Uploaded by Christian Dansby

2021 Capstone Initial Briefing

advertisement
SCY MAJOR CAPSTONE BRIEF
A graduation requirement
SUDO APT-GET 2021CAPSTONE
Dennis Dias ‘92
ONR Chair, Cyber Science
SY401/402 Course Coordinator
dias@usna.edu
3 THINGS TODAY:
1) Understand the Capstone Requirements and
Timelines
1) Start brainstorming ideas
1) Form a team of 2-4 Midshipmen and find a
faculty advisor for your project
PROJECT PLAN IN PLACE BY 01 APR 2020!
WHY A CAPSTONE PROJECT?
● Project-Based Learning
● Application of all you have learned
● An opportunity to dive into something you are
interested in - technical or policy
● Publish and present!
Understand the Capstone Requirements & timelines
• Pick your team, advisor and project idea by 01 APR
• Over the summer, keep researching and learning
about your project
• SY401 - Fall - Updates in the semester (10% of grade)
• SY402 - Spring - Finalize project & poster/paper (40%
of grade)
• CAPSTONE DAY PRESENTATIONS APRIL 2021
• THIS IS A GRADUATION REQUIREMENT!
Cyber Operations Major Matrix
Fall
Sophomore
Year
Spring
Sophomore
Year
Fall
Junior
Year
SM286
Discrete Math
SY201 Cyber
Fundamentals
Python
(CYBER)
SY205H Cyber
Networking
Intro
(CYBER)
SY204
Programs &
Op Systems
C-Language
(CYBER)
SY301
Data
Structures
(CYBER/CS)
SY202 Cyber
Engineering
Control
System sIntro
(WSE)
SY303
Applied Cyber
Systems Arch
(CYBER)
Spring
Junior
Year
Fall
Senior
Year
Spring
Senior
Year
SY304 Social
Eng, Human
Factors
(CYBER)
SY403
Cyber Policy
& Planning
(CYBER)
SY406
Law &
Ethics
(CYBER)
SY401 Cyber
Ops I
Offense
SY402
Cyber Ops II
Defense
SY4XX
Elective
SY4XX
Elective
Honors
Elective:
SY416
Reverse
Engineering
Honors
Elective:
IC411
Operating
Systems
SY306 Web &
Database
Security
(CYBER/CS)
SY308 Data
Security
Principles
(CYBER/CS)
SY310
Network &
Wireless
(CYBER/ECE)
Honors Track & NSA CAE-CO Track:
add SY205H and electives SY416 &I C411
Start brainstorming ideas
Getting Started with Cybersecurity Science
Josiah Dykstra
• Computer science PhD
• 14 years at NSA
• Cybersecurity practitioner
• Cybersecurity researcher
• Active with the scientific community
• Advocate for cybersecurity science
SEE HIS TALK HERE
SEE HIS SLIDES HERE
Checklist - see Video for details
1.
2.
3.
4.
5.
6.
7.
8.
Formulate a question- the purpose for doing experimentation.
Is the topic non-trivial and important to solve?
Conduct a lit review/background research
Form your hypothesis, & make some predictions about your
hypothesis
Assemble a team to help execute the experiment, if necessary.
If studying human subjects, seek HRPP approval
Test your hypothesis. Collect data. Analyze. Check for errors
Document & share your work
FOCUS ON YOUR QUESTION
Limited only by your imagination
14 Cyber Ops Capstone Projects AY2019
46 Midshipman – 14 Projects
• Securing Critical Infrastructure: An Open Source Approach
• Vulnerabilities in shipboard 3D Printers
• Amazon Alexa - dolphin attack
• End-To-End Voting Methodology
• Profiling a Software Developer -The Link Between Personality and the Development of
Technical Skills
• Intel Software Guard Extensions in Military Drones
• Securing Gmail
• The Need for a Federal Data Breach Notification Law
• Hardening Autonomous Drones for Combat Augmentation
• Cyber Letters of Marque
• A Wild Ride on a Solid State Drive
• A Feasibility Survey of FAW Attack on Block chain
• WORTHY WAYPOINTS
• "Lowering the Barrier to Entry: Network Visualization in Real Time"
Visualizing Network Traffic using Hololens
1/C Knute Jones, 1/C Jacques Henot, 1/C Brandon Shields, 1/C Andrew Phiel
Dr. Robert Schuman, Microsoft
Background and
Goals
Can augmented reality better
communicate the architecture
and traffic of a network?
Approach
• Create Static
dashboard, Pinned in
space.
• Create Database and
import data
• Connect Hololens to
database
• Pull data from database
and display sample data
on dashboard.
Social Graph Model
Plan
A work in progress
Have each piece work in
concert.
• A cluster in the Cosmos
DB has been created.
• DB holds over
3,000,000 Records from
Kagle.com.
