IDS used within Satellite As a Sensor Duong Hang.

Slides:



Advertisements
Similar presentations
The U.S. Merchant Marine and America’s Maritime Security
Advertisements

Semantic Web for the Military User C2 Applications Breakout Report 11/14/01.
Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences Paul Smart, Ali.
Marc Grégoire, DRDC Ottawa Luc Beaudoin, Bologik Inc.
Upgrading from Calibration Manager to Blue Mountain RAM
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Copyright © 2012, SAS Institute Inc. All rights reserved. Cyber Security threats to Open Government Data Vishal Marria April 2014.
Modeling Human Reasoning About Meta-Information Presented By: Scott Langevin Jingsong Wang.
Fusion and Automation Fusion and Automation Human Cognitive and Visualization Issues Jean-Remi Duquet Marc Gregoire Maura Lohrenz Kesh Kesavados Elisa.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
ESA SSA SWE element status and near future plans 7th European Space Weather Week November, Brugge, Belgium Juha-Pekka Luntama Space Weather.
Disaster Communications System (DCS) Overview for State and Local Governments National Conference on Emergency Communications (NCEC) Panel 5: State and.
1 Satellite Link Equations Introduction to Space Systems and Spacecraft Design Space Systems Design.
Report on Multi-agent Data Fusion System: Design and implementation issues 1 By Ganesh Godavari.
Presented to: MPAR Working Group By: William Benner, Weather Processors Team Manager (AJP-1820), FAA Technical Center Date: 19 March 2007 Federal Aviation.
Date / references EBMS Solution for Police Agenda EBMS Product Range Emergency Service Sensor Solution Tracking Solution Video Solution Check.
Intranets Lessons from Global Experiences J Satyanarayana Chief Executive Officer National Institute for Smart Government Hyderabad, India.
CASE STUDY: Implementing and Administering SAS® Enterprise Guide® Across the Enterprise As a Solution for Data Access Security Ulf Borjesson Evangeline.
National Security Space Applications Bob Hall AGI Product Manager.
The Canadian Lightning Detection Network (CLDN). Novel Approaches for Performance Measurement & Network Management. Meteorological Service of Canada D.
Streamlining Business Operations
NATO VIZ-N/X Custom Ontologies for Expanded Social Network Analysis Amy K. C. S. Vanderbilt, Ph.D. and J. Andrew Skene 4465 Brookfield Corporate Drive,
Indian Ocean METOC Imager (IOMI) Operational Concept Demonstrates Military Operational Utility and Enables Improved Global Weather Prediction Data to Naval.
1. 2 Purpose of This Presentation ◆ To explain how spacecraft can be virtualized by using a standard modeling method; ◆ To introduce the basic concept.
Strategies for Ensuring Optimal Guidance in Decision Support Systems for Winter Maintenance Operations Kevin Petty, Daniel Johns, Paul Bridge, Mikko Siitonen,
XYZ 10/2/2015 MIT Lincoln Laboratory Sidecar Network Adapters: Open Architecture for ISR Data Sources Craig McNally, Larry Barbieri, Charles Yee.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Space-Based Network Centric Operations Research. Secure Autonomous Integrated Controller for Distributed Sensor Webs Objective Develop architectures and.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Woody Roberts Tom LeFebvre Kevin Manross Paul Schultz Evan Polster Xiangbao Jing ESRL/Global Systems Division Application of RUA/RTMA to AWIPS and the.
The Namibia Flood Dashboard Satellite Acquisition and Data Availability through the Namibia Flood Dashboard Matt Handy NASA Goddard Space Flight Center.
.1 RESEARCH & TECHNOLOGY DEVELOPMENT CENTER SYSTEM AND INFORMATION SCIENCES JHU/MIT Proprietary Titan MESSENGER Autonomy Experiment.
1 Observing Systems Update Steve Ruberg Great Lakes Environmental Research Lab March 1, 2013 Great Lakes Environmental Research Laboratory.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
1 Requirements Gathering, Validation, and Concept Studies GOES Users’ Conference Boulder, CO October 1-3, 2002.
FLTC Perspective Focused Long Term Challenges (FLTCs) are an innovative approach to match user requirements with relevant technology development, while.
C4ISR and Information Warfare Naval Weapons Systems.
Understanding the Human Network Martin Kruger LCDR Jodie Gooby November 2008.
2 nd GNSS Vulnerabilities and Solutions Conference Baska, KrK Island, Croatia September 3, 2009   Hank Skalski U.S. Department.
AGBell -1- Build the A Train Constellation using STK To build the “ideal” A Train constellation we will use STK - Satellite Tool Kit by AGI We would like.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved CHAPTER 9 DECISION MAKING.
Unclassified – FOUO – Not Approved for Public Release Space Situational Awareness Environmental Effects Fusion System Overview 6 Jan 2006 Dr Robert V Hilmer.
Nov11-cesg-1 SOIS Area Report Wireless WG Primary Objectives for the fall meeting Establish lessons learned from the Asset Management (AM) Magenta Book.
1 Technology in Action Chapter 11 Behind the Scenes: Databases and Information Systems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice.
What Shape is Your Real-Time System? Lonnie R. Welch Intelligent, Real-Time, Secure Systems Lab. School of EECS Ohio University Michael.
This Briefing is UNCLASSIFIED Lt Gen Willie Shelton 14 AF (AFSTRAT)/CC 3 December 2008 Fourteenth Air Force Technology … the enabler of SSA 14 th Air Force.
AUTOMATIC TARGET RECOGNITION AND DATA FUSION March 9 th, 2004 Bala Lakshminarayanan.
2/28/02 NSF - Responding to the Unexpected 1 Earthquake Case Discussion Response to Unexpected NSF Workshop Feb 27-Mar
C4ISR for the Military: Development and Implementation Presentation to the Security Network’s C4ISR, Robot Platforms, and Sensor Conference Greg Collins,
2nd European Space Weather Week Nov 2005, ESTEC1/5 SEIS: The INTEGRAL Experience F. Di Marco – INTEGRAL FCT- VEGA IT GmbH, Germany A. Baumgartner – SOLENIX.
SHUTTLE ANTENNA MONITORING SYSTEM Allows the NIC Operators to monitor the configuration, status, and performance of Shuttle antenna systems as an aid for.
1 Earth Science Technology Office The Earth Science (ES) Vision: An intelligent Web of Sensors IGARSS 2002 Paper 02_06_08:20 Eduardo Torres-Martinez –
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
March /5/2016 At A Glance STARS is a real-time, distributed, multi-spacecraft simulation system for GN&C technology research and development. It.
Final Version Kequan Luu May 13-17, 2002 Micro-Arcsecond Imaging Mission, Pathfinder (MAXIM-PF) Flight Software.
Key Management V 0.4 Discussion of document revision SeaSec Intermediary Meeting, Heppenheim, October 07 Daniel Fischer Uni Lux SECAN-Lab / ESA OPS-GDA.
Global Situational Awareness Tool (GSAT) Steven Lufkin HQ Air Force Special Operations Command A7CV.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved CHAPTER 9 Enabling the Organization—Decision Making.
Information Fusion Command and Control (IFC2) The OTBSAF is generating the simulated ground truth as well as displaying it in the OTBSAF GUI.
The ATLAS Run 2 Expert System Giuseppe Avolio - CERN.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
1 Creating Situational Awareness with Data Trending and Monitoring Zhenping Li, J.P. Douglas, and Ken. Mitchell Arctic Slope Technical Services.
SOIS Area Report Wireless WG Primary Objectives for the fall meeting
Select the Right Vendor for Desktop Virtualization
Inter-experimental LHC Machine Learning Working Group Activities
Detection and Analysis of Threats to the Energy Sector (DATES)
TEMPO’s Commercially Hosted Payload Concept
CS 4700: Foundations of Artificial Intelligence
CS 4700: Foundations of Artificial Intelligence
Presentation transcript:

