At the forefront of cyber security research

Aug 12, 2011 By Suzanna Schmeelk
DETER testbed server bank. Credit: DETER Testbed

Suzanna Schmeelk works at the forefront of cyber security research. In her role as both Berkeley R&D Engineer and a member of the Team for Research in Ubiquitous Secure Technology (TRUST), she examines critical cyber security issues.

TRUST is a university and industry consortium that's focused on cyber issues and it significantly impacts computer technologies around the globe. Specifically, TRUST examines cyber related to health care, national infrastructures, law and other issues facing the general public.

"TRUST is an international flagship program that explores a multitude of cyber security aspects that will directly impact the future of the United States--and the planet at large," Schmeelk said. "My role has been to design and test cyber security tools and mentor students as they learn about cyber security issues."

TRUST testing

Many cyber security issues can be recreated and researched on a test bed. The cyber-Defense Technology Experimental Research (DETER) test bed was developed to conduct repeatable experiments in computer security and it is also used for components of TRUST-related research. Co-located at the Information Science Institute at the University of Southern California and the University of California at Berkeley, the test bed provides a safe venue to explore cyber security vulnerabilities since it is isolated from the outside internet.

The is useful for exploring aspects of traditional information security, including integrity, availability and confidentiality. Availability assures that users can access information without interference or obstruction and in a usable format. Confidentiality assures that information can only be accessed by humans with sufficient privileges and adequate motivations. Integrity is the state of information being whole, complete and uncorrupted.

Cyber security research uses various combinations of theory, simulation and emulation-based experimentations. Theoretical research examines security threats through purely formal mathematical models. Simulation research traditionally studies an abstract system model. Emulation research examines actual system scenarios where a full-blown realistic system is constructed to duplicate the system under study. The research techniques can be blended to examine theoretical and/or realistic scenarios. After such an experiment is created, it can be executed on DETER to obtain repeatable results.

Gaining TRUST

"The best parts of my personal TRUST experience have been working with the brilliant individuals associated with TRUST coupled with the avant-garde and dynamic nature of the investigated issues and solutions," said Schmeelk.

Schmeelk explained that TRUST also sponsors the TRUST Academy Online, a web-based portal providing cyber security teaching and learning resources to interested faculty and researchers. Resources include literature, presentations, videos, sample code and open courseware to help facility cyber security understanding. The academy also offers courseware in information security, network security, trustworthy systems and social sciences.

For undergraduates interested in TRUST, the TRUST Research Experiences for Undergraduates (TRUST-REU) provides excellent summer research opportunities and a great introduction to research led by world class experts.

Explore further: Engineering students create real-time 3-D radar system

Related Stories

Baker College wins cyber defense contest

Apr 24, 2008

Baker College of Flint, Mich., Texas A&M University and the University of Louisville have won top honors in the National Collegiate Cyber Defense Competition.

NATO plans force to respond to cyber attacks

Jun 08, 2011

NATO wants to beef up its cyber defence capabilities with the creation of a special task force to detect and respond to Internet attacks, an alliance expert said Wednesday at a conference on cyber security ...

'New arms race' taking shape in cyberspace: Van Loan

May 27, 2009

A "new arms race" is taking shape in cyberspace, Canada's security czar said Wednesday, lamenting ever bolder and more sophisticated attacks on government websites by Russia, China and others.

Recommended for you

Engineering students create real-time 3-D radar system

2 hours ago

Spencer Kent stands nervously in front of Team D.R.A.D.I.S.' booth at Rice University's annual Engineering Design Showcase. Judging begins in about 10 minutes, and his teammate Galen Schmidt is frantically ...

New research to realise the sensor 'pipe dream'

9 hours ago

Three new research projects funded by Australia's energy pipeline industry have been initiated at Deakin University. The projects aim to develop a world-first pipeline health monitoring system that will be ...

Economical and effective security design

11 hours ago

Operators of infrastructures such as power grids and airports are expected to ensure a high level of security – but their financial means are limited. Fraunhofer researchers have developed an analysis tool ...

Ten-engine electric plane prototype takes off

11 hours ago

A team at NASA's Langley Research Center is developing a concept of a battery-powered plane that has 10 engines and can take off like a helicopter and fly efficiently like an aircraft. The prototype, called ...

FAA's Airworthiness Directive issued to avoid power loss

May 02, 2015

A fix for a software problem that could possibly result in power loss in Boeing 787s has been ordered. Federal Aviation Administration officials adopted a new airworthiness directive (AD), effective as of ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.