U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview



Similar documents
II. DETAILED INFORMATION ABOUT THE FUNDING OPPORTUNITY

CRA. Cyber-Security Collaborative Research Alliance: MACRO: Models for Enabling Continuous Reconfigurability of Secure Missions

COOPERATIVE AGREEMENT BETWEEN. Cyber Security (CS) Collaborative Research Alliance (CRA) Consortium* AND

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Network Mission Assurance

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Cognitive and Organizational Challenges of Big Data in Cyber Defense

Intrusion Detection via Machine Learning for SCADA System Protection

Data Intensive Science and Computing

THE CHALLENGES OF CYBERSECURITY TRAINING

LEARNING OUTCOMES FOR THE PSYCHOLOGY MAJOR

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy February 2012

Addressing Human Behavior in Cyber Security

A Primer on Cyber Threat Intelligence

Symantec Cyber Security Services: A Recipe for Disaster

Time Is Not On Our Side!

US-CERT Year in Review. United States Computer Emergency Readiness Team

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Cyber Security. Chris Hankin, Imperial College London November 2014

The 5 Cybersecurity Concerns You Can t Overlook

Advanced Threat Protection with Dell SecureWorks Security Services

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

CyberNEXS Global Services

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)

U.S. Defense Priorities OSD PA&E

Cybersecurity Capability Maturity Model

PSYCHOLOGY PROGRAM LEARNING GOALS AND OUTCOMES BY COURSE LISTING

Master of Science Service Oriented Architecture for Enterprise. Courses description

Modelling cyber-threats in the Airport domain: a case study from the SECONOMICS project. Alessandra Tedeschi, Deep Blue S.r.

Update On Smart Grid Cyber Security

Cybersecurity Delivering Confidence in the Cyber Domain

OSCAR: Open Source Cybersecurity Academic Repository

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

Capabilities for Cybersecurity Resilience

Measuring Software Security

Cyber-Security: Private-Sector Efforts Addressing Cyber Threats

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

Enterprise Cybersecurity: Building an Effective Defense

Cyber Security. Vision. Mission

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

POLICIES TO MITIGATE CYBER RISK

CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE

Undergraduate Psychology Major Learning Goals and Outcomes i

DoD Strategy for Defending Networks, Systems, and Data

No Free Lunch in Cyber Security

Bio-Inspired Anomaly Detection

Dealer Member Cyber-security

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015

Cybersecurity on a Global Scale

Rising to the Challenge

Self-organized Collaboration of Distributed IDS Sensors

Security Visualization Past, Present, Future

WHITE PAPER. Attack the Attacker HOW A MANAGED SECURITY SERVICE IMPROVES EFFICIENCY AND SAVES COST

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

Cyber Information-Sharing Models: An Overview

A Framework for Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision-Making 1

White Paper: Leveraging Web Intelligence to Enhance Cyber Security


STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

MEng, BSc Applied Computer Science

Measurement Information Model

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

EL Program: Smart Manufacturing Systems Design and Analysis

ADVERSARIAL AND UNCERTAIN REASONING FOR ADAPTIVE CYBER DEFENSE: BUILDING THE SCIENTIFIC FOUNDATION. Sushil Jajodia George Mason University

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber Governance Preparing for the Inevitable Perimeter Breach

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009

An Overview of Large US Military Cybersecurity Organizations

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

How To Write The English Language Learner Can Do Booklet

DEVELOPING THE SCIENCE OF PRIVACY IN SUPPORT OF THE ART OF PRIVACY. NSA Civil Liberties & Privacy Office Feb 2015

School of Advanced Studies Doctor Of Management In Organizational Leadership. DM 004 Requirements

Symantec Cyber Security Services: DeepSight Intelligence

Cyberspace Situational Awarness in National Security System

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

Cyber Adversary Characterization. Know thy enemy!

