Validating and restoring defense in depth using attack graphs

PHASE III: Ultimately the procedures developed during the performance of this SBIR for manufacturing WC small-arms projectiles will then be scaled and applied to other caliber projectiles such as the 7.62mm and 50 cal. PHASE I: 1) Research and develop a novel simulation and analysis model based on a cognitive task analysis of the cyber domain that directly integrates network models, attack graph visualization, low-level vulnerability information, and decision support functions; 2) Extend existing team cognition metrics for cognitive system performance to assess tool effectiveness and cyber situation awareness 3) Evaluate the psychological validity of the tool by conducting human-in-the-loop testing.

validating and restoring defense in depth using attack graphs-56

Based on this, we further propose a network security assessment and enhancement method along with a small network scenario to exemplify its usage.

Kaushik, “Scalable, Graph-Based Network Vulnerability Analysis,” Procee- dings of the 9th ACM Conference on Computer & Communications Security, Washington DC, 2002, pp.

O’Handley, Modern Magnetic Materials: Principles and Applications, John Wiley and Sons, New York (2000).3. Reasonable performance related goals expected to be achieved by the proposer related to the execution of this project are the demonstration of the selected WC production process through the generation and delivery of five (5) prototype WC rods 500mm long. Pick-Up, “Comparative Analysis of Oblique Impact on Ceramic Composite Systems,” Int. Information overload and a concomitant lack of comprehensive cyber situation awareness are common problems that hamper the effectiveness of analysis.

Perform a cost analysis assessment for future production. Human cyber analysts are an essential element in these efforts.

Interest domain includes the fundamental science at the interface of phases of heterogeneous structures, nanotechnology and mesotechnology efforts are focused on new architectures using crystal chemistry principles to create pathways to synthesize alloys for high temperature applications.

PHASE I: This focus area provides broad scientific challenges and will require the development of new experimental and computational tools to address the complexity of thermal and magnetic loads as they relate back to the performance of the material.

Li, et al., “Using Attack Graphs and Intrusion Evidences to Extrapolate Network Security State,” Proceedings of the 4th International Conference on Communications and Networking in China, Guang Zhou, 2009. Bhahramani, “An Introduction to Hidden Markov Models and Bayesian Networks,” International Journal of Pattern Recognition and Artificial Intelligence, Vol.

TECHNOLOGY AREAS: Materials/Processes OBJECTIVE: The objective of this basic research announcement is building the foundation for the discovery, characterization and predictability of non rare-earth containing high temperature aerospace alloys for high temperature applications. In all these applications having additional cobalt-free alternatives would be highly desirable and competitive. Goldsmith, “Non-Ideal Projectile Impact on Targets,” Int. PHASE III DUAL-USE COMMERCIALIZATION: Effective cyber attack mitigation is a critical capability for both the military and commercial sectors.

PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: Rare earth magnets are widely used in commercial applications from primary electric traction motors for transportation to miniature electric motors for a vast array of automotive and actuator applications.

Rare earth magnets are especially important in wind-power permanent magnet generators.

This program seeks bold, new basic research that addresses the design, creation, and employment of nontraditional approaches on synthesis of novel high temperature magnetic alloys and nanostructures that take into account geometric or topological descriptors to characterize similarity and scaling between stimuli under the multi-dimensional external fields (i.e., magnetic and thermal fields) to secure revolutionary advances.

Tags: , ,