«

»

Mar
07

Defense Science Board Recommendations on Continuous Monitoring

Editor’s Note: The Final Report of the Defense Science Board (DSB) Task Force on Resilient Military Systems is attached here.  Below is an excerpt from a section of the report discussing continuous monitoring.

8.2.1.2 Provide Continuous Monitoring and Situational Awareness

An additional challenge for DoD is understanding who is “on” and what is the operational status of their network(s).  Sensor deployment has begun at Internet access points to monitor and control access and network traffic flow. These Einstein sensors provide monitoring of network ingress and egress through a system of mostly COTS network monitoring tools driven by the NSA-provided signature set.  This is a good start, but commercial tools have advanced to include capabilities to operate behind firewalls and to track anomalous activity throughout the components of a network. It is essential to provide continuous monitoring of all networks against cyber attack (see State Department example in Figure 8.1).

The information assurance of operational systems is typically achieved through encryption of data during network transport (and occasionally at rest-while stored) or multi-level security solutions geared toward the safe handling of multiple security levels of data on the same computer (processor).  Data must be decrypted prior to processing, and advanced attacks being used today access the data at that point, thereby circumventing the encryption.

Little consideration goes into military system design today on providing test points
that can report system health and operation (sensors). Are checksums overflowing in
the processor?  Is the processor conducting unexpected computations?  There are
many “tells”
(symptoms)
that could be
detected
and reported.
Although
such
test
points an
d
their
data transmission would also become targets for cyber attack, an
adversary
must now
have a more detailed understanding of system internal
s
to
design a successful attack.
The
adversary
would also be required
to break into two
systems (the main miss
ion and test/sensor system) and change both correctly
without setting off alarms to successfully infiltrate the system
a much more difficult
task.
In the recent wars,
DoD
once again learned the value of timely, detailed situational
awareness on the battlefield and invested heavily in
Intelligence, Surveillance and
Reconnaissance (
ISR
)
assets.
The U
nited
S
tates
must
now
build the same level of
understanding into
its
networ
ks and weapon systems.

Leave a Reply

Please Answer: *