24
1 This Briefing is: UNCLASSIFIED Aha! Analytics 2278 Baldwin Drive Phone: (937) 477-2983, FAX: (866) 450-3812 Semantics Based Threat Assessment Semantics Based Threat Assessment and and Threat Knowledge Threat Knowledge Representation/Applications Representation/Applications for for Intelligence, Defense, Intelligence, Defense, and and Homeland Security Homeland Security (May 10) (May 10) Dave Lush, SME Aha! Analytics

Dave Lush, SME Aha! Analytics

  • Upload
    wayde

  • View
    45

  • Download
    0

Embed Size (px)

DESCRIPTION

Semantics Based Threat Assessment and Threat Knowledge Representation/Applications for Intelligence, Defense, and Homeland Security (May 10). Dave Lush, SME Aha! Analytics. Contents. Purpose Background Statement of the Need Implications Proposed Approach - PowerPoint PPT Presentation

Citation preview

Page 1: Dave Lush, SME Aha! Analytics

1

This Briefing is:UNCLASSIFIED

Aha! Analytics2278 Baldwin Drive

Phone: (937) 477-2983, FAX: (866) 450-3812

Semantics Based Threat AssessmentSemantics Based Threat Assessment and and

Threat Knowledge Representation/Applications Threat Knowledge Representation/Applications for for

Intelligence, Defense, Intelligence, Defense, and and

Homeland Security Homeland Security

(May 10)(May 10) Dave Lush, SMEAha! Analytics

Page 2: Dave Lush, SME Aha! Analytics

2

UNCLASSIFIED

UNCLASSIFIED

ContentsPurposeBackground Statement of the NeedImplicationsProposed ApproachSemantic Apps/Technologies PrimerOntology Driven Threat Assessment and Threat

Knowledge Representation/ApplicationsThe Key Semantic Technologies RevisitedMore ImplicationsSummary/Conclusions

Page 3: Dave Lush, SME Aha! Analytics

3

UNCLASSIFIED

UNCLASSIFIED

Purpose(s)

To communicate some ideas/concepts

regarding

Semantics Based

Threat Assessment and Threat Knowledge Representation/Applications

for

Intelligence, Defense, and Homeland Security

Page 4: Dave Lush, SME Aha! Analytics

4

UNCLASSIFIED

UNCLASSIFIED

Quick BackgroundBreath Taking Change!

Threat

Requirements

Technology

Complexity

Collective Externalized Threat Knowledge Not In Good Shape It Is Quite Sub-Optimal for Discovery and Extraction of

Specific Relevant Knowledge Regarding the Threat

It Is Not Sufficiently Operationalized

Lots of Envisioning and Initiatives Going On But No Break Through Yet

Page 5: Dave Lush, SME Aha! Analytics

5

UNCLASSIFIED

UNCLASSIFIED

Statement of Core Need Regarding Threat Data, Info, Knowledge

National Security Players (including machines)

Must Be Able to

Quickly Receive, Discover, Access, and Acquire the

Specific Pieces

of

Threat Data, Information, Knowledge

That They Need and

That They Have Security Clearance Level to Receive

Page 6: Dave Lush, SME Aha! Analytics

6

UNCLASSIFIED

UNCLASSIFIED

Implications in Terms of Major Knowledge Mgt and Sharing Requirements:

Intelligence, DoD, and DHS Elements Must Capture and Manage Complete Digital Characterizations of Simple and Complex Threat Objects, Situations, and Associated Objects/Concepts

Must Capture These Characterizations With Requisite Structure, Detail, and Data Type

Must Capture and Manage the Threat Knowledge In Product Neutral Form So It Can Serve As the Single Source and Be Readily Re-purposed (Multi-channel, Single Source)

Must Capture and Manage the Requisite Meta-data at the Attribute and Attribute Value Level In Order To Enable: Automated Distribution of Data and Derived Products to Different Security

Domains

Rich Content Tagging of the Data and Derived Dynamic Products

Page 7: Dave Lush, SME Aha! Analytics

7

UNCLASSIFIED

UNCLASSIFIED

Implications in Terms of Major Knowledge Mgt and Sharing Requirements:

Must Develop, Capture, Manage, and Apply Externalized (Digital) Machine Readable Conceptual Models/Instantiations (Ontologies) of the Threat Objects & Concepts In Order to Provide a Common Conceptual Foundation for Information (Database)

