Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kevin S. Nauer is active.

Publication


Featured researches published by Kevin S. Nauer.


international conference on augmented cognition | 2013

Enhanced Training for Cyber Situational Awareness

Susan Marie Stevens-Adams; Armida Carbajal; Austin Silva; Kevin S. Nauer; Benjamin John Anderson; Theodore Reed; J. Chris Forsythe

A study was conducted in which participants received either tool-based or narrative-based training and then completed challenges associated with network security threats. Three teams were formed: (1) Tool-Based, for which each participant received tool-based training; (2) Narrative-Based, for which each participant received narrative-based training and (3) Combined, for which three participants received tool-based training and two received narrative-based training. Results showed that the Narrative-Based team recognized the spatial-temporal relationship between events and constructed a timeline that was a reasonable approximation of ground truth. In contrast, the Combined team produced a linear sequence of events that did not encompass the relationships between different adversaries. Finally, the Tool-Based team demonstrated little appreciation of either the spatial or temporal relationships between events. These findings suggest that participants receiving Narrative-Based training were able to use the software tools in a way that allowed them to gain a greater level of situation awareness.


international conference on augmented cognition | 2013

Instrumenting Competition-Based Exercises to Evaluate Cyber Defender Situation Awareness

Theodore Reed; Kevin S. Nauer; Austin Silva

Cyber defense exercises create simulated attack and defense scenarios used to train and evaluate incident responders. The most pervasive form of competition-based exercise is comprised of jeopardy-style challenges, which compliment a fictional cyber-security event. Multiple competitions were instrumented to collect usage statistics on a per-challenge basis. The competitions use researcher-developed challenges containing over twenty attack techniques, which generate forensic evidence and observable second-order effects. The following observations were made: (1) a group of defenders performs better than an individual; (2) situation awareness of the fictional event may be measured; (3) challenge complexity does not imply difficulty. This research introduces a novel application of system instrumentation on competition-based exercises and describes an exercise development methodology for effective challenge and competition creation. Effective challenges correctly represent difficulty and reward competitors with objective points and optional forensic clues. Effective competitions compliment training goals and appropriately improve the knowledge and skill of a competitor.


Proceedings of the Human Factors and Ergonomics Society Annual Meeting | 2014

Simulation of Workflow and Threat Characteristics for Cyber Security Incident Response Teams

Theodore Reed; Robert G. Abbott; Benjamin John Anderson; Kevin S. Nauer; Chris Forsythe

Within large organizations, the defense of cyber assets generally involves the use of various mechanisms, such as intrusion detection systems, to alert cyber security personnel to suspicious network activity. Resulting alerts are reviewed by the organization’s cyber security personnel to investigate and assess the threat and initiate appropriate actions to defend the organization’s network assets. While automated software routines are essential to cope with the massive volumes of data transmitted across data networks, the ultimate success of an organization’s efforts to resist adversarial attacks upon their cyber assets relies on the effectiveness of individuals and teams. This paper reports research to understand the factors that impact the effectiveness of Cyber Security Incidence Response Teams (CSIRTs). Specifically, a simulation is described that captures the workflow within a CSIRT. The simulation is then demonstrated in a study comparing the differential response time to threats that vary with respect to key characteristics (attack trajectory, targeted asset and perpetrator). It is shown that the results of the simulation correlate with data from the actual incident response times of a professional CSIRT.


Archive | 2015

UVI Cyber-security Workshop Workshop Analysis.

Tommie G. Kuykendall; Jacob Lee Allsop; Benjamin Robert Anderson; Marc Boumedine; Cedric Carter; Seanmichael Yurko Galvin; Oscar Gonzalez; Wellington K. Lee; Han Wei Lin; Tyler Jake Morris; Kevin S. Nauer; Beth A. Potts; Kim Thanh Ta; Jennifer Trasti; David R. White

The cybersecurity consortium, which was established by DOE/NNSA’s Minority Serving Institutions Partnerships Program (MSIPP), allows students from any of the partner schools (13 HBCUs, two national laboratories, and a public school district) to have all consortia options available to them, to create career paths and to open doors to DOE sites and facilities to student members of the consortium. As a part of this year consortium activities, Sandia National Laboratories and the University of Virgin Islands conducted a week long cyber workshop that consisted of three courses; Digital Forensics and Malware Analysis, Python Programming, and ThunderBird Cup. These courses are designed to enhance cyber defense skills and promote learning within STEM related fields.


Archive | 2012

Enhanced Training for Cyber Situational Awareness in Red versus Blue Team Exercises

Armida Carbajal; Susan Marie Stevens-Adams; Austin Silva; Kevin S. Nauer; Benjamin Robert Anderson; James C. Forsythe

This report summarizes research conducted through the Sandia National Laboratories Enhanced Training for Cyber Situational Awareness in Red Versus Blue Team Exercises Laboratory Directed Research and Development project. The objective of this project was to advance scientific understanding concerning how to best structure training for cyber defenders. Two modes of training were considered. The baseline training condition (Tool-Based training) was based on current practices where classroom instruction focuses on the functions of a software tool with various exercises in which students apply those functions. In the second training condition (Narrative-Based training), classroom instruction addressed software functions, but in the context of adversary tactics and techniques. It was hypothesized that students receiving narrative-based training would gain a deeper conceptual understanding of the software tools and this would be reflected in better performance within a red versus blue team exercise.


Archive | 2014

Factors Impacting Performance in Competitive Cyber Exercises.

Austin Silva; Jonathan T. McClain; Benjamin Robert Anderson; Kevin S. Nauer; Robert G. Abbott; James C. Forsythe


Procedia Manufacturing | 2015

Human Performance Factors in Cyber Security Forensic Analysis

Jonathan T. McClain; Austin Silva; Glory Ruth Emmanuel; Benjamin John Anderson; Kevin S. Nauer; Robert G. Abbott; Chris Forsythe


Procedia Manufacturing | 2015

Log Analysis of Cyber Security Training Exercises

Robert G. Abbott; Jonathan T. McClain; Benjamin John Anderson; Kevin S. Nauer; Austin Silva; Chris Forsythe


Archive | 2015

Automated Performance Assessment in Cyber Training Exercises.

Robert G. Abbott; Jonathan T. McClain; Benjamin Robert Anderson; Kevin S. Nauer; Austin Silva; James C. Forsythe


Archive | 2016

Sandia National Laboratories’ Cyber Tracer Program

Kevin S. Nauer; Armida Carbajal; Kim Thanh Ta; Wellington K. Lee; Seanmichael Yurko Galvin; Ben Mixon-Baca; Ann Speed; Barack Obama

Collaboration


Dive into the Kevin S. Nauer's collaboration.

Top Co-Authors

Avatar

Austin Silva

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Robert G. Abbott

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Jonathan T. McClain

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Armida Carbajal

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Chris Forsythe

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

James C. Forsythe

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Theodore Reed

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge