In Introducing Cyber Effects in C2 Simulation
- Dr. B. Boltjes1, Dr. M. Pullen2, Dr. K. L. Morse3
1TNO Defence Research, The Netherlands 2George Mason University, C4I Centre. 3Johns Hopkins University / Applied Physics Laboratory
In Introducing Cyber Effects in C2 Simulation Dr. B. Boltjes 1 , - - PowerPoint PPT Presentation
In Introducing Cyber Effects in C2 Simulation Dr. B. Boltjes 1 , Dr. M. Pullen 2 , Dr. K. L. Morse 3 1 TNO Defence Research, The Netherlands 2 George Mason University, C4I Centre. 3 Johns Hopkins University / Applied Physics Laboratory APPROVED
1TNO Defence Research, The Netherlands 2George Mason University, C4I Centre. 3Johns Hopkins University / Applied Physics Laboratory
APPROVED FOR PUBLIC RELEASE.
MSG: Modelling & Simulation Group
Maritime Air, and Land domains.
new threats such as credible simulation of cyberattacks.
3
APPROVED FOR PUBLIC RELEASE.
Defence efforts
best practice on how to achieve/implement effective representations in mission rehearsal and training
implementations
4 EAC2s: Effects/Attacks/Countermeasures and Countereffects
APPROVED FOR PUBLIC RELEASE.
Key objectives and expected achievements:
Countereffects (EAC2s) that are most worth modelling
work for future activities
and 145. (NMSG-151 Presentation by Dr. Mark Pullen, GMU C4I & Cyber Center)
5
APPROVED FOR PUBLIC RELEASE.
SISO: Simulation Interoperability Standards Organization I/ITSEC: Interservice/ Industry Training, Simulation and Education Conference
EAC2s list details:
processes and procedures for dealing with the cyberattacks .
simulation in campaign and mission level exercises of the EAC2s.
effective representations in mission rehearsal and training.
EAC2s: Effects/Attacks/Countermeasures and Countereffects
APPROVED FOR PUBLIC RELEASE.
APPROVED FOR PUBLIC RELEASE.
APPROVED FOR PUBLIC RELEASE.
C2SIM: Command & Control Simulation
9
APPROVED FOR PUBLIC RELEASE.
saves $$$
10
APPROVED FOR PUBLIC RELEASE.
Real-time database BML Messages (Orders, Reports, etc.) BML Web Services + Initialization and Synchronization
11
APPROVED FOR PUBLIC RELEASE.
BML: Battlefield Management Language
C2SIM Example: NATO MSG SG-085 Fin inal Demonstratio ion Architecture
12
APPROVED FOR PUBLIC RELEASE.
to training exercises
expensive/time-consuming
13
APPROVED FOR PUBLIC RELEASE.
CWIX: Coalition Warrior Interoperability eXercise
Command and Control Systems Simulation Systems
real-time database BML Messages (Orders, Reports, etc.)
BML Web Services + Initialization and Synchronization Cyber Effects Message Editor Cyber Exercise Driver
14
APPROVED FOR PUBLIC RELEASE.
lidatin ing ball llotable le SIS SISO C2 C2SI SIM standard
lete testin ing
lti-natio ional l brig rigade sc scenario io
SME role le-pla layers debrie iefed on cyber r effects
2SIM-Cyber testin ing fr from CWIX 20 2018 18
15
APPROVED FOR PUBLIC RELEASE.
SME: Subject Matter Expert
DISTRIBUTION STATEMENT A - APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED.
CyRDEM: Cyber Reference Data Exchange Model
responses during OT&E events
cyber range.
“Establish an enterprise-wide cyber modeling and simulation capability. DoD will work in collaboration with the intelligence community to develop the data schema, databases, algorithms, and modeling and simulation (M&S) capabilities necessary to assess the effectiveness of cyber operations.” – The DoD Cyber Strategy, April 2015 “The Adversarial Cybersecurity DT&E phase, … , includes an evaluation of the system’s cybersecurity in a mission context, using realistic threat exploitation techniques, while in a representative operating environment.” - The DoD Cybersecurity T&E Guidebook, section 3.3.4, Adversarial Cybersecurity DT&E
17
DISTRIBUTION STATEMENT A - APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED.
DT&E: Development Test & Evaluation
cyber ranges.
(CRIS) working group to identify keys areas in which the establishment and adoption of standards across cyber ranges will result in efficiencies and improved scalability.
18
DISTRIBUTION STATEMENT A - APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED.
Cyber M&S Technical Working Group (CyMSTWG) Interoperability Technical Capability Team (ITCT) is the lack of a reference Data Exchange Model (DEM) for cyber.
effects in the LVC environment.”
DEM, each federation will define their own to meet their immediate needs.
and their associated interfaces to achieve broader interoperability in future federations.
19
DISTRIBUTION STATEMENT A - APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED.
LVC: Live, Virtual & Constructive
contributor to interoperability and reuse within and between cyber and kinetic LVC environments.
neutral format with loss-less conversion to multiple architecture-specific formats.
20
DISTRIBUTION STATEMENT A - APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED.
cyber effects, network representation, offensive and defensive, and sensor reports, based upon use cases
Reference DEM
be represented in multiple formats, e.g., HLA Evolved FOM, HLA 1.3 FOM, XML messages, TENA LROM, DIS IO PDU, etc.
Reference DEM within one or more stakeholder cyber representation and integration capabilities
21
DISTRIBUTION STATEMENT A - APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED.
HLA: High Level Architecture, FOM: Federation Object Model, TENA: Test and Training Enabling Architecture DIS: Distributed Interactive Simulation, IO PDU: Information Operations Protocol Data Unit
Response Team (CMU SEI/CERT)
International: l:
− Canadian JWFC − NATO Joint Force Training Centre (JFTC) − MBDA France − TNO Defence (The Netherlands)
Contractor Co Companies:
− Alion Science & Technology − CACI − CapeGemini − Dignitas Tech − Dynamic Animation Systems − Engility Corporation − Leidos − McGlynn Consulting Group (MCG) − Metova − SAIC − Seajays Consultancy − Thales − Trideum
Lea ead: Kath Katherin ine L. . Mor
Tec echnic ical l Act Activit ity Dire recto tor: : Chr hris is McGro roarty ARL-HRED-STTC 22
DISTRIBUTION STATEMENT A - APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED.
kinetic simulation environment
1. Target system identification
2. Target system behavioral effects
embedded emulators on testing range
1. Target system identification
2. Target system behavioral effects
23
DISTRIBUTION STATEMENT A - APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED.
the absence of a cyber range
1. Target system identification
2. Attack representation (possibly an enumeration)
to kinetic simulations where their effects are simulated (possibly over time)
1. Target system identification
2. Attack representation (possibly an enumeration)
24
DISTRIBUTION STATEMENT A - APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED.
to a constructive kinetic simulation environment including a simulation of the system under design with embedded cyber defenses
1. Target system identification
2. Attack representation (possibly an enumeration)
25
DISTRIBUTION STATEMENT A - APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED.
OCO/DCO: Offensive Cyber Operations/Defensive Cyber Operations
https://discussions.sisostds.org/index.htm?A0=SIW-SG- CYBERMS
26
DISTRIBUTION STATEMENT A - APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED.
SIW: Simulation Innovation Workshop
27
DISTRIBUTION STATEMENT A - APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED.
Identify & categorize capabilities
Cyber DEM / FOM Module
Demonstration Literature review Guidance Use cases Glossary, taxonomies,
Effects/ attacks/ countermeasures and countereffects most worth modelling Fidelity & credibility levels Available implementations C2Sim Cyber Means Effects Kinetic Kinetic Cyber
Command and Control Systems Simulation Systems real-time database BML Messages (Orders, Reports, etc.) BML Web Services + Initialization and Synchronization Cyber Effects Message Editor Cyber Exercise Driver29
30