Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Suzanne P. Hassell is active.

Publication


Featured researches published by Suzanne P. Hassell.


international carnahan conference on security technology | 2010

Cyber defense Network Maneuver Commander

Paul F. Beraud; Alen Cruz; Suzanne P. Hassell; Juan E. Sandoval; Jeffrey J. Wiley

Network Maneuver Commander (NMC) is a research project to develop a prototype cyber command and control (C2) system that maneuvers network-based elements preemptively, and to develop performance metrics to be used for the evaluation of cyber dynamic defense solutions. The Network Maneuver Commander addresses the gap area between active information operations & reactive information assurance defenses, by focusing on the introduction of artificial diversity of hardware platforms, operating systems, IP addresses and hypervisors. NMC also establishes metrics to determine the benefit of these defensive techniques. The goals of the research were to increase the investment an attacker must make to succeed, increase the exposure of an attacker to detection as the attacker is forced to out-maneuver target reconfigurations, increase the uncertainty of the success of the attack, increase the survivability in the presence of attacks, and to define metrics associated with cyber operations for dynamic defense.


military communications conference | 2011

Using cyber maneuver to improve network resiliency

Paul F. Beraud; Alen Cruz; Suzanne P. Hassell; Sonny Meadows

The Net Maneuver Commander (NMC) is a research prototype cyber command and control (C2) system which constantly maneuvers network-based elements preemptively to improve network resiliency in a cyber compromised environment. Similar in concept to a frequency hopping radio, Network Maneuver Commander transparently and preemptively provides a moving target defense to evade attack. It utilizes randomization algorithms for maneuver destination selection, providing randomized synthetic diversity of hardware platforms, operating systems and network segments. Network Maneuver Commander also improves resiliency through random and pre-emptive application and platform reconstitution with check-pointing, reloading and resetting, and through the support of deception and containment of malware.


military communications conference | 2010

Measurement, identification and calculation of cyber defense metrics

Juan E. Sandoval; Suzanne P. Hassell

This paper presents performance metrics to be used for evaluation of cyber dynamic defense solutions. Currently, there are no standard, industry-defined metrics or benchmarks for evaluating cyber security architectures and systems for dynamic defense. These systems have relied instead on a layered, “defense in depth” approach, where the only measurement made is the number of defenses. In order to characterize the performance of cyber defense solutions, a variety of metrics need to be defined and captured based on observable effects on both cyber attacks and defenses. By establishing these metrics, the benefit each individual layer provides to an overall defensive solution can be determined, allowing system designers to select the most effective suite of defensive techniques. The metrics presented were formulated using a discrete event simulation of dynamic defense solutions. The focus of this simulation was to assess the increased cost to cyber attackers, where cost is based in time. Metrics are captured from the perspective of the defender, as well as that of the attacker. Collection of data supporting computation of the metrics will be shown in a discrete event simulation environment, as well as recommendations for network locations and equipment that can be used to collect these metrics in a notional network architecture.


military communications conference | 2012

Evaluating network cyber resiliency methods using cyber threat, Vulnerability and Defense Modeling and Simulation

Suzanne P. Hassell; Paul F. Beraud; Alen Cruz; Gangadhar Ganga; Steve R Martin; Justin W. Toennies; Pablo Vazquez; Gary Wright; Daniel Gomez; Frank Pietryka; Niraj Srivastava; Travis C. Hester; David Hyde; Brian Mastropietro

This paper describes a Cyber Threat, Vulnerability and Defense Modeling and Simulation tool kit used for evaluation of systems and networks to improve cyber resiliency. This capability is used to help increase the resiliency of networks at various stages of their lifecycle, from initial design and architecture through the operation of deployed systems and networks. Resiliency of computer systems and networks to cyber threats is facilitated by the modeling of agile and resilient defenses versus threats and running multiple simulations evaluated against resiliency metrics. This helps network designers, cyber analysts and Security Operations Center personnel to perform trades using what-if scenarios to select resiliency capabilities and optimally design and configure cyber resiliency capabilities for their systems and networks.


Archive | 2011

Cyber Attack Analysis

Juan E. Sandoval; Nicholas I. Sapankevych; Armando J. Santos; Suzanne P. Hassell


Archive | 2013

Method and device for simulating network resiliance against attacks

Suzanne P. Hassell; Paul F. Beraud; Alen Cruz; Gangadhar Ganga; Brian Mastropietro; Travis C. Hester; David Hyde; Justin W. Toennies; Stephen R. Martin; Frank Pietryka; Niraj Srivastava


Archive | 2009

Specifying integration points of a system-of-systems

Jason M. Surprise; Kristina L. Stewart; Stephen P. Marra; Suzanne P. Hassell


Archive | 2013

Cyber analysis modeling evaluation for operations (cameo) simulation system

Suzanne P. Hassell; Iii Paul F. Beraud; Alen Cruz; Gangadhar Ganga; Brian Mastropietro; Travis C. Hester; David Hyde; Justin W. Toennies; Stephen R. Martin; Frank Pietryka; Niraj Srivastava


Insight | 2015

Using DoDAF and Metrics for Evaluation of the Resilience of Systems, Systems of Systems, and Networks Against Cyber Threats

Suzanne P. Hassell; Randy Case; Gangadhar Ganga; Steve R Martin; Stephen P. Marra; Christopher R. Eck


Archive | 2011

System, method, and software for analyzing the execution performance of an application in a distributed computing environment based on application characteristics

Suzanne P. Hassell; James D. Janscha; Jeffrey J. Wiley; Paul F. Beraud; Alen Cruz; Armando J. Santos; Juan E. Sandoval; Nicholas I. Sapankevych; Frederick E. Bass

Collaboration


Dive into the Suzanne P. Hassell's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Frank Pietryka

Raytheon Space and Airborne Systems

View shared research outputs
Top Co-Authors

Avatar

Niraj Srivastava

Raytheon Space and Airborne Systems

View shared research outputs
Researchain Logo
Decentralizing Knowledge