05.06.2013 Views

PNNL-13501 - Pacific Northwest National Laboratory

PNNL-13501 - Pacific Northwest National Laboratory

PNNL-13501 - Pacific Northwest National Laboratory

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Study Control Number: PN99010/1338<br />

Critical Infrastructure and Protection Simulator (CIPS)<br />

Steve Ouderkirk<br />

The Department of Energy has an urgent requirement for technology to protect its computer networks and information<br />

systems. Neither current technology nor the computer security industry offers adequate capabilities for the level of cyber<br />

protection expected of DOE.<br />

Project Description<br />

The Critical Infrastructure and Protection Simulator<br />

(CIPS) project investigates a framework for an integral<br />

offensive and defensive cyber environment to serve as a<br />

model for simulating cyber events. This CIPS research<br />

addresses a problem of national stature. It builds<br />

additional computer security expertise at the <strong>Laboratory</strong><br />

to address the urgent DOE computer security concerns<br />

and a specific new technology that could become key to a<br />

future DOE computer security solution. The expected<br />

research results are a cyber simulation concept that can<br />

serve as a foundation for cyber security products, a CIPS<br />

user facility, and certified infrastructure services to DOE.<br />

A simulator that includes both offensive and defensive<br />

cyber tools does not exist today. The CIPS project will<br />

investigate this possibility and will create a proof-ofconcept<br />

prototype to demonstrate the essential<br />

components.<br />

Introduction<br />

The scope of this project was to perform research and<br />

develop a proof-of-concept prototype tool that allows<br />

simulation of computer and network cyber attacks<br />

concurrently with intrusion detection tools and other<br />

countermeasures. The objective was to create a<br />

computational environment that allows for extensive<br />

experiments with offensive and defensive cyber tools to<br />

determine their effectiveness, to determine the limitations,<br />

and to proactively explore new vulnerabilities before they<br />

occur in the real world.<br />

Approach<br />

The technical approach for CIPS was to develop the<br />

concept of a simulator for computer security and<br />

information assurance. More specifically, CIPS provided<br />

a framework and connectivity to leverage the many<br />

offensive and defensive cyber tools existing today into a<br />

single environment. Through software agents and<br />

158 FY 2000 <strong>Laboratory</strong> Directed Research and Development Annual Report<br />

encapsulation, it provided an environment for the<br />

simlution of offensive and defensive cyber security<br />

functions. The approach provided for the unfolding of<br />

capabilities as the research progresses.<br />

Results and Accomplishments<br />

The intent of this project was to create the tools necessary<br />

for creating a cyber security analysis laboratory. These<br />

tools would comprise the roles of cyber threat source and<br />

cyber threat mitigation. These tools would be applied to<br />

problems with testing of security policy effectiveness,<br />

security tool analysis, threat signature analysis, and<br />

security training.<br />

The coordinated attack tool is the component of CIPS that<br />

serves as the source of cyber threats. The secondgeneration<br />

prototype is completed. It is planned to now<br />

be incorporated into the System Administrator Simulation<br />

Trainer program (DoD). The coordinated attack tool consists<br />

of two elements, a client (supervisor) that controls<br />

the operation and servers (agents) that execute the attacks.<br />

The client application is hosted on NT 4.0 and the server<br />

applications can be hosted on NT and UNIX systems.<br />

Figure 1 illustrates the coordinated attack tool process.<br />

Current supervisor functionality includes<br />

• an exploit library and database that includes over 900<br />

applications and scripts<br />

• manual initiation attacks against specific targets<br />

utilizing one or more agents<br />

• attacks can include combinations of exploits from the<br />

exploit library, other exploits, and normal command<br />

line interface system commands

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!