Advances in Internet services, location-based services, and mobile wireless services lead to the development of cyberattacks that are persistent, complex, and can propagate rapidly to severely impact all aspects of our life, economy, and national security. This problem is even more severe for Navy unmanned vehicle systems (UxS) and the most dangerous threat types focus on the applications to be provided by the Unmanned Maritime Autonomic Architecture (UMAA) (e.g., mission management, support, processing operations, maneuver operations, situation awareness). Existing cybersecurity technology and tools have failed to protect our cyberinfrastructure for many reasons: They are mainly signature based solutions that cannot detect new and novel cyber-attacks. They use many isolated and heterogeneous tools for monitoring performance, fault, and security that make it extremely difficult for human to comprehend and manage in a timely manner. They are typically developed as threat response (defensive) technologies that inherently cause operational issues as they respond and repair attack damages. They are manually intensive activities that make them too slow to respond and act in a timely manner against malicious threats (e.g., according to a recent survey of 50 benchmark companies, the average detection of a cyber-attack is 18 days and more than 200 days for detecting an insider threat if successful). In this SBIR Phase I, we will leverage AVIRTEK Autonomic Cyber Security (ACS) technology to develop Autonomic Protection for UMAA services (AP-UMAA). The ACS technology is a true alternative to the existing cybersecurity technologies that will revolutionize the way we secure and protect our cyberspaces. It can efficiently and cost-effectively address the current and future challenges of cybersecurity.
Benefit: The success of commercializing of the proposed AP-UMAA technology will overcome the current cybersecurity challenges by providing a multi-layer monitoring and real-time analysis for unmanned maritimes through anomaly behavior analysis and autonomous management along with autonomic incident response. Hence, it will be benefiting air craft controllers, cyber battle management commanders and operators, disaster management, just to name a few.
Keywords: incident response, incident response, insider threat, anomaly behavior, Autonomous, Man-in-the-middle, UxS, DoS