Interactive Visualizations for Cyber-

Similar documents
Mission-focused Interaction and Visualization for Cyber-Awareness!

ARTIFICIAL INTELLIGENCE (CS 370D)

mywbut.com Two agent games : alpha beta pruning

CSC 110 Lab 4 Algorithms using Functions. Names:

Game-playing AIs: Games and Adversarial Search I AIMA

Module 3. Problem Solving using Search- (Two agent) Version 2 CSE IIT, Kharagpur

Adversarial Search. Robert Platt Northeastern University. Some images and slides are used from: 1. CS188 UC Berkeley 2. RN, AIMA

2359 (i.e. 11:59:00 pm) on 4/16/18 via Blackboard

Shared Imagination: Creative Collaboration in Mixed Reality. Charles Hughes Christopher Stapleton July 26, 2005

Sven Wachsmuth Bielefeld University

CS 2710 Foundations of AI. Lecture 9. Adversarial search. CS 2710 Foundations of AI. Game search

CMPUT 396 Tic-Tac-Toe Game

CS 331: Artificial Intelligence Adversarial Search II. Outline

Artificial Intelligence

Future of Cities. Harvard GSD. Smart[er] Citizens Bergamo University

Set 4: Game-Playing. ICS 271 Fall 2017 Kalev Kask

The LVCx Framework. The LVCx Framework An Advanced Framework for Live, Virtual and Constructive Experimentation

CS 1571 Introduction to AI Lecture 12. Adversarial search. CS 1571 Intro to AI. Announcements

Tic-tac-toe. Lars-Henrik Eriksson. Functional Programming 1. Original presentation by Tjark Weber. Lars-Henrik Eriksson (UU) Tic-tac-toe 1 / 23

NVIDIA APEX: From Mirror s Edge to Pervasive Cinematic Destruction. Anders Caspersson, DICE Monier Maher, NVIDIA Jean Pierre Bordes, NVIDIA

MOBILIZE AND MAXIMIZE THE POTENTIAL OF P25 DIGITAL LMR

TIES: An Engineering Design Methodology and System

Ubiquitous Home Simulation Using Augmented Reality

Architecting Systems of the Future, page 1

A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS DESIGN

CS 4700: Foundations of Artificial Intelligence

Announcements. Homework 1 solutions posted. Test in 2 weeks (27 th ) -Covers up to and including HW2 (informed search)

Exploring Virtual Reality (VR) with ArcGIS. Euan Cameron Simon Haegler Mark Baird

Generating Virtual Environments by Linking Spatial Data Processing with a Gaming Engine

Project Example: wissen.de

Adversarial Search. Rob Platt Northeastern University. Some images and slides are used from: AIMA CS188 UC Berkeley

An Agent-based Heterogeneous UAV Simulator Design

MSc(CompSc) List of courses offered in

Rules of the game. chess checkers tic-tac-toe...

MOBILIZE REALTIME INFORMATION SEAMLESSLY ACROSS YOUR OPERATION CONNECT PERSONNEL MORE SAFELY AND EFFICIENTLY WITH OUR MISSION CRITICAL SOLUTIONS

Playing Games. Henry Z. Lo. June 23, We consider writing AI to play games with the following properties:

Autonomous Robotic (Cyber) Weapons?

1 Introduction. 1.1 Game play. CSC 261 Lab 4: Adversarial Search Fall Assigned: Tuesday 24 September 2013

Real-time Cooperative Behavior for Tactical Mobile Robot Teams. September 10, 1998 Ronald C. Arkin and Thomas R. Collins Georgia Tech

Distributed Robotics: Building an environment for digital cooperation. Artificial Intelligence series

Expression Of Interest

Unit 12: Artificial Intelligence CS 101, Fall 2018

Artificial Intelligence Lecture 3

Mission Space. Value-based use of augmented reality in support of critical contextual environments

Game Tree Search 1/6/17

Rules of the game. chess checkers tic-tac-toe...

2 person perfect information

TECHNOLOGY COMMONALITY FOR SIMULATION TRAINING OF AIR COMBAT OFFICERS AND NAVAL HELICOPTER CONTROL OFFICERS

Industry 4.0: the new challenge for the Italian textile machinery industry

Autonomous Control for Unmanned

Combining complementary skills, research, novel technologies.

Development of CBRN Impact Assessment Capabilities

Solving a Brew Mystery: Digital Forensics With The Dragos Platform and OSIsoft PI System

Edward Waller Joseph Chaput Presented at the IAEA International Conference on Physical Protection of Nuclear Material and Facilities

Ar#ficial)Intelligence!!

