22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

354 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

persons). Additionally, payload is encrypted with different keys <strong>and</strong> it can be only<br />

decrypted by domains that belong to the same distribution group (nodes relaying<br />

the message can not read the payload).<br />

The visualization methods <strong>and</strong> Decision Module GUI will allow the administrator<br />

of the proposed system to increase the situational awareness. The goal<br />

of the Decision Module GUI is to visualize the network status <strong>and</strong> provide information<br />

about historical <strong>and</strong> current network events <strong>and</strong> security incidents. DM will use<br />

data about historical network performance, information from the underlying online<br />

system <strong>and</strong> reported network events. The tool will analyze <strong>and</strong> present the threats,<br />

provide support <strong>and</strong> guidance to the operator <strong>and</strong> will evaluate potential actions<br />

to be taken as well as decisions made by the administrator.<br />

One of the visualization examples is shown in Figure 5.<br />

Figure 5. GUI visualization<br />

Furthermore, GUI allows the administrator to visualize the network events<br />

currently processed by the Decision Module, manage the communication between<br />

different DMs <strong>and</strong> decide what types of decisions rules can be distributed <strong>and</strong><br />

shared with other domains.<br />

Very important functionality of FCDS is the possibility of semi-automate prevention/reaction<br />

to attacks. Full CDR describes how RE should react to detected attack.<br />

This CDR is transformed by translator (Figure 3) into comm<strong>and</strong>s underst<strong>and</strong>able by<br />

response elements (e.g. firewalls). Then translator sends them to selected RE.<br />

C. Reaction elements<br />

The FCDS architecture includes reaction elements. They are responsible<br />

for actions, which enable prevention, limitation or cut down hostile actions. It is<br />

obvious that response to certain attacks may be difficult <strong>and</strong> sometimes impos-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!