25 research outputs found

    Ground station as a service reference architectures and cyber security attack tree analysis

    Get PDF
    As the Ground Station as a Service (GSaaS) paradigm transforms space infrastructure operations, new attack surface emerges for malicious actors. While the space community generally refers to GSaaS as a singular model, there are several flavors of these systems. After a description of the general GSaaS network's basic structure, this paper presents an analysis of four reference architectures of GSaaS. On the basis of this systems engineering analysis, a cybersecurity analysis of the critical nodes will be carried out through the attack tree method. Later the cybersecurity implication both of technical and strategic characteristic of GSaaS networks will be discussed and put in relation with the current state of space cyberwarfare landscape

    Reconfigurable Radio Systems : Towards Secure Collaboration for Peace Support and Public Safety

    No full text
    As military priorities are shifting from invasion defense to crisis management and peace support operations, the capability to partake in efficient inter-organizational collaboration is becoming increasingly important for armed forces across Europe. The “solidarity clause” of the Treaty of Lisbon, which entered into force on December 1st 2009, dictates that all EU member states shall act jointly if another member state is the target of a terrorist attack or the victim of a natural or man-made disaster. Sweden has gone even further, stating that it will not remain passive if a member state or another Nordic country is attacked, and expects these countries to act in the same manner if Sweden is attacked. This declaration obligates Sweden to be able to collaborate successfully with allied partners, both within own territories and abroad. Application-based collaboration tools for use in unpredictable settings, requiring high user mobility and network survivability, put high demands on the underlying ICT systems in order to function correctly. Networks employing the TErrestrial Trunked RAdio (TETRA) standard are becoming pervasive as platforms for interagency collaboration in crisis response. Although these networks provide many benefits compared to legacy technology they lack the possibility to offer secure, infrastructure-less and disruption-tolerant communication in challenging environments. Emerging ICT such as MANET-based Reconfigurable Radio Systems (RRS) shows potential for overcoming these problems, in addition to resolving issues of technical heterogeneity. The Common Tactical Radio System (GTRS) is an RRS being developed by the Swedish Armed Forces, intended to be the future ICT system for all parts of the forces, used both in national and international mission settings. However, remaining challenges include threats of node compromisation and adversary network infiltration, as well as the safeguarding of confidential information shared by collaborating parties and preventing information leakage. This paper contributes by (i) giving a summary of recent work in mechanisms for achieving information security in tactical MANETs and Hastily Formed Networks for disaster response. The paper also (ii) presents in-progress work towards the design of a gossip-based cross-layer Distributed Intrusion Detection System (DIDS) for the GTRS system, which takes resource constraints of portable devices into account, and offloads traffic analysis and anomaly detection to more powerful “Big Brother” nodes. An outline of the proposed DIDS architecture is presented, and the paper (iii) suggests future work towards offering a dependable and trustworthy communications platform for efficient and secure inter-organizational collaboration

    Secure Tactical Communications for Inter-Organizational Collaboration : The Role of Emerging Information and Communications Technology, Privacy Issues, and Cyber Threats on the Digital Battlefield

