SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Enhancing Cyber
Operational Decisions
Making Sense of Network Data

Anita D’Amico, Ph.D.
Anita.Damico@SecureDecisions.com
631.759.3909

securedecisions.com
codedx.com
avi.com
About Secure Decisions
Secure Decisions helps you makes sense of data
• Analyze security decision processes
• Build visual analytics to enhance security decision
processes and training
• Transition our R&D into operational use
Our expertise starts where automated security
sensors and scanners stop
Division of Applied Visions, Inc., which does
commercial software development
• 40 people in Northport and Clifton Park, NY
• Secure facilities and security clearances
3

http://securedecisions.com
SecDec Core Competencies
Situational Awareness and Decision Support for cyber operations



Analysis of decision process
Visual analytics for wired / wireless network data
Visualizations of abstract cyber data
Visual systems for CND training
Impact analysis of cyber events



Decision support system design






Software assurance visualization
Technology transition
Cyber testbed support
Classified portfolio

4
Current Products Transitioned From R&D
Visualizations to help cyber analysts make sense
of massive data, and communicate results

Use:

Data:
TRL 9:

In-depth incident
analysis, historical
analysis, watch briefings
NetFlow, alerts

Deployed to USCERT
In evaluation in intel
community
Funding: IARPA, DHS, AFRL

5

Use:
Data:
TRL 9:

Wireless threat and risk
analysis, policy compliance,
audit reporting
Wardriving , WIDS

DoD version downloadable
from NRL site; Commercial
version available
Funding: DARPA, AFRL, NRL, DISA

Use:
Data:
TRL 9:

Triage and analysis of
software source code
vulnerabilities
Results of SwA tools

Info and trial download
available at
www.codedx.com;
Funding: DHS
Sample Customers and Partners
Government
Air Force Research Lab
DARPA
DHS
DISA
IARPA
Naval Research Lab
ONR
OSD

Industry/Academia
Adventium
Alion
ATC
BAE
General Dynamics
George Mason University
Hopkins Applied Physics Lab
Informatica
ITT
Lockheed Martin
Raytheon
SAIC

• Nominated twice by DARPA for SBIR of the Year
• Featured twice as a DARPA Success Story
6
Key Projects
at
Secure Decisions

A sample Asset-to-Mission mapping
generated from
multiple data sources
Software assurance visualization
Code Dx: Software Analysis Integration Platform
• Imports and correlates results
from multiple SAST tools
• Normalizes results; common
severity scale

Workflows tailored to
each type of user

• Visual analytics to rapidly triage
results, remove false positives
• Common UI with custom detail
for security analysts,
developers, and CISOs
• Code Dx Bundle embeds open
source SAST tools for use with
or without commercial tools
• Affordable for small and
medium size businesses
9

Interactive, powerful
filtering

Visualize thousands of
weaknesses in a single view
Quickly and effectively
triage large weakness lists

A CWE-friendly application
Products that visualize
vulnerabilities and suspicious
network activity
MeerCAT: Visualization of Cyber Asset Tracks
Visualizes wireless network security


Physical 2D and 3D geographic location



Logical network topology location



Communication patterns



Security status



Mission of cyber assets

An SBIR Phase 2 funded
by DARPA

Accredited within DoD’s Flying Squirrel
Wireless Suite for vulnerability analysts.
Featured in DARPA’s SBIR Success Report.
11
WildCAT: Wireless Analysis from Patrol Cars
Remote Connectivity
(Satellite, 3G, etc.)
Suspicious
Detections
Instructions
to Patrol

Centralized Monitoring and Analysis
Aggregates and fuses data from multiple facilities.
Provides instruction to field patrols.

