Skip to main content

Towards Net-Centric Cyber Survivability for Ballistic Missile Defense

  • Conference paper
Book cover Architecting Critical Systems (ISARCS 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6150))

Included in the following conference series:

Abstract

The United States Department of Defense (DoD) is engaged in a mission to unify its software systems towards a “net-centric” vision—where commanders gain advantage by rapidly producing, consuming, and sharing information using service oriented architectures (SOAs). In this paper, we study the cyber survivability of mission-critical net-centric systems, focusing on Ballistic-Missile-Defense (BMD) systems. We propose a net-centric architecture for augmenting the survivability of critical DoD net-centric systems. Our architecture draws inspiration from several theories of warfare, focusing on the goal of giving cyber commanders “decision superiority.” Our architecture prescribes a net-centric decision-support system that implements the Cyber OODA loop (the cycle of observing, orienting, deciding, and acting within the cyber domain). We present an illustration-of-concept prototype implementation, and describe its role in a ballistic-missile exercise. We relate our experiences from this exercise and suggest future directions towards achieving net-centric cyber survivability.

This work is sponsored by the Department of Defense under Air Force Contract FA8721-05-C-0002. Opinions, interpretations, conclusions, and recommendations are those of the authors and are not necessarily endorsed by the United States Government.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alberts, D.S., Garstka, J.J., Stein, F.P.: Network centric warfare: Developing and leveraging information superiority (1998)

    Google Scholar 

  2. VMware Technology Network Blog. Introducing VProbes: a stethoscope for your VM (June 2008), http://blogs.vmware.com/vmtn/2008/06/introducing-vpr.html

  3. Boyd, J.R.: A discourse on winning and losing. Maxwell Air Force Base, AL: Air University. Library Document No. M-U 43947, Briefing slides (1987)

    Google Scholar 

  4. Chen, L., Avizienis, A.: N-version programming: A fault-tolerance approach to reliability of software operation. In: International Symposium on Fault-Tolerant Computing, FTCS (1978)

    Google Scholar 

  5. Coakley, T.: Decision superiority. Air & Space Power Journal (May 2001)

    Google Scholar 

  6. Crosby, S.A., Wallach, D.S.: Denial of service via algorithmic complexity attacks. In: USENIX Security Symposium (2003)

    Google Scholar 

  7. National Vulnerability Database. Vulnerability summary for CVE-2003-0244, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0244

  8. Endsley, M.R.: Toward a theory of situation awareness in dynamic systems. Human Factors 37(1), 32–64 (1995)

    Article  Google Scholar 

  9. Keromytis, A.D.: Characterizing self-healing software systems. In: Proceedings of the 4th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS) (2007)

    Google Scholar 

  10. MIT Lincoln Laboratory. Air and missle defense technology principal accomplishments (2008), http://www.ll.mit.edu/mission/airmissile/airmissileaccomplishments.html

  11. Lee, D., Lee, J., Lee, K.H.: A decision-support system to improve damage survivability of submarine. In: Hendtlass, T., Ali, M. (eds.) IEA/AIE 2002. LNCS (LNAI), vol. 2358, pp. 61–78. Springer, Heidelberg (2002)

    Google Scholar 

  12. Lipson, H.F., Fisher, D.A.: Survivability—a new technical and business perspective on security. In: NSPW 1999: Proceedings of the 1999 workshop on New security paradigms, pp. 33–39. ACM, New York (2000)

    Chapter  Google Scholar 

  13. United States Department of Defense. The implementation of network-centric warfare. United States Government Printing Office (January 2005)

    Google Scholar 

  14. United States Department of Defense. FY2009–2034 Unmanned systems integrated roadmap (2009), http://www.acq.osd.mil/uas/

  15. United States Joint Chiefs of Staff. Joint publication 3-13: Information operations (February 2006), http://www.dtic.mil/doctrine

  16. United States National Institute of Standards (NIST). Guide to intrusion detection and prevention systems (IDPS) (Special publication 800-94) (February 2007)

    Google Scholar 

  17. Schwaegerl, C., Seifert, O., Buschmann, R., Dellwing, H., Geretshuber, S., Leick, C.: Increase of power system survivability with the decision support tool CRIPS based on network planning and simulation program PSS®SINCAL. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 119–130. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  18. Sidiroglou, S., Locasto, M.E., Boyd, S.W., Keromytis, A.D.: Building a reactive immune system for software services. In: In Proceedings of the USENIX Annual Technical Conference, pp. 149–161 (2004)

    Google Scholar 

  19. United States. Information operations [electronic resource]. U.S. Air Force, Washington, D.C (2005)

    Google Scholar 

  20. Weimer, F.: Algorithmic complexity attacks and the linux networking code (May 2003), http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gagnon, M.N., Truelove, J., Kapadia, A., Haines, J., Huang, O. (2010). Towards Net-Centric Cyber Survivability for Ballistic Missile Defense. In: Giese, H. (eds) Architecting Critical Systems. ISARCS 2010. Lecture Notes in Computer Science, vol 6150. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13556-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13556-9_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13555-2

  • Online ISBN: 978-3-642-13556-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics