1 MURI: Computer-aided Human Centric Cyber Situation Awareness Peng Liu Professor & Director, The LIONS Center Pennsylvania State University ARO Cyber.

Slides:



Advertisements
Similar presentations
Strategies for Integrating Technology into Every Class Joseph Chmielewski Center for Creative Learning Center for Creative Learning.
Advertisements

2014 CGT Postcard VPI 10/23/2014 v3 10/22/2014 v1.
ODDR&E PBR11 Issue: Deployable Force 07/06/09 Page-1 ASD(R&E) Joint Situational Awareness & Decision Support Development Campaign CLOUDBREAK Program Manager:
Presentation at CHMPR IAB Meeting May 11, 2011 UMBC Participation in CHMPR by Professor Yelena Yesha, UMBC site director.
Uncertainty-Aware Data Transformations for Collaborative Reasoning Kwan-Liu Ma University of California, Davis.
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Leveraging “Visualization Functions” in Collaborative Visual Analytics Chen Zhong, Mingyi Zhao, Gaoyao Xiao, Jun Xu PhD students College of Information.
Leadership Development Opportunities for Tenured Faculty Sadan Kulturel-Konak Associate Professor of Management Information Systems Coordinator of Engineering.
Join Our Research Efforts in CCAA to Improve Cybersecurity Robustness, Resiliency and Management in Enterprises Information Slides to Encourage Your Organization.
The LOGIIC Consortium Zachary Tudor, CISSP, CISM, CCP Program Director SRI International.
Topological Vulnerability Analysis
Department of Electrical Engineering, Southern Taiwan University of Science and Technology Chi-Jo Wang Professor and Associate Chair December 17, 2012.
A Mission-Centric Framework for Cyber Situational Awareness Metrics, Lifecycle of Situational Awareness, and Impact of Automated Tools on Analyst Performance.
1 MURI: Computer-aided Human Centric Cyber Situation Awareness Peng Liu Professor & Director, Lions Center Pennsylvania State University ARO Cyber Situation.
Architecture, models and experiments in cognitive- based cyber situation awareness David Hall Michael McNeese Nicklaus Giacobe Jeffrey Rimland.
© 2013 The MITRE Corporation. All rights reserved. Systems Engineering: MITRE & SERC Dr. J. Providakes Director, SE Tech Center “The SERC-MITRE Doctoral.
Umbrella Presentation Theme C: Cognitive Science of Cyber SA ASU (Cooke) Cyber Security as a Complex Cognitive System PSU (McNeese & Hall) Computer-aided.
Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.
SIMCorBSIMCorB 1 Outreach Projects n SIMCorB Web site (8.3.1) n Strategic partnerships with other organizations (8.3.2) n Promote awareness of scientific.
New M&S Curriculum: The Emerging Strategy Dr. Wayne Summers TSYS Department of Computer Science Columbus State University.
ARO–MURI Thoughts on Visualization for Cyber Situation Awareness MURI Meeting July 8–9, 2015 Christopher G. Healey Lihua Hao Steve E. Hutchinson CS Department,
Data and Applications Security (DAS) Research at UTD Dr. Bhavani Thuraisingham 20 June 2006.
Integrated Technology Transfer Network Finalist - Outstanding Specialty Entrepreneurship Program.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
CISE IAB Meeting Oct. 25, Overview Degree programs & students. Faculty & staff. Research areas. Future hiring.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
1/20 (Big Data Analytics for Everyone) Remco Chang Assistant Professor Department of Computer Science Tufts University Big Data Visual Analytics: A User-Centric.
Intelligent Large Scale Sensing Systems (ILS 3 ) initiative Initiative Status and Activities Kevin M. McNeill, PhD Research Assoc. Professor Director,
Michael McNeese, Ph.D. Associate Dean for Research, Graduate Programs, and Academic Affairs College of Information Sciences and Technology The Pennsylvania.
