[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3675741.3675751acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsetConference Proceedingsconference-collections
research-article
Open access

A Testbed for Operations in the Information Environment

Published: 13 August 2024 Publication History

Abstract

Operations in the Information Environment (OIE) is a rapidly evolving field in US government defense. Historically, the use of testbeds and assessments contributed to the maturation of cybersecurity, in both industry and defense. Cybersecurity testbeds and OIE assessments evaluate defenses in controlled settings, with OIE assessments concentrating on information manipulation and influence operations. To support OIE assessments, we developed CIOTER, a cybersecurity-styled testbed supporting end-to-end OIE assessments of both tools and their operators. CIOTER’s extensible architecture and capabilities make it suitable for integration into OIE training and exercise environments. Two current capabilities, a Machine Learning Operations Pipeline (MLOps) and an Over-the-shoulder (OTS) Monitoring and Situational Awareness tool suite, were demonstrated with OIE tools/data; one in a training session, and an information warfare exercise. The demonstrations resulted in actionable improvements to the OIE tools, metrics and visualizations, and metrics providing insights into participant use of the tools, and validation of and extensions to the CIOTER capabilities.

References

[1]
Sahar Abdelnabi and Mario Fritz. 2023. { Fact-Saboteurs} : A Taxonomy of Evidence Manipulation Attacks against { Fact-Verification} Systems. In 32nd USENIX Security Symposium (USENIX Security 23). 6719–6736.
[2]
Darius Afchar, Vincent Nozick, Junichi Yamagishi, and Isao Echizen. 2018. Mesonet: a compact facial video forgery detection network. In 2018 IEEE international workshop on information forensics and security (WIFS). IEEE, 1–7.
[3]
Max Aliapoulios, Antonis Papasavva, Cameron Ballard, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, and Jeremy Blackburn. 2021. The gospel according to Q: Understanding the QAnon conspiracy from the perspective of canonical information. In AAAI International Conference on Web and Social Media.
[4]
Lucy H Butler, Padraig Lamont, Dean Law Yim Wan, Toby Prike, Mehwish Nasim, Bradley Walker, Nicolas Fay, and Ullrich KH Ecker. 2023. The (Mis) Information Game: a social media simulator. Behavior Research Methods (2023), 1–22.
[5]
François Chollet. 2017. Xception: Deep learning with depthwise separable convolutions. In Proceedings of the IEEE conference on computer vision and pattern recognition. 1251–1258.
[6]
NICE Community Coordinating Council. 2023. The Cyber Range: A Guide. https://www.nist.gov/system/files/documents/2023/09/29/The%20Cyber%20Range_A%20Guide.pdf Accessed: 24 April 2024.
[7]
Ziv Epstein and Hause Lin. 2022. Yourfeed: Towards open science and interoperable systems for social media. arXiv preprint arXiv:2207.07478 (2022).
[8]
Chris Hays, Zachary Schutzman, Manish Raghavan, Erin Walk, and Philipp Zimmer. 2023. Simplistic collection and labeling practices limit the utility of benchmark datasets for Twitter bot detection. In Proceedings of the ACM web conference 2023. 3660–3669.
[9]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770–778.
[10]
Jia Wen Seow, Mei Kuan Lim, Raphaël CW Phan, and Joseph K Liu. 2022. A comprehensive overview of Deepfake: Generation, detection, datasets, and opportunities. Neurocomputing 513 (2022), 351–371.
[11]
The Forrester Tech Tide. 2021. Zero Trust Threat Detection and Response. Technical Report Q2 2021. Forrester.
[12]
Elochukwu Ukwandu, Mohamed Amine Ben Farah, Hanan Hindy, David Brosset, Dimitris Kavallieros, Robert Atkinson, Christos Tachtatzis, Miroslav Bures, Ivan Andonovic, and Xavier Bellekens. 2020. A review of cyber-ranges and test-beds: Current and future trends. Sensors 20, 24 (2020), 7148.
[13]
Mary Ellen Zurko. 2022. Disinformation and reflections from usable security. IEEE Security & Privacy 20, 3 (2022), 4–7.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSET '24: Proceedings of the 17th Cyber Security Experimentation and Test Workshop
August 2024
115 pages
ISBN:9798400709579
DOI:10.1145/3675741
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 August 2024

Check for updates

Author Tags

  1. operations in the information environment
  2. testbed

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • U.S. Department of Defense

Conference

CSET 2024

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 127
    Total Downloads
  • Downloads (Last 12 months)127
  • Downloads (Last 6 weeks)40
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media