=Paper=
{{Paper
|id=Vol-2040/paper3
|storemode=property
|title= JUMP: Modelling and Simulation of Cyber Resilience for Mission Impact Assessment
|pdfUrl=https://ceur-ws.org/Vol-2040/paper3.pdf
|volume=Vol-2040
|authors= Tim Dudman, Antony Waldock
}}
== JUMP: Modelling and Simulation of Cyber Resilience for Mission Impact Assessment==
IST-153 NATO WORKSHOP ON CYBER RESILIENCE Ref: JUMP-IST-153-2 Date: 14/9/2017 JUMP: Modelling and Simulation of Cyber Resilience for Mission Impact Assessment Principal author: Tim Dudman: Senior Principal Consultant, Riskaware, Colston Tower, Colston Street, Bristol BS1 4XE, UK, +44 (0)117 929 1058, tim.dudman@riskaware.co.uk, www.riskaware.co.uk Co-author: Antony Waldock: Principal Systems Analyst, BMT Defence Services, Maritime House, 210 Lower Bristol Road, Bath, BA2 3DQ, UK, +44 (0)1225 473600, awaldock@bmtdsl.co.uk, http://www.bmtdsl.co.uk/ MOD contact: Steve Barrington: Principal Scientist, Cyber & Information Systems Division, Dstl, Porton Down, Salisbury, Wiltshire, SP4 0JQ, UK, +44 (0)1980 956877, sjbarrington@dstl.gov.uk, https://www.gov.uk/government/organisations/defence-science-and-technology-laboratory/ Overview The Joint User cyber Mission Planning (JUMP) application is a concept demonstration environment to understand the impact of land, air and sea activities on cyberspace and vice versa for various defensive and offensive joint force missions using state-of-the-art analysis algorithms and interactive visualisations. The scope of this work is to develop a concept demonstrator framework for visual analytics, Virtual Reality (VR) and Augmented Reality (AR) tools that can be employed for Cyber Mission Planning (CMP) with a view towards exploitation over the medium term (~5 years). JUMP will provide the defence community with much-needed confirmation that foundational theory can be implemented and applied within a coherent mission planning context. It will also provide prototype tools and techniques to de-risk the development of a capability that should ultimately support a military commander to accomplish a wide-range of mission- planning tasks including: • Understand the impact of cyberspace activity on various mission Courses of Action (CoA) and the subsequent decision-making. • Construct mission plans containing CoA. • Evaluate the impact of CoA against the potential activities of adversaries, allies and neutrals. • The use of cyber Search, Visualisation and Analysis (SV&A) technologies. • Identify the critical points of our own, or adversary’s, military cyber-dependent systems and understand their status. • Integrate understanding of the Cyber and Electro-Magnetic Activity (CEMA) environment into cyber-operational planning, exploiting synergies with MOD projects (e.g. Landseeker, Airseeker and Seaseeker). • Fuse Land, Air, Sea, Electro-Magnetic (EM) and cyber environments for a joint picture. In addition to mission planning, JUMP could also be applied to support mission rehearsal immediately ahead of the mission to confirm that plans are feasible, re-planning during the live mission, and following the mission as part of de-briefing. JUMP is being developed for the UK MOD by a consortium of BMT Defence Services, Riskaware and Cyberlytic; running from December 2016 to reach Technology Readiness Level (TRL) 6 by March 2019. It will help to communicate implications of the cyber battle to non-cyber commanders and give cyber staff awareness of the wider factors affecting the mission. End users interact with 2D and 3D maps of both NATO UNCLASSIFIED – RELEASABLE TO PUBLIC PAGE 1 OF 8 IST-153 NATO WORKSHOP ON CYBER RESILIENCE Ref: JUMP-IST-153-2 Date: 14/9/2017 physical and cyber entities that provide a range of views supporting planning activities across the physical and CEMA spectrum. The analysis and insight developed from these views allows users to extract implications on the mission. An agile development approach is being employed while engaging with MOD users and stakeholders to run experiments and integrate research outputs. Exploitation is via demonstrations, workshops with users and engagement with relevant personnel during military exercises, including Joint Venture 2017 and potentially Cyber Warrior 2018. Defence of Critical National Infrastructure JUMP aims to support military effects-based planning within a CEMA environment. It extends the existing symbology, language and visualisation of