分布式隐形网络(D-SN)创建一个实时的、虚拟的、建设性的(LVC)环境来模拟网络攻击进行测试和评估(T&E)2015年(8页)

ID:24890

大小:1.39 MB

页数:8页

时间:2022-12-01

金币:15

上传者:战必胜
1 of 8
Distributed StealthNet (D-SN): Creating a Live, Virtual, Constructive (LVC) Environment for Simulat-
ing Cyber-Attacks for Test and Evaluation (T&E)
Gilbert Torres, NAVAIR Systems Command
Kathy Smith, James Buscemi, GBL Systems
Sheetal Doshi, Ha Duong, Defeng Xu, Rajive Bagrodia, Scalable Network Technologies Inc
H. Kent Pickett, MITRE Corp.
ABSTRACT
The Services have become increasingly dependent on
their tactical networks for mission command functions,
situational awareness, and target engagements (terminal
weapon guidance). While the network brings an unprece-
dented ability to project force by all echelons in a mission
context, it also brings the increased risk of cyber-attack on
the mission operation. With both this network use and vul-
nerability in mind, it is necessary to test new systems (and
networked Systems of Systems (SoS)) in a cyber-
vulnerable network context.
A new test technology, Distributed-StealthNet (D-SN),
has been created by the Department of Defense Test Re-
source Management Center (TRMC) to support SoS test-
ing with cyber-attacks against mission threads. D-SN is a
simulation/emulation based virtual environment that can
provide a representation of a full scale tactical network
deployment (both Radio Frequency (RF) segments and
wired networks at command posts). D-SN has models of
real world cyber threats that affect live tactical systems
and networks. D-SN can be integrated with live mission
Command and Control (C2) hardware and then a series of
cyber-attacks using these threat models can be launched
against the virtual network and the live hardware to deter-
mine the SoS’s resiliency to sustain the tactical mission.
This paper describes this new capability and the new tech-
nologies developed to support this capability.
I. INTRODUCTION
D-SN has been developed for use in a distributed test in-
frastructure environment where live systems are located at
different labs across the test community and connected via
a high-speed backbone network. The Joint Mission Envi-
ronment Test Capability (JMETC) [1] is an example of a
classified, high-speed, Wide Area Network (WAN) that
links many of the DOD Test Ranges and key development
facilities. It is at these Test Ranges where the military
hardware (some under development, some currently de-
ployed) resides. Through the use of the Test and Training
Enabling Architecture (TENA) middleware, the military
hardware elements can be logically linked exchanging tac-
tical information (as they would in a SoS field support
mission) forming a distributed test environment (see Fig-
ure 1). D-SN is thus a key capability for representing the
mission network and introducing the effects of cyber-
attack on mission networks and systems in this distributed
testing environment.
This paper describes the key technologies developed to
support D-SN that extends the StealthNet LVC framework
for cyber operation test and evaluation described in [2] to
operate in a distributed manner.
Section II describes the elements available in the
StealthNet system to model the tactical network and the
simulated cyber-attacks that can be used to test the mis-
sion’s cyber robustness of these tactical networks.
Section III describes the technology development that
was necessary to represent the full tactical network envi-
ronment in a distributed test infrastructure. In this case,
multiple Instances of StealthNet must run at each of the
T&E installations participating in the WAN based distrib-
uted test. The “distributed Instances of StealthNet must
be synchronized so that representation of the simulated
tactical network state (message location, link loading (for
both RF and wired portions of the network) and message
arrival timing) can be seamlessly represented between
StealthNet Instances.
Section IV addresses the problems in representing the
attack environment. Cyber-attacks initiated in one
StealthNet Instance must be seamlessly integrated into the
Network Architecture Under Test (NAUT) represented by
all StealthNet Instances. Furthermore, the natural intermit-
tent latencies of the test network infrastructure connecting
StealthNet Instances must have a negligible impact on the
fidelity of representation of the NAUT. Section IV also
describes how pipelining synchronization between
StealthNet Instances helps to minimize the impact of these
WAN infrastructure latencies.
Section V describes related work efforts and Section VI
provides the conclusion.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