Activity-Centric Configuration Work in Nomadic Computing

Game-Playing & Adversarial Search

NVIDIA APEX: High-Definition Physics with Clothing and Vegetation. Michael Sechrest, IDV Monier Maher, NVIDIA Jean Pierre Bordes, NVIDIA

Determining the Cost Function In Tic-Tac-Toe puzzle game by Using Branch and Bound Algorithm

Global Social Casino Market: Size, Trends & Forecasts ( ) March 2018

The Mathematics of Playing Tic Tac Toe

Lecture 33: How can computation Win games against you? Chess: Mechanical Turk

Tutorial: The Web of Things

Authoring & Delivering MR Experiences

R&D Activities at the UCI Center for Computer Games and Virtual Worlds

CS 188: Artificial Intelligence

CS188: Artificial Intelligence, Fall 2011 Written 2: Games and MDP s

CS 188: Artificial Intelligence Spring Announcements

Announcements. CS 188: Artificial Intelligence Spring Game Playing State-of-the-Art. Overview. Game Playing. GamesCrafters

Adversarial Search and Game- Playing C H A P T E R 6 C M P T : S P R I N G H A S S A N K H O S R A V I

2018 Research Campaign Descriptions Additional Information Can Be Found at

Independent Communications Authority of South Africa Pinmill Farm, 164 Katherine Street, Sandton Private Bag X10002, Sandton, 2146

AGENTLESS ARCHITECTURE

AI Approaches to Ultimate Tic-Tac-Toe

COMP9414: Artificial Intelligence Problem Solving and Search

FULL MISSION REHEARSAL & SIMULATION SOLUTIONS

S&T Stakeholders Conference

Knowledge Management for Command and Control

SYNCHROPHASOR TECHNOLOGY GLOSSARY Revision Date: April 24, 2011

Conversion Masters in IT (MIT) AI as Representation and Search. (Representation and Search Strategies) Lecture 002. Sandro Spina

InSciTe Adaptive: Intelligent Technology Analysis Service Considering User Intention

Exploring Technology 8 th Grade Prof Crudele

2014 ARO-MURI Cyber Situation Awareness Review University of California at Santa Barbara, November 19,

PRESS RELEASE EUROSATORY 2018

Game Playing AI Class 8 Ch , 5.4.1, 5.5

Defense Security Service Industrial Security Field Operations

Digital Engineering Support to Mission Engineering

SENDORA: Design of wireless sensor network aided cognitive radio systems

Adversarial Search 1

Board Game AIs. With a Focus on Othello. Julian Panetta March 3, 2010

Adversarial Search: Game Playing. Reading: Chapter

Robotic Systems. Jeff Jaster Deputy Associate Director for Autonomous Systems US Army TARDEC Intelligent Ground Systems

Fault analysis framework. Ana Gainaru, Franck Cappello, Bill Kramer

Spatial Analysis with ArcGIS Pro. Krithica Kantharaj, Esri

CS 771 Artificial Intelligence. Adversarial Search

RMF Considerations for Navy Industrial Control Systems Track 4 Session 2 Jeff Johnson Naval District Washington August [XX], 2017

Game Description Logic and Game Playing

Embedded Systems Lab

Game-playing AIs: Games and Adversarial Search FINAL SET (w/ pruning study examples) AIMA

A Hybrid Risk Management Process for Interconnected Infrastructures

Transcription:

Interactive Visualizations for Cyber- Mission Awareness ARO MURI on Cyber Situation Awareness Year One Review Meeting Tobias Höllerer Four Eyes Laboratory (Imaging, Interaction, and Innovative Interfaces), Computer Science Department, Media Arts & Technology Program,

Motivation 1. Up-to-date views of the available cyber-assets 2. A comprehensive analysis of the dependencies between cyber-missions and cyber-assets, 3. An accurate understanding of the impact of cyberattacks 4. Actionable cyber-attack forecasts 5. A semantically-rich, easy-to-grasp view of the cyber- mission i status. t

Approach Scalable Visualization and Interaction Effective information and knowledge presentation by tailoring interfaces to user s information needs, context, and cognitive state. User models (e.g. war fighters, network security officers, command center personnel) Display and interaction platforms (mobile interfaces, desktop, immersive situation rooms) Our integrative framework and the data structures we share (from data modeling and acquisition, extraction and abstraction, and analysis and presentation) enables such dynamic tailoring. Enable users to interactively explore the information landscape. 3

Approach Scalable Visualization and Interaction Effective information and knowledge presentation by tailoring interfaces to user s information needs, context, and cognitive state. User models (e.g. war fighters, network security officers, command center personnel) Display and interaction platforms (mobile interfaces, desktop, immersive situation rooms) Our integrative framework and the data structures we share (from data modeling and acquisition, extraction and abstraction, and analysis and presentation) enables such dynamic tailoring. Enable users to interactively explore the information landscape. 4

