=Paper=
{{Paper
|id=None
|storemode=property
|title=A Semantic Approach to Evaluate the Impact of Cyber Actions to the Physical Domain
|pdfUrl=https://ceur-ws.org/Vol-966/STIDS2012_T08_BarretoEtAl_EvaluateImpactOfCyberActions.pdf
|volume=Vol-966
|dblpUrl=https://dblp.org/rec/conf/stids/BarretoCY12
}}
==A Semantic Approach to Evaluate the Impact of Cyber Actions to the Physical Domain==
A Semantic Approach to Evaluate the Impact of Cyber Actions on the Physical Domain Alexandre de Barros Barreto Paulo Cesar G. Costa Edgar T. Yano Instituto Tecnológico de Aeronáutica George Mason University Instituto Tecnológico de Aeronáutica São José dos Campos, SP, Brazil Fairfax, VA, USA São José dos Campos, SP, Brazil Email: adebarro@c4i.gmu.edu Email: pcosta@gmu.edu Email: yano@ita.br Abstract—Evaluating the impact that events within the cyber and what it means to the overall mission. Existing tools and domain have on a military operation and its critical infrastruc- methodologies cannot provide this level of information, and ture is a non-trivial question, which remains unanswered so are not suitable to support complex cyber threat assessment far in spite of the various research efforts addressing it. The key issue underlying this question is the difficulty in correlating in real situations. This is a major gap that to our knowledge cyber and physical behaviors in an integrated view, thus allowing has not been successfully filled, in spite of the relatively large for real-time analysis. This paper addresses the issue with the body of research focused on the subject. development of an ontology-based framework in which the cyber This paper addresses this gap by proposing a semantic and physical behaviors are integrated in a consolidated view, framework that fuses physical and cyber data collected from using a combination of open standards protocols and semantic technologies. In our approach, the mission and its physical aspects existing sensors and retrieving information that is relevant are modeled using a business process language (e.g., BPMN) to the assessment of cyber impact. It is designed to support and an information infrastructure based on Simple Network analysts with an integrated view, one that correlates actions in Management Protocol (SNMP). In this scheme, changes in the the cyber domain with effects in other domains, allowing the environment are captured using the output of sensor components evaluation of its impact on the operational objectives. existing in the infrastructure. In order to ensure a complete and integrated analysis of the accruing data, we have developed The proposed framework and its main aspects are illustrated a Cyber Situation ontology (in OWL) and a methodology for and evaluated via a simulated air traffic scenario, which mapping the cyber and the physical domains. In this framework, includes a large number of simulated flights. mission data from the environment is retrieved and fused using This paper is organized as follows. Section II presents the an engine based on the Semantic Web Rule Language (SWRL). main concepts necessary to understand the framework being The output of this process is then presented to an analyst in a way that only the most important information needed to support proposed, as well as a sample of the most relevant approaches his/her decisions is shown. To validate our approach, a real air attained so far to address the problem. Section III describes traffic scenario was modeled and many simulated flights were the framework for evaluating the impact of a cyber attack on generated to support of our experiments. an operation occurring in the physical domain. The approach is discussed in Section IV, and illustrated with an analysis I. I NTRODUCTION of a fictitious air traffic scenario build specifically to evaluate With the increasing automation of processes and systems our research. Finally, Section V presents a few considerations that are part of critical infrastructures supporting military and and issues that must be addressed in future research aimed to vital civilian operations, the cyber domain became one of most improve the approach. important aspects in strategic planning. Society’s dependence on this domain [1] has reached a point II. BACKGROUND AND R ELATED R ESEARCH in which it is now considered as a new dimension of war, The main concept to present is mission. As discussed in together with air, land and sea. In this new paradigm, a key [4], a mission is the task (or set of tasks), together with its aspect is to understand how actions performed in the cyber (their) associated purpose, that clearly indicates the action to domain (space and time) affect the operations taking place in be taken assigned to an individual or unit. the other domains, so one can leverage actions in the cyber Three other important concepts are Situation Awareness, Im- domain as tools to achieve the campaign objectives [2], [3] pact Assessment and Threat Assessment. The first, as described Unfortunately, this is no trivial task, since it requires cor- in [5], is the perception of the elements of the environment relating cyber and physical behaviors in an integrated view within a volume of time and space, the comprehension of their that allows tasks to be evaluated in real time. The complexity meaning, and the projection of their status into the near future embedded in this requirement implies, among other things, to enable decision superiority. that an IT manager supporting critical infrastructures must be The second important concept, Impact Assessment, involves able to access all relevant data pertaining to the network and the task of estimating the effects on situations of planned translate it to the support team in a way that allows them or estimated/predicted actions by the participants, including to understand the real impact of cyber threats to the network interactions between action plans of multiple players [6]. The third and last concept, Threat Assessment, can be on Mission-Oriented Risk and Design Analysis (MORDA) understood as an expression of intention to inflict evil, injury, [14] and on the Security Optimization Countermeasures Risk or damage. The focus of threat analysis is to assess the and Threat Evaluation System (SOCRATES) [15]. In this likelihood of truly hostile actions and, if they were to occur, approach, all components that exist in the problem (mission, projected possible outcomes [6]. resources and threats) are mapped and used in the analysis. From a general perspective, the second and third concepts However, the mapping process is very complex and requires can be seen as being part of the first, but with a difference continuous iteration with the human analyst (i.e. human-in-the- in their focus. More specifically, while impact assessment loop), who needs to provide constant feedback and input to looks for an “internal” understanding (i.e., what is happening the methodology. As a consequence of its demand for human and why should I care?), threat assessment seeks the same interaction, this approach tends to be applied in the planning understanding from the enemy’s viewpoint (i.e., how they phase, while being less suitable to the more time intensive can hurt us). More important to our research is the fact they environment found in real time decision making scenarios. all these concepts imply a means to assess the mission. In Another methodology that relates to the problem addressed other words, all must go through the process of specifying in this paper is Cyber Mission Impact Assessment (CMIA) [7], and maintaining a reasonable degree of confidence in mission [16]. CMIA presents a way to (manually) associate mission success, which is linked to the concept of Mission Assurance and infrastructure, and use the resulting association to support [7]. the assessment of mission assurance. Literature on the subject of measuring effectiveness of a In a typical analytical process using CMIA, each attack is mission points to two major approaches. The first is to use simulated and its associated impact is calculated. Then, all the concept of task as the evaluation basis, while the second attacks and assets are correlated and the paths with the highest instead focuses to the effects [8]. The framework presented in cost are prioritized. The major deficiency of this approach is this paper adopts the second approach. its inability to evaluate more than one attack simultaneously, The main approach to provide mission understanding in- which prevents an assessment of the synergistic effect of volves using a set of distributed sensors to detect intrusions coordinated attacks. This is a major liability, since in most and to uncover attack paths. The preliminary research on the cases the enemy would attempt to achieve an overall effect subject is due to Denning [9] and Bass [10]. Schneier [11] with parallel attacks that is much greater than the sum of the proposed the use of an attack-tree to measure effect, which isolated effects of these same attacks. allows understanding of the relationships between attacks, The above mentioned works are a representative subset as well as how one attack over a cyber asset affects other of current research related to evaluation of the impact of assets. In spite of the advances above cited, the problem of cyber threats, and can thus support the claim that the research determining the impact of a cyber attack on a (mission) task problem remains unsolved. In summary, each approach suffers still persists, since no methodology exists to effectively map from in at least one of the two issues that can be singled out cyber assets to tasks. Furthermore, these techniques are not as the main causes for this situation. The first is the lack of capable of dealing with some common types of cyber attacks, a correlation (and, in some cases, computation) between the rendering them unsuitable for impact assessment in the current main components that are needed for impact assessment, the state of the art in cyber warfare. For instance, when an attack mission and its supporting infrastructure. The second cause for is new (e.g. a zero-day attack), its signature is unknown and failures is the inability to provide real-time analysis of these there will be no