• Able to visualize “cubes”
and “spheres” in the
augmented reality
space.
• Files are parsed outside
of the database using
python.
Challenges
• Connecting to Database
• Connecting Hololens to
Database
• Going from python to
dropping data into DB
Figures, Images,
High Level View or
System Architecture
• Create a cleaner image
on the Hololens.
• Cut down on latency
from cpu to cloud to
Hololens.
• Connect the three main
environments.
Help
• Received resources
through Dr. Schuman by
allowance of his
Microsoft data services.
Product
Poster Gouge using PowerPoint 2010
Open Document
Create Poster Size
Click File> New >Blank Presentation > Create
Click >Design tab at the top of
the screen, >Page Setup
Type in poster size and orientation.
(Standard size is 40”w x 30”h
Conference/Chemistry Dept
size is 56” w x 40” h) >OK
Content First, then Design
Do not skip this step! Create an outline of the content you want to include. The
outline will determine the structure and consequently the design of your poster.
Once the outline is created, sketch a few blocks on paper to contain each outline topic.
Add all your content, text, pictures, graphs, to the poster file, keeping items organized
within the structure you created. Choose a background, formatting and other design
elements to complete the poster.
Design
Content
Insert Text
Contrast
Create a title by inserting a text box. Click>Insert
tab>Text Box. Click or click-and-drag where you want
your text to be. Begin typing.
To copy text from another document, make the text box first, then copy-and-paste into the text box. Resize text box and
font size as necessary. To resize text box, click on block handles to adjust in one direction. Hold shift and click on circle
handles to resize in proportion.
Backgrounds
Insert Images/Objects
Order
Images can be added to the poster in two ways, Insert
Picture from File or Copy-and-Paste.
To insert images,(.jpeg, .gif, .png formats) >Insert tab
>Picture, then Browse to the current location of the image
to select. Alternately, to use the Copy-and-Paste method,
right click on the on screen image, >Copy. Click onto the
active PowerPoint poster, right click for options and
>Paste.
Images can be resized proportionally by using the round
corner handles and dragging. Click and drag in the middle
of the graphic to move it. Select the picture to edit it with
options under the Format tab.
To place an image, text box or
graphic in front or behind
another, right click on the
object and select bring to
front, bring forward, send to
back or send backward.
Insert slides from other Presentations
To insert slides from another presentation and retain their background and formatting,
open the source presentation. In the (left) slide view panel, click on the slide you want to
copy. Right click >Edit>Copy. Go back to your poster presentation file. Click on the place
in the poster where you want to position your copied slide. On the Home tab, click on
the dropdown arrow under Paste and click >Paste Special
>Save to set auto–save timing.>OK
Proofread twice and ask someone not familiar with the project to read it
again. MSC cannot reprint posters for spelling mistakes.
Create separate Text Boxes for each unit of text, allowing them to
be moved independently from each other.
Outlines
Text Boxes, Images, and other graphic
elements can be outlined to group and
distinguish objects from their background.
Click >Shape Outline on the Drawing tools
Format tab and select the line color and
style desired.
Balance and Focus
Low resolution pictures will be “grainy” when blown up to poster size. When searching, look for images larger than 80k.
Do not try to download an image from a search thumbnail. Go to the source site to download. >Right click image>Save
Picture As> your folder. To check resolution at full final poster size, set your Zoom view to 100%. If the image needs
considerable editing, such as transparency , color fade or close cropping, ask the MSC staff for assistance in using
Photoshop or Illustrator.
Save your file frequently. >File >PPT Options>Save
Shadows
The shadow icon on the font
formatting toolbar (Home tab) is
very limited. To shadow text or
images, click >Shape Effects on the
Drawing toolbar (Home tab) and
select the shadow style desired.
SHORTCUT: Right click object >Format Shape and choose Fill, Line, Shadow, Picture or Text box formatting options.
Resolution
Tips
From the Design tab, click >Background Styles >Format
Background. Select Fill for a solid color; Fill Effects to create
a gradient; or Picture to select an image.
High contrast between the text and the immediate background makes the text the focal point and easier to read. The
best backgrounds are either very dark or very light with text in the opposite value. Mid range background
colors/values or busy images make it harder for the reader to distinguish the text. To correct this, consider putting an
outline, glow or shadow around the text, fade out the background image or place the text in a high contrast box over
the background.
White (empty) space is an essential design tool.
Use it to cushion text boxes from one another.
Margins will group objects and allow the eye to rest between units. Items aligned with one another create a sense of
organization and balance. Angles created by white space, color change and image content direct the eye. If content is
organized in a grid, it is essential to give the reader a direction to follow by grouping rows or columns closer together.
Format Text
Line Spacing
You can change the
color of the text, the
edge, and the fill as
well as other
options in the Home
tab.
To specify the spacing between
lines within a text box, click on
the line spacing icon on the
Paragraph toolbar (Home tab),
> Line Spacing Options, choose
Exactly and specify height.
Align and Distribute
To display drawing guides, click >View and check off the
Grid and Guides box.
To display the ruler, go to the View menu and select Ruler.
Move guides to measure distance from center for precise
alignment. Snap option is also available. Position guides,
drag objects close to guide so it snaps into alignment.
Arrange objects on the slide individually or group objects to
allow them to be aligned as one unit.
On the Drawing tools Format tab, click >Arrange >Align to
distribute.
Print Requests and MSC Graphics Technology Lab
MSC Graphics is located beyond Circulation, room 105, Main Deck, Nimitz Library . Hours are Mon-Thurs 0730-2245, Fri 1900-2200, during the academic term.
Bring your files on a cd, by email or short term file-sharing. Sign into the lab, fill out a poster request form and allow for 15 minutes to sit with a graphic artist to review
your file. Please proofread content before requesting printing. There are NO REPRINTS.
MSC will not be able to print posters at the last minute. Please allow three business days for printing.
Phone: 410-293-5857, Email: mscgraphics@usna.edu
Vehicle Telematics and Vulnerabilities
1/C Ryan Chow, 1/C Yixin Ye
Prof Melaragno, Cyber Science Department
Problem Statement
With the amount of information
involved with operating a modern
automobile, how can we take
advantage of it to achieve tactical
objectives?
What kind of information can we
gather from wireless
transmissions from an
automobile? Is it enough for
fingerprinting?
Approach
1.Set up testbed
System Specifications
❖Using a KerberosSDR
(Figure 3) to set up a DF
array.
❖Antenna spacing factor
must be taken into
account (typically ~0.3).
Multiply wavelength with
spacing factor to attain
physical spacing distance
needed between
antennas.
❖Use a Raspberry Pi to
process and present
Images
or Models
data using open source
software.
2.Establish location
and volume of traffic
3.Prepare for
fingerprinting
4.Fingerprint and
collect data
Figure 1. Linear Array
5.Gather collection and
attribute
Results
❖Raspberry PI 3 and SD
card needed and
assembled
❖Etcher burn program for
SD card
❖Antennas in a linear or
circular array for direction
finding
❖Linear array cannot tell if
you’re in front or behind not ideal.
❖Circular array can
discern direction better,
but spikes due to
antenna positioning suggest perform linear
array first for simplicity.
❖HackRF One performs
the physical bearing
tests.
❖As in Figure 4, the aim is
to fingerprint and localize
a target by plotting
bearing lines onto a map.
Challenges,
Our main challenge is the ability
to scale this project. We may or
may not be able to conduct
attribution, but if we are unable
to, it would be an excellent
opportunity to further research.
Figure 4. Example from previous
research for localization through
bearing plotting.
6.Expand volume of
traffic if possible
Figure 2. Circular Array
Figure 3. 4 Channel Coherent
KerborosSDR
Figure 5. Team members. MIDN Ryan
Chow (left), MIDN Yixin Ye (right)
Letters of CYBER Marque & Reprisal
1/C Lucian Rombado, Eric Roque-Jackson, Hank Secrist, Addi Williams
Professor Jeffrey Kosseff, Cyber Science Department
Research Question
Two Approaches
When implementing
letters of marque and
reprisal as a tool within
the cyber realm, what
governmental, political,
legislative, and worldly
considerations need to
be made and what are
the potential outcomes?
Active Approach:
This is centered around the
argument that the
government should regulate
offensive cyber for the
private sector in a similar
fashion to letters of marque:
- The government has an
oversight committee to
qualify and license private
OCO companies.
- When a private company
gets hacked, they have the
opportunity to contact a
licensed OCO company to
conduct an operation on
their behalf.
Passive Approach:
This is centered around the
argument that the utilization
of offensive cyber is
comparable to that of home
defense. The government
will push out word to private
companies telling them they
have the right to ‘hack back’
if attacked in cyberspace.
- Eliminates the need for
letters of marque (at least in
the short term) and gives
companies the freedom to
respond to cyber attacks as
they feel is appropriate.
What is a letter of
marque?
A government license in
the Age of Sail that
authorized a private
person, known as a
privateer or corsair, to
attack and capture
vessels of a nation at war
with the issuer.
https://en.m.wikipedia.org//
wiki/Letter_of_marque
History
- Letters of Marque &
Reprisal can be traced back
to the 13th Century but
became widespread during
the Age of Sail in the 18th
Century. Upon capturing a
vessel they would be
brought to the Court and if
deemed an appropriate
target, rewarded. If not, then
there would be revocation of
the letter of marque,
forfeiture of prize money, or
award tort to the injured
vessel/crew.
