A novel automatic discovery system of critical assets in cyberspace-oriented military missions

Álvaro Luis Martínez, V. Villagrá
{"title":"A novel automatic discovery system of critical assets in cyberspace-oriented military missions","authors":"Álvaro Luis Martínez, V. Villagrá","doi":"10.1145/3407023.3409225","DOIUrl":null,"url":null,"abstract":"As result of the digitalization of the military operations, the need for capabilities able to facilitate the acquisition of cyber situation awareness are increasingly demanded. In this context, augmenting the conscious of the context and warfare environment, risks and impacts of cyber threats on kinetic actuations became a critical rule-changer that military decision-makers must consider. Among the challenges that developing these solutions addresses, it is worth to highlight the dynamically assessment of the impact of the ICT infrastructure that enables the modern military operations, regarding the mission expectations and goals. In this context, the identification of Key Cyber Terrains (KCT) becomes an essential task, which requires the analysis of cross-domain knowledge from the tactical environment combined by feeds from the cyberspace. Bearing this in mind, the aim of the research presented in this paper is to explore the existing gaps and challenges concerning the dynamic cyber asset valuation and based on that, design a supporting system able to automatically identify KCT on military missions that rely on the cyberspace. Accordingly, the proposed KCT identification solution was not only a cyber risk management analysis tool for dual-use cyber assets, but a full procedure for their mission-centric identification. The approach explored the dependency degrees among tasks and assets defined by commanders as part of the assessment criteria. They were correlated with the discoveries on the operational network and the asset vulnerabilities identified thorough the supported mission development. In order to facilitate the understanding of the introduced method, an illustrative use case that combined a hypothetical mission scenario with real network traffic has been defined and discussed.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 15th International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3407023.3409225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

As result of the digitalization of the military operations, the need for capabilities able to facilitate the acquisition of cyber situation awareness are increasingly demanded. In this context, augmenting the conscious of the context and warfare environment, risks and impacts of cyber threats on kinetic actuations became a critical rule-changer that military decision-makers must consider. Among the challenges that developing these solutions addresses, it is worth to highlight the dynamically assessment of the impact of the ICT infrastructure that enables the modern military operations, regarding the mission expectations and goals. In this context, the identification of Key Cyber Terrains (KCT) becomes an essential task, which requires the analysis of cross-domain knowledge from the tactical environment combined by feeds from the cyberspace. Bearing this in mind, the aim of the research presented in this paper is to explore the existing gaps and challenges concerning the dynamic cyber asset valuation and based on that, design a supporting system able to automatically identify KCT on military missions that rely on the cyberspace. Accordingly, the proposed KCT identification solution was not only a cyber risk management analysis tool for dual-use cyber assets, but a full procedure for their mission-centric identification. The approach explored the dependency degrees among tasks and assets defined by commanders as part of the assessment criteria. They were correlated with the discoveries on the operational network and the asset vulnerabilities identified thorough the supported mission development. In order to facilitate the understanding of the introduced method, an illustrative use case that combined a hypothetical mission scenario with real network traffic has been defined and discussed.
面向网络空间的军事任务中关键资产的新型自动发现系统
由于军事行动的数字化,对能够促进获取网络态势感知能力的需求日益增加。在此背景下,增强对背景和战争环境的意识,网络威胁对动能驱动的风险和影响成为军事决策者必须考虑的关键规则改变者。在开发这些解决方案所应对的挑战中,值得强调的是动态评估信息通信技术基础设施的影响,这些基础设施使现代军事行动能够实现任务期望和目标。在这种背景下,关键网络地形(KCT)的识别成为一项必不可少的任务,这需要对来自战术环境的跨域知识进行分析,并结合来自网络空间的馈送。考虑到这一点,本文提出的研究目的是探讨动态网络资产评估方面存在的差距和挑战,并在此基础上设计一个能够自动识别依赖网络空间的军事任务中的KCT的支持系统。因此,所提出的KCT识别解决方案不仅是两用网络资产的网络风险管理分析工具,而且是以任务为中心识别的完整程序。该方法探讨了指挥官定义的任务和资产之间的依赖程度,作为评估标准的一部分。它们与业务网络上的发现以及在支助任务发展过程中确定的资产脆弱性相关。为了便于理解所介绍的方法,定义并讨论了一个将假设任务场景与实际网络流量相结合的说明性用例。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信