Cognitive Support for Intelligent Survivability Management

Slides:



Advertisements
Similar presentations
Learning in the Intelligent Complex Adaptive System David Bennet Alex Bennet Mountain Quest Institute March 20, 2002.
Advertisements

Pat Langley Institute for the Study of Learning and Expertise Palo Alto, California and Center for the Study of Language and Information Stanford University,
Information Processing Technology Office Learning Workshop April 12, 2004 Seedling Overview Learning Hierarchical Reactive Skills from Reasoning and Experience.
Strategic Management/ Business Policy
1 The Strategic Management Process. Copyright © Houghton Mifflin Company. All rights reserved Why do some organizations succeed while others fail?
1 1 The Strategic Management Process. 2 Why do some organizations succeed while others fail? Strategy  An action managers take to achieve one or more.
Making Real-time Systems Survive Malicious Attacks Partha Pal Joe Loyall, Franklin Webber, Rick Schantz BBN Technologies.
Game AI Fundamentals. What is Artificial Intelligence (AI)? Not easy to answer… “Ability of a computer or other machine to perform those activities that.
MILCOM 2001 October page 1 Defense Enabling Using Advanced Middleware: An Example Franklin Webber, Partha Pal, Richard Schantz, Michael Atighetchi,
DSN 2002 June page 1 BBN, UIUC, Boeing, and UM Intrusion Tolerance by Unpredictable Adaptation (ITUA) Franklin Webber BBN Technologies ParthaPal.
WDMS 2002 June page 1 Middleware Policies for Intrusion Tolerance QuO Franklin Webber, Partha Pal, Chris Jones, Michael Atighetchi, and Paul Rubel.
Cognitive Support for Intelligent Survivability Management CSISM TEAM June 21, 2007.
FLTC Perspective Focused Long Term Challenges (FLTCs) are an innovative approach to match user requirements with relevant technology development, while.
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
Challenges in Enabling and Exploiting Opportunistic Spectrum MANETs An Industry Perspective NSF “Beyond Cognitive Radio” Workshop June 13-14, 2011 Ram.
Thinking Twice Fast Cognition, Slow Cognition, and the Challenge of Critical Thinking.
Dissertation Defense Machine Assisted Grading of Rare Collectibles through the COINS framework By: Rick Bassett July 24, 2003.
Information Management Services for Proactive Computing Dr. Joe Loyall, Michael Atighetchi, Dr. Partha Pal, Aaron Paulos, Matt Gillen, Jon Webb Rick Schantz.
OASI S ORGANICALLY ASSURED & SURVIVABLE INFORMATION SYSEMS PRINCIPAL INVESTIGATORS’ MEETING Santa Fe, NM 24 July 2001 Jaynarayan H. Lala Program Manger.
SRS Architecture Study Partha Pal Franklin Webber.
Dynamic Task Allocation in a turn based strategy game Gilles Schtickzelle September 2012 ULB.
Unclassified//For Official Use Only 1 RAPID: Representation and Analysis of Probabilistic Intelligence Data Carnegie Mellon University PI : Prof. Jaime.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Automating Cyber- Defense Management By: Zach Archer COSC 316.
Information Aids for Diagnosis Tasks Based on Operators’ Strategies 김 종 현.
Use of Soar for Modeling Cyber Operations 36 th Soar Workshop Ann Arbor, Michigan Denise Nicholson, Ph.D., Director of X Ryan O’Grady, Software Engineer.
BILC Conference Athens, Greece 22 – 26 June 2008 Ray T. Clifford
Creating a Positive Learning Environment
NAVCube Analytics for Business
BUSINESS STRATEGY AND ‘COMMON SENSE’
Strategic Management/ Business Policy
Joe Loyall, Rick Schantz, Gary Duzan
Middleware Policies for Intrusion Tolerance
Chan M. Hellman – ASSOCIATE DEAN
CHAPTER 1 Introduction BIC 3337 EXPERT SYSTEM.
Power Point Set 9b: Competitive Dynamics: Real Options
Providing Instruction & Explanation
Learning Objectives Define power and its relationship to authority and influence. Identify the various classifications of power. Discuss the contingency.
KELA Targeted Cyber Intelligence
Dr Iain Reid (University of Malta)
Artificial Intelligence Lecture No. 5
Brain Initiative Informational Conference Call
Housekeeping: Candidate’s Statement
Enterprise Resource Management(ERM) & ERM Checklist
Strategic Management/ Business Policy
BCG Growth/Share Matrix
AI in Cyber-security: Examples of Algorithms & Techniques
Modeling Cyberspace Operations
Roku-dan meta-framework
Presented by Marnee Loftin, MA; LSSP July 12, 2018
Power Point Set 9b: Competitive Dynamics: Real Options
Strategic Management/ Business Policy
Multi-Step Attack Defense Operating Point Estimation via Bayesian Modeling under Parameter Uncertainty Peng Liu, Jun Dai, Xiaoyan Sun, Robert Cole Penn.
Strategic Management/ Business Policy
Supporting an omnichannel strategy Enabling an omnichannel strategy
Geospatial and Problem Specific Semantics Danielle Forsyth, CEO and Co-Founder Thetus Corporation 20 June, 2006.
Roku-dan meta-framework
Flooding Interventions Part of PhD research:
Power Point Set 9b: Competitive Dynamics: Real Options
What are the Resilience Mechanisms? Hugo Pereira Evoleo Technologies
Bernadette Stadler Scoville Fellow
ORGAnisational resilience analysis introduction
Wenyu Ren, Timothy Yardley, Klara Nahrstedt
Cybersecurity EXERCISE (CE) ATD Scenario questions
Strategic Management/ Business Policy
The Australian Taxation Office Information Management and Analytics
Statistical based IDS background introduction
SUPPLY CHAIN TECHNOLOGY:
Strategic Management/ Business Policy
Shebo Nalishebo Research Fellow, Public Finance 12 September 2019
Presentation transcript:

Cognitive Support for Intelligent Survivability Management Partha Pal Rick Schantz, Franklin Webber BBN Technologies DSN HOT DEP 2007 June 26 2007

Context Cyber-Defense Survivable systems Automated … Self-improving…… Dependable systems must be dependable when attacked Cyber defense considerations increasingly affect dependable system design DARPA OASIS Dem/Val program demonstrated high level of resilience against sophisticated cyber attacks But needed considerable expert involvement in cyber-defense decision making Self-regenerative Survivable Systems– an emerging direction within the general cyber defense research Cyber-Defense Survivable systems Automated … Self-improving…… Our Focus: Automated interpretation of observation and response selection..

Challenges Goal: Automate the reasoning performed by expert cyber-defense administrators Effective, reusable, easy to port and retarget Challenges: Making sense of low-level information (alerts, observations) to drive low-level defense-mechanisms (block, isolate etc.) such that higher-level objectives (survive, continue to operate) are achieved Doing it as well as human experts Additional difficulties Rapid and real time decision-making and response Uncertainty due to incomplete and imperfect information Widely varying operating conditions (no alerts to 100s of alerts per second) New symptoms and changes in adversary’s strategy

Multi-Layer reasoning Approach Multi-perspective multi-hypothesis deliberation Keep all options open– delay the bindings Divide and conquer Current-utility as well as potential adversarial counter-response based response selection A simple “match” is insufficient against intelligent adversary Unpredictability to counter gaming Maintain while deliberate Fast containment response Buy time for higher level reasoning Interpret “Immunity” against repeats and variants Learning-based dynamic modification of defense parameters and strategies Multi-Layer reasoning OLC Select Response Learning ILC

High Level Reasoning Flow