You are here

Computational cyber-security Attacker/Analyst Models

Award Information
Agency: Department of Defense
Branch: Navy
Contract: N00014-14-P-1069
Agency Tracking Number: N132-132-0749
Amount: $80,000.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: N132-132
Solicitation Number: 2013.2
Timeline
Solicitation Year: 2013
Award Year: 2014
Award Start Date (Proposal Award Date): 2013-10-28
Award End Date (Contract End Date): 2014-08-28
Small Business Information
15400 Calhoun Drive Suite 400
Rockville, MD 20855-
United States
DUNS: 161911532
HUBZone Owned: No
Woman Owned: Yes
Socially and Economically Disadvantaged: No
Principal Investigator
 Bob Pokorny
 Director, ETT
 (301) 294-4750
 bpokorny@i-a-i.com
Business Contact
 Mark James
Title: Director, Contracts and
Phone: (301) 294-5221
Email: mjames@i-a-i.com
Research Institution
N/A
Abstract

Cyber-attacks threaten our security and impede American business. To counter cyber-security attacks, computational models of the entire cyber-security environments can provide many benefits. With our transition partners, we will create computational models that can play the roles of cyber-attacker, cyber-defender, network users, and network policy makers. Synthetic environments could (1) measure the real security of an organization"s network without causing harm; (2) investigate defenses against new kinds of attacks, (3) project how future attacks are likely to evolve, (4) and support defenders as they struggle to reduce the effectiveness of attacks. To make these computational models, we will conduct cognitive task analyses that are designed to clearly represent the approach that various players take and that are sufficiently detailed to inform the design and development of computational models. For this project, we will be using the computational model Lumen. Lumen is a product of DARPA"s Cognitive Agents that Learn and Organize project. Lumen was chosen because it is a modern procedural reasoning system that can address the kinds of back and forth probes and responses that matches the confrontation between cyber-attackers and cyber-defenders. This project will demonstrate how complex CTAs and computational models can elucidate the ubiquitous threat of cyber-attacks.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government