Intrusion/anomaly detection systems are among the first lines of cyber defense. Commonly, they either use signatures or machine learning (ML) to identify threats, but fail to account for sophisticated attackers trying to circumvent them. We propose to embed machine learning within a game theoretic framework that performs adversarial modeling, develops methods for optimizing operational response based on ML, and integrates the resulting optimization codebase into the existing ML infrastructure developed by the Hybrid LDRD. Our approach addresses three key shortcomings of ML in adversarial settings: 1) resulting classifiers are typically deterministic and, therefore, easy to reverse engineer; 2) ML approaches only address the prediction problem, but do not prescribe how one should operationalize predictions, nor account for operational costs and constraints; and 3) ML approaches do not model attackers’ response and can be circumvented by sophisticated adversaries. The principal novelty of our approach is to construct an optimization framework that blends ML, operational considerations, and a model predicting attackers reaction, with the goal of computing optimal moving target defense. One important challenge is to construct a realistic model of an adversary that is tractable, yet realistic. We aim to advance the science of attacker modeling by considering game-theoretic methods, and by engaging experimental subjects with red teaming experience in trying to actively circumvent an intrusion detection system, and learning a predictive model of such circumvention activities. In addition, we will generate metrics to test that a particular model of an adversary is consistent with available data.
Production of oil and gas reserves in the New Mexico Four Corners Region results in large volumes of "produced water". The common method for handling the produced water from well production is re-injection in regulatory permitted salt water disposal wells. This is expensive (%7E $5/bbl.) and does not recycle water, an ever increasingly valuable commodity. Previously, Sandia National Laboratories and several NM small business tested pressure driven membrane-filtration techniques to remove the high TDS (total dissolved solids) from a Four Corners Coal Bed Methane produced water. Treatment effectiveness was less than optimal due to problems with pre-treatment. Inadequate pre-treatment allowed hydrocarbons, wax and biological growth to foul the membranes. Recently, an innovative pre-treatment scheme using ozone and hydrogen peroxide was pilot tested. Results showed complete removal of hydrocarbons and the majority of organic constituents from a gas well production water. ACKNOWLEDGEMENTS This report was made possible through funding from the New Mexico Small Business Administration (NMSBA) Program at Sandia National Laboratories. Special thanks to Juan Martinez and Genaro Montoya for guidance and support from project inception to completion. Also, special thanks to Frank McDonald, the small businesses team POC, for laying the ground work for the entire project; Teresa McCown, the gas well owner and very knowledgeable- fantastic site host; Lea and Tim Phillips for their tremendous knowledge and passion in the oil & gas industry.; and Frank Miller and Steve Addleman for providing a pilot scale version of their proprietary process to facilitate the pilot testing.
The approach was to perform a document search, supplemented by a visual site inspection, to identify potential environmental contamination associated with the property. Factors evaluated included hazardous substances; petroleum products and derivatives; environmental restoration sites; areas of concern; storage tanks; oil/water separators; grease traps; wash racks; waste tanks; pesticides; military munitions/ordnance; medical or bio-hazardous waste; radioactive waste; solid/municipal waste; indoor air quality; groundwater; wastewater treatment, collection, and disposal/discharge; drinking water quality; utilities; asbestos; polychlorinated biphenyls (PCBs); radon; lead-based paint; cultural resources; floodplains; and natural/biological resources.
This ASER Summary Pamphlet presents the environmental protection, restoration, and monitoring programs in place at SNL/NM during calendar year 2014. It also discusses Sandia’s compliance with environmental regulations, and it highlights significant environmental program efforts and accomplishments. The environmental programs and waste management activities at SNL/NM meet or exceed the requirements of federal, state, and local environmental regulations, as well as DOE directives in the contract between Sandia and DOE. This document, prepared in accordance with and as required by DOE Order 231.1B, Environment, Safety, and Health Reporting, is a key component of DOE’s efforts to keep the public informed about environmental conditions throughout the DOE/NNSA nuclear weapons complex.
Evaluating the health of a mechanism requires more than just a binary evaluation of whether an operation was completed. It requires analyzing more comprehensive, full-field data. Health monitoring is a process of nondestructively identifying characteristics that indicate the fitness of an engineered component. In order to monitor unit health in a production setting, an automated test system must be created to capture the motion of mechanism parts in a real-time and non-intrusive manner. One way to accomplish this is by using high-speed video (HSV) and Digital Image Correlation (DIC). In this approach, individual frames of the video are analyzed to track the motion of mechanism components. The derived performance metrics allow for state-of-health monitoring and improved fidelity of mechanism modeling. The results are in-situ state-of-health identification and performance prediction. This paper introduces basic concepts of this test method, and discusses two main themes: the use of laser marking to add fiducial patterns to mechanism components, and new software developed to track objects with complex shapes, even as they move behind obstructions. Finally, the implementation of these tests into an automated tester is discussed.