IDS used within Satellite As a Sensor Duong Hang

Satellite as a Sensor and Other Space Situation Awareness Tools of Interest” Tschan, Christopher, “Satellite as a Sensor and Other Space Situation Awareness Tools of Interest”

NormalEclipse Severe Space Weather Uplink RFI Time Satellite as a Sensor and Other Space Situation Awareness Tools of Interest” Tschan, Christopher, “Satellite as a Sensor and Other Space Situation Awareness Tools of Interest”

Response Management - Decide Response Systems - Act Guidance & Control Communications Maintenance Reconfiguration Data Sources - Detect Decision Support System - Fuse Multi-Source Data Fusion Higher Level Fusion Provides Aggregated Insight VIEWUSERINTERFACEVIEWUSERINTERFACE ENVIRONMENTENVIRONMENT Level 0 Fusion RFI SIGNATURE ASSESSMENT Level 0 Fusion RFI SIGNATURE ASSESSMENT Level 1 Fusion SITE RFI ASSESSMENT Level 1 Fusion SITE RFI ASSESSMENT Level 2 Fusion AFSCN RFI RELATIONSHIP ASSESSMENT Level 2 Fusion AFSCN RFI RELATIONSHIP ASSESSMENT Level 3 Fusion TT&C MISSION IMPACT ASSESSMENT Level 3 Fusion TT&C MISSION IMPACT ASSESSMENT Level 0: Sensor Mgmt Level 1: Satellite Management Level 2: Constellation Mgmt Level 3: Mission Mgmt 23 SOPS WOC JSpOC SOPS WOC JSpOC Satellite Sat Abnormality Telemetry Detection Repts Up/Downlink RFI Event Spectra Reports Space WxSpace Wx Data Event Repts Space Object Orbital Data Proximity Repts Intelligence Intel Event Data Reports SOPS Two sites experiencing simultaneous RFI… not seen previously Possible adversary attempting to disrupt TT&C Unauthorized signals multiple SGLS Lion Signals at Lion don’t match IRON templates …probable RFI Satellite as a Sensor and Other Space Situation Awareness Tools of Interest” Tschan, Christopher, “Satellite as a Sensor and Other Space Situation Awareness Tools of Interest”

ISAS Data Fusion Processes DF Display Report RT Eval RFIDS SAS SEAES AbClassNN AnalysisArchive Real-time Processes SOH SEAES RFIDS NN Training AbClass Learning DF Updates Off-line Processes New ES Rules Or Conditional Probs All RT Process Data Archived Ops RT Validation Fusion Processes Detection and Classification Processes CABR or BCP Data Fusion and Summary Status” Kelecy, Tom, “Data Fusion and Summary Status”

Two Approaches for Processing Neural Networks –Bayesian Conditional Probability –Pros/Cons Expert Systems –Consolidated Assessment Business Rules –Pros/Cons

Future Challenges / Possible Solutions Horizontal systems integration –Current systems –Future systems –Satellites –Ground Systems Most importantly: Same info, different interpretation –Significance of info –How info is handled

Other References Frank, Jeremy, “ � AI and Intrusion Detection: Current and Future Directions � ” Tschan, Chris, “Defensive Counterspace (DCS) Test Bed (DTB) for Rapid Spacecraft Attack/Anamoly Detection, Characterization, and Reporting � ” Department of Defense, “Spacecraft Technology Guide � ” High Frontier: The Journal for Space and Missile Professionals, � Winter 2005