Access To Data Lawrence Berkeley National Lab (LBL) logs ~4,000 users, ~12,000 internal hosts, Gbps/10Gbps Ground truth th (or at least partial) available Topology, historical DNS also available UCSB network logs and trouble tickets Set up network logging facilities with Engineering Computing Infrastructure at UCSB Netflow from switches in 3 main engineering buildings Correlation with CS support trouble tickets

User/Task Analysis Main user types: Network security officers at different levels Command center, mission planning Network security officers Most likely standard desktop computer and display, but might switch to mobile interface in extraordinary situations. Cybaware visualizations need to be easily shared / networked Officers need to maintain overview of mission timeline including assets and their use, as well as all incoming information, potential threats, their impact, and possible countermeasures. Mission planners and some officers may work in the situation room, where we assume high-end display and interaction hardware to be available. 6

User/Task Analysis Main user types: Network security officers at different levels Command center, mission planning Network security officers Most likely standard desktop computer and display, but might switch to mobile interface in extraordinary situations. Cybaware visualizations need to be easily shared / networked Officers need to maintain overview of mission timeline including assets and their use, as well as all incoming information, potential threats, their impact, and possible countermeasures. Mission planners and some officers may work in the situation room, where we assume high-end display and interaction hardware to be available. 7

Platform Evaluation Mobile Platform Desktop / Networked Collaboration Immersive Situation ti Room 8

Ebb context-aware timelines

Platform Evaluation Mobile Platform Desktop / Networked Collaboration Immersive Situation ti Room 10

Platform Evaluation Mobile Platform Desktop / Networked Collaboration Immersive Situation ti Room UCSB Allosphere 11

Desktop / Networked Collaboration Networked Graph Views WIGIs: Web-based Interactive Graph Interfaces Demo 12

Cybaware NSR NSR (Network Simulation Realm) is an immersive 3D visualization tool for cybersecurity situational awareness. Network Topologies Datasets Framework for defining and importing network topologies, registering relevant data sets, and rendering a space containing these entities in a situation room or on a desktop PC. Space Desktop PC / AlloSphere

Cybaware NSR Network Topologies Plug-ins Space Datasets A key element of our framework is a plug-in based architecture allowing users to build and deploy any number of custom visualization agents into the space. These plug-in agents can annotate and augment the network entities in the space in order to provide real-time analysis, feedback, or suggestions to the user. Desktop PC / AlloSphere

Plugin Example: Visualizing Game Theoretic Problems Goal: Visualize information about game theoretic problems to aid the decision making process Will enable interactive what-if analyses of attack scenarios Here, refer to a game as a set of moves (game can be incomplete) First step: Visualize data from game trees

Game Trees Example: Tic Tac Toe game tree Root: empty game X s turn, 9 possible x moves, 9 children per game (if game isn t over) O s turn, 8 possible moves, 8 children per game (if game isn t over) x o o x x x x... o o o x x x x o o o x o x o x 2 nd level of tree: game with 1 move Leaves: games that are done (win/lose/draw) X wins O wins Draw

Visualizing Game Trees via Treemaps Treemap: Area-efficient Areaefficient representation of tree, usually on a 2D surface Game Tree: Nodes correspond to games, leaves are completed games Corresponding treemap construction Initial region for root node... X0 X1 O1 O2 O8... X8 Divide each region horizontally for each game resulting from X s next move Divide region vertically for each game resulting from O s next move Further divisions X wins (Blue) O Wins (Orange) Draw (Black) Final look of entire treemap after coloring Once at region corresponding to moves corresponding to completed game (tree leaf), color region and stop dividing

Resulting Treemap Treemap for complete (9 moves max) Tic Tac Toe game tree (~250k leaves): Tic Tac Toe game treemap Tic Tac Toe game treemap with regions corresponding X s Xs first move highlighted (X can play moves 0 8 at this point In the game) We are interested in subregions of the treemap that correspond to available moves. This allows us to see the possible set of outcomes corresponding to a certain move.

GameTreemap plugin/app (OpenGL) Allows user to test Tic-Tac-Toe Tac Toe moves with treemap visualization Game board and data Treemaps Treemap for entire game with region corresponding to current set of moves highlighted Region of treemap corresponding to current game with current player s available moves highlighted. Current selected move is highlighted with thicker line. Region of treemap corresponding to game if current player selects current selected move. Subregions with next player s possible moves highlighted; helps identify imminent threats.

Demo in AlloSphere 3:30pm today 20

Conclusions Scalable Information Presentation Networked Graphs and Information Browsing Mission Control in Immersive Situation Rooms Preparatory Work on Mobile Platforms Interfaces will Scale with Data UCSB network logs and trouble tickets Lawrence Berkeley National Lab (LBL) logs Support for Interactive Situational Awareness Resources Overview Adversary Alertness What-If Scenarios 21

22