News
With MOSAICS, 秘密直播 APL Brings the Future of Industrial Cybersecurity into Focus
The vulnerability of industrial control systems (ICS) to cyberattacks has become alarmingly clear in the past year, with a series of headline-grabbing hacks like SolarWinds, Colonial Pipeline and the Oldsmar water treatment facility having laid bare the limitations of the ad hoc, piecemeal solutions that have characterized ICS cybersecurity to date. The 秘密直播 Applied Physics Laboratory (APL) in Laurel, Maryland, in partnership with Sandia National Laboratories, Pacific Northwest National Laboratory and Idaho National Laboratory, is leading the development of the first-ever comprehensive, integrated and automated solution for ICS cybersecurity.
Known as MOSAICS 鈥 from 鈥淢ore Situational Awareness for Industrial Control Systems鈥 鈥 the working prototype has already demonstrated its value to the U.S. Navy, which is expanding its deployment of the system after initial testing demonstrated a 100% success rate with fewer than 1% false positives.
MOSAICS was initially envisioned simply as an ICS cyberattack detection system. APL leveraged its expertise in systems engineering and ongoing work in Integrated Adaptive Cyber Defense (IACD) to develop MOSAICS into a true ICS operational defense capability. The resulting capability allows ICS operators to detect and characterize cyberattacks on their systems in real time, and will eventually support automated 鈥 and even autonomous 鈥 response and recovery protocols.
鈥淢OSAICS represents a major step forward from existing solutions 鈥 the transition from a haphazard and piecemeal cybersecurity approach to an all-encompassing, integrated capability that can be used in the field,鈥 said Ray Yuan, APL鈥檚 Cyber Operations Mission Area executive. 鈥淚t aggregates and applies existing technology in a synchronized way that hasn鈥檛 been accomplished before."
The U.S. Navy conducted a military utility assessment in August, deploying the system at Naval Facilities Southwest (NAVFAC SW) in San Diego, California. Over the course of five days, MOSAICS surveilled a 3,000-node network, while 17 adversarial attacks were launched against a simulated control station on the base. The attacks targeted every level of the system, from devices in the supervisory layer such as servers and engineer workstations all the way down to low-level devices like electrical relays and logic gates.
While monitoring the entire network, MOSAICS successfully identified every attack, achieving the aforementioned 100% success rate with fewer than 1% false positives. What鈥檚 more, when a contractor showed up at the base unannounced and began installing new components into the electrical system without obtaining proper authorization, MOSAICS flagged the installation as a possible cyberattack, demonstrating its real-world utility.
鈥淏eyond the success of the planned testing, the incident with the contractor demonstrated the true value of MOSAICS 鈥 it can help operators determine, when they see a physical effect on their system, whether that鈥檚 due to mechanical failure or a cyberattack,鈥 said Harley Parkes, a cybersecurity engineer in APL鈥檚 Asymmetric Operations Sector (AOS) who led the design and development of the capability. 鈥淭hat would be very difficult to do at all, let alone instantaneously, without a capability like MOSAICS that gives a full picture of the cyber aspects of an ICS.鈥
The Navy has licensed MOSAICS to continue using it for a year and is seeking funding to deploy the capability at additional bases. As the work continues, Parkes and his team are working to increase the functionality and make it easier to learn, use and deploy.
鈥淎t the moment, APL and our partners at the other three national laboratories are heavily involved in installing, integrating and training operators to use MOSAICS,鈥 he said. 鈥淥ur current phase of development is focused on enabling MOSAICS to be easily and rapidly deployed in new locations without our help.鈥
Steve Carder, who manages the Resilient Navy Networks and Systems program in AOS, said that the capability has significant implications 鈥 not only for Navy systems but for all of the nation鈥檚 critical infrastructure.
鈥淲e鈥檙e going to leverage the work we鈥檝e done with MOSAICS to enhance cybersecurity for maritime control systems, but that鈥檚 only the beginning,鈥 Carder said. 鈥淯ltimately, this work will benefit not only the Department of Defense and their systems but also private sector control systems 鈥 the electrical grid, water plants, sewer systems, you name it 鈥 that constitute the critical infrastructure the nation depends on.鈥
Moreover, the architecture of MOSAICS is designed to extend beyond automation, and to take advantage of autonomous systems as they become increasingly capable and trusted, said Yuan, who emphasized the importance of trust in the system.
鈥淭he next big step is to incorporate autonomy into the system, so that MOSAICS and other capabilities like it can take defense and repair actions without human intervention,鈥 said Yuan. 鈥淭hat will require trust in autonomy, but that鈥檚 where we鈥檙e headed, and APL will be at the nexus of that work, as well.鈥
Government technical management of MOSAICS was provided by Rich Scalco from Naval Information Warfare Center 鈥 Atlantic (NIWC Atlantic), while operational management was led by USINDOPACOM and USNORTHCOM. Transition management was overseen by NAVFAC.