterstageService.getComments service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-0548
Published: 2015-07-04
The D2DownloadService.getDownloadUrls service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-4196
Published: 2015-07-04
Platform Software before 4.4.5 in Cisco Unified Communications Domain Manager (CDM) 8.x has a hardcoded password for a privileged account, which allows remote attackers to obtain root access by leveraging knowledge of this password and entering it in an SSH session, aka Bug ID CSCuq45546.

CVE-2015-4525
Published: 2015-07-04
The log-gather implementation in the web administration interface in EMC Isilon OneFS 6.5.x.x through 7.1.1.x before 7.1.1.5 and 7.2.0.x before 7.2.0.2 allows remote authenticated users to execute arbitrary commands with root privileges via unspecified vectors.

CVE-2015-4231
Published: 2015-07-03
The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report