N252-110 TITLE: Modeling and Simulation for Multi-modal Exercises
OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and Software;Integrated Sensing and Cyber;Sustainment
OBJECTIVE: Develop a simulation model of information warfare that can realistically simulate multi-modal information attacks, in particular cyber-attacks and their precursors in social media campaigns. This model would be used for joint live, virtual constructive exercises to more realistically engage the training audience in scenarios in which information conflict plays important roles. This model be capable of developing and improving scenarios for multi-modal information warfare and provide guidance to planners and trainers to author and manage these exercises. The capability to explain, visualize and provide white cell adjudication support is highly desired in the final product.
DESCRIPTION: Social media provides cyber-attackers with the affordances to recruit confederates in cyber-attack, track mission execution, and perform other acts of coordination prior to and during these attacks. Currently little training is available to assist cyber-defenders to identify the social media precursors, coordination efforts, and tracking. Most cyber-defense exercises are "tabletop" efforts that are largely controlled through "white card injects," Participants are told something has happened, then they are tasked to explain how they would respond. These exercises fail to prepare the participant in the role of first responder/cyber defender to "train as they fight" – to experience the many cues and tips that precede a cyber-attack or to rehearse the steps that they would take to discover, counter, and defeat cyber-attacks. Simulation exercises are needed to provide the opportunity for cyber-defenders to experience rehearsal and response in a sandbox environment to these types of hybrid attacks. The Navy seeks a model that brings together simulations of cyber-attack with simulated social media precursors and related information flows (i.e., "social-cyber maneuvers"). This would enable exercises to include cyber-attack together with their social-cyber precursors and counter-arts for live virtual constructive training.
The desired deliverable would develop: (1) a collection of related hybrid cyber and social-cyber data indicative of these hybrid maneuvers to provide the foundation for a realistic, validated augmented generation system for scenario data; (2) a framework for information maneuvers that broadly encompass cyber and social-cyber maneuvers that would support scenario development, synthetic data production, and scenario validation (for example, the MITRE ATT&CK framework); (3) authoring tools and decision aids to guide the development of social-media facilitated cyber-attacks; and (4) a simulation model that brings together the data and the framework to enable exercise planners to develop realistic scenarios and vignettes for social media facilitated cyber-attacks. The desired deliverable would be able to produce realistic scenarios in under 1 month. It is highly desired that scenario updates and vignette changes are possible in 24 hours so that training could be changed, with the scenario "sped up" or "slowed down" based on participant performance and with injects that could be created and launched during the exercise itself.
PHASE I: Collect and validate data relevant to hybrid (cyber and social-cyber) attacks in a particular use case or set of use cases. Determine an initial data synthesis capability (such as a large language model) that can produce synthetic material indicative of an impending cyber-attack. Establish the feasibility of the initial framework for describing relationships, stages, and red flags that suggest cyber-adversaries are active. Prepare a Phase II plan.
For example, a Distributed Denial of Service (DDOS) attack has several stages: the "call to arms" stage in which audiences are enraged and encouraged to support the attack; recruitment of cyber-attackers; the distribution of tools and resources; the identification of targets and the coordination of "fires" in terms of time and targets. This is an example of an initial use case for Phase I development.
PHASE II: Enlarge the use cases from Phase I and collection of data relevant to these use cases for inclusion in a realistic augmentation generation system needed to validate synthetic data and conform to the developed framework. Develop a catalog of use cases and related information needed to guide exercise planners. Mature the Phase I data synthesis capability (possibly a special use large language model) to produce realistic volumes of synthetic data for information warfare exercises. Develop authoring tools to assist exercise planners in developing scenarios by using the framework and catalog of use cases. Create a working prototype of the simulation capability capable of a full technical demonstration in a live, virtual constructive exercise for validation of the system.
PHASE III DUAL USE APPLICATIONS: Support the transition of the simulation model to Navy use. Components of this effort would be useful to cybersecurity companies in developing simulations of cyber-attacks and their precursors for the purpose of training cybersecurity professionals.
REFERENCES:
KEYWORDS: Training, exercise, cyber-defense; cyber-attack; information warfare; modeling and simulation
TPOC 1: Rebecca Goolsby
[email protected]TPOC 2: Ralph Wachter
[email protected]
** TOPIC NOTICE ** |
The Navy Topic above is an "unofficial" copy from the Navy Topics in the DoD 25.2 SBIR BAA. Please see the official DoD Topic website at www.dodsbirsttr.mil/submissions/solicitation-documents/active-solicitations for any updates. The DoD issued its Navy 25.2 SBIR Topics pre-release on April 2, 2025 which opens to receive proposals on April 23, 2025, and closes May 21, 2025 (12:00pm ET). Direct Contact with Topic Authors: During the pre-release period (April 2, 2025, through April 22, 2025) proposing firms have an opportunity to directly contact the Technical Point of Contact (TPOC) to ask technical questions about the specific BAA topic. The TPOC contact information is listed in each topic description. Once DoD begins accepting proposals on April 23, 2025 no further direct contact between proposers and topic authors is allowed unless the Topic Author is responding to a question submitted during the Pre-release period. DoD On-line Q&A System: After the pre-release period, until May 7, 2025, at 12:00 PM ET, proposers may submit written questions through the DoD On-line Topic Q&A at https://www.dodsbirsttr.mil/submissions/login/ by logging in and following instructions. In the Topic Q&A system, the questioner and respondent remain anonymous but all questions and answers are posted for general viewing. DoD Topics Search Tool: Visit the DoD Topic Search Tool at www.dodsbirsttr.mil/topics-app/ to find topics by keyword across all DoD Components participating in this BAA.
|