History, organization, network help, doing business with us Projects, programs, research facilities Our 5 research labs Full-time and student jobs Information for visitors
Space & Geophysics Laboratory Signal & Information Sciences
ARL Home pageUT Home pageUT electronic/email directoryARL site searchUT email and phone directory UT home pageARL home page
 

Search

 

 

Signal & Information Sciences Laboratory

 
   
 

CYBER INFORMATION ASSURANCE AND DECISION SUPPORT

The Cyber Information Assurance and Decision Support (CIADS) team within the Information Sciences Division (ISD) has an extensive background in using and developing artificial intelligence (AI) technology for a broad range of security and decision-support applications.

Core CIADS expertise:

  • Artificial Intelligence Technology: Data mining, expert systems, pattern matching, and pattern recognition

  • Operating System Customization and Instrumentation: Operating system kernel modification and monitoring, verification and validation, and custom appliance evaluation

  • Software and Systems Engineering: Knowledge acquisition, data fusion, and software architectures

  • Automated Reasoning: Machine learning, prediction, decision support, and content analysis

  • Agent-based Systems: Multi-agent distributed systems, organizational adaptation, and agent-based modeling

Selected projects reflecting these areas of expertise are discussed below.

   

Common Intrusion Detection Director System

   
ARTIFICIAL INTELLIGENCE TECHNOLOGY FOR CYBER SECURITY. CIADS' experience in artificial intelligence technology includes the development of the high-performance LEAPS (Lazy Evaluation Algorithm for Production Systems) expert system algorithm, which has been shown to outperform the well-known Rete algorithm in terms of speed and storage efficiency. Using the LEAPS algorithm, CIADS has developed the Enhanced Rule-Based Expert System (ERBES), which is in use by the Air Force Information Operations Center (AFIOC) as the core analytical engine of its Common Intrusion Detection Director System (CIDDS). CIDDS protects Air Force computer networks worldwide by providing decision support through data reduction, data correlation, and data summarization of Automated Security Incident Measurement (ASIM) sensor data. Results are presented to human analysts who are tasked with monitoring the Air Force networks for intrusive activity. ERBES employs automated reasoning for rapid detection of correlations in large amounts of data. Extensions to ERBES have expanded its data acquisition and data fusion capabilities to include input from widely used government and commercial sensor products and freeware, including Snort, JIDS, NetRanger, ASIM, Dragon and system logs. In addition, the system uses data mining to detect attack patterns and can provide automated analysis of attacks to include severity levels, damage assessment, and recommended courses of action. CIADS has further leveraged this experience with intrusion detection and network traffic analysis to evaluate network packet inspection tools and appliances for compliance with sponsor requirements.

 

Return to the top



Security Monitoring for Insider Threat Detection

OPERATING SYSTEM INSTRUMENTATION AND MONITORING. CIADS has significant experience with low-level operating system instrumentation and monitoring. Recent work for the U.S. Government's Advanced Research and Development Activity focused on classified data leakage related to the insider threat using an ARL:UT-developed software tool called Data Tracer. This tool allows an organization to determine if, when, and how digitally stored classified data has leaked. Data Tracer operates by monitoring at the operating system level to track all possible flows of classified data on a computer system. In its current implementation, Data Tracer can report when data has been released in violation of the organization’s security policy. A future implementation could, in addition, prevent these detected leaks by blocking them before they are completed. A recent extension to Data Tracer’s capabilities allows monitoring of potential data leakage among virtual machines on a virtual multi-level security platform.

Return to the top

 



CONTENT ANALYSIS / INSIDER THREAT DETECTION. A major application area for CIADS research is content analysis for detecting leaks of classified information. Recent work performed for the intelligence community includes data mining and machine learning research for monitoring of content traversing the IT perimeter at controlled interfaces to detect indications of insider leakage of classified data.

Another application of the CIADS content analysis capabilities is the creation of a software system to analyze document text and provide automated suggestions for the security classification level (e.g., TS, S, C, or U) that should apply to that text based on known classification guidance. This software applies expert system technology, and knowledge acquisition and knowledge modeling capabilities are used to capture and interpret classification guidelines and the concepts revealed in the documents analyzed.

Return to the top


Content Analysis for Insider Threat Detection
Using ARL:UT's Data Tracer

 

 
 

Predicting Attacks with Dynamic Bayesian Networks

 

ATTACK PREDICTION. CIADS is investigating the use of temporal trends and attack pattern information to predict attacks such as physical terrorist attacks and many types of cyber attacks (hacking). In this research, CIADS has studied the use of Bayesian networks to combine temporal trends with correlational patterns. CIADS has performed experiments to identify specific types of temporal trends that can and cannot be modeled by existing Bayesian network research and developed a method to address these limitations.

Return to the top

DISTRIBUTED AGENTS. CIADS’ experience in development and design of distributed-agent-based systems dates to 1997. Key capabilities of these systems include dynamic organization adaptation, policy interpretation, and user support. Recent research has focused on agent modeling and automated generation of explanations for agent behavior.

For further information regarding the Cyber Information Assurance and Decision Support program, please contact: Director-SISL@arlut.utexas.edu

Click here for print-friendly copy

 
 
     

| Advanced Technology | Environmental Sciences | | Space Geophysics | Signal & Information Sciences |

| About Us | Research | Laboratories | Employment | Visiting ARL |

Site questions or comments? Contact webmaster@arlut.utexas.edu