Use of Soar for Modeling Cyber Operations 36 th Soar Workshop Ann Arbor, Michigan Denise Nicholson, Ph.D., Director of X Ryan O’Grady, Software Engineer.

Slides:



Advertisements
Similar presentations
VirtualSim Inc. Real tools for virtual worlds Presentation.
Advertisements

Modelling CGFs for tactical air-to-air combat training
Chapter 11 user support. Issues –different types of support at different times –implementation and presentation both important –all need careful design.
From Model-based to Model-driven Design of User Interfaces.
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
Semantic Web and Web Mining: Networking with Industry and Academia İsmail Hakkı Toroslu IST EVENT 2006.
Software Issues Derived from Dr. Fawcett’s Slides Phil Pratt-Szeliga Fall 2009.
Annual SERC Research Review - Student Presentation, October 5-6, Extending Model Based System Engineering to Utilize 3D Virtual Environments Peter.
MDC Open Information Model West Virginia University CS486 Presentation Feb 18, 2000 Lijian Liu (OIM:
Module 3: Business Information Systems Chapter 11: Knowledge Management.
COMP 410 & Sky.NET May 2 nd, What is COMP 410? Forming an independent company The customer The planning Learning teamwork.
CSIAC is a DoD Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC) Presentation to: Insider Threat SOAR Workshop.
A Multi-Domain Evaluation of Scaling in Soar’s Episodic Memory Nate Derbinsky, Justin Li, John E. Laird University of Michigan.
University of Dublin Trinity College Localisation and Personalisation: Dynamic Retrieval & Adaptation of Multi-lingual Multimedia Content Prof Vincent.
11 C H A P T E R Artificial Intelligence and Expert Systems.
Hummm…  How do I create an engaging online course that facilitates learning?
High Performance Embedded Computing © 2007 Elsevier Lecture 3: Design Methodologies Embedded Computing Systems Mikko Lipasti, adapted from M. Schulte Based.
High Performance Embedded Computing © 2007 Elsevier Chapter 1, part 2: Embedded Computing High Performance Embedded Computing Wayne Wolf.
Measuring the Quality of Decisionmaking and Planning Framed in the Context of IBC Experimentation February 9, 2007 Evidence Based Research, Inc.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
ICCS WSES BOF Discussion. Possible Topics Scientific workflows and Grid infrastructure Utilization of computing resources in scientific workflows; Virtual.
COMM89 Knowledge-Based Systems Engineering Lecture 8 Life-cycles and Methodologies
Issues in Ontology-based Information integration By Zhan Cui, Dean Jones and Paul O’Brien.
Autonomous Mission Management of Unmanned Vehicles using Soar Scott Hanford Penn State Applied Research Lab Distribution A Approved for Public Release;
Paul Beraud, Alen Cruz, Suzanne Hassell, Juan Sandoval, Jeffrey J Wiley November 15 th, 2010 CRW’ : NETWORK MANEUVER COMMANDER – Resilient Cyber.
Ontologies Reasoning Components Agents Simulations An Overview of Model-Driven Engineering and Architecture Jacques Robin.
Competence-Preserving Retention of Learned Knowledge in Soar’s Working and Procedural Memories Nate Derbinsky, John E. Laird University of Michigan.
Learning Procedural Knowledge through Observation -Michael van Lent, John E. Laird – 인터넷 기술 전공 022ITI02 성유진.
ACGT Architecture and Grid Infrastructure Juliusz Pukacki ‏ EGEE Conference Budapest, 4 October 2007.
Introduction to Machine Learning, its potential usage in network area,
Human Computer Interaction Lecture 21 User Support
GridOS: Operating System Services for Grid Architectures
Kai Li, Allen D. Malony, Sameer Shende, Robert Bell
Advanced Computer Systems
CSCE 548 Secure Software Development Risk-Based Security Testing
OptiView™ XG Network Analysis Tablet
Physical Data Model – step-by-step instructions and template
MetaOS Concept MetaOS developed by Ambient Computing to coordinate the function of smart, networked devices Smart networked devices include processing.
Design and Manufacturing in a Distributed Computer Environment
System Design and Modeling
Middleware independent Information Service
Software Design and Architecture
课程名 编译原理 Compiling Techniques
KNOWLEDGE ACQUISITION
Chapter 1 The Nature of Software
Chapter 1 The Nature of Software
Business Rule Based Configuration Management and Software System Implementation Using Decision Tables Olegas Vasilecas, Aidas Smaizys VGTU, Vilnius, Lithuania.
Overview of System Engineering
An Architecture for Policy-based C2 Decision Support Systems
AI in Cyber-security: Examples of Algorithms & Techniques
Current Applied Soar Agent Development
Modeling Cyberspace Operations
Group Y Presenters: (indicate roles)
cFS-based Autonomy Requirements Tester (ART)
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Introduction to Software Testing
Chapter 15, Exploring the Digital Domain
Operating Systems Bina Ramamurthy CSE421 11/27/2018 B.Ramamurthy.
CSc4730/6730 Scientific Visualization
Soar Agents for Cyberspace 5/15/2018
Team Members: Member1, … Spring 2013
Analysis models and design models
CS 8532: Advanced Software Engineering
Pervasive Computing Happening?
Chapter 11 user support.
Applying Use Cases (Chapters 25,26)
Applying Use Cases (Chapters 25,26)
Subject Name: SOFTWARE ENGINEERING Subject Code:10IS51
Rich Model Toolkit – An Infrastructure for Reliable Computer Systems
Presentation transcript:

