Analyzing Mission Impacts of Cyber Actions (AMICA)

نویسندگان

  • Steven Noel
  • Jackson Ludwig
  • Prem Jain
  • Dale Johnson
  • Roshan K. Thomas
  • Jenny McFarland
  • Ben King
  • Seth Webster
  • Brady Tello
چکیده

This paper describes AMICA (Analyzing Mission Impacts of Cyber Actions), an integrated approach for understanding mission impacts of cyber attacks. AMICA combines process modeling, discrete-event simulation, graph-based dependency modeling, and dynamic visualizations. This is a novel convergence of two lines of research: process modeling/simulation and attack graphs. AMICA captures process flows for mission tasks as well as cyber attacker and defender tactics, techniques, and procedures (TTPs). Vulnerability dependency graphs map network attack paths, and mission-dependency graphs define the hierarchy of high-to-low-level mission requirements mapped to cyber assets. Through simulation of the resulting integrated model, we quantify impacts in terms of mission-based measures, for various mission and threat scenarios. Dynamic visualization of simulation runs provides deeper understanding of cyber warfare dynamics, for situational awareness in the context of simulated conflicts. We demonstrate our approach through a prototype tool that combines operational and systems views for rapid analysis. 1.0 INTRODUCTION In the U.S. Department of Defense (DoD) roadmap for cyber modeling & simulation (M&S), planning for integrated cyber and kinetic mission assurance is a key capability area [1]. The range of capabilities called out in the roadmap underscores the urgent need for rapid progress in this area, especially given the asymmetric nature of cyber conflict. Of particular importance is the integration of kinetic operations with the defensive cyber operations that support them. This requires effective communication of cyber situations (and their big-picture impacts) to decision makers. In addition, there are numerous potential applications of cyber M&S, along a spectrum of increased maturity and corresponding research challenges, as shown in Figure 1. Understanding mission resilience to cyber warfare requires bringing together layers of information from numerous sources. At the lower layers, network topology, firewall policies, intrusion detection systems, system configurations, vulnerabilities, etc., all play a part. We can combine these into a higher-level attack graph model that shows transitive paths of vulnerability. We also need to map cyber assets to mission requirements, and capture dependencies from low-level requirements to higher-level ones appropriate for decision making. Because mission requirements are highly dynamic, we need to capture time-dependent models of mission flow. Cyber attacks and defenses are similarly dynamic, and defenses generally vary depending on particular attack classes. Analyzing Mission Impacts of Cyber Actions (AMICA) PAPER NBR 2 STO-MP-AVT-211 Analysis • Explore • Understand • What-Ifs Training • Planning • Doctrine • Dynamic Interaction Operations • Live Decisions • Courses of Action Figure 1: Spectrum of cyber M&S applications and challenges. We introduce an approach that addresses all these aspects of mission-oriented cyber resilience, through an integrated M&S environment. This approach is called Analyzing Mission Impacts of Cyber Actions (AMICA). AMICA supports exploration and experimentation of the mission impacts of cyber warfare. The goal is to develop a flexible, extensible, modular, multi-layer M&S system for quantitative assessment of operational impacts of cyber attacks on mission performance. AMICA is expected to increase our understanding of dependencies between operational missions, cyber TTPs, and computing infrastructure. 2.0 PREVIOUS WORK There have been numerous information-centric military exercises with aspects of mission assurance and cyber warfare. In many exercises (e.g., Global Thunder [2] and Turbo Challenge [3]), cyber security is an important component, but not the primary exercise focus. More cyber-focused exercises such as Cyber Flag [4] have integrated cyber activities with operational missions for training purposes. M&S has been applied in more traditional military spheres, e.g., for inferring enemy intent [5], entity-based battlefield simulations [6], and command decision support [7]. However, military mission planning has yet to leverage M&S and other formal methods as part of its standard practice, especially in the area of developing cyber defensive courses of action. In short, tools such as AMICA for assessing mission impact of cyber warfare are generally unavailable for operations-level support. The defense community is aggressively accelerating cyber defense forces [8], further motivating the need for more advanced capabilities in cyber course-of-action planning. In the cyber domain, M&S capabilities are still relatively immature. Still, previous work can be leveraged for certain components of an integrated overall M&S approach. Systems such as Topological Vulnerability Analysis (TVA) [9][10], Network Security Planning Architecture (NetSPA) [11], and NRL’s ACCEPT (A Configurable Cyber Event Prioritization Tool) [12] fuse network data (topology, firewall rules, asset inventories, vulnerability scans/databases, intrusion alerts, etc.) into graph-based models for mapping vulnerability paths and prioritizing events. Capabilities such as MITRE’s Cyber Command System (CyCS) [13] and Cyber Mission Impact Assessment (CMIA) [14], and AFRL’s Cyber Mission Assurance [15] capture mission and cyber dependencies. Analyzing Mission Impacts of Cyber Actions (AMICA) STO-MP-AVT-211 PAPER NBR 3 Another key enabler for cyber M&S is standardization efforts. Making Security MeasurableTM [16] is a collection of standardization activities within the cyber security community. It includes Common Vulnerabilities and Exposures (CVE), Common Attack Pattern Enumeration and Classification (CAPEC), Cyber Observable Expression (CybOX), Structured Threat Information Expression (STIX), and many others. These standards cover different aspects of security data needed for building comprehensive and accurate models. To capture the flow of mission and cyber processes, we leverage the Object Management Group (OMG) Business Process Model Notation (BPMN) [17] standard. We employ the commercial tool iGrafx [18], which extends BPMN with behavioral modeling, critical-path analysis, discrete-event simulation, Monte Carlo analysis, and experiment design. 3.0 APPROACH To explore the AMICA approach, we are conducting a pilot study and developing a proof-of-concept system. We seek a flexible, extensible, modular, and multi-layer M&S environment for quantitative assessment of operational impacts of cyber attacks on specific missions, as shown in Figure 2. Thus components can be interchanged, e.g., multiple missions on an infrastructure, to support analysis of different questions. Infrastructure Models Mission Models Cyber Defender TTPs Cyber Attacker TTPs

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Measuring the Utility of a Cyber Incident Mission Impact Assessment (CIMIA) Notification Process

Information is a critical asset on which all modern organizations depend to meet their mission objectives. Military organizations, in particular, have embedded Information and Communications Technologies (ICT) into their core mission processes as a means to increase their operational efficiency, exploit automation, improve decision quality, and enable real-time situational awareness. However, a...

متن کامل

An Integrated Cyber Panel System

The DARPA Cyber Panel program has funded research in defending mission-critical information systems from strategic coordinated attacks. This research spans many areas including novel sensors, alert correlation and reduction, visual correlation, mission impact assessment, and response. This paper describes the integration of Cyber Panel technologies from the different areas into an advanced cybe...

متن کامل

AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems

Access control is an essential security component in protecting sensitive data and services from unauthorized access to the resources in mission-critical Cyber-Physical Systems (CPSs). CPSs are different from conventional information processing systems in such that they involve interactions between the cyber world and the physical world. Therefore, existing access control models cannot be used ...

متن کامل

Evaluating the Impact of Cyber Attacks on Missions

Using current methods, it is virtually impossible to determine the impact of a cyber attack on the attainment of mission objectives. Do we know which mission elements are affected? Can we continue to operate and fulfill the mission? Should we wait for recovery? Can we salvage part of the mission? Since it is currently so difficult for humans to comprehend the mission impact of a cyber incident,...

متن کامل

Operational Exercise Integration Recommendations for DoD Cyber Ranges

Permission has been given to destroy this document when it is no longer needed. Cyber-enabled and cyber-physical systems connect and engage virtually every mission-critical military capability today. And as more warfighting technologies become integrated and connected, both the risks and opportunities from a cyberwarfare continue to grow—motivating sweeping requirements and investments in cyber...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015