    No full text
    The development within the area of information and communications technology (ICT) has been rapid during the last couple of decades. Advancements in mobile technology, such as smartphones and other portable devices with embedded sensors, rapid expansion of communications infrastructure, and increased spectrum utilization, has had a major impact on civilian society, but increasingly also on professional organizations such as the Swedish Armed Forces. While this technology allows for enhanced capabilities in the areas of command and control, situational awareness, and information management, it also leads to new challenges in such areas as cyber security and privacy. For armed forces in many parts of the world, being able to deploy in new types of missions, such as humanitarian assistance and response operations due to natural or man-made disasters, is an increasingly sought-after capability. Such operations commonly require collaboration amongst several heterogeneous organizations, which in turn requires technical as well as organizational interoperability. While the actors must be able to share certain information efficiently, with regards to integrity and availability, sensitive or classified information must be safeguarded in terms of confidentiality. This thesis is concerned with studying emerging ICT for use on the battlefield of tomorrow, investigating how it can lead to more effective operations, and what preconditions that must be met in order for the technology to be of utility for inter-organizational collaboration. In particular, the thesis studies how an acceptable level of information security can be upheld in interconnected tactical communications networks. It is found that Mobile Ad-hoc Networks, Software-Defined Radio and Cognitive Radio are emerging technologies that, while still immature, can contribute to improved capabilities for communications, command and control, and information collection. Furthermore, Hastily Formed Networks is found to be an effective framework for collaboration between heterogeneous actors. However, in order for emerging ICTs to provide military utility, several non-technical requirements must be met. These include usability, trust, legality, cost, and verifying that the technology is in accordance with current military doctrine. Antagonistic as well as unintentional threats must also be mitigated, including information leaks caused by cyberattacks or insiders, and possible consequences of reduced user privacy. Besides to the Swedish Armed Forces, this thesis should be of interest to armed forces of comparable countries, and for professional organizations faced with similar challenges. Among the drawn conclusions, the thesis recommends continuously evaluating emerging ICT in support of new capabilities, through academic research as well as internal concept development. Adopting an incremental and modular process is also recommended when developing or procuring new ICT systems, instead of making long-term investments in proprietary technology. Furthermore, a focus should be put on promoting military requirements in future civilian ICT standards. In this way development costs can be reduced, while facilitating tactical use of commercial off-the-shelf products. Regarding information security in tactical networks for inter-organizational collaboration the thesis concludes that employing best-effort methods could allow for efficient information exchange between actors, while upholding acceptable risk levels regarding data leakage.Informations- och kommunikationsteknik (IKT) har under de senaste Ă„rtiondena varit under stark utveckling. Ökad tillgĂ€nglighet av mobil teknik, sĂ„som smarta mobiltelefoner och andra bĂ€rbara enheter med inbyggda sensorer, kraftig utbyggnad av kommunikationsinfrastruktur samt framsteg inom spektrumeffektivitet, har haft en stor betydelse för civilsamhĂ€llet samt i ökande grad Ă€ven för insatsorganisationer sĂ„som Försvarsmakten. Tekniken bidrar till ökad förmĂ„ga till ledning, situationsuppfattning och informationshantering, men medför samtidigt flera utmaningar inom omrĂ„den som cybersĂ€kerhet och personlig integritet. Nya uppgifter som parallellt kommit i fokus för försvarsmakter i mĂ„nga lĂ€nder inkluderar förmĂ„gan att kunna delta i stödjande insatser i samband med naturkatastrofer, terrorattacker, eller att kunna erbjuda humanitĂ€rt bistĂ„nd i internationella miljöer. SĂ„dana insatser krĂ€ver vanligtvis samverkan mellan mĂ„nga olika heterogena organisationer, vilket medför ett behov av sĂ„vĂ€l teknisk som organisatorisk interoperabilitet. Viss information mĂ„ste kunna delas effektivt mellan de ingĂ„ende aktörerna med avseende pĂ„ riktighet och tillgĂ€nglighet, samtidigt som kĂ€nsliga uppgifter mĂ„ste skyddas avseende sekretess. I denna avhandling studeras taktiskt anvĂ€ndande av framvĂ€xande IKT pĂ„ morgondagens slagfĂ€lt, hur tekniken kan bidra till mer effektiva operationer, samt vilka förutsĂ€ttningar och krav som mĂ„ste uppfyllas för att tekniken ska kunna vara till nytta vid interorganisatorisk samverkan. SĂ€rskilt undersöks möjligheten att upprĂ€tthĂ„lla en acceptabel nivĂ„ av informationssĂ€kerhet i gemensamma taktiska sambandssystem, samtidigt som dessa kan anvĂ€ndas effektivt under pĂ„frestande förhĂ„llanden. Avhandlingen finner att tekniker som mobila ad hoc-nĂ€tverk, mjukvarudefinierad radio och kognitiv radio, trots att de Ă€nnu Ă€r omogna, kan komma att bidra till förbĂ€ttrade eller helt nya förmĂ„gor inom bland annat samband, ledning och informationsinhĂ€mtning. Vidare dras slutsatsen att ramverket Hastily Formed Networks Ă€r effektivt för samverkan mellan heterogena aktörer. För att framvĂ€xande IKT ska kunna vara av militĂ€r nytta krĂ€vs dock att flera icke-tekniska krav kan mötas. Dessa inkluderar anvĂ€ndbarhet, tillit, legalitet, kostnad, samt att tekniken ligger i linje med rĂ„dande militĂ€r doktrin. SĂ„vĂ€l antagonistiska som oavsiktliga hot mĂ„ste samtidigt hanteras, sĂ„som informationslĂ€ckor orsakade av cyberattacker eller insiders, samt konsekvensen av en minskad personlig integritet för anvĂ€ndarna. Avhandlingen förvĂ€ntas vara av intresse för sĂ„vĂ€l Försvarsmakten som organisationer med liknande förutsĂ€ttningar i Sverige och jĂ€mförbara lĂ€nder. Som slutsats rekommenderas i avhandlingen att framvĂ€xande IKT till stöd för nya förmĂ„gor kontinuerligt utvĂ€rderas genom sĂ„vĂ€l akademisk forskning som intern konceptutveckling, samt att en inkrementell och modulĂ€r modell bör vĂ€ljas vid utveckling och anskaffning, snarare Ă€n att göra omfattande investeringar i proprietĂ€r teknik. Fokus bör Ă€ven vara pĂ„ att tidigt fĂ„ med militĂ€ra krav i civila IKT-standarder. PĂ„ sĂ„ vis kan utvecklingskostnader reduceras, samtidigt som militĂ€r anvĂ€ndning av kommersiellt tillgĂ€ngliga produkter förenklas. En slutsats gĂ€llande informationssĂ€kerhet Ă€r att man med metoder som baseras pĂ„ sĂ„ kallad ”best-effort” kan effektivisera utbytet i ett gemensamt informationssystem, samtidigt som risken för datalĂ€ckage kan behĂ„llas pĂ„ en acceptabel nivĂ„