attack-tree associated with it. As a result, it two components and their interactions. The proposed frame- will be extremely difficult to identify its attack pattern by the work is meant to address both, with a unique combination time it occurs. of semantic technologies, operations research, and simulation, The above limitation illustrates the need for new approaches. which we explain in the next Section. A more comprehensive one would involve identifying attacks, III. E VALUATING THE I MPACT OF C YBER T HREATS highlighting significant events and then understanding the This paper proposes ARGUS, a new Framework that eval- importance of them in a system [12]. To assess the importance uate the impact of a cyber attack on a mission. ARGUS is of events, one must understand how the process of planning comprised of four main phases: 1) modeling of mission, 2) and implementing a mission works. Topological Analysis of modeling of network architecture, 3) collecting cyber and Network Vulnerability (TVA) [13] is meant to provide such mission information, and 4) developing impact assessment. understanding. TVA supports an analyst in measuring the These phases are depicted in Figure 1. impact of a threat through the evaluation of topological aspects As implied in the diagram, the core idea within ARGUS of the environment. The main weakness of this approach is is to capture the mission and infrastructure information and the absence of an explicit mapping between the mission and consolidate it in an integrated data representation, which the infrastructure supporting it. As a result, this becomes yet allows for a comprehensive analysis to be performed. another cognitive burden implicitly assigned to the analyst, a solution that clearly does not scale well with the increasing A. Modeling of Mission complexity of the operational environment. The first phase in ARGUS involves modeling of mission, Another related approach can be summarized by the work which is achieved by the use of a business process language. and 3 illustrate some of the extended attributes (marked with a circle in the figures), which are present in the mission ontology supporting the repository. The use of a business language (BPMN in the current implementation) was not only convenient as a development tool for the framework, but also proved to be rather suitable for capturing the main aspects of a mission, especially when it is used in civilian environments such as air traffic management, nuclear power plants, and others. Its business-oriented notation made it easier to accommodate the concepts of a mission in the Air Traffic Domain that we are using in the evaluation of the research, while also having a relatively straightforward mapping to the associated concepts in the mission ontology. One example of a business-oriented concept being mapped Figure 1. ARGUS major phases to the mission ontology is that of a Pool. To model a mission, an analyst starts by describing the Organizations that partici- pate in the process of accomplishing the mission. These can be The goal of this phase is to capture the most important squadrons, sectors, departments, battalions, or any functional information of the mission within the model. Importance here, structure involved with the mission details. Pool is the BPMN of course, is measured with respect to its relevance to impact concept used to describe such organizations. assessment, and includes the tasks, relationships between the tasks, objectives, resources required to develop the mission We expect the currently developed mapping to be relatively and, finally, performer (i.e., entity or set of entities that has robust when applied along with the framework to other do- the responsibility to perform the mission). mains. Table I summarizes of the mapping developed in this In our current research, we leveraged previous experience initial phase of our research. within our group and made the design decision of capturing these aspects using the Business Process Modeling Notation Table I M APPING BPMN TO THE M ISSION O NTOLOGY (BPMN) language [17]. However, any business modeling language with the ability to capture the information described Concept Source above could have been used and, therefore, might be used with Mission Model BPMN the framework in the future. Organization Pool One of the most important features of the ARGUS is its System Lane reliance on semantic technologies to ensure consistency when Activity Task used in multiple domains. Therefore, although a business mod- Service Performer eling language is used as the basis for information elicitation Condition Gateway or Event (BPMN, in the current implementation of the ARGUS), all information captured is stored in an ontology-based informa- tion representation repository. The ontology supporting the repository was developed using the most recent version of the The ARGUS approach only builds mappings between au- W3C recommended OWL 2 Web Ontology Language [18]. In tomated processes, although BPMN is able to support non- fact, to illustrate the advantages of using an ontology-based automated ones. A service is understood as the entity respon- framework, it should be emphasized that we didn’t have to sible for performing tasks (activities), while a system is a actually develop a mission ontology from scratch, but we collection of services. To ensure a proper correlation between simply imported and made some adaptations to existing work business and infrastructure data, the analyst must describe by others. That is, the ontology itself is an adaptation of the where the service is provided, using his address and ports. one defined in D’Amico et al. [19], while architecture is based The framework supports the identification of relevant in- on that of Mateus et al. [20]. formation from raw data captured by the sensors. In order In our context, the main concept in a mission is activity for this to be accomplished, information regarding the effect, (see figure 2). An activity has a set of pre and post conditions conditions and service level are described using rules. More and one goal. His goal is to produce one or more effects over specifically, an effect is the result, outcome, or consequence a resource. An activity can be measure, enabling that can be of an action (task) over a resource. Further, a condition can understand the state of the mission’s components. be understood as the state of the environment or of a situation Due to its main focus on business, BPMN lacks native in which a performer (service) performs or is disposed to support for some of the mission information that needed perform an task. Finally, service level refers to the minimum to be captured. Thus, we had to extend its basic structure (or maximum, depending on the requirement) standard that a to accommodate our representational requirements. Figures 2 service is expected to reach with confidence. Figure 2. The Mission Ontology B. Modeling of Network Architecture depicted in Figure 3. Cyber Assets are responsible for to host one or more service (which is who performs the activities The second phase in ARGUS, modeling of network archi- needed by the mission). Through services, ARGUS maps the tecture, is in fact performed almost in parallel with the first. In infrastructure in mission and vice versa. this phase, all information about the infrastructure is captured using Simple Network Management Protocol (SNMP) [21] Another important concept from BPMN is that of a per- and stored in the ontology-supported information represen- former, which was mapped to the mission ontology as service tation repository. The main concept in the ontology used (cf. Table I). In BPMN, the performer concept defines the to represent the infrastructure is Cyber Asset, which is also resource that is responsible for an activity. It can be specified in Figure 3. The Resource Ontology the form of a specific individual, a group, an organization role Once all information needed from the business and in- or position, or an organization. Due to the above mentioned frastructure is retrieved, the events are captured from the mapping, in ARGUS performers are services, which explains sensors’ input, and classified in accordance with relevant the need for analysts to specify the implementation address situations using rules. Then the framework is ready to evaluate during the modeling. In other words, the correlation between the impact of the current state of the system on its main the services and the cyber assets is made automatically by the mission. In ARGUS, this evaluation is performed through four framework via SNMP queries, which collect the UDP/TCP distinct types of analysis: dependence paths, temporal, cost, ports of the services via two tables residing in the Manage- and history degradation. ment Information Base (MIB) of each of the network hosts The first type of analysis, dependence paths, aims to un- (tcpConnLocalPort and udpLocalPort). cover problems in topology that have the potential to affect the To build the network archiecture and its variations, the accomplishment of the mission. The typical questions involved framework performs queries on the other three tables residing in this analysis include (but are not limited to) the following: in each host’s MIB, the ipRouteDest, the ipRouteMetric, and • In this state of the system, can the mission goal be the ipRouteNextHop. The combination of the information reached? retrieved from these tables allows the Framework algorithm to • If task C fails, is there any path left to reach the goal? infer the neighbors of the host, as well as the network distance The second type of analysis, temporal, seeks to define a between the host and nodes that were eventually discovered window of interest in which the problem is solvable. The via the routing protocol embedded in the framework algorithm. typical questions that are raised in this type of analysis include Finally, the framework uses changes in those attributes (e.g. but are not limited to: nodes added, nodes deleted, changes in nodes IP route metrics, etc.) as parameters for inferring the network dynamics. Besides • What tasks need to be monitored at time T ? the network information mentioned above, the framework also • How much