SlideShare a Scribd company logo
© 2012 Polar Star Consulting, LLC 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
Cyber Resiliency
Technology, Architecture, and Practical
Validation
This paper proposes an approach to creating pervasive cyber resiliency. It reviews key
technologies, identifies and illustrates architecture components, and proposes to use
academic infrastructure to validate cyber infrastructure.
Author: Steve Goeringer, Director and Senior Network Engineer
P a g e | 2 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
Introduction
Traditional information assurance techniques have relied on defense-in-depth and a variety of
anomaly detection techniques to identify attacks where threats are expected to achieve Cyber
Resilience. These techniques have been expensive in terms of both recurring (operational) and
non-recurring (development and capital) costs. Moreover, they have not kept pace with the rapid
development of IT infrastructure enabling critical mission environments where networks and
information resources are highly fluid and continually evolving. Moreover, current threat
mitigation and attack management techniques tend to be mission disruptive – the resources
under attack are often made unavailable until defensive mechanisms are placed. The result is
contrary to the goal – rather than achieving Cyber Resilience, the architectures supporting our
missions remain brittle to determined, sustained attacks.
Cyber Resilience needs to be redefined to include the ability for critical infrastructures to
continue to operate even while under attack and essential information to remain available to
those in need. This is possible using emerging technologies:
 Pervasive data collection from servers, clients, network elements, and application aware
sensors at line rates up to even 100Gbps.
 Strong packet manipulation capabilities at rates up to 10Gpbs that leverage deep packet
inspection to assess data flows in real-time and filter, modify, and route as appropriate.
 Dynamic multi-layer and multi-technology centralized control to manage threat exposure
as attacks are detected.
 Intelligent network architecture that focuses on mission effectiveness rather than basic
resource availability.
This paper proposes the application of these Commercial-Off-The-Shelf (COTS) based
technologies at scale leveraging distributed resources in combination with traditional lab-based
sandboxes. This will provide an environment where mission specific Cyber Resilience solutions
(COTS, proprietary, and government provided methods and techniques) can be researched,
designed, developed, tested, evaluated, implemented and demonstrated.
The ideas are presented in two sections. The first addresses technologies and architectures that
can be investigated to explore Cyber Resilience in depth, achieving the goal to greatly enhance the
cyber resilience and performance posture of mission networks. The second part addresses how
Cyber Resilience solutions can be developed at scale leveraging national resources while also still
enabling development and investigation in sandbox environments.
P a g e | 3 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
Cyber Resilience Technology and Architecture
Over the past three years, several new technologies have become generally available that provide
new opportunities for enhanced Cyber Resilience. Several of these may not be obvious to most
technologists as related to robust cyber design for IT architecture.
Application performance management – You can’t manage something you can’t measure. Several
suites of COTS software and hardware are providing a breadth and depth of Application
Performance Management (APM) capabilities not possible just a few years ago. The result is the
ability to develop pervasive visibility throughout an IT enterprise.
 Deep packet inspection – One of the enabling technologies for APM is deep packet
inspection that is integrated into highly available, high performance sensors. However, the
benefits of Deep Packet Inspection (DPI) go far beyond APM. DPI enables the ability to
inspect, manipulate (change), and route packet in new and innovative ways. This enables
custom network design that leverages COTS DPI solutions.
 Control plane architectures – Telecommunications equipment and software
manufactures have worked with academia for over a decade to develop new solutions for
managing today’s advanced networks. Several components have been developed
throughout the industry including the IETF’s Generalized Multi-Protocol Label Switching
protocol (GMPLS) and the ITU’s Autonomously Switched Optical Network (ASON)
standard. The result is a wide range of standards and commercial capabilities, each
designed to satisfy a specific niche need. BBN’s PHAROS, developed initially for DARPA,
extends these capabilities to support multi-layer and multi-technology architectures as
appropriate for a given mission environment.
 Application delivery controllers – Traditional optical transport and packet routers and
switches provide robust capabilities to get bits across networks. However, they are fairly
limited when network services need to be application aware. Traditional load balancers
have evolved and are now a new breed of network element – the application delivery
controller. Available from many manufacturers with a wide range of features, the
Application Delivery Controller (ADC) incorporates traditional routing and switching
capabilities and new application aware IT features that enable new service architectures.
 OpenFlow – As stated on the OpenFlow website (www.openflow.org), “OpenFlow enables
networks to evolve, by giving a remote controller the power to modify the behavior of
network devices, through a well-defined ‘forwarding instruction set.” The growing
P a g e | 4 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
OpenFlow ecosystem now includes routers, switches, virtual switches, and access points
from a range of vendors.” Enterprise IT operators can leverage OpenFlow to enable
routing and switching behaviors as they desire rather than the general practices enabled
by traditional routing and switching equipment manufacturers.
 Flow optimization – The suite of Internet protocols has existed for decades. A wide range
of implementations have existed for some time to optimize IP performance. However,
these have not been generally incorporated into network elements, servers, and
application software. Consequently, data networks continue to show poor performance
and little resilience to network disruption, even to moderate changes in latency due to
path fault recovery. WAN optimization solutions provide the opportunity to increase
network “good put” by utilizing existing bandwidth. Moreover, the same mechanisms used
to improve network utilization, throughput, and responsiveness often provide improved
resilience against network disruption.
Common enablers through all of these technologies include high speed, low power packaged as
ASICs and FPGAs, faster and larger storage (high performance memory and Solid State Drives),
standardized processors (such as network processors and systems on a chip) that provide
modularity beneficial to open source software development, and continued evolution of
networking and application algorithms and best practices.
These new technologies and components can be leveraged collectively to create innovative IT
enterprise architectures enable new techniques and establish new best practices for Cyber
Resilience. This enables a transformation of IT environments to flow based, application aware,
converged architectures that leverage distributed architecture and intelligent control to
dynamically dilate exposure the cyber threats while managing mission effectiveness. This
potential architecture is illustrated on the following page.
P a g e | 5 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
P a g e | 6 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
Cyber Resilience Validation
Validation of Cyber Resilience can be performed in three progressive stages. The first stage should
be application of traditional operation research techniques and analysis such as Reliability,
Availability, Maintainability, and Survivability (RAMS) assessment. Unfortunately, the entire area
of information assurance has not received adequate attention in these circles, so techniques of
analytically treating Cyber Resilience must be developed.
Given the principles developed through operations research, the next progressive stage is
verification in controlled environments (loosely referred to as “labs”). Verification of cyber
resilience in a lab environment must be approached as a multidisciplinary endeavor. Traditional
functional and performance testing techniques must be integrated with information assurance
testing practices. In this way, performance of equipment in various configurations (architectures)
can be evaluated while under attack. Most resources for such an environment are expensive, but
generally available as COTS.
Unfortunately, the nature of cyber threats is continually evolving. Moreover, it can be difficult to
simulate real network behavior at scale in a laboratory environment. In addition, access to
researchers can be difficult as the national subject matter experts are distributed geographically
among different stakeholders. This leads to the need for a final stage that Cyber Resilience
validation – testing and evaluation of Cyber Resilience architectures on real networks.
This must be more than the typical “honey pot”. Real networks used for non-sensitive missions
should be used. This is readily achievable using networks such GENI, DREN, and other NSF or
academic networks. Selection of which resource is appropriate for a given implementation is
technology and mission dependent.
GENI provides the ability to virtualize a network environment in a way as to not interfere with
other network users. OpenFlow can be leveraged to provide advanced network routing and
switching while GENI “stacks” can be used to create application clusters. As GENI is a real world
network, performance will be more indicative of actual expected performance in some mission
environments. Additional resources and attack vectors can be applied as necessary.
If the nature of research is sensitive or requires technologies not readily integrated into GENI,
DREN may provide a more suitable validation architecture. Other network architectures can be
approached as well. National and international scale networks, such as Internet2, provide the
capability to explore optical networking resilience in combination with routed networks.
