1 MURI: Computer-aided Human Centric Cyber Situation Awareness Peng Liu Professor & Director, Lions Center Pennsylvania State University ARO Cyber Situation.

Slides:



Advertisements
Similar presentations
A Testbed for Studies of Team Cognition in the Cyber Security Domain
Advertisements

1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security University.
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director January 2010
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Life Science Services and Solutions
Chapter 1 Business Driven Technology
Cyber-Security: Some Thoughts
ODDR&E PBR11 Issue: Deployable Force 07/06/09 Page-1 ASD(R&E) Joint Situational Awareness & Decision Support Development Campaign CLOUDBREAK Program Manager:
1 st Review Meeting, Brussels 5/12/12 – Technical progress (P. Paganelli, Bluegreen) iCargo 1st Review Meeting Brussels 5/12/12 Technical.
Presentation at CHMPR IAB Meeting May 11, 2011 UMBC Participation in CHMPR by Professor Yelena Yesha, UMBC site director.
School of Graduate Professional Studies Systems Engineering Research at Penn State Colin J. Neill Representing the work of: Kathryn Jablokow, Assoc Prof.
Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
Object-Oriented Analysis and Design LECTURE 3: REQUIREMENTS DISCIPLINE.
Ahsan Kabir Project Manager Ahsan Kabir Project Manager ………………………….
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Review 4 Chapters 8, 9, 10.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Tim Harris| Western Computer
Computer Security: Principles and Practice
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Business Driven Technology Unit 3 Streamlining Business Operations Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Introduction to Systems Analysis and Design
Capabilities Briefing
Learning Sciences and Engineering Professional Master’s Program Ken Koedinger Vincent Aleven Albert Corbett Carolyn Rosé Justine Cassell.
Join Our Research Efforts in CCAA to Improve Cybersecurity Robustness, Resiliency and Management in Enterprises Information Slides to Encourage Your Organization.
Annual SERC Research Review - Student Presentation, October 5-6, Extending Model Based System Engineering to Utilize 3D Virtual Environments Peter.
Module 3: Business Information Systems Chapter 11: Knowledge Management.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Information Systems Security Computer System Life Cycle Security.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
1 MURI: Computer-aided Human Centric Cyber Situation Awareness Peng Liu Professor & Director, The LIONS Center Pennsylvania State University ARO Cyber.
ARO–MURI Thoughts on Visualization for Cyber Situation Awareness MURI Meeting July 8–9, 2015 Christopher G. Healey Lihua Hao Steve E. Hutchinson CS Department,
2Object-Oriented Analysis and Design with the Unified Process The Requirements Discipline in More Detail  Focus shifts from defining to realizing objectives.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Logic Model and Methodology for Knowledge Innovation Program(KIP) Evaluation in Chinese Academy of Sciences Tao Dai Nov. 4, 2011 Evaluation 2011: Values.
Intelligent Large Scale Sensing Systems (ILS 3 ) initiative Initiative Status and Activities Kevin M. McNeill, PhD Research Assoc. Professor Director,
NC-BSI: 3.3 Data Fusion for Decision Support Problem Statement/Objectives: Problem - Accurate situation awareness requires rapid integration of heterogeneous.
ARO-MURI on Cyber-Situation Awareness Review Meeting Phoenix AZ, 2013
Pascucci-1 Valerio Pascucci Director, CEDMAV Professor, SCI Institute & School of Computing Laboratory Fellow, PNNL Massive Data Management, Analysis,
Gaining Cyber Situation Awareness in Enterprise Networks: A Systems Approach Peng Liu, Xiaoyan Sun, Jun Dai Penn State University ARO Cyber Situation Awareness.
Umbrella Presentation Cognitive Science of Cyber SA Collaborative Cyber Situation Awareness Nancy J. Cooke, ASU & Prashanth Rajivan, Indiana U. Models.
Systems Analysis and Design in a Changing World, Fourth Edition
Innovation: The Key to the Future of Security  Douglas Maughan, Division Director, DHS S&T  Moderator: Illena Armstrong.
Human-Computer Interaction at CMU Jodi Forlizzi Jason Hong.
A Mission-Centric Framework for Cyber Situational Awareness Assessing the Risk Associated with Zero-day Vulnerabilities: Automated Methods for Efficient.
Non-intrusive Capturing and Analysis of the Cognitive Process of Network Security Analyst Annual Review ARO MURI on Computer-aided Human-centric Cyber.
High Confidence Software and Systems HCMDSS Workshop Brad Martin June 2, 2005.
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
Boeing-MIT Collaborative Time- Sensitive Targeting Project July 28, 2006 Stacey Scott, M. L. Cummings (PI) Humans and Automation Laboratory
1 Power to the Edge Agility Focus and Convergence Adapting C2 to the 21 st Century presented to the Focus, Agility and Convergence Team Inaugural Meeting.
1 MURI: Computer-aided Human Centric Cyber Situation Awareness Peng Liu Professor & Director, The LIONS Center Pennsylvania State University ARO Cyber.
1 Innovation & Transformation: Enabling Information Superiority for the Warfighter Mr. Arthur R. Friedman OASD(NII)/DoD CIO 4 October 2006.
1 APPROVED FOR PUBLIC RELEASE U.S. Army Research, Development and Engineering Command ARL-CISD Social Network Analysis Team Leader Visual Analytics Consortium,
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Penn State Center for e-Design Site Vision and Capabilities
Visualizing Complex Software Systems
Center of Excellence in Cyber Security
DISA Global Operations
Proposal Development Services
Detection and Analysis of Threats to the Energy Sector (DATES)
“Taking the Pentagon to the People” Historically Black Colleges and Universities and Minority Serving Institutions (HBCU/MI) Workshop April 12, 2018 Ms.
Multi-Step Attack Defense Operating Point Estimation via Bayesian Modeling under Parameter Uncertainty Peng Liu, Jun Dai, Xiaoyan Sun, Robert Cole Penn.
Shifting from “Incident” to “Continuous” Response
Enterprise Architecture at Penn State
Jess Neuner Esri Corporate Template-Dark v3.3
Presentation transcript:

