A Tool to Inject Credible Warfighter-Focused Non- Kinetic Attack Effects into the BMDS M&S Environment SMD Symposium 2018 Denise Jefferson Software Engineer Northrop Grumman
Today s Threats Ballistic Missile Defense Systems face a growing number of cyber/non-kinetic threats. Joint Chiefs of Staff (JCS) recognized the seriousness of these threats by incorporating cyber security requirements in the Unified Joint Task List (UJTL) Therefore the importance of sound cybersecurity policy and uncompromising cybersecurity training and oversight of users cannot be overemphasized. Joint Force Commanders (JFCs) must also consider risk mitigation measures, such as reinforcing training of the joint force to be alert for suspicious insider activity.
The Need Wargames, experiments, exercises, and other Joint Live, Virtual, and Constructive (JLVC) events must have a mechanism to prepare today s warfighter not only to recognize the effects of non-kinetic attacks but also to take the appropriate steps to mitigate them. Current methodology of providing a white card to event participants or unplugging their systems from event networks as a means to simulate cyber attacks breaks immersion.
Goals of Non-Kinetic Attack Simulation Tool (N-KAST) Provide MDA with a tool to inject credible warfighter-focused Non-Kinetic Attack Effects into the Ballistic Missile Defense Systems Modeling & Simulation (M&S) Environment. Enable non-kinetic attacks to be planned and injected in accordance with the Master Scenario Event List. Enable the warfighter to develop tactics, techniques, and procedures (TTP) to detect, classify and report cyber activity and create mitigation strategy. Provide a means to quantify, assess, analyze, and improve the warfighter response time. Furnish a mechanism to inject Precision Navigation Timing (PNT)-Timing Attack effects Supply a means to tailor blunt as well subtle cyber attack effects.
N-KAST as a Live Virtual Constructive Computer Aided Event Tool Assumes there is access and is not a black hat in a box. Requires access to the network to configure. Does not reveal system vulnerabilities but instead focuses on presenting effects to warfighter. Works on any network as long as access is granted. N-KAST is System Mission and Domain Agnostic. It impacts network traffic directly not just M&S products.
Benefits of Using N-KAST Although the Live, Virtual, and Constructive (LVC) M&S environment is the initial target, N- KAST will integrate into existing and emerging capabilities to provide a mechanism to inject a variety of non-kinetic attacks onto any network, monitor those activities, and access their readiness. Because N-KAST is system agnostic, and works with the network traffic between systems, it also enables test and training at the sub-element level, and system test. N-KAST can be utilized by the existing teams without requiring cyber experts to use the tool. It does not require an extensive architecture and a large dedicated team to use. Recommend consulting cyber experts to identify attacks to provide in an event. Utilizing N-KAST for event attack effects scheduling, removes the necessity of real-time manual activation and the need to staff every console in order for the effect to occur at a given time. Multiple attacks effects can be scheduled from a single instance.
Scenario that Illustrates N-KAST Use The example illustrates the effects of a non-kinetic attack injected into a notional launch on remote missile scenario between with two BMD I-Sim systems. Additional scenario runs show the non-kinetic cyber attacks effects injected into the scenario via N-KAST.
Example Use of the Non-Kinetic Attack Simulation Tool (N-KAST) All assets and data are notional.
Future Functional Enhancements of N-KAST Poll warfighter community for attack effects prioritization. Add additional types of non-kinetic attacks. Incorporate message level non-kinetic attacks. Research other message formats for manipulation.