MEng, BSc Computer Science with Artificial Intelligence

CFSD 21 ST CENTURY SKILL RUBRIC CRITICAL & CREATIVE THINKING

CyberSecurity Solutions. Delivering

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

US Federal Cyber Security Research Program. NITRD Program

ESCoRTS A European network for the Security of Control & Real Time Systems

Human Dimension in Cyber Operations Research and Development Priorities

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity

Define & Assess Skills - Smart Grid Security Specialists

A Game Theoretical Framework for Adversarial Learning

The Science of Security

School of Advanced Studies Doctor Of Management In Organizational Leadership/information Systems And Technology. DM/IST 004 Requirements

Improving proposal evaluation process with the help of vendor performance feedback and stochastic optimal control

Transcription:

U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014

Cyber Security Collaborative Research Alliance A Collaborative Venture between ARL, CERDEC, Academia, & Industry to advance the foundation of cyber science in the context of Army networks Develop a fundamental understanding of cyber phenomena (incl human aspects) Fundamental laws, theories, & theoretically grounded & empirically validated models Applicable to a broad array of Army domains, applications, & environments 2

Towards a Cyber Science Cyber Security Science Challenges Scientific understanding should manifest itself in models that: Are mathematically formulated Explicitly & formally specify assumptions, simplifications & constraints Involve characteristics of threats, defensive mechanisms & the defended network (including quantifiable attributes of the human) Are at least partly theoretically grounded & yield experimentally testable predictions Are experimentally validated Domain Challenges Heterogeneous & convergent networks Large attack surface Army must: Use & defend networks that it neither owns nor directly controls Construct mission networks with a variety of partners & allies Adapt to rapidly changing technologies, tactics, & threats Relatively disadvantaged assets Large scale & high dynamics Advanced persistent threats Close proximity with threats 3

Cyber Security Collaborative Research Alliance (CRA) Penn State Lead Research Organization (LRO) Prof. Patrick McDaniel (PSU) Consortium Lead Dr. Ananthram Swami (ARL)- Cooperative Agreement Manager (CAM) 4

CRA Vision Goal: Develop a rigorous science of cyber-security that will : a) Detect the risks and attacks present in the environment b) Understand / predict users, defenders and attacker actions c) Alter the environment to securely achieve maximal mission success rates at the lowest resource cost Outcome: Dictate and control the evolution of cyber-missions and adversarial actions Psychosocial Effects Cross-Cutting Research Issue Trans-disciplinary approach to cyber security research 5

Cyber Operation Model Develop formal structures for reasoning about cyber-maneuvers and security goals and strategies. Representations must be decomposable and composable in ways that make analysis tractable Operation model development: Characterize and model risks and user state, including uncertainty, Model the selection of a cyber-maneuver within an operation as a discrete decision problem Identify model elements that introduce fundamental hardness to decision making in this environment Operation model taxonomy and scenario development 6

Risk Develop theories and models that relate properties of dynamic risk assessment e ago algorithms to the fundamental properties tes of cyber-threat, Army s networks and defensive mechanisms User, Defender and Attacker Risk Models Explore models that classify humans into archetypes Infer capabilities & motivations of humans from observable behaviors Model as individuals and groups (teams and peers) System and Network Risk Models Develop metrics partially based on approaches such as Common Vulnerability Scoring System Quantifying and Communicating Risk 7

Detection Develop theories & models that relate properties and capabilities of cyber threat detection & recognition to properties of malicious activity Diagnosis-enabling intrusion detection: Models, algorithms &performance analysis: to infer high level attacks & effects using correlations, automated reasoning, & forensic techniques Computational cognitive models: Represent human processes of threat detection in dynamic environments. Techniques include Instance-based learning, case-based decision theory, reinforcement learning, decisions from experience, and behavioral game theory. Efficient i and effective evidence collection 8

Agility Develop theories, models and methods to reason about possible cyber maneuvers in network characteristics and topologies to thwart and defeat malicious activities Characterize the maneuver space: Concise and accurate representations: actions, impacts, cost Optimal re-configuration: of all layers, while handling deception at both attacker and defender sides, human factor limitations, and the dynamics of the cyber-secure operation state Capturing End-State Dynamics: Game theoretic approaches 9

Psychosocial Effects Develop theoretical understanding of the socio-cognitive factors that impact the decision making of the user, defender, & adversary Modeling human behavior in the mission context : Develop systematic, scientific way of integrating factors that influence human performance into the operation models. Factors may include cognitive biases, personality traits, environmental factors, stress, fatigue Integrating human factors in system design Explore the knowledge necessary to be successful in detecting cyberattacks, and understanding the experience gap between personnel Explore how feedback speeds up learning & helps in adaptation Instruct and evaluate a science of interfaces to better support defenders in detecting and responding to cyber attacks 10

SUMMARY CRA will develop the theoretical underpinnings for a Science of Cyber Security