1 MURI: Computer-aided Human Centric Cyber Situation Awareness Peng Liu Professor & Director, Lions Center Pennsylvania State University ARO Cyber Situation Awareness MURI

Team Peng Liu, Professor and Director, Penn State Center for Cyber-Security, Information Privacy and Trust Massimiliano Albanese, Assistant Professor, GMU Nancy Cooke, Professor and Science Director, Arizona State Cognitive Engineering Research Institute Coty González, Associate Research Professor and Director, CMU Dynamic Decision Making Lab Dave Hall, Professor and Dean, Penn State College of IST Christopher Healey, Professor, NC State 2 Sushil Jajodia, University Professor and Director, George Mason Univ. Center for Secure Information Systems Mike McNeese, Professor and Associate Dean, Penn State College of IST Peng Ning (on leave), Professor, NCSU Douglas Reeves, Professor and Interim Assistant Dean for COE Graduate Programs, NCSU VS Subrahmanian, Professor and past Director, U. of Maryland Institute for Advanced Computer Studies John Yen, University Professor and Director, Intelligent Agents Lab # of post docs: 3 # of graduate students: 16

3 ARO MURI: Computer-aided Human Centric Cyber Situation Awareness PSU, ASU, CMU, GMU, NCSU, UMD Contact: Peng Liu, Tel , Objectives: Improve Cyber SA through: Cyber SA specific cognition models Cognition-friendly tools and analytics that fill the gap between the sensor side and the analyst side of cyber SA Cross-layer situation knowledge integration DoD Benefit: Significantly improved capabilities in gaining cyber SA in face of cyber attacks Significantly improved job performance of analysts Scientific/Technical Approach Take a holistic approach to integrate the “human cognition” aspects and the “cyber tools” aspects of cyber SA Leverage cognition models to develop human cognition-friendly SA techniques, tools, and analytics Accomplishments Year 5: See slide 5 Challenges Understanding the mental processes of analysts Team integration

Security Analysts Computer network Multi-Sensory Human Computer Interaction Enterprise Model Activity Logs IDS reports Vulnerabilities Cognitive Models & Decision Aids Instance Based Learning Models Simulation Measures of SA & Shared SA Data Conditioning Association & Correlation Automated Reasoning Tools R-CAST Plan-based narratives Graphical models Uncertainty analysis Information Aggregation & Fusion Transaction Graph methods Damage assessment Computer network Real World Test- bed 4

5 Year 5 accomplishments Pub: (1 book, 10 journals, 20 conf., 6 chapters) (Y1-Y5 total: 170+) -- 2 PhD thesis -- 7 presentations Tools: -- ARSCA  Shift Transition -- MetaSymploit -- NETS simulator -- DEXTAR -- Patrol  X-Ray -- Switchwall -- NSDMiner -- CyberCog -- PASS  PADUA -- CAULDRON -- etc. Technology transitions: -- See slides later on Research: -- Major achievements made -- See individual presentations Deep collaboration with ARL: ARL security analysts -- 5 researchers at ARL -- 4 joint publications Awards: -- Max Albanese received the 2014 Mason Emerging Researcher/Scholar/Creator Award

What has happened? What is the impact? Why did it happen? What should I do? Security Analysts Computer networks (e.g., GIG) Sensors, probes Cyber Operations for Mission Assurance 6

Cyber Situation Awareness 7 What has happened? What is the impact? Why did it happen? Core Cyber SA Enabler What should I do?