traditional land-based planning tools to include CEMA and form a single view such that the risks and benefits of actions in two domains can be considered side-by-side. An example scenario would be the defence of Critical National Infrastructure (CNI) in a foreign friendly nation that is experiencing insurgence supported by a larger nation state. The nation state is known to have a cyber-capability, and intelligence has been gathered to indicate that CNI is a target. Preparation for such a mission would require an understanding of the geographic environment in and around the CNI, but also awareness of the cyber infrastructure to defend in relation to the enemy’s capabilities. JUMP extends the joint user mission planning environment to allow cyber units to be modelled in existing NATO standards and for cyber devices relevant to the mission to be associated. JUMP draws on data from Geographic Information Systems (GIS), Cyber Vulnerability Investigations (CVI) and Network Information Systems (NIS) to analyse the risk associated with the cyber infrastructure under protection. For example, a CVI may indicate that a particular building contains a device that is exposed (both physically and from a network security perspective) and plays a critical role in the operation of the CNI. JUMP allows the cyber analyst to understand the risk associated with operating the device in the wider context of the mission. For example, if the device vulnerable to attack from a remote location or an employee with elevated privileges. The options available to the commander to secure the device in the building and maintain operation of the CNI are available within JUMP, both in terms of infrastructure updates (patching and firewalling) or by physically securing the location to reduce the risk associated with the mission. Cyber Resilience and Mission Impact Assessment In order to represent the impact of cyber warfare for campaign and mission-level operations, JUMP leverages Riskaware’s previous Centre for Defence Enterprise (CDE) research. In 2014, Riskaware developed the Rapid Evaluation of Disablement Action (REDACT) system to model the resilience of industrial processes to kinetic effects. This work pioneered the integration of connected-graph process modelling, 3D plant and blast modelling and visual analytics. The result was that the performance degradation of parts of the plant due to the impact of kinetic-attack could be modelled and visualised, along with the downstream impact on plant output. In 2015 Riskaware built on this research, and the REDACT platform, to model the cyber resilience of military missions in the Cyber Operational Mission Mapping, Visualisation and Analysis Tool (COMMVAT). Missions were modelled as a dependency-based connected-graph, and the 3D plant and blast model was replaced with a cyber-attack model. The cyber model included a topological representation of a network, stored in a scalable connected-graph database, and algorithms to perform Topological Vulnerability Analysis (TVA) [1] and weakest attack path analysis. As with the previous industrial process resilience modelling, performance degradation of parts of the mission due to the impact of cyber-attack could be modelled and visualised, along with the resulting impact on mission objectives. In addition, the effect of patching mission-critical device vulnerabilities could also be assessed. NATO UNCLASSIFIED – RELEASABLE TO PUBLIC PAGE 2 OF 8 IST-153 NATO WORKSHOP ON CYBER RESILIENCE Ref: JUMP-IST-153-2 Date: 14/9/2017 This existing cyber Mission Impact Assessment (MIA) capability is now being re-developed for integration into the service-based JUMP architecture and for use within the JUMP-hosted NATO mission planning process [2]. Additionally, the scalability of the algorithms and underlying technologies is being enhanced to support multiple missions and hybrid network topologies. Unified Connected-Graph Data Model A unified connected-graph model-driven approach allows JUMP to represent the cyber terrain and mission in a single, coherent data model, bridging the gap between operational decision makers and cyber analysts. Completely built on open-source, scalable connected-graph database technology, JUMP can model cyber- dependent missions with varying levels of fidelity in order to represent the impact of cyber phenomena on operations. Computer networks are modelled as a topology of devices and physical connections in logical groups as shown in Figure 1. Device software is also modelled, along with known vulnerabilities and cyber threats. The intention is that this data will be generated through detailed Cyber Vulnerability Investigations (CVI) and network scans. In the interim, the latest Common Vulnerabilities and Exposures (CVE) are looked-up online from the US National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) [3] using web services such as the Computer Incident and Response Centre Luxembourg (CIRCL) [4]. Figure 1: Connected-graph showing network topology The mission is modelled as a topological vignette of interdependent mission components. These can represent mission threads, actors, processes and other mission-critical assets. Each has an assigned sensitivity to the combination of performance degradation of any dependencies. Mission components can be associated with network devices, and have time-based events, vulnerabilities and impacts associated with them to allow the mission impact of both conventional and cyber events to be modelled. Complex rules such as device redundancy and recovery time can also be modelled. Mission vignettes are built behind the scenes within JUMP based on CVI information and user interaction with the map, or by importing Unified Modelling Language (UML) Cyber Mission Impact Assessment (CMIA) models that are then interactively augmented by a cyber analyst. NATO UNCLASSIFIED – RELEASABLE TO PUBLIC PAGE 3 OF 8 IST-153 NATO WORKSHOP ON CYBER RESILIENCE Ref: JUMP-IST-153-2 Date: 14/9/2017 Figure 2: Connected-graph showing a mission vignette The example mission vignette shown in Figure 2 models the protection of CNI. A blue forces battlegroup defends a power plant to secure the power supply. The battlegroup is reliant on a military network for communications, and the power station is dependent on both a safety-critical Supervisory Control and Data Acquisition (SCADA) network, as well as an enterprise network. Each network is modelled separately (the SCADA and enterprise networks are air-gapped), and critical devices are associated with mission components. The mission vignette models these assets along with military units, plant processes (such as cooling and control) and mission objectives. Mission vulnerabilities and events are also modelled to represent rough terrain, kinetic effects and cyber-attack. The cyber-attack surface is modelled by both mission-level vulnerabilities and cyber threats in the network topology. These simulate both external hackers and insider threats with different authentication capabilities. Topological Cyber Vulnerability Analysis and Mission Impact Assessment Graph-based analysis techniques can simulate both offensive and defensive entities within the mission and cyber domains. The modelling considers the impact of cyber threats and the consequences of mitigations such as firewalling and patching. The progression of chained cyber-attacks is modelled through a simplified and highly-optimised TVA approach; a process whereby all possible attack paths through the logical network are calculated. The algorithm involves the following steps: 1. Exploits are created from applicable vulnerabilities based on pre- and post-condition Common Vulnerability Scoring System (CVSS) [3] metrics: a. Access vector NATO UNCLASSIFIED – RELEASABLE TO PUBLIC PAGE 4 OF 8 IST-153 NATO WORKSHOP ON CYBER RESILIENCE Ref: JUMP-IST-153-2 Date: 14/9/2017 b. Impact 2. Device statuses are then created for the highest impact exploits, based on: a. Integrity impact b. Availability impact Following the TVA stage, MIA is performed in order to predict the likely impact of all events (both cyber and conventional) on the mission. During MIA, the time-based performance degradation and recovery of mission components is calculated as follows: 1. The mission vignette is topologically-sorted using Kahn’s algorithm [4] 2. Weakest attack path analysis from attacker locations in the network to critical devices is performed using Dijkstra's algorithm [5], based on CVSS metrics: a. Authentication b. Access complexity 3. The time-based impact of all events is assessed, considering all known vulnerabilities, resulting in the calculation of: a. Performance degradation and recovery b. Collateral damage 4. Cyber impact is mapped to mission impact through consideration of: a. Device status b. Redundancy rules 5. Dependency