03.12.2012 Views

Life-Cycle Management - Army Logistics University - U.S. Army

Life-Cycle Management - Army Logistics University - U.S. Army

Life-Cycle Management - Army Logistics University - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Team hacker attacks. The attacks were designed to probe<br />

the ability of UltraLog’s multiple security defenses to<br />

preserve the confidentiality and integrity of its logistics<br />

functions against real-world threats based on the concept<br />

of operations scenario. Emphasis was placed on determining<br />

if the defense performed as expected and what<br />

the likely impact of the success or failure of the defense<br />

would be on the resulting logistics plan. A sample of<br />

these experiments follows.<br />

Invalid User Log-in<br />

This experiment tested if an unauthorized user could<br />

gain entry into the UltraLog system. It involved a nonexistent<br />

user with a bad password, a valid user with a<br />

bad password, and a valid user with a bad certificate.<br />

UltraLog successfully prevented the breach of this<br />

“first-line” security defense. The logistics functionality<br />

of the system was protected by successfully deflecting<br />

unauthorized users at the log-in screen. This<br />

defense is particularly important in a deployed and distributed<br />

system, where it may be relatively easy for an<br />

unauthorized user to gain access to a processor running<br />

an operational UltraLog logistics system.<br />

Unauthorized Access<br />

A trusted user operating as an enemy agent or working<br />

with other malicious intentions can be extremely<br />

damaging to military operations. Compartmentalizing<br />

access to systems and data is a fundamental mechanism<br />

for limiting potential damage. An UltraLog user has<br />

defined levels of access to various UltraLog services. In<br />

an operational context, these levels of access would be<br />

used to define the roles of maintenance and supply technicians,<br />

logistics planners, and decision and approval<br />

authorities at different levels in the chain of command.<br />

The purpose of this experiment was to determine if<br />

a user would be allowed access to functions for which<br />

permission had not been granted. A valid user with a<br />

valid password logged in and attempted to access several<br />

unauthorized services. Access to these services<br />

was successfully denied in every instance. The runs<br />

were repeated with the user attempting to access resources<br />

for which use was authorized. In these runs,<br />

the user was able to access the authorized services.<br />

These experiments were repeated using authenticating<br />

certificates, and again the user gained only the appropriate<br />

level of access. Messages were generated advising<br />

security managers of the attempt to access<br />

unauthorized functions. This combination of successful<br />

deflection of access and generation of alerts provided<br />

a sufficient defense against unauthorized access.<br />

Disallowed Messages<br />

A series of experiments was performed on controlling<br />

the transmission of information and instructions<br />

22<br />

between agents. UltraLog agents, whether physical<br />

agents such as a combat or support unit or UltraLog<br />

functional agents such as the security manager, are required<br />

to perform specific tasks with specific communications<br />

requirements. Policy establishes with whom<br />

an agent may communicate and the nature of that<br />

communication. From an operational perspective,<br />

this ensures that communications are limited to what<br />

is needed and that commands and instructions flow<br />

correctly along the military and logistics chains of<br />

command. These experiments demonstrated the following<br />

successes—<br />

• Agents were prevented from sending messages<br />

prohibited by policy. In the experimental runs, UltraLog<br />

successfully stopped the message on the<br />

sender’s node and the message was not delivered to the<br />

intended recipient. Security messages were generated<br />

documenting the attempted transmission of a message<br />

in violation of policy. Operationally, this defense<br />

could be used to isolate military units that display suspicious<br />

behavior or to compartmentalize the force<br />

structure so that the impact of a rogue agent can be<br />

limited to a subset of correspondent agents. [“Correspondent<br />

agents” are a group of agents with which<br />

the bad agent communicates.]<br />

• Agents were prevented from sending disallowed<br />

directives. Messages may contain directives that ask<br />

or direct that something be done. Policy determines<br />

which directives an agent may use and which are prohibited.<br />

For example, it might be inappropriate for a<br />

signal company to direct that a transportation company<br />

move a tank from one location to another. Based on<br />

the experimental data, UltraLog’s access control service<br />

on the send side enforced policies that specify the<br />

directives an agent is allowed to send. Operationally,<br />

this prohibits a military unit from issuing orders without<br />

appropriate authority.<br />

• Receivers rejected disallowed directives. This<br />

experiment examined the situation that occurs when<br />

a compromised agent successfully sends a message<br />

with disallowed directives and determined if the<br />

receiving agent detected and rejected the prohibited<br />

message. In the experimental runs, the message<br />

access control service successfully prevented<br />

agents from receiving messages containing disallowed<br />

directives.<br />

• Receivers rejected disallowed messages. This<br />

experiment examined what happens when a compromised<br />

agent successfully sends a disallowed message<br />

and determined if the receiving agent detected and<br />

rejected the prohibited message. The experiment<br />

demonstrated that UltraLog agents detected, rejected,<br />

and reported when messages disallowed by policy<br />

were received. Operationally, this defense<br />

effectively isolated a military unit from a rogue<br />

MARCH–APRIL 2005

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!