Computational cyber-security Attacker/Analyst Models

Award Information
Agency: Department of Defense
Branch: Navy
Contract: N00014-14-P-1069
Agency Tracking Number: N132-132-0749
Amount: $80,000.00
Phase: Phase I
Program: SBIR
Awards Year: 2014
Solicitation Year: 2013
Solicitation Topic Code: N132-132
Solicitation Number: 2013.2
Small Business Information
Intelligent Automation, Inc.
15400 Calhoun Drive, Suite 400, Rockville, MD, 20855-
DUNS: 161911532
HUBZone Owned: N
Woman Owned: Y
Socially and Economically Disadvantaged: N
Principal Investigator
 Bob Pokorny
 Director, ETT
 (301) 294-4750
 bpokorny@i-a-i.com
Business Contact
 Mark James
Title: Director, Contracts and
Phone: (301) 294-5221
Email: mjames@i-a-i.com
Research Institution
N/A
Abstract
Cyber-attacks threaten our security and impede American business. To counter cyber-security attacks, computational models of the entire cyber-security environments can provide many benefits. With our transition partners, we will create computational models that can play the roles of cyber-attacker, cyber-defender, network users, and network policy makers. Synthetic environments could (1) measure the real security of an organization"s network without causing harm; (2) investigate defenses against new kinds of attacks, (3) project how future attacks are likely to evolve, (4) and support defenders as they struggle to reduce the effectiveness of attacks. To make these computational models, we will conduct cognitive task analyses that are designed to clearly represent the approach that various players take and that are sufficiently detailed to inform the design and development of computational models. For this project, we will be using the computational model Lumen. Lumen is a product of DARPA"s Cognitive Agents that Learn and Organize project. Lumen was chosen because it is a modern procedural reasoning system that can address the kinds of back and forth probes and responses that matches the confrontation between cyber-attackers and cyber-defenders. This project will demonstrate how complex CTAs and computational models can elucidate the ubiquitous threat of cyber-attacks.

* information listed above is at the time of submission.

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government