Title :
Cauldron mission-centric cyber situational awareness with defense in depth
Author :
Jajodia, Sushil ; Noel, Steven ; Kalapa, Pramod ; Albanese, Massimiliano ; Williams, John
Author_Institution :
Center for Secure Inf. Syst., George Mason Univ., Fairfax, VA, USA
Abstract :
The cyber situational awareness of an organization determines its effectiveness in responding to attacks. Mission success is highly dependent on the availability and correct operation of complex computer networks, which are vulnerable to various types of attacks. Today, situational awareness capabilities are limited in many ways, such as inaccurate and incomplete vulnerability analysis, failure to adapt to evolving networks and attacks, inability to transform raw data into cyber intelligence, and inability for handling uncertainty. We describe advanced capabilities for mission-centric cyber situational awareness, based on defense in depth, provided by the Cauldron tool. Cauldron automatically maps all paths of vulnerability through networks, by correlating, aggregating, normalizing, and fusing data from a variety of sources. It provides sophisticated visualization of attack paths, with automatically generated mitigation recommendations. Flexible modeling supports multi-step analysis of firewall rules as well as host-to-host vulnerability, with attack vectors inside the network as well as from the outside. We describe alert correlation based on Caldron attack graphs, along with analysis of mission impact from attacks.
Keywords :
authorisation; computer network security; data visualisation; graph theory; sensor fusion; Caldron attack graphs; Cauldron tool; attack path; automatically generated mitigation recommendation; complex computer network; cyber intelligence; data fusion; firewall rules; flexible modeling; host to host vulnerability; mission centric cyber situational awareness; multistep analysis; uncertainty handling; vulnerability path; Correlation; Data models; Databases; Fires; IP networks; Network topology; Security; Vulnerability analysis; attack graphs; cauldron security tool; cyber situational awareness; intrusion detection;
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011
Conference_Location :
Baltimore, MD
Print_ISBN :
978-1-4673-0079-7
DOI :
10.1109/MILCOM.2011.6127490