SLIDE 1
IT2EC 2020 Blending Cyber Effects into Live, Virtual and Constructive Simulation Cyber Training
Blending Cyber Effects into Live, Virtual and Constructive Simulation
Daniel J. Lacks, PhD1, Stephen Lopez-Couto2, Kevin Hofstra3
1 Chief Scientist, Cole Engineering Services, Inc., Orlando, Florida, USA 2 Senior Program Manager, Cole Engineering Services, Inc., Orlando, Florida, USA 3 Chief Technology Officer, By Light Professional Services, Inc., Denver, CO, USA
Abstract — US DoD Multi Domain Operations include cyber operations, yet the same integration of cyber and kinetic forces within military M&S training systems is limited. Problems exist not only representing and integrating cyber effects within current M&S systems, but also with training soldiers using computer models tuned for kinetic
- interactions. This work examines integrating cyber operations into LVC training operations by focusing on cyber
terrain, modeling, and interoperability. We discuss the DIS Standard Information Operations Protocol Data Unit (IO PDU) and the Cyber Kinetic Effects Integrator (CKEI) approach. With the popularization of the Digital Twin concept, digitizing the cyber terrain representation as a realistic simulated battlefield offers a promising and efficient way to integrate capabilities for training and mission rehearsal. M&S tools import commercial software network topology formats to create Digital Twin network topologies. The OASIS TOSCA standard may be a foundation for a future M&S cyber terrain standard.
1 Background
US DoD Multi Domain Operations (MDO) include cyber
- perations, yet the same integration of cyber and kinetic
forces within military Modeling and Simulation (M&S) training systems is limited. Problems exist not only representing and integrating cyber effects within current M&S systems, but also with training soldiers using computer models tuned for kinetic interactions. There is a lack of modelling non-kinetic interactions and their effects
- n kinetic actions and performance [1-12]. Cyber training
using virtualized “ranges” matured significantly in recent years, however they remain mostly segregated from the traditional M&S systems. Cyber training is applicable in different types of LVC training scenarios where digital and network-centric warfare are utilized:
- Command Staff Training whose adversaries use
network-centric digital tactical communications, situational awareness, and planning equipment.
- Using, disseminating, or protecting data that could
compromise your security or combat effectiveness.
- Intelligence collection, fusion and analysis
- Tactical operations that rely on digital systems
- Maintaining
digital
- r
networked/networking equipment.
- Staff that operates with cyber defense and offense
teams in a kinetic environment (CEMA).
- Engaging adversaries with digital or networked
equipment. The goal of this research is to inspire the exercise directors and scenario designers to take LVC training beyond basic cyber hygiene by including the impacts between cyber warfare and kinetic and non-kinetic effects. Within the US DoD, offensive cyber operations and the predominance of defensive cyber operations are conducted at the core or higher echelons; they are not tactical level
- resources. In a kinetic LVC training event, the
preponderance of the training audience operates at the tactical level (the L and V). The US Army’s CEMA concept aims to fill the gap between tactical and
- perational cyber, so LVC based training approaches to
satisfy these emerging operational concepts must be defined, and systems to provide the training must be developed. 1.1 A Definition of Cyber LVC Traditional kinetic training simulations are classified as a part of the Live, Virtual or Constructive domains based primarily on the equipment utilized, how the user interacts with the simulation and how the world is represented.
- Live Simulation: Utilizes operational equipment in a
physical location that is established for training. The terrain is the real world, with modifications to meet specific training objectives.
- Virtual Simulation: Utilizes a physical or virtual
simulator of a real system in a simulated virtual world.
- Constructive Simulation: Utilizes a software model
- f physical equipment in a computer simulated
environment. The level of detail of the software models, realism of
- pposing forces and targets, and other system specific
features can vary, but the terrain and physical interface utilized by the training audience defines the domain. Cyber M&S systems should be classified similarly, to aid event designers in the selection and utilization of tools for specific use cases. For cyber M&S, it is feasible to reduce the simulation domains to just two: Live and Constructive.
- Live Cyber Simulations: Utilize actual OCO and