This invention pertains to systems and environments in which the behavior or operation of that system is monitored in real-time, and in which an on-going assessment on the goals, missions, and processes of that system is needed. Such assessment is used by the owners, operators, commanders, or managers of the system to understand risks to the goals of that system and to prioritize responses and actions to mitigate these risks.
Conventional impact assessment methods are performed off-line. Offline impact assessments limit the ability to provide an instantaneous picture of impacts caused by one or more changes to the system. In additional, off-line mechanisms are typically qualitative and are difficult to automate because they rely on subjective findings and evaluation techniques. Further, offline impact assessment is cumbersome for dealing with changes to the goals, missions, and processes. In many applications, such changes are frequent and may not be fully known in advance. In addition, offline impact assessment techniques are difficult to apply to large-scale systems with thousands or more interrelated elements.
Offline impact assessment techniques are insufficient for systems and environments which provide real-time information about the status, state and changes to some or all of the elements of that system. Such systems include computer networks, telecommunications networks, transportation systems, buildings, military units, emergency response teams, air traffic, medical facilities and services, chemical process plants, manufacturing assembly lines, power plants, farms, supply-chain management, and businesses with workflow-based business processes.
Real-time impact assessment determines the consequences of actions and changes on the actors and entities of a system on the operational goals of that system and its components, such that the assessment is periodically updated and the assessment includes impact identification and evaluation of the degree of the impact.
Related to impact assessment is vulnerability. Vulnerability is a weakness in a system element that makes it susceptible to failure or attack. Vulnerability may be intrinsic to the element or be a result of actions affecting the state of the element. Vulnerability can change over time. The potential to exploit system vulnerability is a factor in impact assessment. An example of an element is an information technology (IT) asset, where such assets may include hardware, software, software applications, networking devices, peripherals, and the like. Other examples of an element will be forthcoming and readily understood. A safeguard is any means to reduce vulnerability.
Related to impact assessment is risk assessment. A risk is the potential for an element or component or agent of an operation to not completely achieve its objective. A risk assessment is the determination and evaluation of risks for a process, goal or mission.
Related to impact assessment are threats. Threats are incomplete and active attacks.
Related to impact assessment are attacks. An attack is a sequence of hostile actions with a goal to a) compromise the integrity, confidentiality or availability of protected resources, or b) incapacitate the system's mission-oriented operational capabilities, functions and performance. An attack may be performed by a single attacker or may be result of coordinated efforts of multiple attackers.
The present invention is directed to various aspects of real-time impact assessment. A system or environment has a set of assets, elements, resources, and agents which may be interrelated. Some subset of the assets, elements, resources, and agents are in use at various times to perform missions, processes, and tasks for one or more goals of the owners, managers, commanders, and operators of the system or environment. In the context of this invention, a mission, process, task, or procedure is to be taken as kinds of goal-oriented activities. Other goal-oriented activities will be readily apparent depending upon the application domain. For example, in the military domain the word “mission” is often used. In the business domain, the words “process” or “business process” is often used.
There may be external agents, forces, and conditions which interfere with the function of the assets, elements, resources, and agents. The actions of such external agents, forces, and conditions may vary from time to time, and may be intentional, inadvertent, accidental, or providential.
Assets, elements, resources, and agents of the system or environment may malfunction or fail. They may interfere with the function of other assets, elements, resources, and agents due to design, infiltration, or other reasons.
The missions, processes and tasks correspond to units of an operational goal-directed view of the system or environment. The assets, resources, elements, and agents of the system or environment are organized or used to achieve, perform, or execute missions, processes and tasks. The organization or use of assets, resources, elements, and agents for missions, processes, and tasks may be called a mapping of the latter to the former. It may also be called a set of relationships or dependencies between the latter and the former.
The assets, elements, resources, and agents of the system or environment may be shared by two or more missions, process, and tasks. The use of specific assets, elements, resources and agents for a mission, process or task may vary by time.
The method for real-time automated impact assessment uses a method to obtain a real-time situational view of the assets, elements, resources, and agents of a system. Such a method is disclosed in U.S. patent application Ser. No. 10/907,483 filed Apr. 2, 2005, entitled Method and Apparatus for Situation-Based Management . . . by Lundy Lewis, Gabriel Jakobson, John Buford, which is included here in its entirety by reference.
Assets and elements and agents of a system are monitored in real-time. Such monitoring includes sensors, human intelligence, and computational agents. Monitoring elements produce notifications, events, and alerts of changes the associated assets, elements, resources, and agents of the system. These notifications, events, and alerts are processed by a real-time situation-based management system to create and maintain a situational view of the individual and collective elements of the system. In the context of this invention, the terms notifications, event, and alerts are to be taken as synonymous. Other synonyms will be readily available depending upon the application domain. For example, in some domains the term “message” is used.
In addition, the situational view includes predicted situations about potential future situations of the individual and collective elements. A method for real-time determination of predicted and potential situations is disclosed in U.S. patent application Ser. No. 10/907,487 filed Apr. 2, 2005, entitled Method and Apparatus for Creating and Using Situation Transition Graphs in Situation-Based Management . . . by Gabriel Jakobson, Lundy Lewis, John Buford, which is included here in its entirety by reference. Predicted situations are also called projected situations. A situational view is synonymous with a collection of situations. Situation manager is synonymous with situation-based manager, and situation management is synonymous with situation-based management.