time is needed to finish the task and accom- uses SNMP to retrieve a set of other infrastructure properties, plish its objective? such as memory (persistent and volatile) size, operating sys- The third type of analysis, cost, is meant to identify when tem, uptime, etc. It is outside the scope of this paper to explain the cost starts to become a serious threat to the task execution. in detail the framework algorithms and how each network In other words, it evaluates the cost / benefit ratio of each task parameter is assessed, more information on these details can be with respect to the overall mission. The typical questions to obtained from the work at the GMU/ITA C2 testbed (cf. [22]). be answered in this analysis include: C. Collecting Cyber and Mission Information • How much does this task cost? • Do the benefits of this task justify the costs involved in The third phase in ARGUS involves the collection of its execution? relevant information. In this case, the criteria for information • If task C is compromised, does an alternative route have to be considered relevant is related to the value it adds to an acceptable cost? the overall understanding of the environment (i.e. how it improves situation awareness). This assessment is performed The last type of analysis, history degradation, has the goal in accordance with the general scheme depicted in Figure 4. of understanding how fast the infrastructure is degrading. Its The main concept in the scheme is Situation, which is an typical questions can be similar to the ones in each of the event or set of events that are meaningful to the mission. In above tasks, but with a focus on the way the infrastructure ARGUS, events can be captured in any different ways. In assets are degrading and its associated impact on the overall our first implementation, we can retrieving the data existing mission. in the SYSLOG Database [23] or by capturing network D. Developing Impact Assessment packets via a packet capture (PCAP) interface (e.g.through an intrusion detection system) [24]. Once an event is captured, The fourth phase in ARGUS, impact analysis, is the main the framework uses rules to classify it as being part of a part of the framework. In order for this phase to be executed in situation. As previously mentioned, these rules will be applied real time, so the impact evaluation would be done as the mis- to information retrieved from the network sensors and inserted sion unfolds, we have developed the reference implementation into the framework through the BPMN’s and Ontology’s depicted in Figure 5. interfaces (cf. Figures 2, 3, and 4). The Cyber Situation Awareness engine (CyberSA Engine) The design choice for describing the rules was the Semantic is comprised of six modules. The first is the BPMN Module, Web Rule Language (SWRL) [25]. SWRL extends a set of which performs the tasks of getting mission information from OWL axioms to include Horn-like rules, thus enabling Horn- a BPMN file, parsing it, and mapping the retrieved concepts like rules to be combined with an OWL knowledge base. The to the mission ontology. expressiveness achieved by this rule scheme is key to the The SNMP and SYSLOG modules perform queries on framework’s ability to capture aspects that cannot be easily all hosts and on the SYSLOG Server, respectively. When captured using OWL, such as utilization of resources, mission the associated answers are received, the module parses and requirements, and others. converts them to the format they will be used in the system. Figure 4. Capturing the Details of an Event The PCAP module retrieves event data from the network. in a consistent way so the CyberSA Engine can provide it to However, analysing the retrieved raw data is a time consuming the users. This consistency is also achieved with the support of and non-trivial task, so in our implementation we have made semantic technologies, via the implementation of a Semantic the design decision of using an external tool, TSHARK [26]. Fusion Module. The main services this module provides are This tool is a terminal-oriented version of Wireshark designed making inferences and applying rules, which were written by for capturing and displaying packets when an interactive user analysts using the GUI. interface is not necessary or not available. It has a set of filters that produces information in a format that is more readable to The Semantic Fusion Module uses two libraries to provide analysts. its features. The first is the OWL-API [27], a Java API and reference implementation for creating, manipulating and Once the four modules above collect and process their serializing OWL Ontologies. The second is Pellet [28], which respective information, the result needs to be made available is an OWL 2 reasoner that provides standard and cutting-edge Figure 5. The CyberSA Engine reasoning services for OWL ontologies. service where the aircraft consume the smaller amount of fuel The last module of the CyberSA Engine is the View Module, and the system generates a low number of collision resolution which provides the interface to analysts. The main goals of events. A