Models, Engineering Models, and Content Mark-up

To Capture Structured Threat Characterizations in Machine Readable Form Conducive to Application of Semantic Technologies

Must Develop, Capture, and Manage Dynamic Product Components (and Associated Meta-data) That Draw Upon the Pre-positioned Threat Characterizations, Manipulate the Data in a Specified Way, and Render a Component of a Product Presentation

Must Develop, Capture, Manage Intelligence Product Portlets Which Are Made Up of the Components Cited Above and When Invoked Execute the Components to Provide Access to, Delivery of Topical and Specific (Operationalized) Intelligence

Page 8: Dave Lush, SME Aha! Analytics

8

UNCLASSIFIED

UNCLASSIFIED

Proposed Approach Significant Application of Semantic Technologies

They Are Ready for Prime Time

Technologies Include: RDF, SPARQL, OWL, SPIN

Ontology Driven Threat Assessment (ODTA) Formulation and Constant Refinement of Conceptual Model of the Threat Under Study Is

at Center of the Assessment

Perhaps Based on Top Level System Model (SysML) Proposed by OMG (http://www.omgsysml.org/ )

Ontology Based Threat Representation Threat Entity Is Specified With an Ontology Expressed in OWL

Ontology Authored Via Graphical Ontology Authoring/Editing Tool e.g. Top Quadrant Composer

Capture/Management of Simple Intelligence Facts Captured As RDF Triples (Subject-Predicate-Object)

Managed Via RDF Triple Store e.g. Oracle RDF

Semantic Query and Inferencing Application of SPARQL and SPARQL Inferencing Notation (SPIN) (http://spinrdf.org/)

Enables Powerful Query and Inferencing Against the Threat Ontologies and Intelligence Facts

Page 9: Dave Lush, SME Aha! Analytics

9

UNCLASSIFIED

UNCLASSIFIED

Some Definitions/Observations What’s an Ontology?:

In general, a specification of a conceptualization.

More specifically, an externalized conceptual model expressed in terms of concepts and relationships between concepts.

Even more specifically, a conceptual model of a piece of reality of interest expressed in terms concepts, things, and relationships between concepts and things.

Ontologies and Associated Semantic Artifacts Expressed in the Appropriate Machine Readable Language Enable Computer Applications to Leverage Semantics e.g. Semantically Enriched Query

Data Integration at the Semantic Level

Operationalized Intelligence Via Ontologies of the Threat

Page 10: Dave Lush, SME Aha! Analytics

10

UNCLASSIFIED

UNCLASSIFIED

Semantic Applications Semantic Applications Leverage/Apply Machine Readable

Semantics and Semantic Technologies to Achieve Their Objectives

The Core Constructs for Semantic Technologies/Applications Are the Relationship Graph, Taxonomy, and Ontology

Semantic Applications Use Machine Readable Relationship Graphs, Taxonomies, and Ontologies to Express and Leverage Relevant Semantics

Semantics Are Expressed As Subject-Predicate-Property (Object) Triples Using RDF or As Classes/Instances and Associated Relationships and Attributes Using OWL which is an expansion of RDF. RDF and OWL Are Ultimately XML-based Languages

RDF Triples and OWL Ontologies Are Captured and Managed Via RDF Triple Store Capability (e.g. Oracle 11g Spatial)

RDF and OWL Databases Are Queried Via SPARQL Protocol and RDF Query Language (SPARQL)

Page 11: Dave Lush, SME Aha! Analytics

11

UNCLASSIFIED

UNCLASSIFIED

The Core Semantic Technologies Graphs/Taxonomy/Ontology Constructs

RDF Language for Expressing Machine Readable Graphs/Taxonomies

OWL Language for Expressing Machine Readable Ontologies

Authoring/Editing Tools for RDF/OWL

RDF Triple Store (e.g. Oracle 11g Spatial, AllegroGraph))

Semantic Query (SPARQL)

Rules and Inferencing e.g. SPARQL Inferencing Notation (SPIN)

Semantic Applications Frameworks, Platforms e.g. Java Jena, the Top Braid suite

RDF (Entity/Relationship) Extraction

Page 12: Dave Lush, SME Aha! Analytics

12

UNCLASSIFIED

UNCLASSIFIED

Ontology Based Intel Analysis & Threat Characterization

CONCEPTUAL MODEL

EXTERNALIZEDMACHINE READABLEINFORMATION MODEL

ORONTOLOGY

A Major Challenge of the New IntelAnalyst Tradecraft Is to Externalize and Formalize The Analysts’ Conceptual Models to Become Machine Readable Ontologies or Information Models Which Can “Drive” Intel Knowledge Mgt and Virtual Production