Quantitative measures are proposed for characterizing the complexity of material models used in computational mechanics. The algorithms for evaluating these metrics operate on the mathematical equations in the model rather than a code implementation and are different from software complexity measures. The metrics do not rely on a physical understanding of the model, using instead only a formal statement of the equations. A new algorithm detects the dependencies, whether explicit or implicit, between all the variables. The resulting pattern of dependencies is expressed in a set of pathways, each of which represents a chain of dependence between the variables. These pathways provide the raw data used in the metrics, which correlate with the expected ease of understanding, coding, and applying the model. Usage of the ComplexityMetrics code is described, with examples.
The WEC-Sim project is currently on track, having met both the SNL and NREL FY14 Milestones, as shown in Table 1 and Table 2. This is also reflected in the Gantt chart uploaded to the WEC-Sim SharePoint site in the FY14 Q4 Deliverables folder. The work completed in FY14 includes code verification through code-to-code comparison (FY14 Q1 and Q2), preliminary code validation through comparison to experimental data (FY14 Q2 and Q3), presentation and publication of the WEC-Sim project at OMAE 2014 [1], [2], [3] and GMREC/METS 2014 [4] (FY14 Q3), WEC-Sim code development and public open-source release (FY14 Q3), and development of a preliminary WEC-Sim validation test plan (FY14 Q4). This report presents the preliminary Validation Testing Plan developed in FY14 Q4. The validation test effort started in FY14 Q4 and will go on through FY15. Thus far the team has developed a device selection method, selected a device, and placed a contract with the testing facility, established several collaborations including industry contacts, and have working ideas on the testing details such as scaling, device design, and test conditions.
If the United States (U.S.) government allows cyberattacks to continue on their current trajectory of increased frequency and effect, the bonds holding our society together will be jeopardized, potentially impacting the survival of our society as we know it. Actions must be taken not only to defend against, but also to deter future cyberattacks. To achieve a credible and actionable U.S. Cyber Deterrence Strategy, the following three lines of effort are recommended for implementation by the White House: 1. Add a sixth priority to the Obama Administration's current cyberspace priorities to state: "Advance our cyber response policies and capabilities to further protect the country's national interests by deterring attacks within cyberspace." 2. Adopt the proposed Cyber Deterrence Analytic Framework as a guide for policy makers to use when determining the appropriate response to a cyberattack. 3. Implement the proposed Presidential Policy Directive outlining the United States' deterrence policy for cyber. These recommendations for establishing a U.S. Cyber Deterrence Strategy address the following key findings: As the U.S. private sector owns and operates over 90% of all of the networks and infrastructure of cyberspace, an effective policy must be communicated clearly across the government, business enterprise, and most importantly, to the people; More so than any time in our nation's history, individuals, companies, and organizations depend on cyberspace for uses ranging from social interactions to sustaining democracy; Threats existing within the cyber domain have grown both in attack vector complexity and societal impact; and, The current Presidential Executive Orders and Policy Directives related to cyber deterrence do not include a strategy for deterring attacks. The concepts presented in this paper were derived from interviews with experts in subjects ranging from deterrence philosophy, nuclear weapons implementation, U.S. cyber operations, and U.S. cyber policy. In addition, theories on deterrence strategies are explored, ranging from the 1960s to present to develop a deterrence strategy unique to cyber. Lastly, recent examples of cyberattacks are examined to provide evidence for the need to establish consequences for those individuals or countries that continue to behave nefariously within cyberspace. To form a strong foundation for a U.S. Cyber Deterrence Strategy, the U.S. must establish and clearly articulate the consequences for nations or individuals if they choose to initiate a cyberattack on the U.S. or its national interests.
Mandell, John F.; Samborsky, Daniel D.; Miller, David A.; Agastra, Pancasatya; Sears, Aaron T.
