Computational cyber-security Attacker/Analyst Models

Award Information
Agency:
Department of Defense
Branch
Navy
Amount:
$80,000.00
Award Year:
2014
Program:
SBIR
Phase:
Phase I
Contract:
N00014-14-P-1069
Award Id:
n/a
Agency Tracking Number:
N132-132-0749
Solicitation Year:
2013
Solicitation Topic Code:
N132-132
Solicitation Number:
2013.2
Small Business Information
15400 Calhoun Drive, Suite 400, Rockville, MD, 20855-
Hubzone Owned:
N
Minority Owned:
N
Woman Owned:
Y
Duns:
161911532
Principal Investigator:
BobPokorny
Director, ETT
(301) 294-4750
bpokorny@i-a-i.com
Business Contact:
MarkJames
Director, Contracts and
(301) 294-5221
mjames@i-a-i.com
Research Institute:
n/a
Abstract
Cyber-attacks threaten our security and impede American business. To counter cyber-security attacks, computational models of the entire cyber-security environments can provide many benefits. With our transition partners, we will create computational models that can play the roles of cyber-attacker, cyber-defender, network users, and network policy makers. Synthetic environments could (1) measure the real security of an organization"s network without causing harm; (2) investigate defenses against new kinds of attacks, (3) project how future attacks are likely to evolve, (4) and support defenders as they struggle to reduce the effectiveness of attacks. To make these computational models, we will conduct cognitive task analyses that are designed to clearly represent the approach that various players take and that are sufficiently detailed to inform the design and development of computational models. For this project, we will be using the computational model Lumen. Lumen is a product of DARPA"s Cognitive Agents that Learn and Organize project. Lumen was chosen because it is a modern procedural reasoning system that can address the kinds of back and forth probes and responses that matches the confrontation between cyber-attackers and cyber-defenders. This project will demonstrate how complex CTAs and computational models can elucidate the ubiquitous threat of cyber-attacks.

* information listed above is at the time of submission.

Agency Micro-sites


SBA logo

Department of Agriculture logo

Department of Commerce logo

Department of Defense logo

Department of Education logo

Department of Energy logo

Department of Health and Human Services logo

Department of Homeland Security logo

Department of Transportation logo

Enviromental Protection Agency logo

National Aeronautics and Space Administration logo

National Science Foundation logo
US Flag An Official Website of the United States Government