Cyber Warfare Metrics����Dr. David S. Alberts����presented to�28th ICCRTS�November 2023�
1
A Mature Analytic Ecosystem
2
Body of
Evidence
Domain Knowledge
Analyst
Work Force
Analysis
Community
Infrastructure
Conceptual Framework
MoE and MoP
Assessment Methodology
Models and Tools
Community Fora
…
Literature
Testbeds
Simulation Environments
Weapons Ranges
…
Education - Training
Credentials
Mentors
Codes of Best Practice
…
Lessons Learned
Case Studies
Experimental Results
…
Operational Concepts, Doctrine, Tactics�Operational Effectiveness
Force Posture and Structure
Weapon Capabilities and Performance
…
Threats and Scenarios
Asset Vulnerabilities
Task-Mission Dependencies
…
Cyber Warfare Analytic Framework�
3
Initial Conditions to Risk to Mission
Effectiveness
of
Remediation
Effectiveness
of
Deterrence
And
Suppression*
Effectiveness
of
Restoration
0
Events
0
Cyber
Damage
Not Restored
in a Timely
Manner
Effectiveness
of
Consequence
Mitigation
0
Adverse
Impacts
Mission
Agility
Damage to
Cyber
Capability
Integrated Deterrence
Resilience of
Cyber Assets
(hardness)
Restore/Recover/ Replace Damaged
Cyber Capability
Versatility
Flexibility
Adaptiveness
Consequences
-
Outcomes
Consequences
Potential
Threats
and
Hazards
Cyber Risk to
Mission Taxonomy
Significance
of Consequences
Likelihood
of
Scenario
*For this example, deterrence and suppression are not considered
The extent to which potential CRM is passed on is a function
of the effectiveness of risk management at each link in the chain
CRM Parametric Model Purpose and Analytic Uses�
4
Multi-Domain CRM Model Components
Cyber
Kinetic
Mission Force
Mission
Dependencies
On Cyber
Cyber
Terrain
Model
Defensive Cyber
Engagement
Model
Defensive Cyber Forces
Offensive Cyber Forces
Mission
Model
Mission Force
Mission
Dependencies
On Cyber
Cyber
Terrain
Model
Defensive Cyber
Engagement
Model
Defensive Cyber Forces
Offensive Cyber Forces
CRM
CRM
Multi
Domain
C2
Approach
Multi
Domain
C2
Approach
Mission
Decisions
Mission
Decisions
Mission
Decisions
Mission
Decisions
Initial Conditions
6
Events
7
Cyber Terrain of Interest
Protected
Not Critical
Attacked by
Adversary
No Events
Critical
* Some critical assets are also time-sensitive
EVENTS
Damage to Cyber Capabilities
Whether or not a Cyber Asset sustains damage depends upon the values of parameters associated with the Defensive Cyber Engagement Model
8
Cyber Terrain of Interest
Protected
Not Critical
Attacked
Damaged
Attacked
No Damage
Critical
* Some critical assets are also time-sensitive
Damage
to Cyber
Capabilities
Defensive Cyber Engagement Model: Attack Damage�
Cyber
Kinetic
Mission Force
Mission
Dependencies
On Cyber
Cyber
Terrain
Model
Defensive Cyber
Engagement
Model
Defensive Cyber Forces
Offensive Cyber Forces
Mission
Model
Mission Force
Mission
Dependencies
On Cyber
Cyber
Terrain
Model
Defensive Cyber
Engagement
Model
Defensive Cyber Forces
Offensive Cyber Forces
CRM
CRM
Multi
Domain
C2
Approach
Multi
Domain
C2
Approach
Mission
Decisions
Mission
Decisions
Mission
Decisions
Mission
Decisions
Defensive Cyber Engagement Model
Damage Adjudication
Rules and Relationships
- assets not attacked = not damaged
- assets attacked but not defended = damage
- for defended assets
-- if CPT Blue effectiveness > Red Effectiveness = not damaged
-- if asset hardness or local defender is high = not damaged
else, damaged
Outputs
-# Cyber Assets by Type Damaged
Inputs
-Blue Cyber C2 -> allocation of defense forces (assets defended)
-Red Cyber C2 -> assets attacked
-Red Cyber Forces -> attacker effectiveness
-Blue Cyber Forces -> defender effectiveness
-Cyber Terrain-> asset defense posture (hardness)
Cyber Damaged Not Restored in a Timely Manner
Whether or not a damaged Cyber Asset is restored in a mission timely manner depends upon the Defensive Cyber Engagement Model damage restoration assumptions and parameters values
10
Cyber Terrain of Interest
Protected
Not Critical
Damaged
Not Restored
In a Timely
Manner
Critical
Cyber Damage
Not Restored
In a timely
manner
Damaged
and Restored
In a Timely
Manner
*all time-sensitive assets are critical by definition
Defensive Cyber Engagement Model: Damage Restoration�
Cyber
Kinetic
Mission Force
Mission
Dependencies
On Cyber
Cyber
Terrain
Model
Defensive Cyber
Engagement
Model
Defensive Cyber Forces
Offensive Cyber Forces
Mission
Model
Mission Force
Mission
Dependencies
On Cyber
Cyber
Terrain
Model
Defensive Cyber
Engagement
Model
Defensive Cyber Forces
Offensive Cyber Forces
CRM
CRM
Multi
Domain
C2
Approach
Multi
Domain
C2
Approach
Mission
Decisions
Mission
Decisions
Mission
Decisions
Mission
Decisions
Defensive Cyber Engagement Model
Damage Restoration
Rules and Relationships
- if a damaged cyber asset is time-sensitive => not restored in a
timely manner
- if asset is not time-sensitive and
-- allocated cyber restoration capabilities => restored
-- self-healing => restored
restored
Outputs
-# Cyber Assets by Type Damaged and Not Restored in a Timely Manner
Inputs
-Blue Cyber C2 -> allocation of defense restoration forces
-Blue Cyber Forces -> restoration effectiveness
-Cyber Terrain-> mission criticality and time-sensitivity.
of damaged cyber assets
Adverse Mission Impacts
The extent to which critical cyber assets are damaged and not restored adversely impact the mission is determined by the Mission Model
12
Adverse
Mission
Impacts
Step 1: From % Critical Cyber Assets Damaged and Not Restored to % Joint Functional Capability
Step 1
Step 2
Step 2: From % Joint functional Capability to OPLAN Impact
% OPLAN
Impact
% Joint
Functional
Capability
% Critical Cyber Assets Damaged and Not Restored
% Joint functional Capability Lost
Baseline Case
Significance of Adverse Mission Consequence
13
Significance of
Adverse
Mission
Consequences
equal or less than x%
Significance of
Mission Consequences
% OPLAN
Effectiveness Impact
Insignificant
Significant
Potentially
Catastrophic
greater than x%
and less than y%
greater than y%
Cyber Risk to Misison
14
Insights: Feasibility, Utility, Challenges
15
*this structure provides the hooks necessary to incorporate more detailed models of specific processes and relationships