Wind turbine blades are designed to several major structural conditions, including tip deflection, strength and b uckling during severe loading, as well as very high numbers of fatigue cycles and various service environments. The MSU Database Program has, since 1989, addressed the broad range of properties needed for current and potential blade materials through stati c and fatigue testing and test development in cooperation with Sandia National Laboratories and wind industry and supplier partners. This report is the latest in a series, giving test results and analysis for the period 2010 - 2015. Program data are compiled in a public database [1] and other reports and publications given in the cited references. The report begins with an executive summary and introductory material including background discussion of previous related studies. Section 3 describes experimental methods including processing, test methods, instrumentation and test development. Section 4 provides static tension, compression and shear stress - strain properties in three directions using coupons sectioned from a thick infused unidirectional glass/epoxy laminate. The nonlinear, shear dominated static properties were characterized with loading - u nloading - reloading (LUR) tests in tension and compression to increasing load levels, for +-45O laminates. Section 5 explores the origins of tensile fatigue sensitivity in glass fiber dominated laminates with variations in fabric architecture including speci ally prepared fabrics and aligned strand laminates. Several types of resins are considered, with variations in resin toughness and bonding to fibers, as well as cure cycle variations for an epoxy. Conclusions are drawn as to the limits of tensile fatigue r esistance and the effects of resin type and fabric architecture, including the behavior of a commercial aligned glass strand product. Interactions between cyclic fatigue response and creep are addressed for off - axis (+-45O) glass/epoxy laminates in Sectio n 6. The nonlinear fatigue and creep stress - strain and cumulative strain response are characterized in tension and compression as a function of stress level, cycles and cumulative time, using square and sinewave loading over a broad range of frequency. The results are analyzed in terms of the cycles and cumulative time under load. A cumulative strain failure criterion is established, and used to construct shear and tension constant life diagrams (CLD's) with data for nine R - values. The effects of a more duc tile urethne resin are also explored. A previous study of thick adhesives testing is extended to mixed mode fracture mechanics testing in Section 7. Mechanisms of static and fatigue crack extension near the laminate adherend interface are reported in deta il. Data are presented for mixed mode adhesive fracture, compared to mixed mode fracture in ply delamination. Fatigue crack growth exponents are also developed for a mixed mode cracked lap shear coupon. The data for fatigue trends and relative failure stra ins and exponents are compared for various blade component materials in Section 8. The effects of temperature and seawater saturation are considered for selected materials of interest for wind and hydrokinetic turbine blades in Section 9. Section 10 gives detailed conclusions for each section. A cknowledgements The research presented in this report was carried out under Sandia National Laboratories purchase orders 1325028 an d 1543945 between 2010 and 2015, with support from the DOE Wind and Water Technologies Office . In addition to the authors listed, significant contributions were made by Patrick Flaherty, Pancastya Agastra, Michael Schuster, and Michael Voth. Industry m aterials suppliers include Vectorply, Saertex, OCV, AGY, Bayer, Ashland, 3M and Nextel. Industry suppliers with significant contributions to the study were Hexion, PPG, Reichhold, Gurit and NEPTCO. Intentionally Left Blank
The Task 1 objective is to “expedite the PV interconnection process by revising the screening process in California”. The goal of this task is to develop a data-driven, validated approach to determining feeder limits that can simplify interconnection processes and lead to greater PV adoption across the California distribution system.
This task describes R&D activities to establish methods to cost-effectively achieve very high PV penetration scenarios (well beyond 100% of peak load at the feeder level) by leveraging distributed inverters to increase situational awareness and provide local voltage support. The grid performance and reliability objectives (SI vision) of this proposal were selected to enhance feeder planning models that can better characterize and quantify the electric power system including the secondary system servicing customers. The Communication objective was selected to demonstrate how visibility and control of behind-the-meter systems and distributed storage at large scale can be optimized to address system reliability and variability impacts, and to maximize the value of solar in high PV penetration scenarios. The goal of this project was to achieve enhanced grid operation and optimized PV penetration utilizing highly distributed sensor data via three subtasks 1.1-1.3.
Pulsed laser irradiation has been used to create complex, intrinsic markings that can be used as unique identifiers for authentication and asset protection. Markings have been made on the surface of various materials by rapidly scanning a focused laser beam across a designated area as large as several square inches. Markings include macro-scale patterns, such as barcodes, that contain encrypted information. More complex markings are comprised of macro-scale patterns and embedded, unique micro-scale features. Micro-scale features form spontaneously during scanned laser irradiation and have different shapes, spacings, color and other characteristics that are virtually impossible to recreate. The macro-scale patterns can be interrogated rapidly in the field using a digital camera, while the embedded micro-scale features are best evaluated in the laboratory using microscopy or related optical techniques. Interrogated markings are compared with archived maps of the original patterns (obtained at the time of their manufacture) to determine component authenticity. The majority of experiments have involved marking planar solids. A new instrument that marks non-planar substrates is described for future work.
Active source seismic data was collected at the Nevada National Security Site using the Seismic Hammer(TM) (SH), under contract from HK Exploration. The SH generates a seismic pulse by dropping a 13 metric ton mass from a height of 1.5 m. Post-survey evaluation of collected data revealed inconsistencies in shot trigger time that required additional analysis and correction using cross-correlation and/or time shifts derived from manual picks of trigger times. While the primary analysis for which this data set was collected is independent of the knowledge of shot trigger time, other processing methods require highly precise knowledge of the trigger time. In order to make the Thor data set more usable to the larger community, additional work was undertaken. Results using the preferred method of cross-correlation were found to be satisfactory. An improved timing fiducial approach is required to reduce timing errors.
CUBIT is a full-featured software toolkit for robust generation of two- and three-dimensional finite element meshes (grids) and geometry preparation. Its main goal is to reduce the time to generate meshes, particularly large hex meshes of complicated, interlocking assemblies. It is a solid-modeler based preprocessor that meshes volumes and surfaces for finite element analysis. Mesh generation algorithms include quadrilateral and triangular paving, 2D and 3D mapping, hex sweeping and multi-sweeping, tetrahedral meshing, and various special purpose primitives. CUBIT contains many algorithms for controlling and automating much of the meshing process, such as automatic scheme selection, interval matching, sweep grouping, and also includes state-of-the-art smoothing algorithms.
Objective Statement: Development and demonstration of on-board diagnostics to determine battery state of stability and trigger a battery control system response to eliminate a impending safety related failure issues