posted by user: qoptureltis || 1652 views || tracked by 2 users: [display]

Assessment of Impact from Cyber Attack I 2015 : NATO/PfP Workshop on Cyber Attack Detection, Forensics and Attribution for Assessment of Mission Impact IST-128


When Jun 15, 2015 - Jun 17, 2015
Where Istanbul, Turkey
Submission Deadline Apr 1, 2015

Call For Papers

“Cyber Attack Detection, Forensics and Attribution for Assessment of Mission Impact”

to be held in Istanbul, Turkey
15 - 17 June 2015


ENROL BEFORE 1 June 2015

OPEN to Partnership for Peace (PfP/EAPC) Nations

Programme Chair

Dr. Alexander KOTT
U.S. Army Research Laboratory
United States


Mr. Hüseyin TIRLI TÜBITAK BILGEM Cyber Security Institute

Mr. Edmund N. MOXON DSTL
United Kingdom

Dr. Reginald SAWILLA NATO-NCI Agency
The Netherlands

Assoc. Prof. Dr. Maya BOZHILOVA Defence Institute "Prof. Tsvetan Lazarov"

Dr. Dennis McCALLAM Northrop Grumman
United States

Mr. Oguzhan TOPGÜL TÜBITAK BILGEM Cyber Security Institute Turkey

Col. Assoc. Prof. Dr. Nikolai STOIANOV Defence Institute "Prof. Tsvetan Lazarov"

Dr. Chris WILLIAMS Dstl
United Kingdom

Mr. Alfred MØLLER
Danish Defence Acquisition and Logistics


The success of a military mission is highly dependent on the Communications and Information Systems (CIS) hat support the mission, and on their use in the cyber battle space. The inexorably growing dependency on computational information processing for weapons, intelligence, communication, and logistics systems continues to increase the vulnerability of missions to various cyber threats.
Attacks on CIS systems or other cyber incidents degrade or disrupt the usage of CIS systems, and the resulting mission capability, performance, and completion. Such incidents are expected to increase in frequency and sophistication. Therefore there is a need to address the technology and procedures to characterize the impact of cyber attacks on the mission. Such an impact analysis must necessarily include a broad range of cyber analysis activities: detect attacks in a mission- supporting manner, assess damages relevant to the mission, investigate impacts on mission elements, recover from attacks in order to continue missions to the maximum extent possible, and decide on how to respond to cyber attacks in a manner that maximizes mission success.

Additionally, forensics methods and tools are necessary to determine key facts relevant to assessing mission impact. Such tools are used for evidence collection, analysis of the attack, identification of the attacker, understanding the attack, damage assessment, and attribution of attackers. Dependent on the mission and the type of an attack - there may be different degrees of relative importance and resources attached to attack detection, continuity of the military mission, damage assessment, evidence collection, attribution, and other activities. Usage of related methods, procedures, tools or technology should depend largely on mission.


The workshop will focus on identifying practice and research challenges, gaps and approaches – current and future -- to assessment of mission impact due to a cyber attack. Because such an assessment is inseparable from, and impossible without, attack detection, forensics and attribution, the workshop will explore how these activities and related technologies and methods should support the assessment of mission impact.
An example of a complex challenge to be explored by this workshop is achieving the right balance between computational, communication and information resources. Such a balance must be maintained between resources required for ongoing military operations and mission success, resources used for attack detection, battle damage assessment, and investigation - including forensics methods - and resources used to identify origin of attacker in order to determine the attack response, while optimizing the likelihood of mission success. An example of a potential opportunity that the workshop may explore is the question of whether principles known from the traditional military battle damage identification and assessment can be utilized in the cyber domain.
By examining such complex issues, the workshop will formulate a coherent structure of key research and development challenges and technology gaps, as well as recommendations for most promising research and development approaches to closing the gaps.

All example topics focus on the goal of assessment of mission impact. They include but are not limited to:

* Analysis and modeling of mission and mission dependencies of CIS assets;

* Prediction of mission impact, including cascading impacts;

* Quantification and qualification of predicted mission risks and impacts;

* Quantification of the criticality of assets in accordance with mission dependencies;

* Methods and techniques for assessing mission dependencies and cyber risks;

* Incident analysis from mission impact perspective - methods, tools and technology;

* Mission-focused attack detection with prioritization for mission needs, including early warning;

* Advanced data analysis tools for characterizing attackers tools used in the incident;

* Automated damage assessment;

* Mission-focused forensics of information, computers and networks ;

* Automation of mission-focused forensics triage;

* Tools and methods for visualization of damage and the impact on mission dependencies;

* Correlation and fusion of damage and evidence data;

* Mission impact focused attribution and trace back;

* Current and future trends, including potential for real-time or large scale forensics and other analysis that characterizes impact on a particular mission. Emerged/emerging “disruptive” technology developments;

* Metrics for mission impact assessments;

* Use of simulation, e.g., event (re)construction methods and tools, and simulation of impact on mission, such as dependencies propagation.


