Photos: Corel, Photodisk; Photodisk; Photodisk; Comstock; DOT Airborne Network Security Simulator (ANSS) Master Plan Overview Presented by: Chris Riley.

Slides:



Advertisements
Similar presentations
GateFusion Wireless Content Delivery
Advertisements

UCAIug HAN SRS v2.0 Summary August 12, Scope of HAN SRS in the NIST conceptual model.
© 2011 IBM Corporation Improving Reliability and Making Things Cheaper to Run Tuesday 20th September James Linsell-Fraser, Senior Architect & Client Technical.
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
Photos: Corel, Photodisk; Photodisk; Photodisk; Comstock; DOT Electronic Flight Bag Security Use Case and Aircraft Security Simulator Presented by: Chris.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Stephen S. Yau CSE , Fall Security Strategies.
Presented to: MPAR Working Group By: William Benner, Weather Processors Team Manager (AJP-1820), FAA Technical Center Date: 19 March 2007 Federal Aviation.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Electronics, Intelligence & Support Systems Solutions & Integration Charleston, South Carolina Overview.
Integrating information towards Digital ATM Mini Global Demonstration Presented By: Thien Ngo Date:August 28, 2013.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Information Security Issues at Casinos and eGaming
Lessons Learned in Smart Grid Cyber Security
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Joseph Ferracin Director IT Security Solutions Managing Security.
FirstEnergy / Jersey Central Power & Light Integrated Distributed Energy Resources (IDER) Joseph Waligorski FirstEnergy Grid-InterOp 2009 Denver, CO November.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
IPv6 integration with the ATN Tony Whyman Helios Information Services Ltd.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
ITS America CVFM Forum – Session #24 In-Flight Weather Applications 5 June 2007.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
Status Report for Critical Infrastructure Protection Advisory Group
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
IS Network and Telecommunications Risks Chapter Six.
Engineering Essential Characteristics Security Engineering Process Overview.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Presented to: Demonstrations and Prototypes TIM By: Steve Hodges Date: 05/04/2011 Federal Aviation Administration Aircraft Access to SWIM (AAtS) FY11 planned.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Federal Aviation Administration Presented to: Eurocontrol/SJU By: Mike Hritz Date: December 2009 System-Wide Information Management (SWIM) SWIM in General.
Lecture 24 Wireless Network Security
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
IS3220 Information Technology Infrastructure Security
Information Security tools for records managers Frank Rankin.
1 Federal Emergency Management Agency Charlie Hoffman Disaster Operations Directorate Chief, DEC Programs Disaster Emergency Communications National Public.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Moving To Business Objects XI – Release 2 Presented to Business Objects User Group Rich Strout October 20, 1006.
Financial Sector Cybersecurity R&D Priorities The Members of the FSSCC R&D Committee November 2014.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Part III: The Future: Scenarios, Conclusions, and Recommendations [of HSI Methods in System Development] Frank E. Ritter 26 feb 08 1.
Dr. Ir. Yeffry Handoko Putra
Quality Management System Deliverable Software 9115 revision A Key changes presentation IAQG 9115 Team March 2017.
Team 1 – Incident Response
Security Standard: “reasonable security”
Mini Global Demonstration
Cybersecurity at PJM Jonathon Monken
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Cybersecurity ATD technical
AMI Security Roadmap April 13, 2007.
Cyber Security in a Risk Management Framework
Cybersecurity at PJM Jonathon Monken
IT Management Services Infrastructure Services
Connected Aircraft: Key Performance Indicators
Presentation transcript:

Photos: Corel, Photodisk; Photodisk; Photodisk; Comstock; DOT Airborne Network Security Simulator (ANSS) Master Plan Overview Presented by: Chris Riley (DOT/Volpe) November 3,

Agenda ANSS Experiment 1 ANSS Experiment 2 ANSS Master Plan 2

Airborne Network Security Simulator (ANSS) Goals Identify potential information security threats in synthetic environment by simulating next generation aircraft communications systems Share knowledge, tools and methodologies with academia and other interested stakeholders to extend research value Act as coordinating authority for cyber security risk mitigation within the international aerospace & aviation community Recommend appropriate technical & procedural standards for security risks to aid in the development of regulatory guidelines and policies Influence industry bodies on cyber security best practices with respect to specifications, procedures, and recommendations used by the industry 3

Master Plan Overview – Phase 1 Inside Aircraft Network –Simulates a standard airborne network architecture including real and synthetic components –Interconnects with disparate aviation simulators to include real-world information in its experiments –Engages industry, academia and government in its experiments and recommendations –Design experiments to explore stakeholder identified issues and concerns 4

