Publications

Results 60801–61000 of 99,299

Search results

Jump to search filters

Proactive Defense for Evolving Cyber Threats

Colbaugh, Richard

There is great interest to develop proactive methods of cyber defense, in which future attack strategies are anticipated and these insights are incorporated into defense designs; however, little has been done to place this ambitious objective on a sound scientific foundation. Indeed, even fundamental issues associated with how the “arms race” between attackers and defenders actually leads to predictability in attacker activity, or how to effectively and scalably detect this predictability in the relational/temporal data streams generated by attacker/defender adaptation, haven’t been resolved. This LDRD project addressed many of these challenges and the results are briefly summarized here. We have characterized the predictability of attacker/defender coevolution and have leveraged our findings to create a framework for designing proactive defenses for large (organizational) networks. More specifically, this project applied rigorous predictability-based analytics to two central and complementary aspects of the network defense problem – attack strategies of the adversaries and vulnerabilities of the defenders’ systems – and used the results to develop a scientifically-grounded, practically-implementable methodology for designing proactive cyber defense systems. Briefly, predictive analysis of attack strategies involved first conducting predictability assessments to characterize attacker adaptation patterns in given domains, and then used these patterns to “train” adaptive defense systems capable of providing robust performance against both current and (near) future threats. The problem of identifying and prioritizing defender system vulnerabilities was addressed using statistical and machine learning to analyze a broad range of data (e.g., cyber, social media) on recently detected system vulnerabilities to “learn” classifiers that predict how likely it is that, and how soon, new vulnerabilities will be exploited. A variety of cyber threat case studies were developed and investigated throughout the project, one selected from the cyber security research community and one that is more comprehensive and of higher priority to SNL and to external national security partners. A sample of research results and application of this methodology are included in this report (as a series of peer-reviewed publications). For ease of reference the title and SAND number are included below.

More Details

Development of an Advanced Performance Assessment Modeling Capability for Geologic Disposal of Nuclear Waste: Methodology and Requirements

Freeze, Geoffrey; Vaughn, Palmer

This report describes the planning and initial development of an advanced disposal system PA modeling capability to facilitate the science-based evaluation of disposal system performance for a range of fuel cycle alternatives in a variety of geologic media and generic disposal system concepts. The advanced modeling capability will provide a PA model framework that facilitates PA model development, execution, and evaluation within a formal PA methodology. The PA model framework will provide a formalized structure that enables (a) representation and implementation of a range of generic geologic disposal system options, (b) representation of subsystem processes and couplings at varying levels of complexity in an integrated disposal system model, (c) flexible, modular representation of multi-physics processes, including the use of legacy codes, (d) evaluation of system- and subsystem-level performance, (e) uncertainty and sensitivity analyses to isolate key subsystem processes and components, (f) data and configuration management functions, and (g) implementation in HPC environments.

More Details

Quantitative characterization of porosity in laser welds of stainless steel

Scripta Materialia

Madison, Jonathan D.; Aagesen, Larry K.

Standing-edge joints made by a continuous-wave Nd:YAG laser are examined in 304L stainless steel to advance understanding of the linkage between processing and microstructure in high-rate solidification events. Microcomputed tomography combined with traditional metallography has provided qualitative and quantitative characterization of welds in this material system of broad use and applicability. Pore presence and variability have been examined three-dimensionally for average values, spatial distributions and morphology, and related to processing parameters such as weld speed, delivered power and focal lens. © 2012 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved.

More Details

Controlling the column spacing in isothermal magnetic advection to enable tunable heat and mass transfer

Journal of Applied Physics

Solis, Kyle J.; Martin, James E.

Isothermal magnetic advection (IMA) is a recently discovered method of inducing highly organized, non-contact flow lattices in suspensions of magnetic particles, using only uniform ac magnetic fields of modest strength. The initiation of these vigorous flows requires neither a thermal gradient nor a gravitational field, and so can be used to transfer heat and mass in circumstances where natural convection does not occur. These advection lattices are comprised of a square lattice of antiparallel flow columns. If the column spacing is sufficiently large compared to the column length and the flow rate within the columns is sufficiently large, then one would expect efficient transfer of both heat and mass. Otherwise, the flow lattice could act as a countercurrent heat exchanger and only mass will be efficiently transferred. Although this latter case might be useful for feeding a reaction front without extracting heat, it is likely that most interest will be focused on using IMA for heat transfer. In this paper, we explore the various experimental parameters of IMA to determine which of these can be used to control the column spacing. These parameters include the field frequency, strength, and phase relation between the two field components, the liquid viscosity, and particle volume fraction. We find that the column spacing can easily be tuned over a wide range to enable the careful control of heat and mass transfer. © 2012 American Institute of Physics.

More Details

Human dimensions in cyber operations research and development priorities

Forsythe, James C.; Adams, Susan S.; Silva, Austin R.

Within cyber security, the human element represents one of the greatest untapped opportunities for increasing the effectiveness of network defenses. However, there has been little research to understand the human dimension in cyber operations. To better understand the needs and priorities for research and development to address these issues, a workshop was conducted August 28-29, 2012 in Washington DC. A synthesis was developed that captured the key issues and associated research questions. Research and development needs were identified that fell into three parallel paths: (1) human factors analysis and scientific studies to establish foundational knowledge concerning factors underlying the performance of cyber defenders; (2) development of models that capture key processes that mediate interactions between defenders, users, adversaries and the public; and (3) development of a multi-purpose test environment for conducting controlled experiments that enables systems and human performance measurement. These research and development investments would transform cyber operations from an art to a science, enabling systems solutions to be engineered to address a range of situations. Organizations would be able to move beyond the current state where key decisions (e.g. personnel assignment) are made on a largely ad hoc basis to a state in which there exist institutionalized processes for assuring the right people are doing the right jobs in the right way. These developments lay the groundwork for emergence of a professional class of cyber defenders with defined roles and career progressions, with higher levels of personnel commitment and retention. Finally, the operational impact would be evident in improved performance, accompanied by a shift to a more proactive response in which defenders have the capacity to exert greater control over the cyber battlespace.

More Details

Cloud Computing Strategic Framework (FY13 - FY15)

Arellano, Lawrence R.; Arroyo, Steven C.; Giese, Gerald; Cox, Philip M.; Rogers, G.K.

This document presents an architectural framework (plan) and roadmap for the implementation of a robust Cloud Computing capability at Sandia National Laboratories. It is intended to be a living document and serve as the basis for detailed implementation plans, project proposals and strategic investment requests.

More Details
Results 60801–61000 of 99,299
Results 60801–61000 of 99,299