Perimeter
5/10/2011
11:44 AM
Commentary
Commentary
Commentary
50%
50%

A National Monitoring Infrastructure

It's theoretically possible, but who could orchestrate such a huge collaborative endeavor, and would it be possible to bring both private and public data under government oversight?

I recently had the opportunity to read Edward G. Amoroso’s book, entitled ""Cyber Attacks: Protecting National Infrastructure"," about the concept of a national-level infrastructure for the collection, correlation, monitoring (which he calls awareness) of, and response to cybersecurity incidents. As I read the four chapters, I found myself doing a little correlation of my own and drew several parallels to the Enterprise Security Information Management (ESIM) sector.

What Amoroso is describing is essentially a "master ESIM infrastructure" -- taking feeds from both public- and private-sector entities with the goal of centralizing data from the citizenry, business community, and government for the purpose of large-scale trending and worm detection. The idea sounds like a good one, but I have serious doubts about the ability to manage an infrastructure of such monstrous scale.

Although an effort of this design would be useful, it is very unlikely that a nation’s citizenry would trust the government enough to allow for the collection of data from its personally owned technology products. Enterprise customers have their own problems to worry about at a macro level without even considering participating at a super-macro-level for a national monitoring infrastructure. Compliance mandates, impending audits, and organizational security concerns will almost certainly trump national defense -- especially since many organizations consider the defense of the nation to be the problem of the elected government.

If the national-level collection infrastructure were limited to a cybersecurity mandate, however, military branches, in addition to government and intelligence agencies, could wield a national ESIM to better defend their interests. Once implemented, this national ESIM could expand to encompass public utilities and the military industrial base of defense contractors and SIs with which it partners to further national interest. Really, any organization or vendor with ties to government’s defense could be directed to submit to a national ESIM mandate in the best interest of the country’s defense. A major obstacle to hurdle is that many departments, divisions, and federal entities rely on their own ESIM deployments to manage the cybersecurity concerns within their own small spheres of control.

Unfortunately, not all of these deployed products are capable of promiscuously interoperating with one another -- many contain proprietary data stores and formats with no common interface for data sharing. Technical issues aside, the political power plays around information sharing among government entities has never been an easy bridge to cross. Each organization really cares only for its own sphere of control, and sees the request for information from external agencies as an invasion of their sovereign fiefdom.

Perhaps the only way that a national ESIM infrastructure could work is if such an endeavor were mandated by the government and its purview assigned to a coordinating body, such as the Department of Homeland Security (DHS) -- a thought that would make those already concerned with the power wielded by the agency exponentially more nervous. Unfortunately, one organization would need to coordinate everything, and DHS might be the only agency that could wrangle the disparate pieces of government into submitting to such a plan. Even with DHS in charge, I wouldn’t anticipate a massive rip-and-replace of existing ESIM products, but the agency could dictate that vendors share information between one another or risk being replaced.

Andrew Hay is senior analyst with The 451 Group's Enterprise Security Practice and the author of three network security books. Follow him on Twitter: http://twitter.com/andrewsmhay.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3407
Published: 2014-11-27
The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) and earlier does not properly allocate memory blocks during HTTP packet handling, which allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCuq68888.

CVE-2014-4829
Published: 2014-11-27
Cross-site request forgery (CSRF) vulnerability in IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allows remote attackers to hijack the authentication of arbitrary users for requests tha...

CVE-2014-4831
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to hijack sessions via unspecified vectors.

CVE-2014-4832
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to obtain sensitive cookie information by sniffing the network during an HTTP session.

CVE-2014-4883
Published: 2014-11-27
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?