ANALYST

Incoming Observations and

Data

Cognitive andOntology

DevelopmentProcesses

Externalizing Conceptual Models

ONTOLOGY DEVELOPMENTMETHODOLOGIES

ANDTOOL(S)

Figure 6: Externalizing Conceptual Models

Page 13: Dave Lush, SME Aha! Analytics

13

UNCLASSIFIED

UNCLASSIFIED

Conceptual Model of the Threat(the SysML Template)

PurposesCapabilities

Vulnerabilities

Structure(structural models)

Behavior(behavioral models)

Parametrics(physics/math)

Conceptual Model of the Threat

Signatures

Page 14: Dave Lush, SME Aha! Analytics

14

UNCLASSIFIED

UNCLASSIFIED

Figure 1a: C-map of a Conceptual Model of the Threat

SysML consistentgeneric concept map for a threat system

SysML is OMG systemmodeling languagebuilt upon UML

Page 15: Dave Lush, SME Aha! Analytics

15

UNCLASSIFIED

UNCLASSIFIED

The Threat Model and Its Instantiation

+

+

Key Findings (Purposes

CapabilitiesVulnerabilities)

StructureBehavior

Parametrics

Instantiated Model of the Threat

Assumptions&

Constraints

=

Figure 2: Instantiation of the Conceptual Model

Source Data &Engineering

Models &Other Tools

Signatures

Arguments&

Rationales

PurposesCapabilities

VulnerabilitiesStructure Behavior

Parametrics

Conceptual Model of the Threat

Signatures

Page 16: Dave Lush, SME Aha! Analytics

16

UNCLASSIFIED

UNCLASSIFIED

Structured Threat Assessment

InstantiatedConceptual

Model

ConceptualModel

KeyAssumptions

Structured Threat Assessment

Arguments&

RationalesSourceCitations

KeyIntelligenceQuestions

Page 17: Dave Lush, SME Aha! Analytics

17

UNCLASSIFIED

UNCLASSIFIED

Page 18: Dave Lush, SME Aha! Analytics

18

UNCLASSIFIED

UNCLASSIFIED

Model Driven Analysis & Knowledge Capture

A Major Challenge of the New Intel Analyst Tradecraft Is to Externalize and Formalize The Analysts’ Conceptual

Models to Become Machine Readable Ontologies or Information Models Which Can “Drive” Intel Knowledge Mgt and

Virtual Production

ANALYST

Incoming Observations and

Data

Cognitive andConceptual Model Development

Processes

CONCEPTUAL MODEL DEV METHODOLOGIES AND TOOL(S)

ANALYST ANALYST INTERNALIZEDCONCEPTUAL MODEL

Collaborationand

Peer Review

Figure 4: Externalizing Conceptual Models

ANALYSIS AND CONCEPTUAL MODEL INSTANTIATION

METHODS/TOOL(S)

Threat Knowledge Base

A core element of a threat assessment is the conceptual model of the threat.

The model is “instantiated” with data and metadata derived from the source INT data and results of analysis of that data.

The instantiated model is used to ascertain key facts and assertions regarding the nature of the threat.

Structured Threat Assessment

Key Intelligence QuestionsKey AssumptionsSourcesConceptual ModelInstantiated Conceptual ModelArguments/Rationales

Conceptual Model(Ontology) &Instantiation

StructureBehaviorParametricsCapabilitiesSignatures

Page 19: Dave Lush, SME Aha! Analytics

19

UNCLASSIFIED

UNCLASSIFIED

Ever Increasing Structure

Key Observations:

The knowledge extraction processes extract structured knowledge from unstructured input streams.

The knowledge capture processes capture structured knowledge that results from analysis/assessment.

The more our knowledge of the threat is captured and managed in highly structured and labeled form the more flexibility and nimbleness we have when it comes to getting the knowledge to the right customer at the right time and in the right form.

So, it would behoove us to cause our knowledge of the threat to become more and more structured as we move from exploitation and knowledge extraction, through analysis/assessment, to knowledge capture and management.

Unstructured textual information must be accommodated in the resultant threat knowledge but it should be present within the context of an appropriately conceived and structured information model.

less structure more structure

Analysis&

Assessment

DataExploitation

&KnowledgeExtraction

Exploited Data&

ExtractedKnowledge

AnalysisResults

Dynamic Products

&Portlets

Structured LabeledThreat

Knowledge

ConceptualModeling

& Knowledge

Capture

DigitalProduction

&Dissemination

Page 20: Dave Lush, SME Aha! Analytics

20

UNCLASSIFIED

UNCLASSIFIED

Threat Ontology, Intel Facts, and the SPIN Stack This Is About Application of Semantic Technologies to Threat

Assessment, Capture, and Application (Query and Inferencing) RDF, RDF Triple Extraction/Management, Web Ontology Language (OWL), SPARQL

Protocol and RDF Query Language (SPARQL), and SPARQL Inferencing Notation (SPIN)

The Basic Process Capture Threat Assessments Via Ontologies Expressed in OWL

Facilitate Ontology Population Via RDF Extraction from Traditional Intel Documents and Export From RDBMS Data Bases

Capture/Store/Manage Simple Intelligence Facts Via RDF and RDF Triple Store

Deploy and Apply the SPARQL Inferencing Notation (SPIN) Technology Stack

Execute SPARQL Queries and Inferences Against the Threat Ontology and the Related Intelligence Facts Using the SPIN Stack

The Basic Benefits Threat Is Precisely Defined in Machine Readable Form Via Open Standards

Threat Knowledge Easily Queried and Navigated to Acquire Specific Threat Knowledge

Threat Characterization Combined with Intelligence Facts When Processed by SPIN Can Yield Implicit or Intrinsic Knowledge Not Readily Apparent

Ontology Based Threat Assessments, SPARQL, and SPIN Enable Machine to Machine Intel Support to Ops

Page 21: Dave Lush, SME Aha! Analytics

21

UNCLASSIFIED

UNCLASSIFIED

Figure 3: SPINing Threat Ontologies

SAVANTKB

Extract/ExportThreat

Characterization

Traditional Threat KB

(Doc & RDBMS)

ThreatOntology

KB (RDF/OWL)SPIN Stack

(RDF)

Acquire & MediateThreat Knowledge(SPARQL, XSLT)

Policy Maker Client

Analyst KnowledgeEngineer

Threat Ontology and the SPIN StackCan Operationalize Intelligence

Intel FactKB

(RDF)

Capture Intelligence

Facts

Develop Threat Ontology

DB Admin

Intel ApplicationIn

OperationalContext

Ops Client

machine to machine

These storescollectively constitute

operationalized intelligence

Modify & ExtendSPINStack

SPIN (SPARQL Inferencing Notation)

Page 22: Dave Lush, SME Aha! Analytics

22

UNCLASSIFIED

UNCLASSIFIED

The Key Technologies Revisted Concept Mapping and System Modeling Tools

XML, RDF/RDFS, OWL

RDF Triple Store

SPARQL Protocol and RDF Query Language (SPARQL)

SPARQL Inferencing Notation (SPIN)

Semantic Application Development Platform (e.g. Top Braid)

Page 23: Dave Lush, SME Aha! Analytics

23

UNCLASSIFIED

UNCLASSIFIED

More Implications Externalized Conceptual Models of the Threat Are at the Core of

the Threat Assessment; This Becomes Core Tenant of Analyst Tradecraft

Threat Concepts Expressed As Ontologies and Supporting Assertions/Facts Using RDF and OWL and Appropriate Authoring/Editing Tools

Requires a Paradigm Shift and Development of Analyst Competencies/Skills in Conceptual Modeling and Ontology Development

Several Very Important Benefits Development/Refinement of Externalized Conceptual Model of the Threat

Throughout the Assessment Facilitates Communication, Collaboration, Vetting, Completeness, Accuracy, Clarity, etc.

Threat Is Represented Via Highly Structured , Standards Based, Product Neutral, Machine Readable Construct Which Can Be Readily Queried and Which Can Drive Inferencing; Enables Rapid Acquisition of Specific Knowledge Chunks/Facts

Page 24: Dave Lush, SME Aha! Analytics

24

UNCLASSIFIED

UNCLASSIFIED

Conclusions/Summary The Time Has Come to Apply Semantic Technologies to Threat

Assessment, Threat Knowledge Representation, and Associated Applications

Threat Knowledge Can Be Represented in Machine Readable Form Enabling Powerful Query, Inferencing, and Mediation Capabilities and Basically Operationalizing Intelligence

The Same Technologies Can Also Be Used in AFISRC2 Applications Using Threat and ISRC2 Ontologies

There Are Many Possibilities!