degradation is tracked through the graph, based on: a. Sensitivity to upstream mission components b. Combination rules where there are multiple dependencies, covering cases such as those in which all dependencies must work, through to cases where only one need work, via various intermediate cases The topological dependency-based mission graph allows resilience to cyber-attack to be seen at each mission component, as well as aggregated at the mission objective level. Visual Analytics Visual representation of modelling and simulation results and adversary actions is a key element of the JUMP system and is critical for assessing mission resilience and responding to cyber-attacks in a targeted manner that maximises mission success. Web-based visual analytics support interactive views that improve situational understanding and convey the implications of cyber-attacks for mission objectives, allowing damage assessment and mitigation strategies such as patching to be proposed and assessed. NATO UNCLASSIFIED – RELEASABLE TO PUBLIC PAGE 5 OF 8 IST-153 NATO WORKSHOP ON CYBER RESILIENCE Ref: JUMP-IST-153-2 Date: 14/9/2017 Figure 3: MIA showing time-based performance degradation and recovery Figure 4: Weakest cyber-attack path analysis and patching NATO UNCLASSIFIED – RELEASABLE TO PUBLIC PAGE 6 OF 8 IST-153 NATO WORKSHOP ON CYBER RESILIENCE Ref: JUMP-IST-153-2 Date: 14/9/2017 In the simulation results shown in Figure 3, the impact of physical and cyber effects has been quantified, along with the increased cyber resilience gained from actions such as patching mission-critical software vulnerabilities as shown in Figure 4. Detailed cyber resilience information is presented in a separate JUMP screen for cyber analysts. The highly- interactive visual analytics are powered by industry-leading open-source technologies including Data Driven Documents (D3) [6], Facebook’s React framework [7] and Bootstrap (originally Twitter Blueprint) [8]. Redux [9] is being used to implement Facebook’s Flux architecture [10] for building client-side web applications. Figure 5: JUMP cyber analyst screen The cyber analyst screen shown in Figure 5 supports full topological mission vignette editing, as well as views that allow interactive exploration of network vulnerabilities, assignment of network threats, data analytics and cyber resilience simulation. It also allows cyber-attack mitigations such as network hardening or patching of critical vulnerabilities to be staged and assessed. Further Research At the time of writing, the JUMP project has already completed Situational Understanding, Mission Objectives and CoA epics. The remaining Year 1 development epics concern CoA Evaluation, Red Teaming and CoA Decision-Aid Analysis. Planned enhancements to the functionality presented in this paper include what-if analysis, high impact – low probability analysis, alternative futures analysis and integration with the MOD’s Cyber Situational Awareness Fusion Architecture (CySAFA). References [1] S. Jajodia and S. Noel, “Topological Vulnerability Analysis,” Advances in Information Security, vol. 46, NATO UNCLASSIFIED – RELEASABLE TO PUBLIC PAGE 7 OF 8 IST-153 NATO WORKSHOP ON CYBER RESILIENCE Ref: JUMP-IST-153-2 Date: 14/9/2017 pp. 139-154, 2009. [2] “Staff Officers’ Hand Book,” British Army, 2014. [3] National Institute of Standards and Technology, “National Vulnerability Database,” [Online]. Available: https://nvd.nist.gov/. [4] Computer Incident Response Center Luxembourg, “cve-search Common Vulnerabilities and Exposures (CVE),” [Online]. Available: https://www.circl.lu/services/cve-search/. [5] Forum of Incident Response and Security Teams (FIRST), “Common Vulnerability Scoring System,” [Online]. Available: https://www.first.org/cvss/. [6] A. B. Kahn, “Topological sorting of large networks,” Communications of the ACM, vol. 5, p. 558–562, 1962. [7] E. W. Dijkstra, “ A note on two problems in connexion with graphs,” Numerische Mathematik, vol. 1, p. 269–271, 1959. [8] M. Bostock, “Data-Driven Documents,” [Online]. Available: https://d3js.org/. [9] Facebook, “React,” [Online]. Available: https://facebook.github.io/react/. [10] Bootstrap Core Team, “Bootstrap,” [Online]. Available: http://getbootstrap.com/. [11] Redux, “Redux,” [Online]. Available: http://redux.js.org/. [12] Facebook, “Flux,” [Online]. Available: https://facebook.github.io/flux/. NATO UNCLASSIFIED – RELEASABLE TO PUBLIC PAGE 8 OF 8