The method for real-time impact assessment determines the relationships between the situational view of the elements and the missions, processes, and tasks of the system. This determination may be pre-defined, discovered, learned, or otherwise acquired. Techniques for discovering, learning or acquiring these relationships include pattern recognition, compilation, machine learning, inference, statistical correlation, data mining, and algorithms.
In one embodiment, these relationships are called a dependency graph.
In one embodiment, these relationships are called a constraint graph.
The method for real-time impact assessment determines the relationships between the missions, processes, and tasks of the system. This determination may be pre-defined, discovered, learned, or otherwise acquired. Techniques for discovering, learning or acquiring these relationships include pattern recognition, compilation, machine learning, inference, statistical correlation, data mining, and algorithms. The relationships may change over time as the scope of missions, processes, and tasks change or complete or as new missions, processes, and tasks are added. The relationship may be modeled as algorithmic tree structures where the root node represents final impact and the propagation of leaf node values produces the final impact value, dependency directed graphs, probabilistic frames, and expert systems. Confidence values may utilize Bayesian probability propagation, Markov models or anytime algorithms.
For one or more missions, processes, and tasks of the system, the method evaluates the related situations, missions, processes, and tasks and determines the impact of the situations on the missions, processes, and tasks. The evaluation of an impact may be presented as a numeric score, as a measure of likelihood of success, as a fuzzy evaluation, as a qualitative evaluation, or some other metric suitable for ordering different outcomes according to preference.
When a situation changes in the situational view for the assets, elements, resources and agents, the method may revise the evaluation of the impact on the related missions, process, and tasks. The revised evaluation of an impact may be presented as a numeric score, as a measure of likelihood of success, as a fuzzy evaluation, as a qualitative evaluation, or some other metric suitable for ordering different outcomes according to preference. The history of the revised evaluations may be included in the presentation.
The real-time impact assessment may be presented to the user through a computer-based user interface. The real-time impact assessment may be stored and updated in a database or other storage mechanism. The real-time impact assessment may be delivered over a network to software agents. Such agents or software processes might include the agents or software processes performing missions, processes, and tasks. The real-time impact assessment may be incorporated in to one or more situations in the situational view.
In one embodiment, the system is a computer network operated by a business with assets including computers, software applications, network equipment, wireless networks, terrestrial links, and optical fiber, and agents include business personal. The business defines business processes using workflow management software. Assets are monitored using conventional network and system management agents. A situation-based manager creates and maintains the situational view of the assets using notifications, events, alerts, and human intelligence. The method for real-time impact assessment determines the relationship between the situational view and the business processes, and evaluates the situational view to determine the impact on each business process. From time to time, assets change states; business processes execute, complete, or start; and relationships between situations and business processes change. The method re-evaluates the relationships and the impacts.
In one embodiment, the system is a computer network with assets and agents, operated for business processes or missions, in which the computer network assets, elements, and resources are subject to cyber attacks which may impact the associated processes and missions. The situation-based manager detects attacks by a multi-stage process of correlating infrastructure events into IDS/sensor alerts and then correlates them into attack detection alerts. Such attacks are usually aimed at the information technology infrastructure components (routers, hosts, servers, firewalls, communications links, etc.) and through the dependencies between the infrastructure components and the supported services, and between the services and the associated missions affect the services and missions. Attack impact may also propagate through the components on the information technology infrastructure level due to the existing inter-component configuration dependencies. Parameters for characterizing the health of information technology services are fairly well-known and include availability, response time, and quality-of-service.
In one embodiment, the system is a military unit and assets include military equipment and agents include soldiers. The goal of the system is determined by the commanders and described by one or more missions. Such missions include
In one embodiment the method for real-time impact assessment uses constraint satisfaction algorithm. Other algorithms that may be used for impact assessment include a neural network, a genetic algorithm, and a graph search algorithm. Other known algorithms for solving a constraint satisfaction problem are readily available. A constraint satisfaction problem is stated as follows:
Given the following three items,
A set of variables X={x1, x2, . . . , xn}
For each variable xi, a set of values Vi={Vi1, Vi2, . . . , Vim}
A set of consistent constraints C restricting the values the variables can take simultaneously
Find an assignment of values that satisfies all the constraints.
In the constraint satisfaction paradigm, the set of constraints is a program. A set of constraints is exemplified in the following program steps, where the possible values for each variable are retrieved from data dictionaries via a find function:
Given missions, tasks, services, assets, logical connections, attack models, and alerts:
As will be apparent to those familiar with the art, the invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
The method for real-time impact assessment first determines the relationships between the situational view of the elements and the missions, processes, and tasks of the system.
The method for real-time impact assessment second determines the relationships between the missions, processes, and tasks of the system.
The method third evaluates the related situations, missions, processes, and tasks and determines the impact of the situations on the missions, processes, and tasks.
The evaluation of an impact may be presented as a numeric score, as a measure of likelihood of success, as a fuzzy evaluation, as a qualitative evaluation, or some other metric suitable for ordering different outcomes according to preference.
An ontological view shown on
In
In
In
In
In
Although certain preferred embodiments of the invention have been specifically illustrated and described herein, it is to be understood that variations may be made without departing from the spirit and scope of the invention as defined by the appended claims. Thus all variations are to be considered as part of the invention as defined by the following claims.
This application claims priority to the U.S. provisional Patent Application Ser. No. 60/958,055 filed Aug. 25, 2007, entitled METHOD AND APPARATUS FOR CYBER SECURITY IMPACT ASSESSMENT AND SITUATION PREDICTION . . . by Lundy M. Lewis, Gabriel Jakobson, and John F. Buford.