The US Air Force through SBIR initiated a request to create a prototype that would address weapon system platform Cyber Security Processes. The USAF needed to certify that all components on board the weapon system had passed all tests for cyber reliability. The Air Force was concerned at how Cyber Attacks happen and how to simulate their impact on the weapon platform. They wanted KBSI to apply their expertise with simulation to craft a prototype tool. This tool would simulate attacks on the platform based upon know vulnerabilities.
As the simulation model expanded, the USAF now needed a way to document the risk levels of the platform. Focus was then given to augment the system to assist the various teams in documenting the operability of the systems. The military mandated that each weapon system and component on the platform follow the Authorization To Operate (ATO) process. This process required that vulnerabilities be identified, mitigation plans documented, and test results published for each component of the platform. This required thousands of man hours to initially document and also maintain as changes were incorporated.
The system then needed to be expanded in order to create a capability to use Artificial Intelligence algorithms to conduct a Risk Analysis simulation against the platform model. The Air Force needed to add the capability to understand the impacts throughout the system as to what an attack would have on the system vulnerabilities. This produced a Risk Score that was used to rank the risks in order to produce mitigation plans to correct the weaknesses.
With known tactics and vulnerabilities, the USAF then wanted to incorporate battle tactics into the AI Algorithms. This is especially valuable when simulating attacks from State-Sponsored cyber attacks. With pattern recognition technology, these tactics can be simulated to determine anticipated attack paths. Sophisticated attacks are now more sophisticated because they have multi-pronged approaches. A single attack can be a diversion to what is then a secondary, more dangerous, attack. The Attack Path Analyzer highlights the alternative paths that are uncommonly identified.
To this point, ASSURANT™ was primarily focused on the “Platform’s” cyber position. Each mission flown by the platform has temporal elements of risk which needs to be simulated. This phase addresses the “Mission” vs just the “Platform”.