Additional Considerations
- An oversight committee
would likely include
members from the NSA,
DHS, FBI, and
CYBERCOM at the
least.
- In order to qualify as a
private OCO authority,
private companies
would at least have to
adhere to NIST
standards and have
their employees pass
background checks.
The Way Forward
- Finalize our two
approaches with depth.
- Complete a draft of our
paper and prepare to
make plans for multiple
sources of
proofreading.
- Continue to update
advisor with paper
progress.
References
●
●
●
●
●
●
●
●
US Constitution
Talinn Manual
Dr. Libicki
Online Resources
Dr. Orr
Jim Barnett
Michael Schmitt
Dmitri Alperovitch
M
UPCOMING:
-
Captain Evan Field
Ron Gula
Jay Johnson, SMU
Shamoil Shipchandler, SMU
Form a team of 2-4 Midshipmen and find a
faculty advisor for your project
● 2-4 per TEAM!
● Capstone vs Independent Research
● Find a faculty advisor or Subject Matter
Expert (SME)
● You WILL provide feedback on each other
during SY401/402
Capstone Tracker for the Class of 2020
WE are NOT Passing down projects this year
Capstone vs Independent Research
Past Cyber Operations Research
& Capstone Projects
• Vulnerability Assessment on Navigation Information System
• Analysis of Russia’s Information Operations on the 2016 Election
• Detection of Malware C2 Channels using Semi-supervised Multi-label
Classification Machine Learning
• Internet of Things (IoT): Challenges and Potential for Achievement in
Resiliency
• 4GE LTE: Improvised Wireless Device Development and Defeat
• Support of Development of Cyber Wargame Best Practices
• How to Build an (Offensive) Cyber Force
• Hidden-Markov Model-Augmented Fingerprint Based Positioning
• Firmware Analysis of Solid State Drives
• Redefining War Crimes to Account for Advances in Machine Learning
• Due Process in 2017: Ethics and Technology
• Vulnerabilities in Digitally Complex Maritime Systems
HRPP
• USNA’sHuman Research Protection Program
• Long Process - should start in Spring 2020
• Work with your faculty advisor
Need to purchase items?
• Start early - evolving process
• Be reasonable
• Look for free sources with your .edu email
• AWS, Azure
• Kaggle.com for data
Reference Documents!
• Department Capstone Instruction
• 2019 Capstone Day Program
• SY401 - Fall - Updates in the
semester (10% of grade)
• SY402 - Spring - Finalize project &
poster/paper (40% of grade)
Hopper Hall, USNA’s New Cyber Building
Advancing Multidisciplinary Cyber Education
• $120M construction, break ground October 2016, target completion Spring 2020
• Will co-locate similarly “cyber-focused” academic majors:
• Cyber Operations, Computer Science, Information Technology, Computer Engineering,
Systems Engineering and Electrical Engineering
• Collaborative use of new and innovative spaces
• Will have first USNA Secure Facility (SCIF), with classrooms, labs, and a lecture hall
ACTION ITEMS - from SY401 Page
TURN IN BY 01 APR 2020
1) CAPSTONE OVERVIEW AND PROPOSAL
2) MIDN-FACULTY CAPSTONE AGREEMENT
01 APR 2020 DEADLINE
Questions?
dias@usna.edu
(443) 418-8220
Capstone Office Hours in early
MARCH in MI (evenings)
Come to Capstone Day 22 APR
SY401 Offensive Cyber Operations
• Fall Course: SY401 to mirror and end-to-end Offensive Cyber
Operation
• Infrastructure Requirements – Reconnaissance (passive/active) –
Data Analysis – Tactical Cyber Operations Planning – Initial Access
(compiling exploits) – Remote Exploitation (Metasploit) Enumeration (malware/payload development) – Post Exploitation
(obfuscation)
• Hands on based lectures to discuss the aforementioned in the
context of OCO Tools – Tactics – Techniques – Procedures via Kali
Linux and OPEN SOURCES
• Field Trips to Raytheon and NSA/ICC
• Homework (25) to measure knowledge
• Labs (15) to measure hands-on skills
required to execute each phase of an
end-to-end OCO operation (CLI&GUI)
• Exams (3) to measure competency in
handling specific OCO-based scenarios
SY402 Defensive Cyber Operations
• Spring 2019 SY402 to mirror the identify, prepare, detect, respond,
resolve model
• Understanding how:
• Virtualization and simulation support infrastructure defense
• Systems and networks are connected
• To monitor networks
• To detect network exploitation/attack
• To design, maintain, and build large networks
using the principles of extensibility and flexibility
• To handle/respond an event when it occurs
• To manage the associated risk
• Tools include VMWare, OSSEC, Snort, and Python
• Guest Lectures from Ron Gula, Martin Roesche, and a NSA CAPS STDP
Download