collision resolution event happens when two aircraft this interface are to allow analysts to provide information the fly within a distance (vertical or horizontal) that is smaller system cannot obtain automatically, and to write the rules used than the safety rules defined by law. by the system’s inference engine. The simulation includes three distinct air traffic services Figure 6 is an example of a typical form of the system’s organizations (cf. Figure 7). The first is the AIS (Aeronautical GUI, in this case one that allows the analyst to setup a task. In Information Service), which has the responsibilities of insert- the combo box depicted in the figure (named as “Activity”), the ing the flight plan into the system and getting all clearance analyst chooses the type of activity he wants to set, as well as necessary for the aircraft to fly. The second service modeled the associated fields - which are shown in a contextual fashion is the Radio Station, which gets information on flight tracks with support from the mission ontology. In the example, the (i.e. aircraft) within its area of coverage and sends it to the analyst chose the activity “FlightStartWarning”, and was then APP (Ground-controlled Approach) Service. Finally, the APP presented with three fields. In the first field, the analyst is service performs three main tasks: fuse track information, presented with the resources that he needs to do the task. In present it in a controller view and generate alerts to be used the remaining two fields, the analyst is expected to describe, by a monitoring system. using rules in SWRL syntax, how to measure the task progress The simulation was developed using the C2 Simulation and the conditions this measure will be performed. Testbed [22], a joint project between the C4I Center at George Mason University (GMU) and the C2 Lab at the Instituto Tecnológico de Aeronáutica (ITA) in Brazil. The testbed allows the emulation of any infrastructure behavior and the simulation of all aspects of the physical environ- ment (aircraft flights, collisions, etc). The current evaluation scenario includes fourteen aircraft that take off from three different airports and go to the oil platforms. The flight plan was developed to generate collision warnings, allowing the framework to generate situations of interest. A view of this scenario using the C2 Simulation Testbed is presented in Figure 7. Figure 6. The ARGUS User Interface By means of this GUI, the system will guide the analyst through a process in which he will be able to define the activity, the cost of resources, the service’s SLA, and other rules that must be defined given the relevant situations. The Figure 7. The Simulation in VRForces View Module also provides classification of the event (i.e. the situation(s) it pertains to). A major aspect that is needed for the framework to de- fine relevant situations is the proper definition of the rules IV. D ISCUSSION by analysts. Among other things, these rules formally es- A simulation of an air traffic scenario was developed to tablish to the system the conditions that restrict the task, evaluate the framework, verifying its ability to generate the the goal of mission in general, the objective of each task, relevant situation assessment and present it to the analyst. The and other aspects that are important in filtering the raw simulation is based on a real scenario, located at the Campos data coming from the sensors. In addition to these aspects, basin in Brazil, where a heavy helicopter operation is held to another key use of rules is to create relations that are not support maritime oil platforms sixty to eighty miles offshore. explicit in the domain. As an example, the link between The mission described in this scenario thus involves air traffic cyber assets and services can be defined by this simple rule: CyberAsset(?y), OntoService(?x), ipv4Address(?x, ?k), [10] T. Bass, “Multisensor Data Fusion for Next Generation Distributed ipv4Address(?y, ?k) → isHostingIn(?x, ?y). Therefore, it Intrusion Detection Systems,” in IRIS National Symposion, 1999. [11] B. Schneier, “Attack trees: Modeling security threats,” Dr. Dobb’s is fair to say that the combination of SWRL rules and OWL journal, December 1999. 2 statements to link the physical and cyber domains is at the [12] O. S. Saydjari, “Cyber defense: Art to Science.” Communications of the heart of the system’s goal of evaluating mission impact. ACM - Homeland Security, vol. 47, no. 3, March 2004. [13] S. Jajodia, S. Noel, and B. O’Berry, “Topological Analysis of Network Attack Vulnerability.” Managing Cyber Threats, vol. 5, pp. 247–266, V. F UTURE R ESEARCH 2005. This paper presented an approach for connecting the cyber [14] S. Evans, D. Heinbuch, E. Kyle, J. Piorkowski, and J. Wallner, “Risk- based systems security engineering: stopping attacks with intention,” and physical domains, with the objective of assessing the IEEE Security and Privacy, vol. 2, pp. 59–62, 2004. impact that actions in the former have in the latter. This is [15] D. L. Buckshaw, G. S. Parnell, W. L. Unkenholz, D. L. Parks, J. M. research in progress in