Several techniques and methods will be necessary. Exposure to real world (aka, “zero day”) threats
can be managed using “walled gardens”. Network degradations can be managed using laboratory
grade devices such as Apposite’s Linktrop-10G to create a variety of fault modes. Attacks can be
“solicited” using honey pot techniques, or injected using COTS and GOTS exploitation tools.
P a g e | 7 14900 Conference Center Drive
Suite 280
Chantilly, VA 20151
703-955-7770
Finally, intelligent control can be applied to both develop techniques to avoid threat or attack
points while also mitigating exposure to attacks using dynamic filtering and rating limiting on a
per flow basis. This may be the essential definition of what it means to be Cyber threat resilient.
Citations
PHAROS: I. Baldine, A. Jackson, J. Jacob, W. Leland, J. Lowry, W. Miliken, P.Pal, R. Ramanathan,
K. Rauschenbach, C. Santivanez, and D. Wood, “PHAROS: An Architecture for Next-Generation
Core Optical Networks,” pp. 154-179, Next-Generation Internet Architectures and Protocols, Ed. by
Byrav Ramamurthy, George N. Rouskas, and Krishna Moorthy Sivalingam, Cambridge University
Press, 2011.
GENI: www.geni.net

More Related Content

PDF
Slides_Goeringer Steve
PDF
Lte community networks in brazil sustainable modeling, deployment and mainte...
PDF
NTT i3 at OpenStack Summit - May 20th, 2015
PPTX
Time Sensitive Networking Testbed at a Glance
PDF
Accelerating Edge Computing Adoption
PPTX
Future Internet Networks - Tiana RAMAHANDRY - IDATE - Executive Seminar - Dig...
PDF
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFI
PPTX
The importance of Wi-Fi to students - Hewlett Packard Enterprise - Networkshop44
Slides_Goeringer Steve
Lte community networks in brazil sustainable modeling, deployment and mainte...
NTT i3 at OpenStack Summit - May 20th, 2015
Time Sensitive Networking Testbed at a Glance
Accelerating Edge Computing Adoption
Future Internet Networks - Tiana RAMAHANDRY - IDATE - Executive Seminar - Dig...
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFI
The importance of Wi-Fi to students - Hewlett Packard Enterprise - Networkshop44

What's hot (20)

PDF
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
PDF
Netsoft 2020 S4SI Workshop Panel
PDF
Joseph Witt
PPTX
Design of network
DOCX
Resume_George
DOCX
Resume_George
PDF
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
PDF
OIF-plenary-Jan-20-2015_SDN-WAN-Loukas_oif2015.083
DOC
Vamsi_Resume
PPT
Utilities: TDM to IP
PPTX
Building converged plantwide ethernet architectures
PDF
Miami in touch-amdocs-lte-2011-05-16-handout
PDF
Design and emulation tools for serverless edge computing
PPTX
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
DOCX
Daniel Senior Resume
PDF
PacketsNeverLie
PDF
Low-latency distributed computation offloading for pervasive environments
PPTX
LTE Self Organizing Network Projects
PDF
CDE Marketplace: SQR Systems
PDF
What's next in edge computing?
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
Netsoft 2020 S4SI Workshop Panel
Joseph Witt
Design of network
Resume_George
Resume_George
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
OIF-plenary-Jan-20-2015_SDN-WAN-Loukas_oif2015.083
Vamsi_Resume
Utilities: TDM to IP
Building converged plantwide ethernet architectures
Miami in touch-amdocs-lte-2011-05-16-handout
Design and emulation tools for serverless edge computing
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Daniel Senior Resume
PacketsNeverLie
Low-latency distributed computation offloading for pervasive environments
LTE Self Organizing Network Projects
CDE Marketplace: SQR Systems
What's next in edge computing?
Ad

Viewers also liked (20)

PPTX
The dark is rising dan hohmann
PDF
Martina Carlino Portfolio2013
PDF
Indices 05 aug2013055239
ODP
As irmandades da fala2
PDF
Indices 03 jan2013045404
PPTX
Material de Laboratori
PDF
Indices 20 aug2013082020
PDF
Indices 04 jul2013073804
PPSX
BIG CHRISTMAS REUNION
PPTX
Jack lapean the genius files never say genius
PPT
PPSX
Susan fleury networking presentation aug 2015
PPTX
ふくおか未来フォーラム構想Ver.001
PDF
Finalaya BSE/NSE indices snapshot for 27 August 2014
PDF
Indices 12 dec2012060827
PPTX
Lauren Platou The Hunger Games
PDF
Indices 16 aug2013062420
PDF
Indices 05 sep2013054649
PPT
Pres historic royal palaces
PDF
Indices 20 feb2013052950
The dark is rising dan hohmann
Martina Carlino Portfolio2013
Indices 05 aug2013055239
As irmandades da fala2
Indices 03 jan2013045404
Material de Laboratori
Indices 20 aug2013082020
Indices 04 jul2013073804
BIG CHRISTMAS REUNION
Jack lapean the genius files never say genius
Susan fleury networking presentation aug 2015
ふくおか未来フォーラム構想Ver.001
Finalaya BSE/NSE indices snapshot for 27 August 2014
Indices 12 dec2012060827
Lauren Platou The Hunger Games
Indices 16 aug2013062420
Indices 05 sep2013054649
Pres historic royal palaces
Indices 20 feb2013052950
Ad

Similar to Cyber Resiliency 20120420 (20)

PDF
Data Center Solutions: Radical Shift toward Design-Driven Innovation
PDF
Missioncritical Network Planning Matthew Liotine
PPTX
The Website Resiliency Imperative
PDF
Devopsdays State of the Union Amsterdam 2014
PDF
Brighttalk understanding the promise of sde - final
PPTX
Understanding cyber resilience
PDF
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
PDF
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
PDF
Infrastructure & Enterprise IT Powering Scalable Digital Operations - Techmat...
DOCX
Comprehensive NOC Support Safeguarding Your Network Infrastr.docx
PPTX
How to consolidate Citrix Monitoring in a Single Pane of Glass
PDF
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
PDF
Internet of things Emerging Network Technology Assessment Report
PDF
Cyber Resilience white paper 20160401_sd
PPTX
Lisa Guess - Embracing the Cloud
PDF
Indexing Building Evaluation Criteria
PDF
ICTON 2020 KeyNote: Evolving Network Security & Resilience
PPTX
Network Emerging Technologies assessment
PDF
CyberSecurity in a World of Connected Devices: IoT Security
PDF
SDN Introduction
Data Center Solutions: Radical Shift toward Design-Driven Innovation
Missioncritical Network Planning Matthew Liotine
The Website Resiliency Imperative
Devopsdays State of the Union Amsterdam 2014
Brighttalk understanding the promise of sde - final
Understanding cyber resilience
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
Infrastructure & Enterprise IT Powering Scalable Digital Operations - Techmat...
Comprehensive NOC Support Safeguarding Your Network Infrastr.docx
How to consolidate Citrix Monitoring in a Single Pane of Glass
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Internet of things Emerging Network Technology Assessment Report
Cyber Resilience white paper 20160401_sd
Lisa Guess - Embracing the Cloud
Indexing Building Evaluation Criteria
ICTON 2020 KeyNote: Evolving Network Security & Resilience
Network Emerging Technologies assessment
CyberSecurity in a World of Connected Devices: IoT Security
SDN Introduction

Cyber Resiliency 20120420

  • 1. © 2012 Polar Star Consulting, LLC 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770 Cyber Resiliency Technology, Architecture, and Practical Validation This paper proposes an approach to creating pervasive cyber resiliency. It reviews key technologies, identifies and illustrates architecture components, and proposes to use academic infrastructure to validate cyber infrastructure. Author: Steve Goeringer, Director and Senior Network Engineer
  • 2. P a g e | 2 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770 Introduction Traditional information assurance techniques have relied on defense-in-depth and a variety of anomaly detection techniques to identify attacks where threats are expected to achieve Cyber Resilience. These techniques have been expensive in terms of both recurring (operational) and non-recurring (development and capital) costs. Moreover, they have not kept pace with the rapid development of IT infrastructure enabling critical mission environments where networks and information resources are highly fluid and continually evolving. Moreover, current threat mitigation and attack management techniques tend to be mission disruptive – the resources under attack are often made unavailable until defensive mechanisms are placed. The result is contrary to the goal – rather than achieving Cyber Resilience, the architectures supporting our missions remain brittle to determined, sustained attacks. Cyber Resilience needs to be redefined to include the ability for critical infrastructures to continue to operate even while under attack and essential information to remain available to those in need. This is possible using emerging technologies:  Pervasive data collection from servers, clients, network elements, and application aware sensors at line rates up to even 100Gbps.  Strong packet manipulation capabilities at rates up to 10Gpbs that leverage deep packet inspection to assess data flows in real-time and filter, modify, and route as appropriate.  Dynamic multi-layer and multi-technology centralized control to manage threat exposure as attacks are detected.  Intelligent network architecture that focuses on mission effectiveness rather than basic resource availability. This paper proposes the application of these Commercial-Off-The-Shelf (COTS) based technologies at scale leveraging distributed resources in combination with traditional lab-based sandboxes. This will provide an environment where mission specific Cyber Resilience solutions (COTS, proprietary, and government provided methods and techniques) can be researched, designed, developed, tested, evaluated, implemented and demonstrated. The ideas are presented in two sections. The first addresses technologies and architectures that can be investigated to explore Cyber Resilience in depth, achieving the goal to greatly enhance the cyber resilience and performance posture of mission networks. The second part addresses how Cyber Resilience solutions can be developed at scale leveraging national resources while also still enabling development and investigation in sandbox environments.
  • 3. P a g e | 3 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770 Cyber Resilience Technology and Architecture Over the past three years, several new technologies have become generally available that provide new opportunities for enhanced Cyber Resilience. Several of these may not be obvious to most technologists as related to robust cyber design for IT architecture. Application performance management – You can’t manage something you can’t measure. Several suites of COTS software and hardware are providing a breadth and depth of Application Performance Management (APM) capabilities not possible just a few years ago. The result is the ability to develop pervasive visibility throughout an IT enterprise.  Deep packet inspection – One of the enabling technologies for APM is deep packet inspection that is integrated into highly available, high performance sensors. However, the benefits of Deep Packet Inspection (DPI) go far beyond APM. DPI enables the ability to inspect, manipulate (change), and route packet in new and innovative ways. This enables custom network design that leverages COTS DPI solutions.  Control plane architectures – Telecommunications equipment and software manufactures have worked with academia for over a decade to develop new solutions for managing today’s advanced networks. Several components have been developed throughout the industry including the IETF’s Generalized Multi-Protocol Label Switching protocol (GMPLS) and the ITU’s Autonomously Switched Optical Network (ASON) standard. The result is a wide range of standards and commercial capabilities, each designed to satisfy a specific niche need. BBN’s PHAROS, developed initially for DARPA, extends these capabilities to support multi-layer and multi-technology architectures as appropriate for a given mission environment.  Application delivery controllers – Traditional optical transport and packet routers and switches provide robust capabilities to get bits across networks. However, they are fairly limited when network services need to be application aware. Traditional load balancers have evolved and are now a new breed of network element – the application delivery controller. Available from many manufacturers with a wide range of features, the Application Delivery Controller (ADC) incorporates traditional routing and switching capabilities and new application aware IT features that enable new service architectures.  OpenFlow – As stated on the OpenFlow website (www.openflow.org), “OpenFlow enables networks to evolve, by giving a remote controller the power to modify the behavior of network devices, through a well-defined ‘forwarding instruction set.” The growing
  • 4. P a g e | 4 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770 OpenFlow ecosystem now includes routers, switches, virtual switches, and access points from a range of vendors.” Enterprise IT operators can leverage OpenFlow to enable routing and switching behaviors as they desire rather than the general practices enabled by traditional routing and switching equipment manufacturers.  Flow optimization – The suite of Internet protocols has existed for decades. A wide range of implementations have existed for some time to optimize IP performance. However, these have not been generally incorporated into network elements, servers, and application software. Consequently, data networks continue to show poor performance and little resilience to network disruption, even to moderate changes in latency due to path fault recovery. WAN optimization solutions provide the opportunity to increase network “good put” by utilizing existing bandwidth. Moreover, the same mechanisms used to improve network utilization, throughput, and responsiveness often provide improved resilience against network disruption. Common enablers through all of these technologies include high speed, low power packaged as ASICs and FPGAs, faster and larger storage (high performance memory and Solid State Drives), standardized processors (such as network processors and systems on a chip) that provide modularity beneficial to open source software development, and continued evolution of networking and application algorithms and best practices. These new technologies and components can be leveraged collectively to create innovative IT enterprise architectures enable new techniques and establish new best practices for Cyber Resilience. This enables a transformation of IT environments to flow based, application aware, converged architectures that leverage distributed architecture and intelligent control to dynamically dilate exposure the cyber threats while managing mission effectiveness. This potential architecture is illustrated on the following page.
  • 5. P a g e | 5 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770
  • 6. P a g e | 6 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770 Cyber Resilience Validation Validation of Cyber Resilience can be performed in three progressive stages. The first stage should be application of traditional operation research techniques and analysis such as Reliability, Availability, Maintainability, and Survivability (RAMS) assessment. Unfortunately, the entire area of information assurance has not received adequate attention in these circles, so techniques of analytically treating Cyber Resilience must be developed. Given the principles developed through operations research, the next progressive stage is verification in controlled environments (loosely referred to as “labs”). Verification of cyber resilience in a lab environment must be approached as a multidisciplinary endeavor. Traditional functional and performance testing techniques must be integrated with information assurance testing practices. In this way, performance of equipment in various configurations (architectures) can be evaluated while under attack. Most resources for such an environment are expensive, but generally available as COTS. Unfortunately, the nature of cyber threats is continually evolving. Moreover, it can be difficult to simulate real network behavior at scale in a laboratory environment. In addition, access to researchers can be difficult as the national subject matter experts are distributed geographically among different stakeholders. This leads to the need for a final stage that Cyber Resilience validation – testing and evaluation of Cyber Resilience architectures on real networks. This must be more than the typical “honey pot”. Real networks used for non-sensitive missions should be used. This is readily achievable using networks such GENI, DREN, and other NSF or academic networks. Selection of which resource is appropriate for a given implementation is technology and mission dependent. GENI provides the ability to virtualize a network environment in a way as to not interfere with other network users. OpenFlow can be leveraged to provide advanced network routing and switching while GENI “stacks” can be used to create application clusters. As GENI is a real world network, performance will be more indicative of actual expected performance in some mission environments. Additional resources and attack vectors can be applied as necessary. If the nature of research is sensitive or requires technologies not readily integrated into GENI, DREN may provide a more suitable validation architecture. Other network architectures can be approached as well. National and international scale networks, such as Internet2, provide the capability to explore optical networking resilience in combination with routed networks. Several techniques and methods will be necessary. Exposure to real world (aka, “zero day”) threats can be managed using “walled gardens”. Network degradations can be managed using laboratory grade devices such as Apposite’s Linktrop-10G to create a variety of fault modes. Attacks can be “solicited” using honey pot techniques, or injected using COTS and GOTS exploitation tools.
  • 7. P a g e | 7 14900 Conference Center Drive Suite 280 Chantilly, VA 20151 703-955-7770 Finally, intelligent control can be applied to both develop techniques to avoid threat or attack points while also mitigating exposure to attacks using dynamic filtering and rating limiting on a per flow basis. This may be the essential definition of what it means to be Cyber threat resilient. Citations PHAROS: I. Baldine, A. Jackson, J. Jacob, W. Leland, J. Lowry, W. Miliken, P.Pal, R. Ramanathan, K. Rauschenbach, C. Santivanez, and D. Wood, “PHAROS: An Architecture for Next-Generation Core Optical Networks,” pp. 154-179, Next-Generation Internet Architectures and Protocols, Ed. by Byrav Ramamurthy, George N. Rouskas, and Krishna Moorthy Sivalingam, Cambridge University Press, 2011. GENI: www.geni.net