Cyber SA Info Processing Box The Network Attacks Data Sources (feeds) Depicted Situation Ground Truth (estimates) Compare Job Performance 8

Why Research is Needed? CNDSPs*, whose operations are relying on human analysts, face critical challenges: 1. Job performance is unstable 2. Hard to get the big picture: walls between functional domains 3. Better analytics and tools are needed to improve job performance * In the commercial world, similar issues exist.

State of the Art: Big Gap Exists 10 Ability to create problem- solving workflows To see big picture To manage uncertainty To reason albeit incomplete/noisy knowledge To quickly locate needles in haystacks To do strategic planning To predict … Vulnerability scan Event logging Traffic classifying Intrusion detection Alert correlation Signature gen. Taint analysis Back tracking Integrity check Static analysis Bug finding Attack graphs Symbolic execution Sandbox VM monitors … Current tools: BIG GAP Desired cyber SA capabilities:

Scientific Objectives 11 Develop a deep understanding on: 1.Why the job performance between expert and rookie analysts is so different? How to bridge the job performance gap? 2.Why many tools cannot effectively improve job performance? 3.What models, tools and analytics are needed to effectively boost job performance? Develop a new paradigm of cyber SA system design, implementation, and evaluation.

Scientific Barriers 12 A.Massive amounts of sensed info vs. poorly used by analysts B.Silicon-speed info sensing vs. neuron-speed human cognition C.Stovepiped sensing vs. the need for "big picture awareness" D.Knowledge of “us” E.Lack of ground-truth vs. the need for scientifically sound models F.Unknown adversary intent vs. publicly-known vulnerability categories

Potential Scientific Advances 13 Understand the nature of human analysts’ cyber SA cognition and decision making. Let this nature inspire innovative designs of SA systems. Break both vertical stovepipes (between compartments) and horizontal stovepipes (between abstraction layers). “Stitched together” awareness enables advanced mission assurance analytics (e.g., asset map, damage, impact, mitigation, recovery). Discover blind spot situation knowledge. Make adversary intent an inherent part of SA analytics.

Scientific Principles 14 Cybersecurity research shows a new trend: moving from qualitative to quantitative science; from data-insufficient science to data-abundant science. The availability of sea of sensed information opens up fascinating opportunities to understand both mission and adversary activity through modeling and analytics. This will require creative mission-aware analysis of heterogeneous data with cross-compartment and cross-abstraction-layer dependencies in the presence of significant uncertainty and untrustworthiness. SA tools should incorporate human cognition and decision making characteristics at the design phase.

Why a Multidisciplinary Approach? 15 Several fundamentally important research questions cannot be systematically answered by a single- disciplinary approach. See next slide.

Our focus Computer and Information Science of Cyber SA Cognitive Science of Cyber SA Decision Making and Learning Science of Cyber SA Q1: What are the differences between expert analysts and rookies? Q2: What analytics and tools are needed to effectively boost job performance? Q3: How to develop the better tools? 16

Technical Approach 17 Draw inspirations from cognitive task analysis, simulations, modeling of analysts’ decision making, and human subject research findings. Use these inspirations to develop a new paradigm of computer-aided cyber SA Develop new analytics and better tools Let tools and analysts work in concert “Green the desert” between the sensor side and the human side Develop an end-to-end, holistic solution: In contrast, prior work treated the three vertices of the “triangle” as disjoint research areas

The proposed cyber SA framework  The life-cycle side  Shows the SA tasks in each stage of cyber SA  Vision pushes us to “think out-of-the-box” in performing these tasks  The computer-aided cognition side  Build the right cognition models  Build cognition-friendly SA tools It is a ‘coin’ with two sides: 18

Security Analysts Computer network Multi-Sensory Human Computer Interaction Enterprise Model Activity Logs IDS reports Vulnerabilities Cognitive Models & Decision Aids Instance Based Learning Models Simulation Measures of SA & Shared SA Data Conditioning Association & Correlation Automated Reasoning Tools R-CAST Plan-based narratives Graphical models Uncertainty analysis Information Aggregation & Fusion Transaction Graph methods Damage assessment Computer network Real World Test- bed 19 Perception Comprehension Projection

Situation Knowledge Abstraction Perspective 20 Mission Workflows Mission Workflows App, Net Services Vulnerability Exploits Alerts OS CPU Liu: integration McNeese & Hall: multi-level cognition and fusion Gonzalez, Cooke Yen, Healey Jajodia, Albanese Subrahmanian Reeves

Impact on DoD 21 Significantly enhance mission assurance through: 1. Significantly improving the job performance of CNDSPs 2. Developing cognition-friendly SA tools to effectively improve job performance Situation knowledge integration Situation knowledge discovery & elicitation Reasoning assistants, decision aids Better interfaces, better shift transitions