Corporate Information Reconnaissance Cell (CIRC).
NC-BSI: 3.3 Data Fusion for Decision Support Problem Statement/Objectives: Problem - Accurate situation awareness requires rapid integration of heterogeneous.
VALTVA IntroAppsWrap-up 1/34 User-Centric Visual Analytics Remco Chang Tufts University Department of Computer Science.
ARO-MURI on Cyber-Situation Awareness Review Meeting Phoenix AZ, 2013
Pascucci-1 Valerio Pascucci Director, CEDMAV Professor, SCI Institute & School of Computing Laboratory Fellow, PNNL Massive Data Management, Analysis,
Gaining Cyber Situation Awareness in Enterprise Networks: A Systems Approach Peng Liu, Xiaoyan Sun, Jun Dai Penn State University ARO Cyber Situation Awareness.
Umbrella Presentation Cognitive Science of Cyber SA Collaborative Cyber Situation Awareness Nancy J. Cooke, ASU & Prashanth Rajivan, Indiana U. Models.
Innovation: The Key to the Future of Security  Douglas Maughan, Division Director, DHS S&T  Moderator: Illena Armstrong.
Crossing the Longest Yard: Eight Strategies for Creating Knowledge from a Glut of Data Dr. David L. Hall School of Information Sciences and Technology.
A Mission-Centric Framework for Cyber Situational Awareness Assessing the Risk Associated with Zero-day Vulnerabilities: Automated Methods for Efficient.
Non-intrusive Capturing and Analysis of the Cognitive Process of Network Security Analyst Annual Review ARO MURI on Computer-aided Human-centric Cyber.
1 Research Centers in Computer Science: A New Way of Doing Science Fred Roberts, DIMACS, Rutgers University.
Distinguished Talk Dr. Jun Wang, IEEE Fellow Professor Dept. of Mechanical and Automation Engineering, The Chinese University of Hong Kong For further.
November Geoffrey Fox Community Grids Lab Indiana University Net-Centric Sensor Grids.
The Interplay Between Mathematics/Computation and Analytics Haesun Park Division of Computational Science and Engineering Georgia Institute of Technology.
C4ISR for the Military: Development and Implementation Presentation to the Security Network’s C4ISR, Robot Platforms, and Sensor Conference Greg Collins,
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
1 MURI: Computer-aided Human Centric Cyber Situation Awareness Peng Liu Professor & Director, The LIONS Center Pennsylvania State University ARO Cyber.
Kitware Jeff Baumes Kitware, Inc..
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
NDIA ICOTE Meeting November 12, Industrial Committee on Test & Evaluation Joe Manas, T&E Division Chair Raytheon Company (520)
MedStar Health Research Institute
Dr. Ellen Livingston Office of Naval Research September 2017
Naval Opportunity Awareness Workshop
Context-Specific Intention Awareness through Web Query
Context-Specific Intention Awareness through Web Query
Detection and Analysis of Threats to the Energy Sector (DATES)
HSCB Focus 2010 Overview August 5-7, 2009 Chantilly, Virginia
Topological Vulnerability Analysis
Beyond Vendor Fairs: Partnering with Vendors to Engage End Users
Information Pooling Bias in Collaborative Cyber Forensics
Computer-Aided Human Centric Cyber Situation Awareness
Industrial Committee on Test & Evaluation
“Taking the Pentagon to the People” Historically Black Colleges and Universities and Minority Serving Institutions (HBCU/MI) Workshop April 12, 2018 Ms.
Snake Project Technology Maturation Matrix (MIT)
Amir Hussain’s Brief Biography
Multi-Step Attack Defense Operating Point Estimation via Bayesian Modeling under Parameter Uncertainty Peng Liu, Jun Dai, Xiaoyan Sun, Robert Cole Penn.
Dr. Kathleen Liang Kellogg Distinguished Professor of Sustainable Agriculture Director of Center for Environmental Farming Systems North Carolina A&T State.
Presentation transcript:

1 MURI: Computer-aided Human Centric Cyber Situation Awareness Peng Liu Professor & Director, The LIONS Center Pennsylvania State University ARO Cyber Situation Awareness MURI

Security Analysts Computer network Multi-Sensory Human Computer Interaction Enterprise Model Activity Logs IDS reports Vulnerabilities Cognitive Models & Decision Aids Instance Based Learning Models Simulation Measures of SA & Shared SA Data Conditioning Association & Correlation Automated Reasoning Tools R-CAST Plan-based narratives Graphical models Uncertainty analysis Information Aggregation & Fusion Transaction Graph methods Damage assessment Computer network Real World Test- bed 2

Publications Year 4 –13 journals –24 conferences –3 book chapters –9 presentations Year 3 –40 papers –One journal special issue on Cyber SA –13 presentations 3 Y1 to Y4 accumulation: around 140 papers

Students Year 4 –18 graduate students –5 post-docs –4 earned a PhD degree –2 earned a MS degree Year 3 –17 graduate students –8 post-docs –4 earned a PhD degree 4

Awards 5 CogSIMA 2012 Best Paper Award Best Paper Award, SECRYPT 2013, “An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities” by M. Albanese, S. Jajodia, A. Singhal, and L. Wang. HFES 2013 Alphonse Chapanis Award for best student paper, Prashanth Rajivan Sushil Jajodia, IEEE Fellow, January VAST Challenge 2013 Honorable Mention, by C. Zhong, M. Zhao, J. Xu, and G. Xiao Grace Hopper Scholarship 2013: Chen Zhong

6 Tech Transfer Deep collaboration with ARL -- ARSCA tool is now being used at ARL to understand the RPs of security analysts -- Adapting ARSCA to directly operate on ARL datasets -- Weekly teleconferences: joint research team DoD STTR that involves a higher fidelity version of CyberCog, DEXTAR, in which we will integrate CAULDRON DoD SBIR 12.3 Phase I OSD12-IA5 project “An Integrated Threat feed Aggregation, Analysis, and Visualization (TAAV) Tool for Cyber Situational Awareness,” funded, led by Intelligent Automation, Inc. (IAI).

7 Tech Transfer (cont’d) The source code for NSDMiner is now released through SourceForge at There have been 63 downloads to date. Briefings to Deloitte, Lockheed Martin, Raytheon Corporation, MITRE, Computer Sciences Corporation, and MIT Lincoln Laboratory. Briefings to NSA, DTRA, ONR, DHS, and DoDII.

Year 5 Plan: Technology Transitions (1) 8 Partner: Contact: Opportunity: Partners: Contacts: Opportunity: Partner: Contact: Opportunity: Partner: Contact: Opportunity: Partner: Contact: Opportunity: AFRL – Human Effectiveness Directorate 711 th Human Performance Wing, Wright-Patterson AFB, OH Benjamin Knott and Vince Mancuso Human performance and measurement of cognition Deloitte, Ernst and Young, KPMG, Price Waterhouse Coopers J.B. O’Kane (Vigilant by Deloitte), Jenna McAuley (EY-ASC) and others Observe practicing analysts, test visualization toolkits and fusion tools, measure human cognition and performance MIT Lincoln Laboratories Cyber Security Information Sciences Division Stephen Rejto and Tony Pensa Conduct human-in-the-loop experiments; evaluate MIT-LL/PSU analyst tools ARL (Tactical Information Analysis) Tim Hanratty Transition knowledge elicitation and visualization toolkits to the demonstration lab at ARL Aberdeen ARL – Adelphi, MD Hasan Cam Applied research in risk and resilience in cyber security

Year 5 Plan: Tech Transitions (2) 9 Partner: Contact: Opportunity: Partners: Contacts: Opportunity: Partner: Contact: Opportunity: Partner: Contact: Opportunity: Partner: Contact: Opportunity: ARL (Network division) Bill Glodek, Rob Erbacher, Steve Hutchinson, Hasan Cam, Renee Etoty Tracing and analyzing the reasoning processes of security analysts Sandia Research, Inc. Cooke DoD STTR: A higher fidelity version of CyberCog/DEXTAR/CAULDRON Intelligent Automation, Inc. (Network and Security Division) Jason Li DoD SBIR: Integrated Threat feed Aggregation, Analysis, and Visualization (TAAV) Tool for Cyber Situational Awareness NIST A. Singhal Cloud-wide vulnerability analysis NEC Labs America, Inc. Z. Qian, Z. Li Whole enterprise system-call-level security intelligence