12

Instrumented Patrol Car
Detects intruder’s wireless
emissions

Intruder
Emits wireless
signals
VIAssist: Visualization for Information Assurance
Integrates visualization of NetFlow and IDS data


Multiple linked visualizations to see different perspectives



Don’t jump to the most logical conclusion: test
hypotheses; see things for various viewpoints



Big picture and detailed incident views



Collaboration and built in reporting

Installed at US-CERT
Being prepared for transition to USAF
Under evaluation in IC
13

Original funding by IARPA and NSA.
Now funded by DHS and AFRL
TVA: Topological Vulnerability Assessment
Visualizes attack graphs to understand
vulnerability


Attack paths based on vulnerabilities &
topology



Aggregation to make graphs readable

A collaboration with GMU, for the
Department of Homeland Security
14

Sold by http://proinfomd.com/
Cyber Security Education
SimBLEND: Game-Based Learning for Net Defense
Blends computer-based training (CBT) with games,
visualizations, & simulation to train network defenders


Harness an existing Learning Management System (LMS) for
student tracking and scoring



Reinforce learning with games

+
CBT + Visuals + Simulations + Games = Better training
16

An SBIR Phase 2 funded by
AFRL (Mesa, AZ)
Safe Computing Training Courses
Safe computing education for non-technical audiences


Principles of safe computing

Work with authorizing institutions for continuing education
credits





17

Demonstrations of vulnerabilities in typical office environments
Interactive graphic novels
Analytical services and
technologies
Deucalion: Cyber Decision Support System
Design and develop next generation
decision support system for Navy cyber
defense

19
Camus: Mapping Cyber Assets to Missions & Users
Relates cyber attacks to affected missions and users
Current CND ops have poor awareness of how compromised
cyber assets affect missions, organizations, and people


Fuses various network and mission data into a common ontology



Maps cyber assets to dependent
people and operations



Integrates with security and sensor
systems to provide operational
information about specific assets

An SBIR Phase 2 funded by OSD
through AFRL
20
NetDemon: Cyber Defense Decision Modeling
Models “as-is” and “idealized” decision processes used
in cyber defense





21

Analyze current Navy decision process
Develop scenarios to illustrate future decisions
Recommend new approach to cyber defense decision-making
Recommend decision support tools and data
Test support services and
technologies
National Cyber Range
Reconfigurable test range for testing cyber
technologies in a high-performance simulated classified
network
Range command and control system to control the
execution and monitor the performance of cyber
experiments
User experience design and
implementation for key systems:
Experiment command and control
Design tool

Repository
Gateway
23
Scalable Network Monitoring Testbed
Testbed for evaluating the performance of
new network monitoring algorithms
Developed software to control entire test network:
Main C2 System for execution and monitoring of tests
Remote Storage Service controls packet capture from remote locations
C2 System Client/Test Station to display and test control mechanism
Traffic Generation Services for
connectivity, control, & status between
test controller and traffic generator
Network Management System Services
for health and utilization monitoring of
the test network
24
Thought Leadership
VizSec Sponsor and chair of annual symposium for R&D related to
visualization for cyber security
Congressional testimony on cyber R&D and education
Mission Impact Workshop Conducted by-invitation workshop on
mission impact of cyber attacks
Publications in refereed journals and proceedings
Patent for temporal visualizations. Patent-pending wireless
security visualization

25
Enhancing Cyber
Operational Decisions
Making Sense of Network Data

Anita D’Amico, Ph.D.
Anita.Damico@SecureDecisions.com
631.759.3909

SecureDecisions.com
Codedx.com
avi.com

Mais conteúdo relacionado

Mais procurados

Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
EnergySec
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001
eaiti
 
2 20613 qualys_top_10_reports_vm
2 20613 qualys_top_10_reports_vm2 20613 qualys_top_10_reports_vm
2 20613 qualys_top_10_reports_vm
azfayel
 
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
EnergySec
 

Mais procurados (19)

Securing Electric Utility Infrastructure
Securing Electric Utility InfrastructureSecuring Electric Utility Infrastructure
Securing Electric Utility Infrastructure
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined Networking
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
 
Security sdn
Security sdnSecurity sdn
Security sdn
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001
 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
 
