Abstract
The United States Department of Defense (DoD) is engaged in a mission to unify its software systems towards a “net-centric” vision—where commanders gain advantage by rapidly producing, consuming, and sharing information using service oriented architectures (SOAs). In this paper, we study the cyber survivability of mission-critical net-centric systems, focusing on Ballistic-Missile-Defense (BMD) systems. We propose a net-centric architecture for augmenting the survivability of critical DoD net-centric systems. Our architecture draws inspiration from several theories of warfare, focusing on the goal of giving cyber commanders “decision superiority.” Our architecture prescribes a net-centric decision-support system that implements the Cyber OODA loop (the cycle of observing, orienting, deciding, and acting within the cyber domain). We present an illustration-of-concept prototype implementation, and describe its role in a ballistic-missile exercise. We relate our experiences from this exercise and suggest future directions towards achieving net-centric cyber survivability.
This work is sponsored by the Department of Defense under Air Force Contract FA8721-05-C-0002. Opinions, interpretations, conclusions, and recommendations are those of the authors and are not necessarily endorsed by the United States Government.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alberts, D.S., Garstka, J.J., Stein, F.P.: Network centric warfare: Developing and leveraging information superiority (1998)
VMware Technology Network Blog. Introducing VProbes: a stethoscope for your VM (June 2008), http://blogs.vmware.com/vmtn/2008/06/introducing-vpr.html
Boyd, J.R.: A discourse on winning and losing. Maxwell Air Force Base, AL: Air University. Library Document No. M-U 43947, Briefing slides (1987)
Chen, L., Avizienis, A.: N-version programming: A fault-tolerance approach to reliability of software operation. In: International Symposium on Fault-Tolerant Computing, FTCS (1978)
Coakley, T.: Decision superiority. Air & Space Power Journal (May 2001)
Crosby, S.A., Wallach, D.S.: Denial of service via algorithmic complexity attacks. In: USENIX Security Symposium (2003)
National Vulnerability Database. Vulnerability summary for CVE-2003-0244, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0244
Endsley, M.R.: Toward a theory of situation awareness in dynamic systems. Human Factors 37(1), 32–64 (1995)
Keromytis, A.D.: Characterizing self-healing software systems. In: Proceedings of the 4th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS) (2007)
MIT Lincoln Laboratory. Air and missle defense technology principal accomplishments (2008), http://www.ll.mit.edu/mission/airmissile/airmissileaccomplishments.html
Lee, D., Lee, J., Lee, K.H.: A decision-support system to improve damage survivability of submarine. In: Hendtlass, T., Ali, M. (eds.) IEA/AIE 2002. LNCS (LNAI), vol. 2358, pp. 61–78. Springer, Heidelberg (2002)
Lipson, H.F., Fisher, D.A.: Survivability—a new technical and business perspective on security. In: NSPW 1999: Proceedings of the 1999 workshop on New security paradigms, pp. 33–39. ACM, New York (2000)
United States Department of Defense. The implementation of network-centric warfare. United States Government Printing Office (January 2005)
United States Department of Defense. FY2009–2034 Unmanned systems integrated roadmap (2009), http://www.acq.osd.mil/uas/
United States Joint Chiefs of Staff. Joint publication 3-13: Information operations (February 2006), http://www.dtic.mil/doctrine
United States National Institute of Standards (NIST). Guide to intrusion detection and prevention systems (IDPS) (Special publication 800-94) (February 2007)
Schwaegerl, C., Seifert, O., Buschmann, R., Dellwing, H., Geretshuber, S., Leick, C.: Increase of power system survivability with the decision support tool CRIPS based on network planning and simulation program PSS®SINCAL. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 119–130. Springer, Heidelberg (2009)
Sidiroglou, S., Locasto, M.E., Boyd, S.W., Keromytis, A.D.: Building a reactive immune system for software services. In: In Proceedings of the USENIX Annual Technical Conference, pp. 149–161 (2004)
United States. Information operations [electronic resource]. U.S. Air Force, Washington, D.C (2005)
Weimer, F.: Algorithmic complexity attacks and the linux networking code (May 2003), http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gagnon, M.N., Truelove, J., Kapadia, A., Haines, J., Huang, O. (2010). Towards Net-Centric Cyber Survivability for Ballistic Missile Defense. In: Giese, H. (eds) Architecting Critical Systems. ISARCS 2010. Lecture Notes in Computer Science, vol 6150. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13556-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-13556-9_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13555-2
Online ISBN: 978-3-642-13556-9
eBook Packages: Computer ScienceComputer Science (R0)