SlideShare a Scribd company logo
1 of 15
Download to read offline
Vulnerability Requirements in the
RAN
Goal setting and testing via computer models
Kurt Pudniks
Vulnerability Technology Manager
Total Ship Survivability
DNPS – NAVSYSCOM – RAN
27/03/09
Technical Standard
 CNE sponsors the DEF AUST 5000 documents
 Materiel Requirements Set (MRS)
 Defines the following areas:
- Scope
- Definitions
- Background
- Functional Performance Requirements
- Constraints
- Deliverables
Technical Standard
 Vol 2 Pt 3 is the Platform Vulnerability
MRS
 Defines the vulnerability goals in terms of
retained capabilities
 Mandates the modeling approach
- Note this is not prescriptive to a particular software
package, but tries to talk in general modeling terms
- Could it be done by hand?
Goal Framework
 The vulnerability goals rely on a modeling framework
 The framework is meant to be general
 Makes use of general ideas such as:
1. Nodes
2. Links
3. Fault trees
4. Coarse and specific volume based damage scenarios
(damage templates)
5. Capabilities vs. functions
6. Data mapping and lists (spreadsheets or databases)
7. Percentages and colour coded thresholds
(communication of results)
Nodes and Links [1 & 2]
Fault Tree [3]
Coarse Damage Scenarios [4]
Specific Damage Scenarios [4]
Capabilities vs. Functions [5]
 A capability is defined as:
- Capability is the power to achieve a desired operational effect in a
nominated environment, within a specified time, and to sustain
that effect for a designated period.
- Capability is generated by Fundamental Inputs to Capability
comprising organisation, personnel, collective training, major
systems, supplies, facilities, support, command and management.
an action the ship can do
- Track targets
- Fire weapons
- Sustain
- Mobility
- Emergency Evacuation
- Specialist capabilities
Capabilities vs. Functions [5]
 A function is defined as:
- An action that occurs within the ship or an action that the
ship performs on the external environment.
- A function is a conceptual idea, with no tangible physical
equivalent
- Propulsion
- Steering
- Buoyancy
- Internal Communications
- External Communications
- Sensors (if any)
- Weapons (if any)
- Combat System (if any)
Data Mapping [6]
 Functions are mapped onto nodes
 Capabilities are mapped onto functions
 In total there are only three levels of data, and
two interfaces between the three levels
- NODE
- NODE / FUNCTION INTERFACE (MAP)
- FUNCTION
- FUNCTION / CAPABILITY INTERFACE (MAP)
- CAPABILITY
Retained Capability % Levels [7]
 Damage is binary
 However multiple nodes can have one function
 Therefore a function value can be between 0 and 1
in n steps (n = number of functions)
- Green shall indicate x = 100%
- Yellow shall indicate 50% < x < 100%.
- Orange shall indicate 0% < x <= 50%.
- Red shall indicate 0%
 The capability will adopt the most conservative
colour (least or most red!)
Retained Capability % Levels [7]
Vulnerability Study - A to Z
 Build ship model with nodes and links
- Assign functions to nodes
- Assign capabilities to functions
 Create threat volumes
- coarse zones
- specific volumes
 “Intersect” the threat with the ship
 Run fault tree analysis to find cascading
disablement due to damaged systems
 Summarise results in a retained capability list
Minimum Retained Capabilities

More Related Content

What's hot (6)

2021 06-02-tabnet
2021 06-02-tabnet2021 06-02-tabnet
2021 06-02-tabnet
 
ACES_Journal_February_2012_Paper_07
ACES_Journal_February_2012_Paper_07ACES_Journal_February_2012_Paper_07
ACES_Journal_February_2012_Paper_07
 
1801.06434
1801.064341801.06434
1801.06434
 
3D-DRESD DReAMS
3D-DRESD DReAMS3D-DRESD DReAMS
3D-DRESD DReAMS
 
Vlsi physical design automation on partitioning
Vlsi physical design automation on partitioningVlsi physical design automation on partitioning
Vlsi physical design automation on partitioning
 
Mlp mixer image_process_210613 deeplearning paper review!
Mlp mixer image_process_210613 deeplearning paper review!Mlp mixer image_process_210613 deeplearning paper review!
Mlp mixer image_process_210613 deeplearning paper review!
 

