Congratulations to Dr. Himanshu Upadhyay on his highly well received presentation at the 2018 International Test and Evaluation Association (ITEA) (https://www.itea.org/) Test and Training Instrumentation Workshop on May 15-17 in Las Vegas, NV.  Himanshu’s talk presented FIU’s Cyber Attack Orchestration Test Bed for Automation and Threat Monitoring in Virtual Environment (CTAM), developed for the Department of Defense’s Test Resource Management Center. CTAM has proved its efficacy in advanced cyber threat monitoring and response…

">

Dr. Upadhyay presents FIU-ARC’s cyber security research at the 2018 International Test and Evaluation Association (ITEA)

Dr. Upadhyay presenting CTAM at the 2018 International Test and Evaluation Association (ITEA) Test and Training Instrumentation Workshop on May 15-17 in Las Vegas, NV.

Congratulations to Dr. Himanshu Upadhyay on his highly well received presentation at the 2018 International Test and Evaluation Association (ITEA) (https://www.itea.org/) Test and Training Instrumentation Workshop on May 15-17 in Las Vegas, NV.  Himanshu’s talk presented FIU’s Cyber Attack Orchestration Test Bed for Automation and Threat Monitoring in Virtual Environment (CTAM), developed for the Department of Defense’s Test Resource Management Center. CTAM has proved its efficacy in advanced cyber threat monitoring and response by implementing state-of-the-art virtualization technology and malware behavioral analysis using sophisticated machine learning algorithms.

Dr. Lagos and Dr. Upadhyay with members of the Test Resource Management Center (TRMC) at the 2018 International Test and Evaluation Association (ITEA)

Dr. Lagos and Dr. Upadhyay with members of the Test Resource Management Center (TRMC) at the 2018 International Test and Evaluation Association (ITEA) Test and Training Instrumentation Workshop on May 15-17 in Las Vegas, NV.

The focus of this S&T research is to understand the impact of various test vectors on the defined mission using a virtual test bed. The CTAM system is being developed in phases for T&E purposes to detect, monitor, and analyze the malware behavior during cyberspace attacks by enabling key capabilities like:

  1. deployment of virtualized environments along with the advanced instrumentation tools for control and monitoring of malware;
  2. cyber-attack emulation through infection and propagation of simulated endpoints;
  3. fine-grained introspection, data collection, and monitoring of various aspects of the infrastructure through the centralized system;
  4. profiling of malware behavior from a virtual infrastructure perspective;
  5. rapid cleanup, reconfiguration and redeployment for efficient real-time profiling of test vectors in cyberspace; and
  6. generation of reports, including visualizations which assess the potential damage to operational cyberspace assets.

Comments are closed.