22 Y5 Team Integration Within each theme: Collaboration is pervasive Collaboration is further deepened Joint research tasks Co-authored papers Tool-level integration in progress Between themes: Integration along the functional perspective Integration along the knowledge abstraction perspective E.g., Jajodia & Cooke, Coty & Cooke, Hall & McNeese & Liu, Healey & Hutchinson, Yen & Cam & Erbacher & Glodek & Hutchinson & Liu, Jajodia & Albanese & Cam & Yen & Liu

Technology Transfer (1) 23 Partner: Contact: Focus: Status: ARL Rob Erbacher, Bill Glodek, Steve Hutchinson, Hasan Cam, Renee Etoty, Chris Garneau Collect the cognitive traces of CNDSP analysts -- Over two years -- Over 30 traces collected -- ARSCA tool is being used at ARL -- Weekly teleconferences -- In discussion: directly operate on ARL datasets

Technology Transfer (2) 24 Partner: Contact: Focus: Status: ARL Rob Erbacher, Bill Glodek, Steve Hutchinson Shift transitions -- A user study on shift transition fully designed -- IRB developed and approved -- ARSCA-shift-transition tool developed -- Shipped to ARL site and tested there -- Pilot study is being scheduled

Technology Transfer (3) 25 Partner: Contact: Focus: Status: ARL Hasan Cam Enhance the ARL petri-net model for impact assessment -- feed outputs of CAULDRON and ARSCA into petri-net -- Proposal developed and approved -- Just started (Nov 2014) -- First experiment sketched

Technology Transfer (4) 26 Partner: Contact: Focus: Status: ARL Rob Erbacher, Christopher Garneau (a) Investigate how the current practice of training professional CNDSP security analysts can be enhanced by leveraging ARSCA. (b) A pilot study for investigating the feasibility of using ARSCA-facilitated training procedures for supporting the training of analysts about their analytical reasoning process. -- Proposal developed and approved -- Just started (Nov 2014) -- Weekly teleconferences

Technology Transfer (5) 27 Partner: Contact: Focus: Status: ARL Christopher Garneau, Rob Erbacher Human subject experiments on the cognitive effects of different (visualization) views -- IRB developed and approved -- User study fully designed -- Pilot study being scheduled at Penn State

28 Tech Transfer (6) Phase II STTR: Cooke group has been working with Sushil Jajodia and Max Albanese (George Mason and fellow MURI PIs) on an STTR that involves a higher fidelity version of CyberCog, DEXTAR, in which we will integrate CAULDRON. - Phase II STTR through Sandia Research Corporation - AFRL has shown interest in the test-bed we have been developing on the Phase II STTR Cooke group has been working on SBIR for AFRL with Charles River Associates that involves team sensors for cyber analysts.

Technology Transfer (7) 29 Partner: Contact: Focus: Partners: Contacts: Focus: Partner: Contact: Focus: AFRL – Human Effectiveness Directorate 711 th Human Performance Wing, Wright-Patterson AFB, OH Benjamin Knott and Vince Mancuso Human performance and measurement of cognition Deloitte, Ernst and Young, KPMG, Price Waterhouse Coopers J.B. O’Kane (Vigilant by Deloitte), Jenna McAuley (EY-ASC) and others Observe practicing analysts, test visualization toolkits and fusion tools, measure human cognition and performance MIT Lincoln Laboratories Cyber Security Information Sciences Division Stephen Rejto and Tony Pensa Conduct human-in-the-loop experiments; evaluate MIT-LL/PSU analyst tools

Technology Transfer (8) 30 Partner: Contact: Focus: Status: Partner: Contact: Focus: Status: Partner: Contact: Focus: Status: NIST Anoop Singhal Gain awareness of stealthy info bridges in a cloud -- One research work done -- One NIST technical report produced -- Paper published NEC Labs America, Inc. Z. Qian, Z. Li Discover long-running Idling processes in enterprise systems -- One research work done -- A real enterprise environment (on 24 hosts) -- In-depth measurement study -- Paper submitted IAI, Inc. Jason Li System call level enterprise cyber SA -- A new research work done -- One PhD dissertation

31 Tech Transfer (9) Ethnographic studies/knowledge elicitation with network analysts working in education, military, government, and industry domains. Briefings provided to several companies including: Deloitte, Lockheed Martin, Raytheon Corporation, MITRE, Computer Sciences Corporation, and MIT Lincoln Laboratory. Briefings to NSA, DTRA, ONR, DHS, and DoDII. Neville Stanton, University of Southampton is the developer of EAST modeling and is collaborating with Buchanan and Cooke on this form of modeling applied to cyber.

No-Cost Extension Plan 32 Each PI has a research plan from their perspectives: see the individual presentations Set-aside project 1 with ARL Set-aside project 2 with ARL Team integration exercises will be held

33 Q & A Thank you.