Viewers also liked

Eenergeia-Energietransitie vraagt om flexibele en multi
Eenergeia-Energietransitie vraagt om flexibele en multiEenergeia-Energietransitie vraagt om flexibele en multi
Eenergeia-Energietransitie vraagt om flexibele en multi
Robert Berends
 
fault_level_study_ITEE_March_2012
fault_level_study_ITEE_March_2012fault_level_study_ITEE_March_2012
fault_level_study_ITEE_March_2012
Kurt Pudniks
 

Viewers also liked (8)

wetlands-KP
wetlands-KPwetlands-KP
wetlands-KP
 
CV-DOC-2015
CV-DOC-2015CV-DOC-2015
CV-DOC-2015
 
Eenergeia-Energietransitie vraagt om flexibele en multi
Eenergeia-Energietransitie vraagt om flexibele en multiEenergeia-Energietransitie vraagt om flexibele en multi
Eenergeia-Energietransitie vraagt om flexibele en multi
 
Saleem Raza Channa (saleemrazachanna85@gmail.com).
Saleem Raza Channa (saleemrazachanna85@gmail.com).Saleem Raza Channa (saleemrazachanna85@gmail.com).
Saleem Raza Channa (saleemrazachanna85@gmail.com).
 
ANAELE JOHN VITUS
ANAELE JOHN VITUSANAELE JOHN VITUS
ANAELE JOHN VITUS
 
fault_level_study_ITEE_March_2012
fault_level_study_ITEE_March_2012fault_level_study_ITEE_March_2012
fault_level_study_ITEE_March_2012
 
Integumentary System
Integumentary SystemIntegumentary System
Integumentary System
 
Saleem.C.v
Saleem.C.vSaleem.C.v
Saleem.C.v
 

Similar to Vulnerability Requirements in the RAN

Raminder kaur presentation_two
Raminder kaur presentation_twoRaminder kaur presentation_two
Raminder kaur presentation_two
ramikaurraminder
 
The Network Research Project (NRP) expectations are to explain.docx
The Network Research Project (NRP) expectations are to explain.docxThe Network Research Project (NRP) expectations are to explain.docx
The Network Research Project (NRP) expectations are to explain.docx
dennisa15
 
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Derryck Lamptey, MPhil, CISSP
 

Similar to Vulnerability Requirements in the RAN (20)

BARRACUDA, AN OPEN SOURCE FRAMEWORK FOR PARALLELIZING DIVIDE AND CONQUER ALGO...
BARRACUDA, AN OPEN SOURCE FRAMEWORK FOR PARALLELIZING DIVIDE AND CONQUER ALGO...BARRACUDA, AN OPEN SOURCE FRAMEWORK FOR PARALLELIZING DIVIDE AND CONQUER ALGO...
BARRACUDA, AN OPEN SOURCE FRAMEWORK FOR PARALLELIZING DIVIDE AND CONQUER ALGO...
 
HalifaxNGGs
HalifaxNGGsHalifaxNGGs
HalifaxNGGs
 
Enhancing Performance and Fault Tolerance of Hadoop Cluster
Enhancing Performance and Fault Tolerance of Hadoop ClusterEnhancing Performance and Fault Tolerance of Hadoop Cluster
Enhancing Performance and Fault Tolerance of Hadoop Cluster
 
Distributed Monte Carlo Feature Selection: Extracting Informative Features Ou...
Distributed Monte Carlo Feature Selection: Extracting Informative Features Ou...Distributed Monte Carlo Feature Selection: Extracting Informative Features Ou...
Distributed Monte Carlo Feature Selection: Extracting Informative Features Ou...
 
Karl Hedrick
Karl HedrickKarl Hedrick
Karl Hedrick
 
Apache Spark: What? Why? When?
Apache Spark: What? Why? When?Apache Spark: What? Why? When?
Apache Spark: What? Why? When?
 
Next generation analytics with yarn, spark and graph lab
Next generation analytics with yarn, spark and graph labNext generation analytics with yarn, spark and graph lab
Next generation analytics with yarn, spark and graph lab
 
Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)	Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)
 
Raminder kaur presentation_two
Raminder kaur presentation_twoRaminder kaur presentation_two
Raminder kaur presentation_two
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
 
Exploring Emerging Technologies in the Extreme Scale HPC Co-Design Space with...
Exploring Emerging Technologies in the Extreme Scale HPC Co-Design Space with...Exploring Emerging Technologies in the Extreme Scale HPC Co-Design Space with...
Exploring Emerging Technologies in the Extreme Scale HPC Co-Design Space with...
 
Feature Selection Techniques for Software Fault Prediction (Summary)
Feature Selection Techniques for Software Fault Prediction (Summary)Feature Selection Techniques for Software Fault Prediction (Summary)
Feature Selection Techniques for Software Fault Prediction (Summary)
 
A comparative study in dynamic job scheduling approaches in grid computing en...
A comparative study in dynamic job scheduling approaches in grid computing en...A comparative study in dynamic job scheduling approaches in grid computing en...
A comparative study in dynamic job scheduling approaches in grid computing en...
 
