Visible to the public Policy Analytics for Cybersecurity of Cyber-Physical Systems: April 2019 (Y1, Q4)Conflict Detection Enabled

Funding Type: Full proposal

Start Date: March 01, 2018

Expected Completion Date: April 30, 2019

Principal Investigator: Nazli Choucri

Public View

Accomplishments

Accomplishments during this reporting period (2019-Q4) and Planned Activities for year 2 are presented in the following sections of this Report:

1. Contributions to Science of Security: Policy-Domain

1.1 Contribution(s) to Addressing Hard Problems
1.2 Year 1 Activities
1.3 Past Progress: April - December 2018

2. Current Progress: January - March 2019
3. Text as Raw - System Structure & Process
4. Rules for Extracing Data form Text
5. Plan Developed for Year 2
6. Administrative
7. Education
8. References

1. Contributions to Science of Security: Policy-Domain

The first quarterly report for year 1 [1] outlines the purpose of the project as a whole -over and above the proposal statement. Specific contribution to made to the core project are outlined in the second quarterly report [2] and in third quarterly report [3]. Additionally, the research contributes to the 2019 National Intelligence Strategy of United States of America [4], specifically the topical mission objective 4 on Cyber Threat Intelligence:

"Detect and understand cyber threats from state and non-state actors engaged in malicious cyber activity to inform and enable national security decision making, cybersecurity, and the full range of response activities."

Our project focusing on cyber-physical system for cybersecurity of electrical smart grids - as an example of critical infrastructure - works tol provide an opportunity for "under the hood" understanding of policies and directives to provide incentives for greater than "compliance only" reponses, and greater understanding of systems relationships and interdependencies.

1.1 Contribution(s) to Addressing Hard Problems

This project on the "policy governed secure collaboration" is for managing cybersecurity risk by capturing the full-value of sector or critical infrastructure specific cybersecurity guidelines. As outlined in the project proposal, the research consist of a multi-method modular approach applied to a generic infrastructure system in a controlled environment. The "raw data" consists of texts of National Institute for Standard and Technology (NIST) guidelines, policies and directives for cybersecurity of power systems, augmented by exploration for user-specific customizations and generalizations.

For context, Figure 1 provides once more the near-, mid- and long- term project goals, with "Policy Governed Secure Collaboration" as the primary hard problem.

Figure 1. Near-, mid- and long- term project goals

Source: Analytics for Cyber-Physical System Cybersecurity: January 2019 [1].

1.2 Year 1 Activities

Task 1 in Year 1 focuses on creating foundations for cybersecurity analytics. Table 1 summarizes the scope of work and signals the overall progress targeted.

Table 1. Task 1 (Year 1) Scope of work and progress made in Year 1

While the items in Table 1 are presented sequentially, the actual research cannot and does not follow this discrete listing.

1.3 Past Progress: April - December 2018

Progress made between April - December 2018 are available here:

The following sections of this report summarize the progress in the remaining three months of the Year 1 effort: January - March 2019.

2. Current Progress: January - March 2019

In this quarter, the work resulted in completing of three critical tasks:

1. Constructing Text-as-Raw Data"

  1. Conceptual model of NIST for smart grid NISTIR-7628 on Guidelines for Smart Grid Cybersecurity
  2. Cumulative materials provided in other NIST sources and cumulating in the NISTIR-7628
  3. Customized data for this application from NIST Cybersecurity Framework.

2. Designing Rules for Extracting Data from Text

3. Developing Plan for Year 2

The sections below detail the work on each component

3. Text as Raw Data - System Structure & Process

At this point we highlight our approach to generate "raw-data" and our uses of these to build the data set for metricization. We begin with NIST Conceptual Model. Our purpose at this point is to provide a more user-friendly or operational approach to the contents of. We do so by organizing the overall system structure and process into to yield a coherent framework of the system" as is", as well as its fundamental vulnerabilities and security objectives.

Table 3 Summary of Characateristic Features of Raw Data Base

_______________________________________________________________________________

The Raw Data Base is:

Anchored in

"As Is State" of Infrastructure Specific System

  • Actor and domain (or function)

  • Logical interfaces

Augmented by:

Vulnerabilities, Security Objectives, Impacts, Requirements

  • Vulnerabilities for each of actors and domains

  • Security objectives

  • Impact for each of the three-security objectives of system:

availability, information integrity and customer confidentiality

  • applicable Security requirements

Augmented by

Customized application of Cybersecurity Framework to "As Is State"

  • applicable sub-categories, categories and functions of NIST Cybersecurity Framework.

_______________________________________________________________________________

This now completes the task of identifying the bguildling blocs and building a raw data base from text. The process yields a cumulative "onion like" data base.

4. Rules for Extracting Data from Text

The data-extraction strategy undertaken after developing a design for the raw data is shown in Figure 4. This figure provides a high-level view of the vastness of the information embedded in NISTIR-7628 (and its supporting texts). It is designed to show the linkage-strategy to connect the components of policy-governed security for cyber-physical systems.

Figure 4. The overall linkage strategy

A more detailed discussion of the overall system - in parsed form - is prepared to be provided in the first Quarterly Report of Year 2

5. Plan Developed for Year 2

Building on the Year 1 results, in Year 2 we will focus on Task 2 to "Establish Information Flows in System-wide Operations" (see Figure 4). By following the linkage strategy in Figure 4 w e can then create dependency structure matrix (DSM) of Smart Grid Cyber-Physical System in metricized form. This is done by (i) following the structure in Table 3, (ii) identifying first level information dependencies; and (iii) cluster and partition DSM to reveal "hidden features". The table below shows tentative plan for year 2.

Table 4. Planning for Year 2 Tasks.

6. Administrative:

Continuing on the white paper for "Security of Global Undersea Networks: Models, Defenses, and Policy Mechanisms" in response to current Agency hard question Long-Chain Analysis of Dynamic and Mobile Infrastructure that Lablet members could help address, MIT-PI is completing a case study on China.

7. Education:

MIT-PI is teaching a graduate-level class on International Relations Theory in the Cyber Age, drawing on policy-relevant materials. The course draws from student participants from different parts of MIT. 2015 edition of the course is now available at: https://ocw.mit.edu/courses/political-science/17-445-international-relations-theory-in-the-cyber-age-fall-2015/

8. References

  1. https://cps-vo.org/node/57492
  2. https://cps-vo.org/node/56209
  3. https://cps-vo.org/node/54641
  4. https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF
  5. Nazli CHouci and Guarav Agarwal, Report for Year 1, 2019