The workshop will bring together military and civilian cyber security researchers, technologists, and practitioners. The workshop provides an excellent opportunity to increase participants’ insight in civil as well as military cyber security problem space, and to influence the future research in cyber security, especially as it relates to mission impact assessment and related detection, forensics and attribution. The workshop will comprise a series of topical sessions – see Attachment 1. Each session will include several presentations of papers – some of which will be full papers and others will be shorter position papers – and a discussion open to all participants. The Programme Committee will utilize both the papers and the oral discussions at the workshop to formulate the final report of the workshop, including a set of recommendations.


Although submission of a paper is not required for participating in the workshop, it is encouraged. The Programme Committee invites two types of papers: full papers and position papers. A full paper is a technical paper (between 2500-5000 words) that presents results of a novel research and is subject to evaluation criteria of a typical technical conference. A position paper is short (between 500-1500 words) and reflects the views of the author – usually a discussion of research challenges, gaps and approaches -- without necessarily presenting a supporting research. Papers must address one or more of the aforementioned topics and focus on assessment of mission impact due to a cyber attack.
All (NATO UNCLASSIFIED-Releasable to PfP) papers must be submitted and sent by e-mail to the Workshop Chairman ( and to the Chairman’s Assistant ( ) by the deadline set in the schedule (see below). US authors and non-US Citizen affiliated with a US organization, please see Attachment 2.
The paper must include the following information, in the beginning:
• IST-128 Workshop on Cyber Attack Detection, Forensics and Attribution for Assessment of
Mission Impact
• Name of the principle Author, followed by the names of the Co-Author(s) if any, and then
Company/Affiliation, complete mailing addresses, telephone, fax and e-mail addresses
It is the responsibility of each contributor to fulfil the publication release and clearance requirements of his/her organization/company and country to obtain clearance of papers as needed. An official clearance is mandatory in the United States and there may also be a requirement in other countries to obtain clearance for unclassified papers. For further information, authors may contact any of the Programme Committee Members listed in this document or their National STO Coordinator. Please allow sufficient time for the clearance to be issued before deadline. In this case, the NATO classification for the Workshop has been declared as NATO UNCLASSIFIED – Releasable to Partner for Peace (PfP) nations.
US Authors: Authors from the United States must comply with US procedures.
(Refer to the Instructions in Attachment 2)

The Programme Committee will select a number of papers that are considered suitable for presentation at the Workshop. Authors will be notified by the date indicated in the schedule whether or not their papers are selected. Authors of selected papers will also be provided with information in the Instructions for Authors, which contains detailed instructions for the final formatting, presentation, transmission, etc. of papers.

The time allowed for each presenter of a full paper is 20 minutes, for a position paper - 10 minutes. Equipment will be available for PowerPoint presentations. Paper presentation times will be given in the Programme Announcement included with General Information Package. All papers accepted for presentation at the workshop will appear in the Workshop’s Report and published electronically on the CSO Website.

Please note that the authors of papers selected for presentation will not be financially supported by this organization. You are fully responsible for your own hotel and travel.


1 April Deadline for submission of your paper (not required for attendance but encouraged)
15 May Author is notified whether the paper has been accepted
1 June Deadline for enrolment (whether you present a paper or not)

All material and discussion in this workshop will be unclassified.
Participation and Enrolment
You can attend and participate in the workshop even if you do not present a paper. However, enrolment is required in order to attend the workshop. Whether you present a paper or not, you must enrol for the workshop on the CSO website ( before 1st June 2015. The enrolment web page will become available on March 15. We encourage you to enrol early. Attendance will be limited to a number of people to be determined by the Programme Committee.
Presentations and discussions will be in English.
Workshop site, lodging and social programme

The workshop will be held in Istanbul, Turkey. There is no workshop registration fee.
Attendees and accompanying persons will be responsible for their own accommodation arrangements and any travel expenses.

Once you have enrolled on the CSO website and your enrolment has been validated, you will automatically receive a General Information Package (GIP), giving you further details about the meeting site, the hotels and other general information.

Any questions on the technical aspects of the scientific programme or the participation process should be addressed to the Workshop Chair.

Questions on the administrative aspects of this Workshop or requests for further information on STO activities should be addressed to the IST Panel Office:

(Interim) IST Panel Executive IST Panel Assistant
Mr. Philippe SOÈTE Mrs. Aysegül APAYDIN
E-mail: E-mail:
Tel: +33 (0)1 5561 2280 Tel: +33 (0)1 5561 2282

Science & Technology Organization/Collaboration Support Office (CSO) Information Systems Technology (IST) Panel
BP 25, 922001 Neuilly sur Seine, France

Questions on the local arrangement and facilities should be addressed to Mr. Hüseyin TIRLI

The Programme and Organization of the Workshop

The Tentative Programme and Organization of the Workshop

MONDAY, 15 June 2015
09h00 – 12h00 Session 1: Mission Impact Assessment and Attack Detection

In this session we explore the complex relations between the assessment of mission impact and the various aspects of detection of malicious cyber activities. Understanding of potential nature of mission impact, and priorities associated with mission impact, can guide the process of detection. Conversely, the information gleaned in the process of detection informs assessment of the mission impact and helps its automation.

13h00 – 16h00 Session 2: Mission Impact Assessment and Forensics

Cyber forensics is a key process that yields insights into the nature of the impact that a cyber incident induces on the mission. As such, the forensics itself should be informed by the mission structure and dynamics. Here we explore mission-focused forensics of information, computers and networks; automation of mission-focused forensics triage; characterizing attackers tools; real-time or large scale forensics analysis that characterizes impact on a particular mission.

TUESDAY, 16 June 2015
09h00 – 12h00 Session 3: Mission Impact Assessment and Attribution

The challenge of attribution and trace-back for cyber incidents continues to grow in importance and complexity. Mission impact assessment can provide clues regarding the intent and the identity of potential perpetrators of the cyber attack. At the same time, any information about the attacker can help guide and focus the impact assessment. We also explore correlation and fusion of related data.

13h00 – 16h00 Session 4: Modeling, Simulations and Visualization for Mission Impact

In this session we explore analysis and modeling of mission and mission dependencies of CIS assets; use of event reconstruction methods and tools, and simulation of impact on mission, such as dependencies propagation. Also of interest are tools and methods for visualization of damage and the impact on mission; and metrics for mission impact assessments.

WEDNESDAY, 17 June 2015
09h00 – 12h00 Session 5: Opportunities, Priorities and Recommendations

Papers from the U.S. must be sent ONLY to the following P.O.C.:

NATO STO U.S. National Coordinator
OASD (R&E)/International Technology Programs
4800 Mark Center Drive, Suite 17D08
Alexandria, VA 22350-3600
E-mail: or
Tel: +1 571 372 6539 / 6538
Fax: +1 571 372 6471

All U.S. Authors must submit one electronic copy to this P.O.C. by 1 APRIL 2015
All US Authors must include the following statement in a covering letter:
• The work described in this paper is cleared for presentation to NATO audiences
(i.e., Approved for public release)
• The paper is technically correct
• If work is sponsored by a government agency, identify the organization and attest that the organization is aware of submission
• The paper is NATO/PfP Unclassified; and
• The paper does not violate any proprietary rights.

1. Only complete packages (paper plus all items listed above) will be accepted by the US P.O.C.
2. After review and approval, the US POC will forward all US papers with the Details of Authors Form to the Panel Assistant. All US papers must be received directly from the US POC. US papers will not be accepted directly from authors.
3. In the event there are any questions or concerns with these requirements, U.S. authors are encouraged to contact the US POC as early as possible. Delays in meeting POC deadlines will impact the timely submission of your paper.

Related Resources

CyberSA 2017   International Conference On Cyber Situational Awareness, Data Analytics And Assessment
HPDC 2017   The 26th International ACM Symposium on High-Performance Parallel and Distributed Computing
CPSSC 2016   1st International Workshop on Cyber-Physical Systems in the Context of Smart Cities
ICECE 2016   International Conference of Early Childhood Education 2016
SIoT 2016   SIoT 2016 : ESORICS International Workshop on Secure Internet of Things 2016
Visible Learning World Conference 2016   Improving Schools through Visible Learning: Research, Practice Impact
ECCWS 2017   16th European Conference on Cyber Warfare and SecurityECCWS 2017
CPSCom 2016   The 9th IEEE International Conference on Cyber, Physical and Social Computing
WOOT 2016   10th Workshop on Offensive Technologies
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic