[Docs] [txt|pdf|xml|html] [Tracker] [WG] [Email] [Diff1] [Diff2] [Nits]

Versions: (draft-moriarty-carisreport) 00 01 02 RFC 8073

Network                                                      K. Moriarty
Internet-Draft                                      Dell EMC Corporation
Intended status: Informational                                   M. Ford
Expires: July 9, 2017                                   Internet Society
                                                        January 05, 2017


 Coordinating Attack Response at Internet Scale (CARIS) Workshop Report
                        draft-iab-carisreport-02

Abstract

   This report documents the discussions and conclusions from the
   Coordinating Attack Response at Internet Scale (CARIS) workshop that
   took place in Berlin, Germany on 18 June 2015.  The purpose of this
   workshop was to improve mutual awareness, understanding, and
   coordination among the diverse participating organizations and their
   representatives.

   Note that this document is a report on the proceedings of the
   workshop.  The views and positions documented in this report are
   those of the workshop participants and do not necessarily reflect IAB
   views and positions.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on July 9, 2017.

Copyright Notice

   Copyright (c) 2017 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents



Moriarty & Ford           Expires July 9, 2017                  [Page 1]


Internet-Draft                    CARIS                     January 2017


   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Sessions and Panel Groups . . . . . . . . . . . . . . . . . .   4
     2.1.  Coordination between CSIRTs and Attack Response
           Mitigation Efforts  . . . . . . . . . . . . . . . . . . .   4
     2.2.  Scaling Response to DDoS and Botnets Effectively and
           Safely  . . . . . . . . . . . . . . . . . . . . . . . . .   7
     2.3.  DNS & RIRs: Attack Response and Mitigation  . . . . . . .   8
     2.4.  Trust Privacy and Data Markings Panel . . . . . . . . . .   9
   3.  Workshop Themes . . . . . . . . . . . . . . . . . . . . . . .  11
   4.  Next Steps  . . . . . . . . . . . . . . . . . . . . . . . . .  11
     4.1.  RIR and DNS Provider Resources  . . . . . . . . . . . . .  11
     4.2.  Education and Guidance  . . . . . . . . . . . . . . . . .  11
     4.3.  Transport Options . . . . . . . . . . . . . . . . . . . .  12
     4.4.  Updated Template for Information Exchange Groups  . . . .  12
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .  12
   6.  Informative References  . . . . . . . . . . . . . . . . . . .  13
   Appendix A.  Acknowledgements . . . . . . . . . . . . . . . . . .  14
   Appendix B.  Workshop Attendees . . . . . . . . . . . . . . . . .  15
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  15

1.  Introduction

   The Internet Architecture Board (IAB) and the Internet Society (ISOC)
   hosted a day-long Coordinating Attack Response at Internet Scale
   (CARIS) workshop on 18 June 2015 in coordination with the Forum for
   Incident Response and Security Teams (FIRST) Conference in Berlin.
   The workshop included members of the FIRST community, attack response
   working group representatives, network and security operators,
   Regional Internet Registry (RIR) representatives, researchers,
   vendors, and representatives from standardisation communities.  Key
   goals of the workshop were to improve mutual awareness,
   understanding, and coordination among the diverse participating
   organizations.  The workshop also aimed to provide the attendees with
   greater awareness of existing efforts to mitigate specific types of
   attacks, and greater understanding of the options available to
   collaborate and engage with these efforts.





Moriarty & Ford           Expires July 9, 2017                  [Page 2]


Internet-Draft                    CARIS                     January 2017


   The day-long workshop included a mix of invited talks and panel
   discussion sessions with opportunities to collaborate throughout,
   taking full advantage of the tremendous value of having these diverse
   communities with common goals in one room.  There were approximately
   50 participants engaged in the CARIS workshop.

   Attendance at the workshop was by invitation only.  Prior to the
   workshop, existing attack-mitigation working groups were asked to
   complete a survey.  The data gathered through this questionnaire,
   including how third parties can participate in or contribute to the
   attack-mitigation working group, was shared with all of the
   participants at the workshop to better enable collaboration [ISOC].
   Attendees were also selected from submissions of 2-page position
   papers that included some key insight or challenge relevant to the
   broader group.  Paper topics included research topics related to
   attack mitigation or information sharing/exchange, success stories,
   lessons learned, and more in-depth studies on specific topics such as
   privacy or trust.

   The program committee received 25 papers and 19 template submissions.
   The template submissions will be maintained by the Internet Society
   and as a result of the workshop they will be amended to provide
   additional value to the computer security incident response teams
   (CSIRTs) and attack response communities/operators on their
   information exchange capabilities.  The CARIS participants found the
   template submissions to be very useful in coordinating their future
   attack mitigation efforts.  This is a new initiative and is open for
   the global community and hosted in a neutral location.  All
   submissions are available online and linked from the agenda [AGENDA].

   The workshop talks and panels involved full participation from
   attendees who were required to read all the submitted materials.  The
   panels were organized to spur conversation between specific groups to
   see if progress could be made towards more efficient and effective
   attack mitigation efforts.  See [KME1] and [KME2] for additional
   information on possible approaches to accomplish more effective
   attack response and information exchanges with methods that require
   fewer analysts.

   The workshop was run under the Chatham House Rule to facilitate the
   exchange of sensitive information involved with incident response.
   As such, there was no recording, but minutes were taken and used to
   aid in the generation of this report.  Comments will not be
   attributed to any particular attendee, nor will organizations be
   named in association with any discussion topics that were not made
   public through submission templates or papers by the submitter and
   organization.




Moriarty & Ford           Expires July 9, 2017                  [Page 3]


Internet-Draft                    CARIS                     January 2017


2.  Sessions and Panel Groups

   After an initial presentation to set the stage and elaborate the
   goals of the workshop, the day was divided into five sessions as
   follows.

   1.  Coordination between CSIRTs and attack response mitigation
       efforts

   2.  Scaling response to DDoS and botnets effectively and safely

   3.  Infrastructure: DNS and RIR providers and researchers

   4.  Trust and Privacy with the exchange of potentially sensitive
       information

   5.  Implications for Internet architecture and next steps

   The remainder of this report will provide more detail on each of
   these sessions.

2.1.  Coordination between CSIRTs and Attack Response Mitigation Efforts

   The first panel session on Coordination between CSIRTs and attack
   mitigation efforts included representatives from several
   organizations that submitted templates describing their
   organization's attack mitigation efforts.  This panel was
   purposefully a cross section of organizations attending to see if
   there were new opportunities to collaborate and improve efficiency
   thereby better scaling attack mitigation.  The panelists described
   their efforts with the following questions in mind:

   o  What is the use case for their organization?

   o  Where are they focusing their efforts?

   o  How can others engage with their organization?

   o  Who participates in their organization today?

   For each of the following organizations, additional information can
   be found in their template submissions [ISOC].

   The following summaries are to be read in the context of the workshop
   and not as stand alone descriptions for each organization.  These
   summaries are a result of the workshop discussions.





Moriarty & Ford           Expires July 9, 2017                  [Page 4]


Internet-Draft                    CARIS                     January 2017


   o  ENISA is the European Network and Information Security Agency
      [ENISA].  While ENISA provides support for the community in the
      form of education, training and collaboration on security and
      attack mitigation, it does not offer a service for attack response
      or mitigation.

   o  The Anti-Phishing Working Group (APWG) offered examples of
      operator driven exchanges focused on specific use cases that
      involve hundreds of participating organizations daily.  The APWG
      operates a data clearinghouse and provides infrastructure to
      support meaningful data exchanges and maintains a current set of
      data through these interactions.  More can be learned on the APWG
      web site [APWG] in addition to their template submission.

   o  The Research and Education Networking Information Sharing and
      Analysis Center (Ren-ISAC) employs an interesting operational
      model that scales well through automation, exchanging actionable
      information between 500 universities and automatically
      implementing controls.  Since many universities cannot respond to
      incidents in real-time due to a scarcity of resources, REN-ISAC
      leverages a small number of analysts to accomplish the task of
      protecting many universities through automation.  The key to the
      success of their project is providing tools that allow
      organizations to make use of incident data operationally.  They
      are currently working to develop open-source tools to track
      metrics more formally [REN-ISAC].

   o  CERT.br is the Brazilian Computer Emergency Response Team (CERT)
      and they have made impressive progress in a short amount of time.
      CERT.br is the national focal point for incident reporting,
      collection and dissemination of threat and attack trend
      information in Brazil.  CERT.br works to increase awareness and
      incident-handling capabilities in country as well as assisting to
      establish new CSIRTs.  In addition to providing training and
      awareness campaigns, they distribute network security honeypots
      and have a primary focus on network monitoring.  CERT.br requires
      active participation from third parties wishing to collaborate and
      exchange data with them [CERT.BR].

   o  MyCERT's mission is to address the security concerns of Malaysian
      Internet users and reduce the probability of successful attacks
      [MYCERT].  They have been operational since 1997.  MyCERT is
      responsible for incident handling of unauthorised intrusions,
      identity theft, DDoS attacks, etc.  MyCERT handles computer
      security incidents in Malaysia, provides malware research, and
      technical coordination.  In addition to incident response and
      coordination activities, MyCERT members provide talks and
      training, as well as local and regional security exercises.



Moriarty & Ford           Expires July 9, 2017                  [Page 5]


Internet-Draft                    CARIS                     January 2017


      MyCERT also provides incident alerts and advisories on
      vulnerabilities, breaches, etc.

   o  The CERT Coordination Center (CERT/CC) has been operational since
      1998 on an international and national scale [CERTCC].  They have
      long been known for their software vulnerability work and the
      national vulnerability database in the US (Common Vulnerabilities
      and Exposures - CVEs) and informing organizations of
      vulnerabilities.  CERT/CC helps to coordinate between vendors and
      researchers for improved collaborations.  CERT/CC provides
      guidance on dealing with the aftermath of incidents, risk
      assessment best practice, bug bounties, and other incident related
      areas.

   Highlights from the panel discussion:

   o  Passive surveillance by state actors has impacted incident
      response activities due to the erosion of trust between
      communities.

   o  Government involvement in information exchange efforts hasn't been
      productive, despite lots of discussion there have not been useful
      outcomes.

   o  There is more interest in consuming feeds of information than
      sharing information.

   o  Ego has been a big issue for improving data sharing, as have
      reputation-related concerns when sharing or receiving data.

   o  There is a perception of weakness around organizations who do
      share attack information in some regions.

   o  Sharing in isolation doesn't help, it must lead to operational
      return on investment.

   o  Language barriers have been an issue for some national CSIRTs.

   o  Sharing too much information leads to capacity and resource issues
      for receiving organizations.  Organizations directly receiving
      feeds can often misinterpret data and think they are under attack
      when it is not the case.  Operational models are preferred where
      data exchanges have a direct impact on improving the efficiency of
      a small number of analysts to impact many.

   o  Privacy regulations restricting some organizations from sharing IP
      address information have had an impact on the effectiveness of




Moriarty & Ford           Expires July 9, 2017                  [Page 6]


Internet-Draft                    CARIS                     January 2017


      incident data exchanges.  ENISA is currently running a study on
      this impact (this point was raised by several attendees).

   o  Too many efforts are using data just for blocking attacks and not
      for operational mitigation and elimination of vulnerabilities as
      part of their incident response effort.  Note: Operational efforts
      stand out in that they do eliminate threats and update data
      warehouses.

   o  Involvement of vendors is needed to better scale attack response.
      This is not seen as a need by all groups, but some sharing groups
      with an operational focus are looking for improved efficiencies to
      leverage a small number of analysts more productively.  Analysts
      are a limited resource in this technical area of expertise.

   o  Enterprises don't want more security boxes in their networks as
      they don't have the resources to manage them, so involving vendors
      doesn't mean deploying more equipment, but improving automated
      controls and the elimination of threats wherever possible.  False
      positives are still an issue, which can be problematic for some
      automation activities.

2.2.  Scaling Response to DDoS and Botnets Effectively and Safely

   The first invited talk at the workshop provided an interesting
   history of Distributed Denial of Service (DDoS) attacks and the
   evolution of botnets as well as the methods to combat these threats.
   The paper by Dave Dittrich [DD1] is available to learn more of this
   history: this section of the report will focus on the workshop
   discussion in an effort to benefit from the workshop attendees'
   thoughts concerning how to better scale our response to these
   threats.

   Key points from the discussion:

   o  Of the attack types discussed, DDoS and botnets appear to be the
      furthest along in terms of efficient and effective response.
      Other efforts can learn from this experience.  There has not been
      any interaction between these two attack types that may benefit
      from information exchange tied to remediation activities since
      botnets can be the source of DDoS attacks.

   o  There is a disparity between short-term mitigation goals and
      actual eradication of DDoS and botnet threats.  The question was
      raised: how do we normalize the same data in different ways to
      serve different goals?  In other words, DDoS traffic is often the
      result of botnets, but the data is not shared between the service




Moriarty & Ford           Expires July 9, 2017                  [Page 7]


Internet-Draft                    CARIS                     January 2017


      providers and vendors responding to DDoS threats and those
      actively mitigating and eradicating botnets.

   o  There are ad-hoc trust groups within the OpSec community today:
      the Cybercrime Response Advisory Group (CRAG) is one example.

   o  Filtering and triage is an issue, but this is a solvable problem.

   o  The IETF DDOS Open Threat Signaling (DOTS) working group was
      discussed and compared to a previous effort, Real-time Inter-
      network defense (RID) [RFC6545].  It was stated that the two are
      similar, except DOTS makes use of current data formats and
      protocols and has the support of multiple DDoS vendors.  One of
      the goals of DOTS is to have this solution be the "glue" between
      vendors to communicate shared data using standard formats and
      protocols developed in open source tools.

   o  The IETF Interface to Network Security Functions (I2NSF) effort
      was discussed to explore ways to leverage infrastructure to combat
      DDoS attacks.

   o  Vendors discussed existing capabilities for DDoS mitigation, while
      data sharing groups discussed their mitigation activities related
      to botnets (see the submissions under the heading 'Panel on
      Scaling Attack Response for DDoS and BotNets' in the workshop
      agenda [AGENDA]).

   o  Trust and reputation of data sources is still a concern.

   o  One of the exchange groups has a goal of "automated takedowns" for
      botnets.  However, they think they will always have a need for
      manual intervention.

   o  The need for multiple levels of trust seemed to be prevalent among
      those participating in the panel discussion.  Intelligence
      agencies erode trust (this was also mentioned in the first panel
      in terms of surveillance activities from governments).

   o  Although trust was discussed in this panel and there are concerns,
      it was noted that trust is not as big a barrier for DDoS and
      botnet mitigation and this is likely due to the operational
      experience of the participants.

2.3.  DNS & RIRs: Attack Response and Mitigation

   This session was a shift from other sessions in the day as the
   panelists were infrastructure providers for those combating attacks.
   This session was of interest to see how attack and incident



Moriarty & Ford           Expires July 9, 2017                  [Page 8]


Internet-Draft                    CARIS                     January 2017


   responders could better collaborate with DNS infrastructure
   organisations and RIRs.  These groups have not interacted in the past
   and it was interesting to see the collaboration opportunities since
   the workshop participants rely on these services to do their jobs.
   From the panelists' perspective, DNS and RIRs are separate worlds,
   where they spend a lot of time trying to educate policymakers about
   how they work together to make the Internet work.

   Key discussion points:

   o  The use of passive DNS in attack mitigation was described.

   o  RIRs discussed the data they maintain and provide, including
      worldwide BGP update data and root DNS server data.  These
      datasets are available to share with researchers and could be of
      interest to those working on attack response.  The current way the
      data is made available does not scale and ideas were discussed in
      the workshop to improve the scalability should this become a more
      widely used resource.

   o  Some of the global RIRs already actively coordinate with incident
      responders in their region.  In some cases they do facilitate
      information sharing as well as provide education and training.
      Data shared out by RIRs is anonymized.

   o  A concern was raised regarding overlapping efforts and a request
      was made for the IETF and ISOC to pay attention to this and help.
      This workshop was one step toward that in bringing together this
      diverse community.  The participants wished to see this type of
      event repeated for future cross area collaboration between the
      diverse set of groups that often only meet within their silo.

   o  Standards for APIs to access data consistently from RIRs and
      scoring methods were discussed as possible ways to scale trust.
      Questions were raised as to how this might be possible.  One might
      receive unverifiable data about a network.  They may be able to
      verify the source's identity, verify route origins, but won't be
      able to verify the provenance of data.

2.4.  Trust Privacy and Data Markings Panel

   Why don't organizations share data?  It seems to be a mix of privacy,
   legal, technical/mundane, cultural, and communication issues.  There
   are also concerns about sharing proprietary data with competitors.
   Having said that, most of these reasons were dismissed as bogus by
   the more operationally focused participants in the workshop.  Lawyers
   need contextual education for the intersection of law and technology.




Moriarty & Ford           Expires July 9, 2017                  [Page 9]


Internet-Draft                    CARIS                     January 2017


   Sensitive data is still an issue as one can't control what others do
   with data once it is shared.

   Key points from the panel discussion:

   o  Operationally focused groups do retain/rate/re-mark confidence
      levels based upon the submitter's reputation.

   o  The Traffic Light Protocol (TLP) [TLP] was discussed.  While TLP
      is useful to some groups who exchange data, others find that it is
      not granular enough for their needs.

   o  In many cases when data is shared the user never knows, and there
      is no way to manage that disclosure.

   o  Trust is personal.  When sharing circles get too large, trust
      breaks down.  The personal relationship aspect of information
      sharing communities was emphasized by several who are actively
      exchanging data.  This was a very prevalent theme.

   o  A point of comparison was made with consumer goods and it was
      observed that trademarks are a byproduct of the Industrial
      Revolution.  The question was raised: does trust need branding?

   o  Participants observing noted that there appear to be cabals
      operating the groups based on the current trust notions.  This was
      not disputed.

   o  Transparency is vital to maintain trust.

   o  Participants working on automation have found a need to share with
      organizations of all sizes as well as a need to share both
      synchronously and asynchronously.  In an automated model, they
      must ensure data sources are 'authorized' and these efforts have
      encountered questions about anonymization as well as regional
      regulatory perspectives as they vary.

   o  Another automation effort found that people have different upper
      limits for trust group scale, which is sometimes based on
      individualized knowledge of other participants and having a
      comfort level with them.  Social interaction (beer) is a common
      thread amongst sharing partners to build trust relationships.  The
      relationships are formed between individuals and not necessarily
      between organizations.

   o  It's rare for any single piece of information to be clearly
      identifiable as private or public.  The temptation is to say




Moriarty & Ford           Expires July 9, 2017                 [Page 10]


Internet-Draft                    CARIS                     January 2017


      information isn't personally identifiable information (PII).  In
      aggregate, however, non-PII can become PII.

   o  There was common agreement that reputation is fundamental.

3.  Workshop Themes

   During the course of the day, a couple of themes recurred in the
   discussions.  Firstly, in order to better scale attack response
   through improvements to the efficiency and effectiveness of
   information exchanges:

   1.  Data exchanges should not be just for the purpose of creating
       blacklists that could be redundant efforts.

   2.  Involving service providers and vendors to better coordinate and
       scale response is key.

   Secondly, information security practitioners are a scarce resource:

   1.  Training and education was discussed to improve this gap, both to
       train information security professionals and others in IT on
       basic network and system hygiene.

   2.  Leveraging resources to better scale response, using fewer
       resources is critical.

4.  Next Steps

4.1.  RIR and DNS Provider Resources

   Workshop participants expressed an interest in expanded information
   on the resources and assistance offered by the RIRs and DNS
   providers.  Participants are going to define what is needed.

4.2.  Education and Guidance

   Another recurring theme was the lack of knowledge in the community of
   basic security principles such as ingress and egress filtering
   explained in BCP38 [RFC2827].  The CSIRTs, operators, and vendors of
   attack mitigation tools found this particularly frustrating.  As a
   result, follow up activities may include determining if security
   guidance BCPs require updates or to determine whether there are
   opportunities to educate people on these basic principles already
   documented by the IETF.






Moriarty & Ford           Expires July 9, 2017                 [Page 11]


Internet-Draft                    CARIS                     January 2017


4.3.  Transport Options

   One of the more lively discussions was the need for better transports
   for information exchange.  Real-time Inter-network Defense (RID)
   [RFC6545] was written more than 10 years ago.  While the patterns
   established in RID still show promise, there are updated solutions
   being worked on.  One such solution is in the IETF DOTS working
   group, that has an approach similar to RID with updated formats and
   protocols to meet the demands of today's DDoS attacks.  While Trusted
   Automated eXchange of Indicator Information (TAXII - another
   transport option) is just in transition to OASIS, its base is similar
   to RID in its use of SOAP-like messaging, which will likely prevent
   it from scaling to the demands of the Internet.  Vendors also cited
   several interoperability challenges of TAXII in workshop discussions.
   Alternatively, XMPP-Grid has been proposed in the IETF Security
   Automation and Continuous Monitoring (SACM) working group and it
   offers promise as the data exchange protocol for deployment at scale.
   XMPP [RFC6120] inherently meets the requirements for today's
   information exchanges with features such as publish/subscribe,
   federation, and use of a control channel.  XMPP-Grid is gaining
   traction with at least 10 vendors using it in their products and
   several more planning to add support [I-D.appala-mile-xmpp-grid].
   Review and discussion of this draft would be helpful as it
   transitions to the Managed Incident Lightweight Exchange (MILE)
   working group as an outcome of the workshop.  REST was also brought
   up as a needed interface because of the low barrier to use [REST].
   The IETF MILE Working Group has discussed a draft detailing a common
   RESTful interface (ROLIE) that could be used with any data format and
   this may also be of interest [I-D.ietf-mile-rolie].

4.4.  Updated Template for Information Exchange Groups

   One of the submission options was for organizations actively
   exchanging data to submit a form describing their work to reduce
   computer security incidents.  The CSIRTs, in particular, liked having
   access to this information in a neutral location like the Internet
   Society.  However, they wanted to see amendments to the format to
   improve its usefulness.  There was a desire to have this used by
   additional information exchange groups, thereby creating a living
   library to improve awareness of how to become a member, benefit from,
   or contribute to the success of the attack response and CSIRT
   information exchange platforms.

5.  Security Considerations

   The CARIS workshop was focused on security and methods to improve the
   effectiveness and efficiency of attack response to enable better
   scaling.  This report provides a summary of the workshop discussions



Moriarty & Ford           Expires July 9, 2017                 [Page 12]


Internet-Draft                    CARIS                     January 2017


   and identifies some outcomes to improve security.  As such, no
   additional considerations are provided in this section.

6.  Informative References

   [AGENDA]   "Agenda: Coordinating Attack Response at Internet Scale
              (CARIS) Workshop", 2015,
              <https://www.iab.org/activities/workshops/caris/agenda/>.

   [APWG]     "APWG Homepage", 2015, <http://www.antiphishing.org>.

   [CERT.BR]  "Brazilian National Computer Emergency Response Team
              Homepage", 2015, <http://www.cert.br/en/>.

   [CERTCC]   "CERT Coordination Center Homepage", 2015,
              <https://www.cert.org>.

   [DD1]      Dittrich, D., "Taking Down Botnets - Background", April
              2015, <https://www.iab.org/wp-content/IAB-uploads/2015/04/
              CARIS_2015_submission_21.pdf>.

   [ENISA]    "European Union Agency for Network and Information
              Security Homepage", 2015, <https://www.enisa.europa.eu>.

   [I-D.appala-mile-xmpp-grid]
              Cam-Winget, N., Appala, S., and S. Pope, "XMPP Protocol
              Extensions for Use with IODEF", draft-appala-mile-xmpp-
              grid-00 (work in progress), October 2015.

   [I-D.ietf-mile-rolie]
              Field, J., Banghart, S., and D. Waltermire, "Resource-
              Oriented Lightweight Information Exchange", draft-ietf-
              mile-rolie-03 (work in progress), July 2016.

   [ISOC]     "CARIS Workshop Template Submissions", 2015,
              <https://www.internetsociety.org/doc/caris-workshop-
              template-submissions-2015>.

   [KME1]     Moriarty, K., "Transforming Expectations for Threat-
              Intelligence Sharing", August 2013,
              <http://www.emc.com/collateral/emc-perspective/
              h12175-transf-expect-for-threat-intell-sharing.pdf>.

   [KME2]     Moriarty, K., "Kathleen Moriarty Blog Series", July 2015,
              <http://blogs.rsa.com/author/kathleen-moriarty/>.

   [MYCERT]   "Malaysia Computer Emergency Response Team Homepage",
              2015, <https://www.mycert.org.my/en/>.



Moriarty & Ford           Expires July 9, 2017                 [Page 13]


Internet-Draft                    CARIS                     January 2017


   [REN-ISAC]
              "Research and Education Networking Information Sharing and
              Analysis Center Homepage", 2015, <http://ren-isac.net>.

   [REST]     Fielding, R., "Architectural Styles and the Design of
              Network-based Software Architectures", Ph.D. Dissertation,
              University of California, Irvine, 2000,
              <http://www.ics.uci.edu/~fielding/pubs/dissertation/
              fielding_dissertation.pdf>.

   [RFC2827]  Ferguson, P. and D. Senie, "Network Ingress Filtering:
              Defeating Denial of Service Attacks which employ IP Source
              Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827,
              May 2000, <http://www.rfc-editor.org/info/rfc2827>.

   [RFC6120]  Saint-Andre, P., "Extensible Messaging and Presence
              Protocol (XMPP): Core", RFC 6120, DOI 10.17487/RFC6120,
              March 2011, <http://www.rfc-editor.org/info/rfc6120>.

   [RFC6545]  Moriarty, K., "Real-time Inter-network Defense (RID)", RFC
              6545, DOI 10.17487/RFC6545, April 2012,
              <http://www.rfc-editor.org/info/rfc6545>.

   [TLP]      "Traffic Light Protocol (TLP) Matrix and Frequently Asked
              Questions", 2015, <https://www.us-cert.gov/tlp>.

Appendix A.  Acknowledgements

   Thanks are due to the members of the program committee (in
   alphabetical order) for their efforts to make the CARIS workshop
   possible and a productive session with cross area expertise: Matthew
   Ford (Internet Society, UK), Ted Hardie (Google, USA), Joe Hildebrand
   (Cisco, USA), Eliot Lear (Cisco, Switzerland), Kathleen M.  Moriarty
   (EMC Corporation, USA), Andrew Sullivan (Dyn, USA), Brian Trammell
   (ETH Zurich, Switzerland).

   Thanks are also due to the CARIS workshop sponsors:

   o  FIRST provided a room and excellent facilities in partnership with
      their annual conference in Berlin.

   o  The Internet Society hosted the social event, a boat ride through
      the canals of Berlin.

   o  EMC Corporation provided lunch, snacks and coffee throughout the
      day to keep the attendees going.





Moriarty & Ford           Expires July 9, 2017                 [Page 14]


Internet-Draft                    CARIS                     January 2017


Appendix B.  Workshop Attendees

   In alphabetical order by first name, workshop attendees were: Adli
   Wahid, Alexey Melnikov, Andrew Sullivan, Arnold Sykosch, Brian
   Trammell, Chris Morrow, Cristine Hoepers, Dario Forte, Dave Cridland,
   Dave Dittrich, Eliot Lear, Foy Shiver, Frank Xialiang, Graciella
   Martinez, Jessica Stienberger, Jim Duncan, Joe Hildebrand, John Bond,
   John Graham-Cummings, John Kristoff, Kathleen Moriarty, Klaus
   Steding-Jessen, Linda Dunbar, Marco Obiso, Martin Stiemerling, Mat
   Ford, Merike Kaeo, Michael Daly, Mio Suzuki, Mirjam Kuehne, Mr. Fu
   TianFu , Nancy Cam-Winget, Nik Teague, Pat Cain, Roland Dobbins,
   Roman Danyliw, Rosella Mattioli, Sandeep Bhatt , Scott Pinkerton,
   Sharifah Roziah Mohd Kassim, Stuart Murdoch, Takeshi Takahashi, Ted
   Hardie, Tobias Gondrom, Tom Millar, Tomas Sander, Ulrich
   Seldeslachts, Valerie Duncan, Wes Young

Authors' Addresses

   Kathleen M. Moriarty
   Dell EMC Corporation
   176 South Street
   Hopkinton, MA
   United States

   Email: Kathleen.Moriarty@dell.com


   Mat Ford
   Internet Society
   Galerie Jean-Malbuisson 15
   Geneva
   Switzerland

   Email: ford@isoc.org

















Moriarty & Ford           Expires July 9, 2017                 [Page 15]


Html markup produced by rfcmarkup 1.129c, available from https://tools.ietf.org/tools/rfcmarkup/