Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...

22.01.2015 Views

414 Military Communications and Information Technology... [9] L. Bernaille, R. Teixeira, and K. Salamatian, “Early application identification,” in Proceedings of the 2006 ACM Conference on emerging Networking eXperiments and Technologies, 2006. [10] M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, “Traffic Classification Through Simple Statistical Fingerprinting,” in ACM SIGCOMM Computer Communication Review, 2007. [11] M. Dusi, M. Crotti, F. Gringoli, and L. Salgarelli, “Detection of Encrypted Tunnels Across Network Boundaries,” in Proceedings of the 2008 IEEE International Conference on Communications, 2008. [12] H. Stern, “The rise and fall of Reactor Mailer,” in Proceedings of the 2009 MIT Spam Conference, 2009. [13] G. Maier, F. Schneider, and A. Feldmann, “NAT Usage in Residential Broadband Networks,” in Passive and Active Measurement, ser. Lecture Notes in Computer Science, N. Spring and G. Riley, Eds., vol. 6579, 2011. [14] R. Beverly and S. Bauer, “The Spoofer Project: Inferring the extent of source address filtering on the Internet,” in Proceedings of the 2005 USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2005. [15] E. Cauich, R. Gómez Cárdenas, and R. Watanabe, “Data Hiding in Identification and Offset IP Fields,” in Advanced Distributed Systems, ser. Lecture Notes in Computer Science, F. Ramos, V. Larios Rosillo, and H. Unger, Eds, vol. 3563, 2005. [16] J. Calvet, C.R. Davis, and P.-M. Bureau, “Malware authors don’t learn, and that’s good!” in Proceedings of the 2009 International Conference on Malicious and Unwanted Software (MALWARE), 2009. [17] “W32.Duqu: The precursor to the next Stuxnet, Version 1.4,” Technical Report published by Symantec, 2011. [18] N. Falliere, “Sality: Story of a peer-to-peer viral network,” Technical Report published by Symantec, 2011. [19] D. Plohmann and E. Gerhards-Padilla, “Case Study of the Miner Botnet,” in Proceedings of the 4th International Conference on Cyber Conflict, 2012 (in press). [20] C. Zhang and V. Paxson, “Detecting and Analyzing Automated Activity on Twitter,” in Passive and Active Measurement, ser. Lecture Notes in Computer Science, N. Spring and G. Riley, Eds., vol. 6579, 2011. [21] “Waikato Internet Traffic Storage Website.” Available: www.wand.net.nz/wits

Methodology for Gathering Data Concerning Incidents in Cyberspace Adam Flizikowski 1, 2 , Jan Zych 2 , Witold Hołubowicz 2 1 University of Technology and Life Sciences, Bydgoszcz, Poland, adamfli@utp.edu.pl 2 ITTI Sp. z o. o., Poznań, Poland, {holub, jan.zych}@itti.com.pl Abstract: This paper introduces a cyber incident observation sheet. It is meant to support the process of gathering cyber incident data from attacks targeted against military missions. An effective method of gathering factual data is in the authors’ opinion one of the biggest challenges and show-stoppers in the process of learning adhering to a lessons learnt paradigm (especially considering negative experiences). While developing Cyber Tool with the aim of cyber threats modeling in the frame of EDA (Europe Defense Agency) Athena project, authors have identified a serious need to introduce a well shaped and structured observation form in order to enable and foster data analysis and automated processing in subsequent steps. In contrary to civil world, cyber incidents against military systems are not reported publically, nor traced back to unveil the actual vulnerabilities that have been exploited by an attack. Authors describe a formal point of view in the area of factual data collection in the area of cyber- -attacks on communication resources. The proposed method (and recommendations) of collecting information about incidents can be a valuable input into the process of continuous improvement of security level in the cyberspace. Keywords: EDA, Athena project, factual data, data acquisition, sensors, cyber threats, asymmetric threats 1 , cyber attacks I. Introduction The EDA ATHENA project is a research project responding to the JIP-FP (Joint Investment Programme on Force Protection) call in the area of mission planning and modeling of asymmetric threats. Aside from ITTI (Poland) there are five other participants from four member countries of the European Union: TNO – the leader (Netherlands), FFI (Finland), Cassidian (France), TUT (Estonia) and WAT (Military University of Technology) (Poland). Undoubtedly such composition of consortium partners with great research potential, experience 1 “Asymmetry” – this term describes different forms of disproportion, differentiation and disharmony, which are naturally or intentionally coexist in the environment of opposite realities. In the area of military conflicts, asymmetric operations appear in tandem with terrorists attacks. Today’s military systems are equipped with electronics and information technologies to such an extent, that cyber attacks seem to pose significant threats to military missions’ success.

Methodology for Gathering Data Concerning<br />

Incidents in Cyberspace<br />

Adam Flizikowski 1, 2 , Jan Zych 2 , Witold Hołubowicz 2<br />

1 University of <strong>Technology</strong> <strong>and</strong> Life Sciences, Bydgoszcz, Pol<strong>and</strong>, adamfli@utp.edu.pl<br />

2 ITTI Sp. z o. o., Poznań, Pol<strong>and</strong>, {holub, jan.zych}@itti.com.pl<br />

Abstract: This paper introduces a cyber incident observation sheet. It is meant to support the process<br />

of gathering cyber incident data from attacks targeted against military missions. An effective method<br />

of gathering factual data is in the authors’ opinion one of the biggest challenges <strong>and</strong> show-stoppers<br />

in the process of learning adhering to a lessons learnt paradigm (especially considering negative<br />

experiences).<br />

While developing Cyber Tool with the aim of cyber threats modeling in the frame of EDA (Europe<br />

Defense Agency) Athena project, authors have identified a serious need to introduce a well shaped<br />

<strong>and</strong> structured observation form in order to enable <strong>and</strong> foster data analysis <strong>and</strong> automated processing<br />

in subsequent steps. In contrary to civil world, cyber incidents against military systems are not reported<br />

publically, nor traced back to unveil the actual vulnerabilities that have been exploited by an attack.<br />

Authors describe a formal point of view in the area of factual data collection in the area of cyber-<br />

-attacks on communication resources. The proposed method (<strong>and</strong> recommendations) of collecting<br />

information about incidents can be a valuable input into the process of continuous improvement<br />

of security level in the cyberspace.<br />

Keywords: EDA, Athena project, factual data, data acquisition, sensors, cyber threats, asymmetric<br />

threats 1 , cyber attacks<br />

I. Introduction<br />

The EDA ATHENA project is a research project responding to the JIP-FP<br />

(Joint Investment Programme on Force Protection) call in the area of mission<br />

planning <strong>and</strong> modeling of asymmetric threats. Aside from ITTI (Pol<strong>and</strong>) there<br />

are five other participants from four member countries of the European Union:<br />

TNO – the leader (Netherl<strong>and</strong>s), FFI (Finl<strong>and</strong>), Cassidian (France), TUT (Estonia)<br />

<strong>and</strong> WAT (<strong>Military</strong> University of <strong>Technology</strong>) (Pol<strong>and</strong>). Undoubtedly such<br />

composition of consortium partners with great research potential, experience<br />

1<br />

“Asymmetry” – this term describes different forms of disproportion, differentiation <strong>and</strong> disharmony, which<br />

are naturally or intentionally coexist in the environment of opposite realities. In the area of military conflicts,<br />

asymmetric operations appear in t<strong>and</strong>em with terrorists attacks. Today’s military systems are equipped with<br />

electronics <strong>and</strong> information technologies to such an extent, that cyber attacks seem to pose significant threats<br />

to military missions’ success.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!