Life-Cycle Management - Army Logistics University - U.S. Army
Life-Cycle Management - Army Logistics University - U.S. Army
Life-Cycle Management - Army Logistics University - U.S. Army
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
UltraLog is a distributed, agent-based software architecture that is inherently survivable even in the<br />
most hostile environments. It is a resilient system that can protect and adapt itself under the most<br />
harsh and dynamic wartime conditions.<br />
traffic, reports violations, and, if warranted, isolates<br />
the unit transmitting suspect messages.<br />
• Communications security service. Encryption<br />
and digital signature of data in the communications<br />
pipeline protect data from compromise or unauthorized<br />
modification. Encryption ensures confidentiality,<br />
and digital signature ensures integrity of data and<br />
serves to authenticate the source.<br />
• Monitor and response service. This provides a<br />
framework for monitoring the security condition of the<br />
logistics information system. It looks for signs of<br />
attack, such as denial-of-service flooding, using data<br />
collected from a range of sources; analyzes the data;<br />
and selects a course of action determined to minimize<br />
the security risk. The framework includes UltraLogdeveloped<br />
sensors to monitor such things as unauthorized<br />
service requests or denial-of-service probing;<br />
analyzers to evaluate sensor input against decision<br />
rules; and a policy-management service that provides<br />
the ability to manage the security posture of the system.<br />
Examples of responses include simply monitoring<br />
intruder activities, deactivating portions of the<br />
system under attack, updating security policy<br />
(strengthening or weakening it as appropriate), and<br />
locking out offending users.<br />
Assessment of Security Defenses<br />
In order to assess the suite of security technologies,<br />
an UltraLog society was designed, built, and tested in<br />
the computer lab located at DARPA’s Technology<br />
Integration Center. A battery of over 100 high-speed<br />
servers, along with related routers and switches running<br />
on a fractional T–3 network connection, were assembled<br />
to demonstrate an UltraLog society of over<br />
1,000 military organizations and vehicles.<br />
A scenario was run simulating units of the <strong>Army</strong>’s V<br />
Corps fighting a 180-day major regional contingency<br />
in Southwest Asia. UltraLog’s task was to propagate an<br />
operation plan (OPLAN); build an executable transportation<br />
plan; plan the sustainment of deploying units;<br />
and then, during a simulated execution of the scenario,<br />
accept and propagate changes to the OPLAN and revise<br />
the transportation and sustainment plans accordingly.<br />
All of this was to be accomplished with minimal loss of<br />
function while independent assessors attacked the system<br />
by such means as cutting or reducing communications,<br />
limiting available computer processing and<br />
memory, and conducting a variety of IW assaults.<br />
With the testing infrastructure in place, UltraLog<br />
security functionality was assessed using a combination<br />
of distinct structured experiments and a variety of Red<br />
ARMY LOGISTICIAN PROFESSIONAL BULLETIN OF UNITED STATES ARMY LOGISTICS 21