an area where clear answers are usually Wallner, and O. S. Saydjari, “Mission Oriented Risk and Design Anal- ysis of Critical Information Systems,” Military Operations Research, not attainable, mostly due to the complexity as well as to the vol. 2, pp. 19–38, 2005. level of subjectivity involved in real time impact assessment. [16] S. Musman, M. Tanner, A. Temin, E. Elsaesser, and L. Loren, “Com- As such, the framework presented here should be seen as a puting the impact of cyber attacks on complex missions.” in 2011 IEEE International Systems Conference (SysCon), 2011, pp. 46–51. first step of a steep ladder. Yet, it is a firm step, since after [17] OMG, Business Process Model and Notation (BPMN) 2.0, attempting various approaches we remain convinced that the http://www.omg.org/spec/BPMN/2.0, OMG Std., 2011. solution to this problem relies in a combination of techniques [18] W3C, OWL 2 Web Ontology Language, http://www.w3.org/TR/owl2- overview/, W3C Std., October 2009. where semantic technologies and simulation play a major role. [19] A. D’Amico, L. Buchanan, J. Goodall, and P. Walczak, “Mission Impact The software modules, including the ontology and some of of Cyber Events: Scenarios and Ontology to Express the Relationships the rules, that together comprise the framework are already im- between Cyber Assets, Missions, and Users.” AFRL/RIEF, Tech. Rep. OMB No. 0704-0188, December 2009. plemented, and we are currently evaluating its performance via [20] C. J. Matheus, M. M. Kokar, K. Baclawski, J. A. Letkowski, the C2 Simulation Testbed. Preliminary results are promising C. Call, M. Hinman, J. Salerno, and D. Boulware, “SAWA: An and should be available soon. Our future work path includes assistant for higher-level fusion and situation awareness,” Proceedings of SPIE, vol. 5813, no. 1, pp. 75–85, 2006. [Online]. Available: aspects such as the usability of the system, and others that rely http://link.aip.org/link/?PSI/5813/75/1&Agg=doi on semantic technologies to alleviate the reliance on analysts [21] J. Case, M. Fedor, M. Schoffstall, and J. Davin, A Simple to provide domain knowledge in the form of SWRL rules. Network Management Protocol (SNMP), The Internet Engineering Task Force (IETF) Std. RFC 1157, May 1990. [Online]. Available: http://www.ietf.org/rfc/rfc1157.txt ACKNOWLEDGMENT [22] A. B. Barreto, M. Hieb, and E. T. Yano, “Developing a Complex The authors recognize VT MÄK and Scalable Network Simulation Environment for Evaluating Cyber Attacks,” in I/ITSEC. I/ITSEC, 2012, will be published in I/ITSEC 2012. Technologies for providing the tools and support needed to [23] R. Gerhards, The Syslog Protocol, http://tools.ietf.org/html/rfc5424, develop the Testbed. Our gratitude is also extended to Latin- IETF Std. rfc5424, March 2009. Media SA, who provided support for the testbed in Brazil. [24] E. Nemeth, G. Snyder, S. Seebass, and T. Hein, UNIX System Adminis- tration Handbook. Prentice Hall, 2000. [25] I. Horrocks, P. F. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, and R EFERENCES M. Dean, “SWRL: A Semantic Web Rule Language Combining OWL [1] G. Eason, B. Noble, and I. N. Sneddon, “On Certain Integrals and RuleML,” http://www.w3.org/Submission/SWRL/, W3C Member of Lipschitz-Hankel Type Involving Products of Bessel Functions,” Submission, May 2004. Philosophical Transactions of the Royal Society of London. Series A, [26] Wireshark, “Wireshark,” http://www.wireshark.org/, 2012. Mathematical and Physical Sciences, vol. 247, no. 935, pp. 529–551, [27] M. Horridge and S. Bechhofer., “The OWL API: A Java API for OWL Apr. 1955. [Online]. Available: http://rsta.royalsocietypublishing.org/ Ontologies.” Semantic Web Journal 2(1), Special Issue on Semantic Web content/247/935/529 Tools and Systems,, pp. 11–21, 2011. [2] M. Endsley, “The application of human factors to the development of [28] “Pellet: OWL 2 Reasoner for Java,” http://clarkparsia.com/pellet/, 2012. expert system for advanced cockpits.” in Annual Meeting of Human Factors and Ergonomics Society. Human Factors Society, 1987, pp. 1388–1392. [3] J. Boyd, “OODA Loop.” Center for Defense Information, Tech. Rep., 1995. [4] DoD, DODAF. DoD Architecture Framework Version 2.0 - Volume 1: Introduction, Overview, and Concepts., DoD Std., 2009. [5] J. Salerno, M. Hinman, and D. Boulware, “A situation awareness model applied to multiple domains,” in Proceedings of SPIE, vol. 5813, 2005, p. 65. [6] E. Bosse, J. Roy, and S. Wark, Concepts, models, and tools for information fusion, A. House, Ed. Artech House, 2007 2007. [7] S. Musman, M. Tanner, A. Temin, E. Elsaesser, and L. Loren, “A systems engineering approach for crown jewels estimation and mission assurance decision making.” in IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 2011. [8] M. J. Fiebrandt, C. Mills, and T. Beach., “Modeling and simulation in the analysis of a joint test and evaluation methodology,” in Spring Simulation Multiconference, vol. 3. Society for Computer Simulation International, 2007, pp. 251–256. [9] D. E. Denning, “An intrusion-detection model,” IEEE Transactions on Software Engineering, vol. 13, pp. 222–232, 1987.