A COMPARATIVE STUDY IN DYNAMIC JOB SCHEDULING APPROACHES IN GRID COMPUTING EN...
A COMPARATIVE STUDY IN DYNAMIC JOB SCHEDULING APPROACHES IN GRID COMPUTING EN...A COMPARATIVE STUDY IN DYNAMIC JOB SCHEDULING APPROACHES IN GRID COMPUTING EN...
A COMPARATIVE STUDY IN DYNAMIC JOB SCHEDULING APPROACHES IN GRID COMPUTING EN...
 
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
 
program partitioning and scheduling IN Advanced Computer Architecture
program partitioning and scheduling  IN Advanced Computer Architectureprogram partitioning and scheduling  IN Advanced Computer Architecture
program partitioning and scheduling IN Advanced Computer Architecture
 
Introduction to Convolutional Neural Networks
Introduction to Convolutional Neural NetworksIntroduction to Convolutional Neural Networks
Introduction to Convolutional Neural Networks
 
Software Engineering 101
Software Engineering 101Software Engineering 101
Software Engineering 101
 
The Network Research Project (NRP) expectations are to explain.docx
The Network Research Project (NRP) expectations are to explain.docxThe Network Research Project (NRP) expectations are to explain.docx
The Network Research Project (NRP) expectations are to explain.docx
 
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
 

Vulnerability Requirements in the RAN

  • 1. Vulnerability Requirements in the RAN Goal setting and testing via computer models Kurt Pudniks Vulnerability Technology Manager Total Ship Survivability DNPS – NAVSYSCOM – RAN 27/03/09
  • 2. Technical Standard  CNE sponsors the DEF AUST 5000 documents  Materiel Requirements Set (MRS)  Defines the following areas: - Scope - Definitions - Background - Functional Performance Requirements - Constraints - Deliverables
  • 3. Technical Standard  Vol 2 Pt 3 is the Platform Vulnerability MRS  Defines the vulnerability goals in terms of retained capabilities  Mandates the modeling approach - Note this is not prescriptive to a particular software package, but tries to talk in general modeling terms - Could it be done by hand?
  • 4. Goal Framework  The vulnerability goals rely on a modeling framework  The framework is meant to be general  Makes use of general ideas such as: 1. Nodes 2. Links 3. Fault trees 4. Coarse and specific volume based damage scenarios (damage templates) 5. Capabilities vs. functions 6. Data mapping and lists (spreadsheets or databases) 7. Percentages and colour coded thresholds (communication of results)
  • 5. Nodes and Links [1 & 2]
  • 9. Capabilities vs. Functions [5]  A capability is defined as: - Capability is the power to achieve a desired operational effect in a nominated environment, within a specified time, and to sustain that effect for a designated period. - Capability is generated by Fundamental Inputs to Capability comprising organisation, personnel, collective training, major systems, supplies, facilities, support, command and management. an action the ship can do - Track targets - Fire weapons - Sustain - Mobility - Emergency Evacuation - Specialist capabilities
  • 10. Capabilities vs. Functions [5]  A function is defined as: - An action that occurs within the ship or an action that the ship performs on the external environment. - A function is a conceptual idea, with no tangible physical equivalent - Propulsion - Steering - Buoyancy - Internal Communications - External Communications - Sensors (if any) - Weapons (if any) - Combat System (if any)
  • 11. Data Mapping [6]  Functions are mapped onto nodes  Capabilities are mapped onto functions  In total there are only three levels of data, and two interfaces between the three levels - NODE - NODE / FUNCTION INTERFACE (MAP) - FUNCTION - FUNCTION / CAPABILITY INTERFACE (MAP) - CAPABILITY
  • 12. Retained Capability % Levels [7]  Damage is binary  However multiple nodes can have one function  Therefore a function value can be between 0 and 1 in n steps (n = number of functions) - Green shall indicate x = 100% - Yellow shall indicate 50% < x < 100%. - Orange shall indicate 0% < x <= 50%. - Red shall indicate 0%  The capability will adopt the most conservative colour (least or most red!)
  • 13. Retained Capability % Levels [7]
  • 14. Vulnerability Study - A to Z  Build ship model with nodes and links - Assign functions to nodes - Assign capabilities to functions  Create threat volumes - coarse zones - specific volumes  “Intersect” the threat with the ship  Run fault tree analysis to find cascading disablement due to damaged systems  Summarise results in a retained capability list