03.12.2012 Views

Life-Cycle Management - Army Logistics University - U.S. Army

Life-Cycle Management - Army Logistics University - U.S. Army

Life-Cycle Management - Army Logistics University - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UltraLog is a distributed, agent-based software architecture that is inherently survivable even in the<br />

most hostile environments. It is a resilient system that can protect and adapt itself under the most<br />

harsh and dynamic wartime conditions.<br />

traffic, reports violations, and, if warranted, isolates<br />

the unit transmitting suspect messages.<br />

• Communications security service. Encryption<br />

and digital signature of data in the communications<br />

pipeline protect data from compromise or unauthorized<br />

modification. Encryption ensures confidentiality,<br />

and digital signature ensures integrity of data and<br />

serves to authenticate the source.<br />

• Monitor and response service. This provides a<br />

framework for monitoring the security condition of the<br />

logistics information system. It looks for signs of<br />

attack, such as denial-of-service flooding, using data<br />

collected from a range of sources; analyzes the data;<br />

and selects a course of action determined to minimize<br />

the security risk. The framework includes UltraLogdeveloped<br />

sensors to monitor such things as unauthorized<br />

service requests or denial-of-service probing;<br />

analyzers to evaluate sensor input against decision<br />

rules; and a policy-management service that provides<br />

the ability to manage the security posture of the system.<br />

Examples of responses include simply monitoring<br />

intruder activities, deactivating portions of the<br />

system under attack, updating security policy<br />

(strengthening or weakening it as appropriate), and<br />

locking out offending users.<br />

Assessment of Security Defenses<br />

In order to assess the suite of security technologies,<br />

an UltraLog society was designed, built, and tested in<br />

the computer lab located at DARPA’s Technology<br />

Integration Center. A battery of over 100 high-speed<br />

servers, along with related routers and switches running<br />

on a fractional T–3 network connection, were assembled<br />

to demonstrate an UltraLog society of over<br />

1,000 military organizations and vehicles.<br />

A scenario was run simulating units of the <strong>Army</strong>’s V<br />

Corps fighting a 180-day major regional contingency<br />

in Southwest Asia. UltraLog’s task was to propagate an<br />

operation plan (OPLAN); build an executable transportation<br />

plan; plan the sustainment of deploying units;<br />

and then, during a simulated execution of the scenario,<br />

accept and propagate changes to the OPLAN and revise<br />

the transportation and sustainment plans accordingly.<br />

All of this was to be accomplished with minimal loss of<br />

function while independent assessors attacked the system<br />

by such means as cutting or reducing communications,<br />

limiting available computer processing and<br />

memory, and conducting a variety of IW assaults.<br />

With the testing infrastructure in place, UltraLog<br />

security functionality was assessed using a combination<br />

of distinct structured experiments and a variety of Red<br />

ARMY LOGISTICIAN PROFESSIONAL BULLETIN OF UNITED STATES ARMY LOGISTICS 21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!