CDF - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

CDF

Description:

Much Extant work (typical Intrusion Detection Systems) comes from the 'PC Stable' ... automatically by extant IDS. Where are We with Our Monitoring Research? ... – PowerPoint PPT presentation

Number of Views:40
Avg rating:3.0/5.0
Slides: 14
Provided by: yur51
Category:
Tags: cdf | extant

less

Transcript and Presenter's Notes

Title: CDF


1
(No Transcript)
2
The Hon. Senator Robert Hill
MINISTER
Minister Assisting
Parliamentary Secretary
Mr Ric Smith
GEN Peter Cosgrove
CDF
SEC
Defence Operations
Navy Capability
Army Capability
People
Audit
Finance
Supported by Governance Structure and Committees
Strategic Intelligence
Investment CKO
Public Affairs
Science Technology
Air Force Capability
Strategic Policy
O u t p u t s
O w n e r S u p p o r t
Corporate Services
Materiel
E n a b l e r s
3
DSTO Mission
  • Expert, impartial and innovative application of
    science and technology to the defence of
    Australia and its national interests.

4
Chief Defence Scientist Dr Roger Lough
Science Policy Division Dr Tim McKenna
System Sciences Laboratory Director Dr Nanda
Nandagopal
Information Sciences Laboratory Director Mr Neil
Bryans
Platform Sciences Laboratory Dr Ian Sare
Command Control Dr Alan Burgess
(Ag) Information Networks Dr Mark
Anderson Defence Systems Analysis Dr Ken
Anderson Intelligence, Surveillance
Reconnaissance Dr Bruce Ward
Land Operations Dr Warren Harch Maritime
Operations Dr David Heilbronn Air Operations Mr
Colin Martin
Maritime Platforms Dr David Wyllie Air
Platforms Ms Janis Cocking (Ag) Chemical,
Biological, Radiological Nuclear Defence
Centre Mr Simon Oldfield
Electronic Warfare Radar Dr Len
Sciacca Weapons Systems Mr Bill Dickson
DSTO Staff 2286 Contractors 80 Military 42
5
Information Networks Division Key Thrusts
  • Information Operations
  • High Assurance Trusted Systems,
  • Intrusion Detection, Computer Forensics,
  • Military Communications
  • Military Quality of Service, Network
    Architectures,
  • Wireless Systems, Ad Hoc Networking, Network
  • Restoration, Satellite Communications
  • Advanced Computer Capabilities
  • Appliance Security Devices, Network
  • Vulnerability Assessment, Emerging
  • Technologies

6
Information Security Research Trends in Defence
  • Network Surveillance and Monitoring
  • Secure Self Organising Networks and
    Pathological Mobility
  • Survivability
  • Identity Management
  • IPv6 migration and data type convergence

All in an increasing wireless dominated
environment
7
Network Surveillance, Monitoring and Security
Control
  • Focus on Large Information Infrastructures
  • Defence Critical Infrastructure
  • Maximise automated response/minimise human input
    requirements (small number of skilled humans for
    a very large infrastructure)
  • Much Extant work (typical Intrusion Detection
    Systems) comes from the PC Stable
  • Not scalable
  • Limited Coverage
  • Human intensive
  • Prone to high rates of false positives
  • Security DISINTEGRITY on composing with other
    products

8
Coverage
Business Process Enterprise specific attacks
Attacks correctly detected automatically by
extant IDS
Temporal and condition context sensitive attacks
False Positives
Condition context sensitive attacks
Attacks not yet known
Attacks detectable by many extant IDS
Attacks relevant to Enterprise
9
Where are We with Our Monitoring Research?
  • Now in the last 12 months of a seven year
    concentrated research program
  • Integrated yet modular system prototype
    combining
  • Advanced visualisation
  • A.I. Based software intelligent agents
  • Near real-time event management and response
  • Ability to override and provide parameter control
    of third party devices such as firewalls
  • Commencing major trials and bringing system up to
    Technology Readiness Level 8 as defined by NASA
    software criteria

10
Survivability
  • Confused by some with RELIABILITY
  • Survivability deals with OPERATIONS under
    DIRECTED THREAT

11
The Survivability Pie
ROBUST PROTOCOLS AND ARCHITECTURES
INFRASTRUCTURE ANALYSIS
HARDENING METHODS
SERVICE RESTORATION
MONITORING AND CONTROL
12
Identity Management
  • Trend to Comprehensive Identity management rather
    than just Authentication of basic identity
  • Changing roles (a need for multiple
    identities!)
  • Changing authorities and permissions
  • Record of actions

13
An Example Code Stick
  • Peer to Peer Very High Assurance Credential and
    Value Exchange
  • Military Differentiator No Third Party
    intervention during exchange process
  • Multiple role effectors
  • Physical access control
  • Systems enablement from access to information
    services to weapons systems activation
  • Code Stick bound uniquely to the individual for
    the life of the Unit (discarded if individual
    leaves organisation)
  • Disposable security appliances?

In contrast to Commercial thrusts such as the
barcode ticket sales via mobile phones
Write a Comment
User Comments (0)
About PowerShow.com