You are on page 1of 10

US 2017.

0099308A1
(19) United States
(12) Patent Application Publication (10) Pub. No.: US 2017/0099308A1
Mead et al. (43) Pub. Date: Apr. 6, 2017

(54) CYBERSECURITY SYSTEM WITH (52) U.S. Cl.


DIFFERENTATED CAPACITY TO DEAL CPC ......... H04L 63/1425 (2013.01); G06N 7/005
WITH COMPLEX CYBER ATTACKS (2013.01)

(71) Applicant: The Boeing Company, Chicago, IL (57) ABSTRACT


(US)
(72) Inventors: Jadranka Mead, Renton, WA (US); An improved cyber security protection system with differ
James E. Vasatka, Monroe, WA (US); entiated capacity to deal with complex cyber attacks in
John A. Craig, Snohomish, WA (US) complex, highly-connected industries. The system architec
ture is goal-oriented and separates security goals and con
(21) Appl. No.: 14/872,698 cerns by layers that are assigned specific functions to
address only those goals. The functions operate concurrently
(22) Filed: Oct. 1, 2015 within the layers and provide insight on their respective
Publication Classification layers. The layers are interconnected with connection mod
ules using bi-directional interfacing to establish a feedback
(51) Int. Cl. look within the entire system. Complex adaptive systems
H04L 29/06 (2006.01) (CAS) algorithms are used to identify the probably threats to
G06N 700 (2006.01) the system.

COMPLEX ADAPTIVESYSEM 200

LEARNINGPHASE CREATEA RUNTHESYSTEMAND ASSOCIAE


SOCHASICTY AND STATE MACHINE RECORDTRANSiTIONS PROBABILITIES
PARALESM REPRESENTATION INCLUDING WITHSTATE
OF THESYSTEM STOCHASTICITY TRANSTIONS 208
20 204 206 --

ALCUAETHE LEARN THE WIDTH


PREDICTIVEPHASE DISTRIBUTION OF CORREDORS
ADAPTYEARNING OF POSSIBLE OFOUTPU
OUTPUIS DSIRBONS 26
20 22

ADAPTIVE ISTHE CORRIDOR


ENGINEERINGPHASETOONARROW

28 222
DOES ACORRIDOR INTERVENEBY
CORRESPOND DEETINGOR
TO UNDESREABLE MODIFYINGAGENT
FUTURE OUTCOMES TRANSiTIONS
Patent Application Publication Apr. 6, 2017 Sheet 2 of 4 US 2017/0099308A1
Patent Application Publication Apr. 6, 2017 Sheet 3 of 4 US 2017/0099308A1

500

SPECIFICATION 50
AND DESIGN

MATERIAL 504
PROCUREMENT

COMPONENT AND 50
SUBASSYMFG.

508
SYSTEM INTEGRATION

CERTIFICATION SO
AND DELIVERY

52
INSERVICE

MAINTENANCE AND 514


SERVICE

FIG 3
Patent Application Publication Apr. 6, 2017 Sheet 4 of 4 US 2017/0099308A1
US 2017/00993O8 A1 Apr. 6, 2017

CYBERSECURITY SYSTEM WITH tracks cybersecurity data for forensic analysis, an overlayer
DIFFERENTATED CAPACITY TO DEAL that monitors, tracks, and measures cybersecurity data
WITH COMPLEX CYBER ATTACKS across a plurality of cyber environments, and a CAS algo
rithm that is used to learn, predict, and take action based on
TECHNOLOGICAL FIELD the cybersecurity data. The overlayer and the sublayer
0001. The present disclosure relates generally to cyber exchange cybersecurity data. Each of the Sublayer and
security systems and, in particular, to an improved cyber overlayer further include functions that operate within the
security system including a goal-oriented architecture sublayer and overlayer. Also, the sublayer and overlayer
design to target complex threats in highly connected indus exchange the cybersecurity data via a bi-directional connec
tries, such as the aviation industry. tion module and the exchanged cybersecurity data is corre
lated. The connection module facilitates a feedback loop
BACKGROUND throughout the system and the cyber security system further
includes a complex adaptive system (CAS) algorithm that
0002 The aviation industry largely depends on the reli predicts cyber attacks and based on the cybersecurity data.
able functioning of critical information technology infra The CAS algorithm is modified to create state machines
structure. Like many other industries, the aviation industry representing the cyber security system, run the State
is challenged with providing adequate security for Such IT machines and record their transitions, associate probabilities
infrastructure and mitigating the effects of any cyber events. with the transitions, predict outcomes based on the prob
Examples of cyber events include malicious or Suspicious abilities, determine if action needs to be taken, and take
events that compromise, or attempt to compromise, the action if a level of probability is over a predetermined
operation of an aircraft's network, including its data con threshold.
nections, data transmission, and computing systems. 0007. The features, functions and advantages discussed
0003 Currently available cyber security systems are rela herein may be achieved independently in various example
tively well equipped to deal with cyber attacks which are one implementations or may be combined in yet other example
dimensional. These involve one type of attack vector, Such implementations, further details of which may be seen with
as malware, executed on one company's system to extract reference to the following description and drawings.
data from that system. However, complex cyber threats
involve several simultaneous attack vectors, and often com BRIEF DESCRIPTION OF THE DRAWING(S)
promise loosely related systems to deliver the intended
damage to one of them (the real target). For instance, a 0008 Having thus described example implementations of
money theft schema could involve phishing to gain access to the disclosure in general terms, reference will now be made
a bank analyst, exfiltration Software to gain access to ATM to the accompanying drawings, which are not necessarily
cash order processes within the bank, spyware to capture drawn to scale, and wherein:
keyboard strokes inside a different ATM cash authorizing 0009 FIG. 1 is logic diagram of a cyber security system
entity, and access to physical ATM cash delivery machines with a goal-oriented architecture to deal with complex cyber
on a different continent. Thus, complex attack vectors can attacks in accordance with an example implementation of
consist of two or more means and two or more paths all the present disclosure;
executing at the same time across different companies, 0010 FIG. 2 is a flowchart of use of complex adaptive
geographies and types of assets. system algorithms and agent-based modeling in accordance
0004 Existing cyber security systems are generally with an example implementation of the present disclosure;
designed in one of two manners: (1) threats are identified 0011 FIG. 3 is a block diagram of aircraft production and
and available cyber security tools (“COTS) are purchased service methodology; and
and deployed with an expectation to mitigate the identified
threats; or (2) a selection of best current COTS is purchased 0012 FIG. 4 is a schematic illustration of an aircraft.
and deployed with an expectation to do the best job possible
in protecting the enterprise. A significant limitation of Such DETAILED DESCRIPTION
existing cyber security tools is that they have visibility and 0013 Some implementations of the present disclosure
specialize only in the types of domains, events and threats will now be described more fully hereinafter with reference
they monitor and report on. As a consequence, the architec to the accompanying drawings, in which some, but not all
tures for these tools are necessarily contained within the implementations of the disclosure are shown. Indeed, vari
domain monitored and consequently only detect and report ous implementations of the disclosure may be embodied in
on attack vectors within that specific company or type of many different forms and should not be construed as limited
asset or threat. Complex attack vectors, which have cross to the implementations set forth herein; rather, these
domain, cross-industry and cross-asset attack vector paths example implementations are provided so that this disclo
are not part of such cyber security detection methods cyber sure will be thorough and complete, and will fully convey
security tools.
0005 Thus, it is desirable to have an improved system the scope of the disclosure to those skilled in the art. For
and method for detecting and dealing with complex cyber example, unless otherwise indicated, reference something as
attacks. being a first, second or the like should not be construed to
imply a particular order. Also, something may be described
BRIEF SUMMARY as being above something else (unless otherwise indicated)
may instead be below, and vice versa; and similarly, some
0006. In view of the foregoing background, example thing described as being to the left of Something else may
implementations of the present disclosure provide a cyber instead be to the right, and vice versa. Like reference
security system including a Sublayer that monitors and numerals refer to like elements throughout.
US 2017/00993O8 A1 Apr. 6, 2017

0014 Example implementations of the present disclosure same frequency (or continuously) within the layers. For
will be primarily described in conjunction with aviation example, when looking across the layers, running an algo
applications. It should be understood, however, that example rithm to generate a hierarchical cluster out of a large set of
implementations may be utilized in conjunction with a social feed-based news may operate at a very different
variety of other applications, both in the aviation industry frequency level in one layer versus collection of network
and outside of the aviation industry. data at a more important layer, which occurs in real time.
0015 Commercial aviation is a complex system with This feature allows the subsystems to derive insights at the
many actors in terms of product and service providers, their fastest pace possible, without slower Subsystems delaying
partners, Suppliers, customers, and global facilities. All Such the progress of the faster Subsystems within the same layer.
actors are very tightly interconnected in terms of informa 0022. Layers Exchange Information Via Connection
tion exchange. Many actors in this interconnected network Modules.
are allowed access into each other's internal networks as a 0023 The connection modules are designed to alleviate a
business requirement. This feature of the commercial avia common shortcoming of prior art cyber security systems that
tion ecosystem potentially allows for the establishment of a deliver computations at varying levels of granularity. For
very long path of an attack vector through this complex instance, in Such prior art systems, network packet level
system. visibility could be delivered at the same time as geographic
0016. The present disclosure is for an improved cyber social news feed visibility; however, because each is deliv
security system with differentiated capacity to deal with ered to different organization entities and with different
complex cyber attacks. As explained in more detail below, visual interfaces, it is impossible to know the significance or
the system is based on a goal-oriented cybersecurity design the interconnection between them, if any. The connection
that identifies and separates the goals and concerns by modules of the present system, however, are designed to
layers. Layers are assigned specific functions that address deliver Such interconnection insights and allow analysis of
the goals of the system. The functions operate concurrently these interconnections, continuously and purposefully.
within the layers and deliver insights relevant to that layer of 0024. The Bidirectional Nature of Interfaces.
concern. The layers are interconnected via specific connec 0025 Prior art cyber security systems have, at best,
tion modules at intentionally designed interfaces. The con one-to-one interfaces between Some of the systems and there
nection modules exchange insights in a bidirectional manner is no feedback loop across the entire system. This is a
and implement a feedback loop within the entire system. The significant shortcoming when it comes to detecting and
connection modules are integral components of the system isolating complex cyber threats in complex industries with
when used in highly connected industries, such as aviation. potentially very long attack paths. The improved cyber
Such connection modules facilitate tracking, discovery, and security system of the present disclosure facilitates a circular
isolation of complex attack vector paths for Such complex flow of information within the entire system. This flow is
and cross-functional industries. implemented via the connection modules referenced above.
0017 Goal Oriented Design. The bidirectional flow is an improvement over prior art
0018. As a result of the system design being goal-ori systems that only elevated cyber attack information under
ented, all actors in the design expect the same outcome from the assumption that the information only needs to move “up'
the system without any false expectations. Particularly, both through the system. The bidirectional nature of the connec
the business and technical community are able to understand tion modules in the present system implements the philoso
the abilities and the limitations of decisions related to the phy that a user of a feature knows best how to use it, and also
system design. This design allows the operational, process, allows for maximum visibility within the system. This leads
staffing and governance communities (e.g. legal and audit) to increased awareness and, thus, increased capability of the
to align with the technical cyber security architecture design overall system to protect itself from complex attacks. The
and provide their own artifacts and capabilities that are particular combination of the connection modules and bidi
aligned with each other and the technical goals. As an rectional interfaces facilitates the detection and isolation of
example, if a cyber security design team targets a second complex cyber attack vectors in highly interconnected
level, “Manage cyber security, then the operational com industries.
munity has an opportunity to target installation of operating 0026. Today, cyber security systems are loosely referred
systems that are heterogeneous to target the same level. to as reactive or proactive, depending on what types of tools
0019 Goals and Concerns are Separated by Layers. are included into a specific system. In the example shown in
0020 Design layers are especially significant for the FIG. 1 of a cyber security system 100 in accordance with an
cyber system industry, which is evolving at fast pace. By implementation of the present disclosure, a three (horizon
separating out the goals and concerns of the system by tal) layer system incorporating multiple Subsystems with
layers, the system of the present disclosure has the ability to differentiated capacity is used to deal with complex cyber
evolve and/or replace a very distinct set of related capabili attacks in a highly interconnected industry. The layers are
ties while leaving others capabilities intact. Particularly, the reactive (Layer 1), anticipatory (Layer 2), and resilient
design layers are separated into Subsystems in the overall (Layer 3). The block entitled “Elements of the System’ lists
system design such that they are at very different levels of the functions included in each layer for the goals and effects
maturity, and require different techniques and/or types of of the system as 100 listed in the far right block entitled
personnel to implement them. Design layers may also be “Expected Level of System Operation. In The Event Of An
governed by different corporate governance bodies, policies, Attack.”
and regulatory requirements. 0027. The first subsystem includes inputs from the com
0021. The functions are grouped to allow for concurrent pany managing the system 100, cross-industry ecosystem,
operation within layers. Because the functions are grouped and global categories, as shown on the left side of the Figure.
by their semantic meanings, algorithms may be run at the The second Subsystem includes the platforms and algo
US 2017/00993O8 A1 Apr. 6, 2017

rithms, with associated inputs and outputs, to achieve the above, which requires parallel operation of all the layers of
desired capacity to deal with a cyber attack. This is illus the design in order to detect and isolate complex attack
trated by the box in the center of the Figure. The third vector paths. The connection modules integrate the cyber
Subsystem includes the connection modules that bridge the protection system at the level of processed information,
three horizontal layers of the design and operate concur thereby leveraging the work already spent at each layer of
rently as a background process to all of the layers of the the system 100.
system 100. The connection modules and corresponding 0037. By implementing a separation of the architectural
bidirectional interfaces are depicted as parallel lines between goals and concerns at the very beginning of the design, the
the layers. cyber security system 100 of the present disclosure is able to
0028. The system 100 architecture as depicted in FIG. 1 (1) process data with most appropriate tools for each data
illuminates why it is not sufficient for the connection mod type and desired outcome, (2) perform the computations in
ules to be unidirectional and why it is important that the parallel, and (3) leverage the findings at the latest compu
connection modules be designed as feedback loops. Without tational stage thereby further speeding up the process. Thus,
the use offeedback loops, the system cannot “feed” potential the differentiated workflow process drives the selection of
events from the micro layer (e.g., Layer 1 in the Figure), into inputs, tools and other services that may even be external to
the knowledge base of the macro layer (Layer 2) in order to the cyber security system (e.g., operational or infrastructure
discover hidden connections and insights. Similarly, the decisions). Global dimensions and influences on cyber
macro layer (Layer 2), upon discovery of an interesting security postures are accounted for in the system 100 in
macro pattern, may inform the correlation/data mining order to mitigate culturally, politically and similarly driven
engine at the micro layer (Layer 1) to do additional work. attacks. Also, new design modules can be identified that are
The same applies to all the layers of the system 100. needed to deal with complex cyber attacks and long attack
0029. In one implementation of the present disclosure, vector paths that cross multiple industries and other
modified complex adaptive systems (CAS) algorithms are domains. Because of the concurrency, background opera
used to analyze and feed information from the system 100 to tions and required feedback loops, the timing of operations
a machine learning module that is part of the feedback loop is optimized and delay points are eliminated. The circular
referenced above. The CAS algorithm models, measures, workflow and information base build-outs are implemented
and predicts the probability of certain actions within the via the feedback-loops of the connection modules to speed
system 100 and intervenes if the probability of an action is up time and the attack discovery horizon. Finally, the layered
outside some predetermined bounds. model accounts for an easy evolution and allows for pivot
0030 FIG. 2 depicts an example of use of CAS 200 ing and disruption, as needed.
algorithms and agent-based modeling in a commercial avia 0038 According to example implementations of the pres
tion cyber security setting. In the learning phase (202), a ent disclosure, the various components of the cyber security
state machine representative of the system 100 is created system with differentiated capacity to deal with complex
(204), the state machine is run and transitions are recorded cyber attacks may be implemented by various means includ
including stochasiticity (206), and probabilities are associ ing hardware, alone or under direction of one or more
ated with the state transitions (208). In the predictive phase computer program code instructions, program instructions
(210), the starting state of the state machine system is or executable computer-readable program code instructions
determined (212), the distribution of possible outputs is from a computer-readable storage medium.
calculated (214), and the width of the corridors of output 0039. In one example, one or more apparatuses may be
distributors are learned (216). Then in the adaptive engi provided that are configured to function as or otherwise
neering phase (218), which refers to agents in the State implement the cyber security system with differentiated
machine system (such as Software and hardware compo capacity to deal with complex cyber attacks and respective
nents), an assessment is made of whether the corridor is too elements shown and described herein. In examples involv
narrow (220) and whether the corridor corresponds to unde ing more than one apparatus, the respective apparatuses may
sirable future outcomes (222). If so, there is intervention by be connected to or otherwise in communication with one
deleting or modifying Such agent transitions (224). another in a number of different manners. Such as directly or
0031 One possible implementation of the goal-oriented indirectly via a wireline or wireless network or the like.
cyber security system 100 of the present disclosure in the 0040 Generally, an apparatus of exemplary implementa
commercial aviation industry would include: tion for the system 100 of the present disclosure may include
0032 Contextual analytics of the commercial aviation one or more of a number of components such as a processor
Supply chain in the cyber event space; (e.g., processor unit) connected to a memory (e.g., storage
0033 Machine learning using Principal Component device), as described above. The processor is generally any
Analysis (PCA) for identifying the most significant piece of hardware that is capable of processing information
combinations of aviation ecosystem features; Such as, for example, data, computer-readable program
0034 Agent based modeling algorithms for Complex code, instructions or the like (generally "computer pro
Adaptive Systems (as described above with respect to grams, e.g., software, firmware, etc.), and/or other Suitable
FIG. 2), to identify the most probable developing threat electronic information. More particularly, for example, the
regions based on recent histories of different ecosystem processor may be configured to execute computer programs,
partners in the (aviation) ecosystem; and which may be stored onboard the processor or otherwise
0035 Correlation analysis of the interconnected mod stored in the memory (of the same or another apparatus). The
ules, including correlation of cyber events within the processor may be a number of processors, a multi-processor
company, ecosystem cyber events, and global news. core or some other type of processor, depending on the
0036 Referring again to FIG. 1, today’s complex cyber particular implementation. Further, the processor may be
environment requires an integrated System 100 as described implemented using a number of heterogeneous processor
US 2017/00993O8 A1 Apr. 6, 2017

systems in which a main processor is present with one or tions of the cyber security system with differentiated capac
more secondary processors on a single chip. As another ity to deal with complex cyber attacks. As will be appreci
illustrative example, the processor may be a symmetric ated, any Suitable program code instructions may be loaded
multi-processor System containing multiple processors of onto a computer or other programmable apparatus from a
the same type. In yet another example, the processor may be computer-readable storage medium to produce a particular
embodied as or otherwise include one or more application machine, Such that the particular machine becomes a means
specific integrated circuits (ASICs), field-programmable for implementing the functions specified herein. These pro
gate arrays (FPGAs) or the like. Thus, although the proces gram code instructions may also be stored in a computer
Sor may be capable of executing a computer program to readable storage medium that can direct a computer, a
perform one or more functions, the processor of various processor or other programmable apparatus to function in a
examples may be capable of performing one or more func particular manner to thereby generate a particular machine
tions without the aid of a computer program. or particular article of manufacture. The instructions stored
0041. The memory is generally any piece of hardware in the computer-readable storage medium may produce an
that is capable of storing information such as, for example, article of manufacture, where the article of manufacture
data, computer programs and/or other Suitable information becomes a means for implementing functions described
either on a temporary basis and/or a permanent basis. The herein. The program code instructions may be retrieved from
memory may include Volatile and/or non-volatile memory, a computer-readable storage medium and loaded into a
and may be fixed or removable. Examples of suitable computer, processor or other programmable apparatus to
memory include random access memory (RAM), read-only configure the computer, processor or other programmable
memory (ROM), a hard drive, a flash memory, a thumb apparatus to execute operations to be performed on or by the
drive, a removable computer diskette, an optical disk, a computer, processor or other programmable apparatus.
magnetic tape or some combination of the above. Optical
disks may include compact disk-read only memory (CD 0045 Retrieval, loading and execution of the program
ROM), compact disk-read/write (CD-R/W), DVD or the code instructions may be performed sequentially such that
like. In various instances, the memory may be referred to as one instruction is retrieved, loaded and executed at a time.
a computer-readable storage medium which, as a non In some example implementations, retrieval, loading and/or
transitory device capable of storing information, may be execution may be performed in parallel such that multiple
distinguishable from computer-readable transmission media instructions are retrieved, loaded, and/or executed together.
such as electronic transitory signals capable of carrying Execution of the program code instructions may produce a
information from one location to another. Computer-read computer-implemented process Such that the instructions
able medium as described herein may generally refer to a executed by the computer, processor or other programmable
computer-readable storage medium or computer-readable apparatus provide operations for implementing functions
transmission medium. described herein.
0042. In addition to the memory, the processor may also 0046 Execution of instructions by a processor, or storage
be connected to one or more interfaces for displaying, of instructions in a computer-readable storage medium,
transmitting and/or receiving information. The interfaces Supports combinations of operations for performing the
may include a communications interface (e.g., communica specified functions. It will also be understood that one or
tions unit) and/or one or more user interfaces. The commu more functions, and combinations of functions, may be
nications interface may be configured to transmit and/or implemented by special purpose hardware-based computer
receive information, Such as to and/or from other apparatus systems and/or processors which perform the specified func
(es), network(s) or the like. The communications interface tions, or combinations of special purpose hardware and
may be configured to transmit and/or receive information by program code instructions.
physical (wireline) and/or wireless communications links.
Examples of Suitable communication interfaces include a 0047. As referenced above, examples of the present dis
network interface controller (NIC), wireless NIC (WNIC) or closure may be described in the context of aircraft manu
the like. facturing and service. As shown in FIGS. 3 and 4, during
0043. The user interfaces may include a display and/or pre-production, illustrative method 500 may include speci
one or more user input interfaces (e.g., input/output unit). fication and design (block 502) of aircraft 602 and material
The display may be configured to present or otherwise procurement (block 504). During production, component
display information to a user, Suitable examples of which and subassembly manufacturing (block 506) and system
include a liquid crystal display (LCD), light-emitting diode integration (block 508) of aircraft 602 may take place.
display (LED), plasma display panel (PDP) or the like. The Thereafter, aircraft 602 may go through certification and
user input interfaces may be wireline or wireless, and may delivery (block 510) to be placed in service (block 512).
be configured to receive information from a user into the While in service, aircraft 602 may be scheduled for routine
apparatus, such as for processing, storage and/or display. maintenance and service (block 514). Routine maintenance
Suitable examples of user input interfaces include a micro and service may include modification, reconfiguration,
phone, image or video capture device, keyboard or keypad, refurbishment, etc. of one or more systems of aircraft 602.
joystick, touch-sensitive surface (separate from or integrated 0048. Each of the processes of illustrative method 500
into a touchscreen), biometric sensor or the like. The user may be performed or carried out by a system integrator, a
interfaces may further include one or more interfaces for third party, and/or an operator (e.g., a customer). For the
communicating with peripherals such as printers, Scanners purposes of this description, a system integrator may
or the like. include, without limitation, any number of aircraft manu
0044 Program code instructions may be stored in facturers and major-system Subcontractors; a third party may
memory, and executed by a processor, to implement func include, without limitation, any number of Vendors, Subcon
US 2017/00993O8 A1 Apr. 6, 2017

tractors, and Suppliers; and an operator may be an airline, within the scope of the appended claims. Moreover,
leasing company, military entity, service organization, and although the foregoing descriptions and the associated draw
SO. O. ings describe example implementations in the context of
0049. As shown in FIG. 4, aircraft 602 produced by certain example combinations of elements and/or functions,
illustrative method 500 may include airframe 612 with a it should be appreciated that different combinations of
plurality of high-level systems 600 and interior 614. elements and/or functions may be provided by alternative
Examples of high-level systems 600 include one or more of implementations without departing from the scope of the
propulsion system 604, electrical system 606, hydraulic appended claims. In this regard, for example, different
system 608, and environmental system 610. Any number of combinations of elements and/or functions than those
other systems may be included. Although an aerospace explicitly described above are also contemplated as may be
example is shown, the principles disclosed herein may be set forth in some of the appended claims. Although specific
applied to other industries, such as the automotive industry. terms are employed herein, they are used in a generic and
Accordingly, in addition to aircraft 602, the principles descriptive sense only and not for purposes of limitation.
disclosed herein may apply to other vehicles, e.g., land What is claimed is:
vehicles, marine vehicles, space vehicles, etc. 1. A cyber security system comprising:
0050. Apparatus(es) and method(s) shown or described a Sublayer that monitors and tracks cybersecurity data for
herein may be employed during any one or more of the forensic analysis;
stages of the manufacturing and service method 500. For an overlayer that monitors, tracks, and measures cyber
example, components or Subassemblies corresponding to security data across a plurality of cyber environments;
component and Subassembly manufacturing 506 may be a CAS algorithm that is used to learn, predict, and take
fabricated or manufactured in a manner similar to compo action based on the cybersecurity data;
nents or subassemblies produced while aircraft 602 is in wherein the overlayer and the sublayer exchange cyber
service. Also, one or more examples of the apparatus(es), security data.
method(s), or combination thereof may be utilized during 2. The cyber security system of claim 1 wherein each of
production stages 506 and 508, for example, by substantially the sublayer and overlayer further comprise functions that
expediting assembly of or reducing the cost of aircraft 602. operate within the sublayer and overlayer.
Similarly, one or more examples of the apparatus or method 3. The cyber security system of claim 1 wherein the
realizations, or a combination thereof, may be utilized, for Sublayer and overlayer exchange the cybersecurity data via
example and without limitation, while aircraft 602 is in a bi-directional connection module and the exchanged
service, e.g., maintenance and service stage (block 1116). cybersecurity data is correlated.
0051 Different examples of the apparatus(es) and meth 4. The cyber security system of claim 3 wherein the
od(s) disclosed herein include a variety of components, connection module facilitates a feedback loop throughout
features, and functionalities. It should be understood that the the system.
various examples of the apparatus(es) and method(s) dis 5. The cyber security system of claim 1 further compris
closed herein may include any of the components, features, ing a complex adaptive system (CAS) algorithm that pre
and functionalities of any of the other examples of the dicts cyber attacks and based on the cybersecurity data.
apparatus(es) and method(s) disclosed herein in any com 6. The cyber security system of claim 5 wherein the CAS
bination, and all of such possibilities are intended to be algorithm is modified to:
within the spirit and scope of the present disclosure. create state machines representing the cyber security
0052 Many modifications and other implementations of system;
the disclosure set forth herein will come to mind to one run the state machines and record their transitions;
skilled in the art to which this disclosure pertains having the associate probabilities with the transitions;
benefit of the teachings presented in the foregoing descrip predict outcomes based on the probabilities;
tions and the associated drawings. Therefore, it is to be determine if action needs to be taken; and
understood that the disclosure is not to be limited to the take action if a level of probability is over predetermined
threshold.
specific implementations disclosed and that modifications
and other implementations are intended to be included

You might also like