    Automated Network Node Discovery and Topology Analysis

    No full text
    This Master's Thesis describes the design and development of an architecture for automated network node discovery and topology analysis, implemented as an extension to the network management and provisioning system NETadmin. The architecture includes functionality for flexible network model assessment, using a method for versatile comparison between off-line database models and real-world models. These models are populated by current node data collected by network sensors. The presented architecture supports (1) efficient creation and synchronization of network topology information (2) accurate recognition of new, replaced and upgraded nodes, including rogue nodes that may exhibit malicious behavior, and (3) provides an extension of an existing vendor-neutral enterprise network management and provisioning system. An evaluation of the implementation shows evidence of accurate discovery and classification of unmatched hosts in a live customer production network with over 400 nodes, and presents data on performance and scalability levels. The work was carried out at Netadmin System i Sverige AB, in Linköping, Sweden

    SÀkerhet i cybermiljön

    No full text
    Den snabba utvecklingen inom IT-omrÄdet under de senaste decennierna har haft stor betydelse för Försvarsmaktens verksamhet men har samtidigt Àven inneburit mÄnga nya möjligheter för det civila samhÀllet. I synnerhet har framsteg inom sensorteknik, datateknik och kommunikationsteknik inneburit att man idag kan inhÀmta, överföra, lagra, och analysera stora mÀngder data pÄ ett snabbare och mer effektivt sÀtt Àn tidigare. Detta har kommit till nytta inom bland annat system för ledningsstöd, stridsledning, underrÀttelsetjÀnst och logistik. PÄ samma gÄng har dock komplexiteten, de inbördes systemberoendena och volymerna data som hanteras i informationssystemen ökat kraftigt. I kombination med att karaktÀren pÄ Försvarsmaktens verksamhet medför sÀrskilda krav pÄ systemsÀkerhet och skydd mot antagonistiska hot, Àr upprÀtthÄllandet av en tillrÀcklig sÀkerhetsnivÄ i cybermiljön en utmaning. Att kunna skydda viktiga informationstillgÄngar mot förekommande risker Àr samtidigt en nödvÀndighet för att den nya tekniken ska kunna bidra till militÀr nytta. FörmÄgan att kunna verka i cybermiljön mÄste utvecklas och regelbundet trÀnas i fredstid, för att denna ska kunna stÄ till förfogande vid behov. Försvarsmakten Àr pÄ vÀg mot en högre grad av mognad och förstÄelse för cybermiljöns förutsÀttningar och krav. Det krÀvs dock ett kontinuerligt arbete inom flera omrÄden för att cybermiljön och de system som ingÄr i denna ska bidra till en reell effekt. De aspekter som belyses i denna rapport bedöms vara av sÀrskild vikt.Teknisk Prognos 201

    Non-State Actors in Cyberspace Operations

    No full text
    The growing importance of cyberspace to modern society, and its increasing use as an arena for dispute, is becoming a national security concern for governments and armed forces globally. The special characteristics of cyberspace, such as its asymmetric nature, the lack of attribution, the low cost of entry, the legal ambiguity, and its role as an efficient medium for protest, crime, espionage and military aggression, makes it an attractive domain for nation-states as well as non-state actors in cyber conflict. This paper studies the various non-state actors who coexist in cyberspace, examines their motives and incitements, and analyzes how and when their objectives coincide with those of nation-states. Literature suggests that many nations are currently pursuing cyberwarfare capabilities, oftentimes by leveraging criminal organizations and irregular forces. Employment of such non-state actors as hacktivists, patriot hackers, and cybermilitia in state-on-state cyberspace operations has also proved to be a usable model for conducting cyberattacks. The paper concludes that cyberspace is emerging as a new tool for state power that will likely reshape future warfare. However, due to the lack of concrete cyberwarfare experience, and the limited encounters of legitimate cyberattacks, it is hard to precisely assess future effects, risks and potentials

    Best-Effort Data Leakage Prevention in Inter-Organizational Tactical MANETs

    No full text
    Reconfigurable Radio Systems (RRS), based on technologies such as Software Defined Radio (SDR) and Mobile Ad-hoc Networks (MANETs) offer considerable advantages for military operations, such as increased network survivability and interoperability. The RRS-based Common Tactical Radio System (GTRS), currently in development by the Swedish Armed Forces, is designed for use in diverse geographical settings and for purposes varying from international combat missions to national contingency operations. However, protecting these networks from attacks and safeguarding the carried information against leaks is an ongoing research challenge, especially in combined scenarios where tactical data may flow across organizational boundaries. This paper presents a best-effort approach to Data Leakage Prevention (DLP) for inter-organizational RRS-based networks. The proposed architecture makes use of data mining techniques and an efficient n-dimensional clustering algorithm which has previously been successfully used for real-time anomaly detection in critical infrastructure protection. The DLP architecture is developed as an extension to the GTRS system, modeled and simulated in OPNETℱ Modeler. Our results show that common data leaks can be efficiently identified by the proposed scheme, while keeping the important false positive rate at a very low level
    corecore