2 20613 qualys_top_10_reports_vm
2 20613 qualys_top_10_reports_vm2 20613 qualys_top_10_reports_vm
2 20613 qualys_top_10_reports_vm
 
Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions  How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
 

Semelhante a Secure Decisions - Cyber Security Sensemaking

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
Firas Alsayied
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
Dotha Keller
 

Semelhante a Secure Decisions - Cyber Security Sensemaking (20)

resume IT security
resume IT securityresume IT security
resume IT security
 
Cisco DNA
Cisco DNACisco DNA
Cisco DNA
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Sideband_SB_020316
Sideband_SB_020316Sideband_SB_020316
Sideband_SB_020316
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
cb-EDR-V7_a4_Digital
cb-EDR-V7_a4_Digitalcb-EDR-V7_a4_Digital
cb-EDR-V7_a4_Digital
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 
[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Secure Decisions - Cyber Security Sensemaking

  • 1. Enhancing Cyber Operational Decisions Making Sense of Network Data Anita D’Amico, Ph.D. Anita.Damico@SecureDecisions.com 631.759.3909 securedecisions.com codedx.com avi.com
  • 2. About Secure Decisions Secure Decisions helps you makes sense of data • Analyze security decision processes • Build visual analytics to enhance security decision processes and training • Transition our R&D into operational use Our expertise starts where automated security sensors and scanners stop Division of Applied Visions, Inc., which does commercial software development • 40 people in Northport and Clifton Park, NY • Secure facilities and security clearances 3 http://securedecisions.com
  • 3. SecDec Core Competencies Situational Awareness and Decision Support for cyber operations  Analysis of decision process Visual analytics for wired / wireless network data Visualizations of abstract cyber data Visual systems for CND training Impact analysis of cyber events  Decision support system design     Software assurance visualization Technology transition Cyber testbed support Classified portfolio 4
  • 4. Current Products Transitioned From R&D Visualizations to help cyber analysts make sense of massive data, and communicate results Use: Data: TRL 9: In-depth incident analysis, historical analysis, watch briefings NetFlow, alerts Deployed to USCERT In evaluation in intel community Funding: IARPA, DHS, AFRL 5 Use: Data: TRL 9: Wireless threat and risk analysis, policy compliance, audit reporting Wardriving , WIDS DoD version downloadable from NRL site; Commercial version available Funding: DARPA, AFRL, NRL, DISA Use: Data: TRL 9: Triage and analysis of software source code vulnerabilities Results of SwA tools Info and trial download available at www.codedx.com; Funding: DHS
  • 5. Sample Customers and Partners Government Air Force Research Lab DARPA DHS DISA IARPA Naval Research Lab ONR OSD Industry/Academia Adventium Alion ATC BAE General Dynamics George Mason University Hopkins Applied Physics Lab Informatica ITT Lockheed Martin Raytheon SAIC • Nominated twice by DARPA for SBIR of the Year • Featured twice as a DARPA Success Story 6
  • 6. Key Projects at Secure Decisions A sample Asset-to-Mission mapping generated from multiple data sources
  • 8. Code Dx: Software Analysis Integration Platform • Imports and correlates results from multiple SAST tools • Normalizes results; common severity scale Workflows tailored to each type of user • Visual analytics to rapidly triage results, remove false positives • Common UI with custom detail for security analysts, developers, and CISOs • Code Dx Bundle embeds open source SAST tools for use with or without commercial tools • Affordable for small and medium size businesses 9 Interactive, powerful filtering Visualize thousands of weaknesses in a single view Quickly and effectively triage large weakness lists A CWE-friendly application
  • 9. Products that visualize vulnerabilities and suspicious network activity
  • 10. MeerCAT: Visualization of Cyber Asset Tracks Visualizes wireless network security  Physical 2D and 3D geographic location  Logical network topology location  Communication patterns  Security status  Mission of cyber assets An SBIR Phase 2 funded by DARPA Accredited within DoD’s Flying Squirrel Wireless Suite for vulnerability analysts. Featured in DARPA’s SBIR Success Report. 11
  • 11. WildCAT: Wireless Analysis from Patrol Cars Remote Connectivity (Satellite, 3G, etc.) Suspicious Detections Instructions to Patrol Centralized Monitoring and Analysis Aggregates and fuses data from multiple facilities. Provides instruction to field patrols. 12 Instrumented Patrol Car Detects intruder’s wireless emissions Intruder Emits wireless signals
  • 12. VIAssist: Visualization for Information Assurance Integrates visualization of NetFlow and IDS data  Multiple linked visualizations to see different perspectives  Don’t jump to the most logical conclusion: test hypotheses; see things for various viewpoints  Big picture and detailed incident views  Collaboration and built in reporting Installed at US-CERT Being prepared for transition to USAF Under evaluation in IC 13 Original funding by IARPA and NSA. Now funded by DHS and AFRL
  • 13. TVA: Topological Vulnerability Assessment Visualizes attack graphs to understand vulnerability  Attack paths based on vulnerabilities & topology  Aggregation to make graphs readable A collaboration with GMU, for the Department of Homeland Security 14 Sold by http://proinfomd.com/
  • 15. SimBLEND: Game-Based Learning for Net Defense Blends computer-based training (CBT) with games, visualizations, & simulation to train network defenders  Harness an existing Learning Management System (LMS) for student tracking and scoring  Reinforce learning with games + CBT + Visuals + Simulations + Games = Better training 16 An SBIR Phase 2 funded by AFRL (Mesa, AZ)
  • 16. Safe Computing Training Courses Safe computing education for non-technical audiences  Principles of safe computing Work with authorizing institutions for continuing education credits    17 Demonstrations of vulnerabilities in typical office environments Interactive graphic novels
  • 18. Deucalion: Cyber Decision Support System Design and develop next generation decision support system for Navy cyber defense 19
  • 19. Camus: Mapping Cyber Assets to Missions & Users Relates cyber attacks to affected missions and users Current CND ops have poor awareness of how compromised cyber assets affect missions, organizations, and people  Fuses various network and mission data into a common ontology  Maps cyber assets to dependent people and operations  Integrates with security and sensor systems to provide operational information about specific assets An SBIR Phase 2 funded by OSD through AFRL 20
  • 20. NetDemon: Cyber Defense Decision Modeling Models “as-is” and “idealized” decision processes used in cyber defense     21 Analyze current Navy decision process Develop scenarios to illustrate future decisions Recommend new approach to cyber defense decision-making Recommend decision support tools and data
  • 21. Test support services and technologies
  • 22. National Cyber Range Reconfigurable test range for testing cyber technologies in a high-performance simulated classified network Range command and control system to control the execution and monitor the performance of cyber experiments User experience design and implementation for key systems: Experiment command and control Design tool Repository Gateway 23
  • 23. Scalable Network Monitoring Testbed Testbed for evaluating the performance of new network monitoring algorithms Developed software to control entire test network: Main C2 System for execution and monitoring of tests Remote Storage Service controls packet capture from remote locations C2 System Client/Test Station to display and test control mechanism Traffic Generation Services for connectivity, control, & status between test controller and traffic generator Network Management System Services for health and utilization monitoring of the test network 24
  • 24. Thought Leadership VizSec Sponsor and chair of annual symposium for R&D related to visualization for cyber security Congressional testimony on cyber R&D and education Mission Impact Workshop Conducted by-invitation workshop on mission impact of cyber attacks Publications in refereed journals and proceedings Patent for temporal visualizations. Patent-pending wireless security visualization 25
  • 25. Enhancing Cyber Operational Decisions Making Sense of Network Data Anita D’Amico, Ph.D. Anita.Damico@SecureDecisions.com 631.759.3909 SecureDecisions.com Codedx.com avi.com