Demonstration Scenario; Airline AOC to Aircraft IEEE HLA /RTI Via Internet IEEE HLA /RTI Via Internet ANSS at WSU ANSS Operational Enclave Gatelink OPS Controller Firewall Aircraft Network Control Domain Information Domain Passenger Domain TWLU EFB Load & Balance Data Performance Calculation Performance Calculation 5 LaTech Ops-Center Simulator

Experiment 1 Scenario Final Pre-Flight Data Man-in-the- Middle device captures data and sends it to the Internet Modified Pre-Flight Data Hacker 6

ANSS Experiment 2 7

ANSS Phase 1 Experiment 2 Working with several aviation vendors to add Experiment 2 Functionality –Aircraft Control Domain (ACD) – Pratt & Whitney (P&W) FAST (Flight-data Acquisition, Storage and Transmission ) -- Engine Wireless Maintenance Toolset –ACD – General Electric (GE) Intelligent Platforms AFDX (Avionics Full Duplex Network, Switched Ethernet) simulated configuration –In Flight Entertainment (IFE) – Panasonic Inc. Simulated 3 seat suite of Wi-Fi equipment Developing operational scenarios/uses cases, e.g. –Intrusion Detection, Wireless data transfer, Engine Data/Gatelink interfaces UK Partners to provide Penetration Testing support 8

9 Aircraft Data Network (ADN) ANSS Phase 1 – Experiment 2 Aircraft controlAirline Information Services Passenger Information and Entertainment Services Passenger- Owned Devices Flight and Embedded Control Systems Cabin Core Admin Passenger Support Control the Airplane Operate the Airline Entertain the Passengers ClosedPrivatePublic Source –ARINC 664, Aircraft Data Network, Part 5, Network Domain Characteristics and Interconnection FAST (P&W) IFE(Panasonic)AFDX (GE) EFB/Gatelink

ANSS Master Plan 10

Master Plan Overview – Phase 2 External Interconnections –Include a SOA interface based on current Nextgen Standards –Build synthetic capabilities to evaluate cyber issues when the aircraft is both a SOA provider and consumer –Participate in FAA/DOD experiments to understand the commercial impact of cyber security in this environment –Identify issues and restrictions of global trust in the AN environment –Identity issues associated with centralized auditing, intrusion detection/prevention and a global view of the operation’s theater. 11

ANSS Phase 2 NEXTGEN Simulations 12 Trajectory/clearance changes Acknowledgmen ts TDL S NNE W ERA M Characteristics Situational awareness - advisory Commercial spectrum Limited or No source Authentication Low or no design assurance User specified QoS –RMA –Delivery (e.g. best effort) –Latency International usage based on reach of service provider User designed/directed controls and displays User specified FMS integration Weather Airspace status NOTAMS Characteristics Command and Control – safety critical Protected spectrum Source Authentication High safety assurance levels QoS dictated by safety case –High reliability, maintainability & availability –Guaranteed delivery –Low latency Harmonization based on International agreements Standardized controls and displays FMS integration TDL S ERA M Deviation requests Acknowledgments TF M

Master Plan Overview – Phase 3 Virtual World Training, Modeling and Simulation –Skill development plays a critical role in the cyber protection. Special skills will be needed to address the mobility, public safety and critical infrastructure components of this environment. –Gaming technology is successfully used to build virtual worlds and train the workforce through realistic scenarios. Scenario based training also allows researcher to observe student attack strategies in anticipation of the next level of attack. Learning attack approaches and exploits in a controlled environment feeds the development of predictive and adaptive defense strategies –Leveraging all of these assets, ANSS would develop a gaming environment where security teams from government, academia and industry will compete in “capture the flag” type scenarios. First line defenders, modes, methods and approaches captured in the experiments would prove invaluable to researchers in proactively protecting the AN environment 13

ANSS Phased Approach 14 Phase 1 Phase 2 Phase JFMAMJJASONDJFMAMJJASONDJFMAMJJASOND External Interconnections Experiment 1 – EFB/Gatelink (June 2010) Experiment 2 – Databuses, Wireless Maintenance, and In Flight Entertainment (Spring 2011) NextGen Simulations Experiment 1 - TBD Experiment 2 - TBD Experiment 1 - TBD Experiment 2 - TBD Virtual World Training, Modeling and Simulation

15 Astronautics Corporation of America Contributing Organizations to the ANSS Demonstration/Technical Workshop

Kevin Harnett, Volpe Center Cyber Security Program Manger – – Phone: Chris Riley, Volpe Center Cyber Security Researcher – – Phone: Contact Information 16