Title: CDF
1(No Transcript)
2The Hon. Senator Robert Hill
MINISTER
Minister Assisting
Parliamentary Secretary
Mr Ric Smith
GEN Peter Cosgrove
CDF
SEC
Defence Operations
Navy Capability
Army Capability
People
Audit
Finance
Supported by Governance Structure and Committees
Strategic Intelligence
Investment CKO
Public Affairs
Science Technology
Air Force Capability
Strategic Policy
O u t p u t s
O w n e r S u p p o r t
Corporate Services
Materiel
E n a b l e r s
3DSTO Mission
- Expert, impartial and innovative application of
science and technology to the defence of
Australia and its national interests.
4Chief Defence Scientist Dr Roger Lough
Science Policy Division Dr Tim McKenna
System Sciences Laboratory Director Dr Nanda
Nandagopal
Information Sciences Laboratory Director Mr Neil
Bryans
Platform Sciences Laboratory Dr Ian Sare
Command Control Dr Alan Burgess
(Ag) Information Networks Dr Mark
Anderson Defence Systems Analysis Dr Ken
Anderson Intelligence, Surveillance
Reconnaissance Dr Bruce Ward
Land Operations Dr Warren Harch Maritime
Operations Dr David Heilbronn Air Operations Mr
Colin Martin
Maritime Platforms Dr David Wyllie Air
Platforms Ms Janis Cocking (Ag) Chemical,
Biological, Radiological Nuclear Defence
Centre Mr Simon Oldfield
Electronic Warfare Radar Dr Len
Sciacca Weapons Systems Mr Bill Dickson
DSTO Staff 2286 Contractors 80 Military 42
5Information Networks Division Key Thrusts
- Information Operations
- High Assurance Trusted Systems,
- Intrusion Detection, Computer Forensics,
- Military Communications
- Military Quality of Service, Network
Architectures, - Wireless Systems, Ad Hoc Networking, Network
- Restoration, Satellite Communications
- Advanced Computer Capabilities
- Appliance Security Devices, Network
- Vulnerability Assessment, Emerging
- Technologies
6Information Security Research Trends in Defence
- Network Surveillance and Monitoring
- Secure Self Organising Networks and
Pathological Mobility - Survivability
- Identity Management
- IPv6 migration and data type convergence
All in an increasing wireless dominated
environment
7Network Surveillance, Monitoring and Security
Control
- Focus on Large Information Infrastructures
- Defence Critical Infrastructure
- Maximise automated response/minimise human input
requirements (small number of skilled humans for
a very large infrastructure) - Much Extant work (typical Intrusion Detection
Systems) comes from the PC Stable - Not scalable
- Limited Coverage
- Human intensive
- Prone to high rates of false positives
- Security DISINTEGRITY on composing with other
products
8Coverage
Business Process Enterprise specific attacks
Attacks correctly detected automatically by
extant IDS
Temporal and condition context sensitive attacks
False Positives
Condition context sensitive attacks
Attacks not yet known
Attacks detectable by many extant IDS
Attacks relevant to Enterprise
9Where are We with Our Monitoring Research?
- Now in the last 12 months of a seven year
concentrated research program - Integrated yet modular system prototype
combining - Advanced visualisation
- A.I. Based software intelligent agents
- Near real-time event management and response
- Ability to override and provide parameter control
of third party devices such as firewalls - Commencing major trials and bringing system up to
Technology Readiness Level 8 as defined by NASA
software criteria
10Survivability
- Confused by some with RELIABILITY
- Survivability deals with OPERATIONS under
DIRECTED THREAT
11The Survivability Pie
ROBUST PROTOCOLS AND ARCHITECTURES
INFRASTRUCTURE ANALYSIS
HARDENING METHODS
SERVICE RESTORATION
MONITORING AND CONTROL
12Identity Management
- Trend to Comprehensive Identity management rather
than just Authentication of basic identity - Changing roles (a need for multiple
identities!) - Changing authorities and permissions
- Record of actions
13An Example Code Stick
- Peer to Peer Very High Assurance Credential and
Value Exchange - Military Differentiator No Third Party
intervention during exchange process - Multiple role effectors
- Physical access control
- Systems enablement from access to information
services to weapons systems activation - Code Stick bound uniquely to the individual for
the life of the Unit (discarded if individual
leaves organisation) - Disposable security appliances?
In contrast to Commercial thrusts such as the
barcode ticket sales via mobile phones