Use of Soar for Modeling Cyber Operations 36 th Soar Workshop Ann Arbor, Michigan Denise Nicholson, Ph.D., Director of X Ryan O’Grady, Software Engineer

2 SC2RAM Simulated Cognitive Cyber Red-team Attacker Model Phase II SBIR ONR topic N POP FY15-17

3 CYSTINE (CYber SecuriTy INstruction Environment) Phase II SBIR AFRL topic AF POP FY15-17

How Soar links Cyberspace Potential to represent Doctrinal Templates (Ontologies) of adversary / defense  Do not exist/are rudimentary for cyberspace operations  Useful for action->counter-action (i.e. maneuver), attribution, and deterrence  Must address cyberspace layers 4 Cyberspace Layer IndicatorsRelative Detection Difficulty Adversary Cost to change Cognitive/ Social Intent/Goals TTPs Social Presence HardMedium (harder after foothold is gained) Logical Malware variants IP addresses/TCP Ports Configurations/Logs Low->Medium (depending on adversary sophistication) Low Physical Infrastructure Computing devices Spectrum Location MediumHigh (lower after foothold is gained) SoarTech expertise Where most resources are spent

SC2RAM Agent Demonstration Video URL 5

SC2RAM Architecture 6

Soar Agent in Brief 7 Built using “Forest of Goals” approach, variation of NGS Goal Hierarchy read into WM from XML files Attack-Defense Trees read into WM from XML files General tasks and parameters to output link, translated into network commands via HackerToolkit Results of network commands translated via HackerToolkit and written to input link

Overview of Behavior The agent’s top-level goal is to access and explore the file system of a particular network space Because the target information is on a file system, the agent decides it needs access to the file system The agent decides to try to achieve access by mining user credentials for the system This leads to recursive subgoals to locate an information source that may contain credentials, search the exfiltrated information for credentials, and then (if found) use those credentials to access the system 8

Under The Hood – Agent Knowledge The agent’s knowledge is structured as a set of modular goals that can interleave in multiple ways to support different situations. Example: A “Possess information” goal is required to possess files on the target file-system. There are many possibly ways to “Possess information”, based on the information location, type, medium, etc. One way to gain access to files on a file system is to exfiltrate (again with various potential methods) some user credentials for the system. This in turn generates a different “Possess information” goal, which can again be achieved in multiple possible ways. The threading and interleaving of goals for a particular attack generates an “Attack tree” structure, but the underlying goals are more of a graph The specific demo generates a single “Attack tree” trajectory, but the underlying knowledge representation has numerous placeholders ready to be populated with additional choices, representing a variety of Tactics, Techniques, and Procedures 9

Generated/Composed Attack Tree

Under The Hood – Interaction Middleware Design objectives: –Use existing, standard cyber operations tools Support realistic attack Tactics, Techniques, and Procedures Support future adaptation and extension as toolkits increase in sophistication –Generalize agent-tool interactions Allow reuse of agent reasoning to heterogeneous tools that perform similar functions Decouple decision making from details of attack execution –Support easy integration of new tools Keep toolkit up to date with state of the art at low cost Keep toolkit additions decoupled from agent knowledge enhancements 11

HackerToolkit Middleware Architecture 12

Crawl, Walk, Run 13 Initial demonstration at the end of the Phase 1 Option in 3 vignettes with IHMC’s KAoS network simulation. Demonstrated interoperability with the Michigan Cyber Range (MCR) Alphaville virtualized network. Current Phase II efforts expanded cognitive agent capabilities in situations relevant to transition customer’s scenarios – i.e. capability or tool for a Cyber Exercise

What Comes Next 14 Moving Goal Hierarchy and Attack-Defense Trees to Semantic Memory Plan Recognition to predict adversary actions Explore how Episodic Memory could be used

N UGGETS & C OAL 15 NuggetsCoal A great “wicked problem” to explore learning mechanisms Resource intensive knowledge acquisition and representation Explanation of agent’s decisions is valuable Difficult to demonstrate autonomous vs automated for such complex domain