skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Science and Engineering of Cybersecurity by Uncertainty quantification and Rigorous Experimentation (SECURE) (Final Report)

Abstract

This report summarizes the activities performed as part of the Science and Engineering of Cybersecurity by Uncertainty quantification and Rigorous Experimentation (SECURE) Grand Challenge LDRD project. We provide an overview of the research done in this project, including work on cyber emulation, uncertainty quantification, and optimization. We present examples of integrated analyses performed on two case studies: a network scanning/detection study and a malware command and control study. We highlight the importance of experimental workflows and list references of papers and presentations developed under this project. We outline lessons learned and suggestions for future work.

Authors:
 [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1]
  1. Sandia National Laboratories (SNL), Albuquerque, NM, and Livermore, CA (United States)
Publication Date:
Research Org.:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandia National Lab. (SNL-CA), Livermore, CA (United States)
Sponsoring Org.:
USDOE National Nuclear Security Administration (NNSA); USDOE Laboratory Directed Research and Development (LDRD) Program
OSTI Identifier:
1821322
Report Number(s):
SAND-2021-11719
699527
DOE Contract Number:  
NA0003525
Resource Type:
Technical Report
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING

Citation Formats

Pinar, Ali, Tarman, Thomas, Swiler, Laura Painton, Gearhart, Jared, Hart, Derek, Vugrin, Eric, Cruz, Gerardo, Arguello, Bryan, Geraci, Gianluca, Debusschere, Bert, Hanson, Seth, Outkin, Alexander, Thorpe, Jamie, Hart, William, Sahakian, Meghan, Gabert, Kasimir, Glatter, Casey, Johnson, Emma, and Punla-Green, She'ifa. Science and Engineering of Cybersecurity by Uncertainty quantification and Rigorous Experimentation (SECURE) (Final Report). United States: N. p., 2021. Web. doi:10.2172/1821322.
Pinar, Ali, Tarman, Thomas, Swiler, Laura Painton, Gearhart, Jared, Hart, Derek, Vugrin, Eric, Cruz, Gerardo, Arguello, Bryan, Geraci, Gianluca, Debusschere, Bert, Hanson, Seth, Outkin, Alexander, Thorpe, Jamie, Hart, William, Sahakian, Meghan, Gabert, Kasimir, Glatter, Casey, Johnson, Emma, & Punla-Green, She'ifa. Science and Engineering of Cybersecurity by Uncertainty quantification and Rigorous Experimentation (SECURE) (Final Report). United States. https://doi.org/10.2172/1821322
Pinar, Ali, Tarman, Thomas, Swiler, Laura Painton, Gearhart, Jared, Hart, Derek, Vugrin, Eric, Cruz, Gerardo, Arguello, Bryan, Geraci, Gianluca, Debusschere, Bert, Hanson, Seth, Outkin, Alexander, Thorpe, Jamie, Hart, William, Sahakian, Meghan, Gabert, Kasimir, Glatter, Casey, Johnson, Emma, and Punla-Green, She'ifa. 2021. "Science and Engineering of Cybersecurity by Uncertainty quantification and Rigorous Experimentation (SECURE) (Final Report)". United States. https://doi.org/10.2172/1821322. https://www.osti.gov/servlets/purl/1821322.
@article{osti_1821322,
title = {Science and Engineering of Cybersecurity by Uncertainty quantification and Rigorous Experimentation (SECURE) (Final Report)},
author = {Pinar, Ali and Tarman, Thomas and Swiler, Laura Painton and Gearhart, Jared and Hart, Derek and Vugrin, Eric and Cruz, Gerardo and Arguello, Bryan and Geraci, Gianluca and Debusschere, Bert and Hanson, Seth and Outkin, Alexander and Thorpe, Jamie and Hart, William and Sahakian, Meghan and Gabert, Kasimir and Glatter, Casey and Johnson, Emma and Punla-Green, She'ifa},
abstractNote = {This report summarizes the activities performed as part of the Science and Engineering of Cybersecurity by Uncertainty quantification and Rigorous Experimentation (SECURE) Grand Challenge LDRD project. We provide an overview of the research done in this project, including work on cyber emulation, uncertainty quantification, and optimization. We present examples of integrated analyses performed on two case studies: a network scanning/detection study and a malware command and control study. We highlight the importance of experimental workflows and list references of papers and presentations developed under this project. We outline lessons learned and suggestions for future work.},
doi = {10.2172/1821322},
url = {https://www.osti.gov/biblio/1821322}, journal = {},
number = ,
volume = ,
place = {United States},
year = {2021},
month = {9}
}