Natalie Nakhla, M.A,Sc., Ph. D,
Mackenzie Tummers, Susan Watson, and Jean-Pierre Sabbagh El-Rami
Cyber Operations and Resilient Communications (CORC) section, Ottawa Research Center
Department of National Defence
Cyber effects analysis and characterization
DGRDPA/DRDCCS
ICCRTS’24 (Paper 58)
2
Outline
3
Problem
4
What do we mean by “cyber effects analysis” ??
Effect: A change in the state of a target or a system resulting from an event or combination of events in the operating environment [1]
[1] DND Defence Terminology Bank, (terminology.mil.ca)
[2] Bernier, M. (2013), Military Activities and Cyber effects (MACE) Taxonomy, DRDC CORA, DRDC-CORA-TM-2013-226
Cyber effects: Interruption, modification, degradation, fabrication, interception of the ITI (or the information that resides within it) 🡪 achieve military effects deny, degrade, destroy, disrupt [2]
Often used to also imply the means/capability of achieving the goal
Cyber effects analysis: Metrics, assessments, and characterizations of cyber effects to determine prob(success), how the effect performs under various conditions, etc.
Research Questions
5
- How can we characterize cyber effects in terms of their attributes and MoPs?
- How can we select from a set of cyber actions/attacks to employ, what are the criteria? Trade-offs?
- How can we conduct CEE? Estimate the propagation of attack? Higher-order effects? Collateral damage?
- ….etc…..See [3] for full list
[3] Nakhla, N., Dondo, M., and Watson, S., Metrics and measures for cyber effects analysis - decision support for cyber operations, (PA), DRDC-RDDC-2023-L086 to D Cyber Ops FD, March 2023, PROTECTED A.
Sample MoPs:
Goal: Trade-off analysis
Application to Mission Planning and the �Joint Targeting Cycle
6
More metrics/characterizations!
[4] Targeting Staff Handbook v. 1.9, 2023
Dynamic targeting
7
Outline
Proposed approach and overview
8
1. Caldera adversary emulation platform
2. Cyber Gym for Intelligent Learning (CyGIL) environment
Proposed approach and overview
9
1. Caldera adversary emulation platform
2. Cyber Gym for Intelligent Learning (CyGIL) environment
* https://attack.mitre.org/
Proposed approach and overview
10
1. Caldera adversary emulation platform
2. Cyber Gym for Intelligent Learning (CyGIL) environment
CyGIL environment [5]
[5] Li, L. et. al, “ Building artificial intelligence agents for cyber operations using deep reinforcement learning – A sim-to-real agent training environment”, DRDC-RDDC-2022-R160, Oct 2022
Proposed approach and overview
11
CyGIL VM
Proxy
Sequence agent
Actions
Analysis
Observation space, logs, other metrics, etc.
Network VMs
Caldera server
Observation space, logs
Network traffic generation
Manual Configurations
Network perturbations
Test
environment
12
Metrics analysis
Pj=0 if max no. of trials reached
Metrics analysis
13
14
Outline
Results and analysis- Scenario
15
AD server
Attacker
Goal
Critical VMs for attack chain
START
Initial foothold
Results and analysis
16
Baseline environment:
🡪 All Pj=1 (succeeded on first try)
🡪 Except 1 action Pj=0.58, (1.72 ave. attempts to succeed)
Results and analysis
17
Perturbation #1: Varying reachability
Actions move closer to target
Results and analysis
18
Perturbation #2: Varying traffic and bandwidth
19
Outline
Discussion/Lessons learned
20
🡪 mimics real world, network/environmental conditions
🡪 inherent to cyber operations
🡪 Systems/operators should be able to pivot to other actions, more covert (less attempts of same action)
Discussion/Lessons learned
21
22
Summary
23
Thank you!
24
Extra slides
25
1. Data Collection
Collect data:
2. Exploit management
3. Capabilities analysis
4. Effect deployment
5. Post-deployment analysis
Conduct:
Effects analysis framework
26
27
Mapping of military to cyber effects with examples
28
Challenges and final thoughts
29
e.g.,
Feed into INT
requirements
Add future work