Architecting Cyber-Secure, Resilient System-of-Systems

The DoD system-of-systems (SoS) relies heavily on cyberspace operations. The latter tend to be vulnerable to a variety of disruptions. These disruptions can be from within or outside the SoS. The ability to withstand disruptions is essential to maintaining a competitive edge in terms of freedom of maneuver afforded by cyberspace. Since impenetrable cyberspace capacity is implausible, architecting for cyber-resilience has become a national imperative. This paper explores the complexity of cybersecurity and ways to achieve cyber-resilience that is informed by cyber strategies and techniques developed within a model-based engineering framework.

[1]  Christoph Meinel,et al.  Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds , 2013, GPC.

[2]  Arthur K. Cebrowski,et al.  Network-Centric Warfare: Its Origin and Future , 1998 .

[3]  Eric V. Larson,et al.  Interoperability: A Continuning Challenge in Coalition Air Operations , 2001 .

[4]  Clay Wilson,et al.  Network Centric Warfare: Background and Oversight Issues for Congress , 2004 .

[5]  J. Stradley,et al.  The Electronic Part Supply Chain and Risks of Counterfeit Parts in Defense Applications , 2006, IEEE Transactions on Components and Packaging Technologies.

[6]  Azad M. Madni,et al.  5.4.1 ProACT™: Process‐aware Zero Latency System for Distributed, Collaborative Enterprises , 2002 .

[7]  Azad M. Madni,et al.  System of Systems Integration: Key Considerations and Challenges , 2014, Syst. Eng..

[8]  Sushil Jajodia,et al.  Cyber Situational Awareness - Issues and Research , 2009, Cyber Situational Awareness.

[9]  P. W. Singer,et al.  Cybersecurity and Cyberwar: What Everyone Needs to Know® , 2013 .

[10]  Rainer Böhme,et al.  Security Metrics and Security Investment Models , 2010, IWSEC.

[11]  Mary Baker,et al.  From Nifty Gadgets to Dire Warnings , 2015, IEEE Pervasive Computing.

[12]  Shane Harris,et al.  @War: The Rise of the Military-Internet Complex , 2014 .

[13]  Harriet Goldman,et al.  Cyber resilience for mission assurance , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).

[14]  H. Rittel,et al.  Dilemmas in a general theory of planning , 1973 .

[15]  Azad M. Madni,et al.  Engineered Resilient Systems: A DoD Perspective , 2014, CSER.

[16]  Sadie Creese,et al.  Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.

[17]  D. Dasgupta,et al.  Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.

[18]  Kamal Jabbour,et al.  The Science of Mission Assurance , 2011 .

[19]  J. Reason Human error: models and management , 2000, BMJ : British Medical Journal.

[20]  Ari Juels,et al.  New approaches to security and availability for cloud data , 2013, CACM.

[21]  Azad M. Madni,et al.  Towards a Conceptual Framework for Resilience Engineering , 2009, IEEE Systems Journal.