91 research outputs found
Ground station as a service reference architectures and cyber security attack tree analysis
As the Ground Station as a Service (GSaaS) paradigm transforms space infrastructure operations, new attack surface emerges for malicious actors. While the space community generally refers to GSaaS as a singular model, there are several flavors of these systems. After a description of the general GSaaS network's basic structure, this paper presents an analysis of four reference architectures of GSaaS. On the basis of this systems engineering analysis, a cybersecurity analysis of the critical nodes will be carried out through the attack tree method. Later the cybersecurity implication both of technical and strategic characteristic of GSaaS networks will be discussed and put in relation with the current state of space cyberwarfare landscape
Cyber threat intelligence sharing: Survey and research directions
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process of CTI sharing, and even the basic consumption, has raised new challenges for researchers and practitioners. This extensive literature survey explores the current state-of-the-art and approaches different problem areas of interest pertaining to the larger field of sharing cyber threat intelligence. The motivation for this research stems from the recent emergence of sharing cyber threat intelligence and the involved challenges of automating its processes. This work comprises a considerable amount of articles from academic and gray literature, and focuses on technical and non-technical challenges. Moreover, the findings reveal which topics were widely discussed, and hence considered relevant by the authors and cyber threat intelligence sharing communities
Reconfigurable Radio Systems [Elektronisk resurs] : Towards Secure Collaboration for Peace Support and Public Safety
As military priorities are shifting from invasion defense to crisis management and peace support operations, the capability to partake in efficient inter-organizational collaboration is becoming increasingly important for armed forces across Europe. The “solidarity clause” of the Treaty of Lisbon, which entered into force on December 1st 2009, dictates that all EU member states shall act jointly if another member state is the target of a terrorist attack or the victim of a natural or man-made disaster. Sweden has gone even further, stating that it will not remain passive if a member state or another Nordic country is attacked, and expects these countries to act in the same manner if Sweden is attacked. This declaration obligates Sweden to be able to collaborate successfully with allied partners, both within own territories and abroad. Application-based collaboration tools for use in unpredictable settings, requiring high user mobility and network survivability, put high demands on the underlying ICT systems in order to function correctly. Networks employing the TErrestrial Trunked RAdio (TETRA) standard are becoming pervasive as platforms for interagency collaboration in crisis response. Although these networks provide many benefits compared to legacy technology they lack the possibility to offer secure, infrastructure-less and disruption-tolerant communication in challenging environments. Emerging ICT such as MANET-based Reconfigurable Radio Systems (RRS) shows potential for overcoming these problems, in addition to resolving issues of technical heterogeneity. The Common Tactical Radio System (GTRS) is an RRS being developed by the Swedish Armed Forces, intended to be the future ICT system for all parts of the forces, used both in national and international mission settings. However, remaining challenges include threats of node compromisation and adversary network infiltration, as well as the safeguarding of confidential information shared by collaborating parties and preventing information leakage. This paper contributes by (i) giving a summary of recent work in mechanisms for achieving information security in tactical MANETs and Hastily Formed Networks for disaster response. The paper also (ii) presents in-progress work towards the design of a gossip-based cross-layer Distributed Intrusion Detection System (DIDS) for the GTRS system, which takes resource constraints of portable devices into account, and offloads traffic analysis and anomaly detection to more powerful “Big Brother” nodes. An outline of the proposed DIDS architecture is presented, and the paper (iii) suggests future work towards offering a dependable and trustworthy communications platform for efficient and secure inter-organizational collaboration.</p
Säkerhet i cybermiljön [Elektronisk resurs]
Den snabba utvecklingen inom IT-området under de senaste decennierna har haft stor betydelse för Försvarsmaktens verksamhet men har samtidigt även inneburit många nya möjligheter för det civila samhället. I synnerhet har framsteg inom sensorteknik, datateknik och kommunikationsteknik inneburit att man idag kan inhämta, överföra, lagra, och analysera stora mängder data på ett snabbare och mer effektivt sätt än tidigare. Detta har kommit till nytta inom bland annat system för ledningsstöd, stridsledning, underrättelsetjänst och logistik.På samma gång har dock komplexiteten, de inbördes systemberoendena och volymerna data som hanteras i informationssystemen ökat kraftigt. I kombination med att karaktären på Försvarsmaktens verksamhet medför särskilda krav på systemsäkerhet och skydd mot antagonistiska hot, är upprätthållandet av en tillräcklig säkerhetsnivå i cybermiljön en utmaning. Att kunna skydda viktiga informationstillgångar mot förekommande risker är samtidigt en nödvändighet för att den nya tekniken ska kunna bidra till militär nytta. Förmågan att kunna verka i cybermiljön måste utvecklas och regelbundet tränas i fredstid, för att denna ska kunna stå till förfogande vid behov.Försvarsmakten är på väg mot en högre grad av mognad och förståelse för cybermiljöns förutsättningar och krav. Det krävs dock ett kontinuerligt arbete inom flera områden för att cybermiljön och de system som ingår i denna ska bidra till en reell effekt. De aspekter som belyses i denna rapport bedöms vara av särskild vikt.</p
Reconfigurable Radio Systems : Towards Secure Collaboration for Peace Support and Public Safety
As military priorities are shifting from invasion defense to crisis management and peace support operations, the capability to partake in efficient inter-organizational collaboration is becoming increasingly important for armed forces across Europe. The “solidarity clause” of the Treaty of Lisbon, which entered into force on December 1st 2009, dictates that all EU member states shall act jointly if another member state is the target of a terrorist attack or the victim of a natural or man-made disaster. Sweden has gone even further, stating that it will not remain passive if a member state or another Nordic country is attacked, and expects these countries to act in the same manner if Sweden is attacked. This declaration obligates Sweden to be able to collaborate successfully with allied partners, both within own territories and abroad. Application-based collaboration tools for use in unpredictable settings, requiring high user mobility and network survivability, put high demands on the underlying ICT systems in order to function correctly. Networks employing the TErrestrial Trunked RAdio (TETRA) standard are becoming pervasive as platforms for interagency collaboration in crisis response. Although these networks provide many benefits compared to legacy technology they lack the possibility to offer secure, infrastructure-less and disruption-tolerant communication in challenging environments. Emerging ICT such as MANET-based Reconfigurable Radio Systems (RRS) shows potential for overcoming these problems, in addition to resolving issues of technical heterogeneity. The Common Tactical Radio System (GTRS) is an RRS being developed by the Swedish Armed Forces, intended to be the future ICT system for all parts of the forces, used both in national and international mission settings. However, remaining challenges include threats of node compromisation and adversary network infiltration, as well as the safeguarding of confidential information shared by collaborating parties and preventing information leakage. This paper contributes by (i) giving a summary of recent work in mechanisms for achieving information security in tactical MANETs and Hastily Formed Networks for disaster response. The paper also (ii) presents in-progress work towards the design of a gossip-based cross-layer Distributed Intrusion Detection System (DIDS) for the GTRS system, which takes resource constraints of portable devices into account, and offloads traffic analysis and anomaly detection to more powerful “Big Brother” nodes. An outline of the proposed DIDS architecture is presented, and the paper (iii) suggests future work towards offering a dependable and trustworthy communications platform for efficient and secure inter-organizational collaboration
Towards Secure Collaboration Through Emerging ICT : A Distributed IDS for Tactical MANETs
- …
