DESC0023776
Project Grant
Overview
Grant Description
Bayesian attack detection and recommendation of actions for operational response.
Awardee
Grant Program (CFDA)
Awarding Agency
Funding Agency
Place of Performance
Cambridge,
Massachusetts
02138-4555
United States
Geographic Scope
Single Zip Code
Related Opportunity
Charles River Analytics was awarded
Project Grant DESC0023776
worth $199,963
from the Office of Science in July 2023 with work to be completed primarily in Cambridge Massachusetts United States.
The grant
has a duration of 1 year and
was awarded through assistance program 81.049 Office of Science Financial Assistance Program.
The Project Grant was awarded through grant opportunity FY 2023 Phase I Release 2.
SBIR Details
Research Type
SBIR Phase I
Title
Bayesian Attack Detection and Recommendation of Actions for Operational Response (BAD REACTOR)
Abstract
C56-40h-273244 Nuclear power plants have historically relied on analog systems for control and operations; however, due to the aging nature of these systems and the fact that many of their components are no longer manufactured, nuclear power plant operators are increasingly replacing these legacy control systems with modern digital operational technology systems. This greater degree of connectivity leads to challenges protecting these systems from cyberattacks. One such challenge is the difficulty in providing specific and actionable information about an attack to analysts or operators. Modern intrusion detection systems may be able to detect that an attack is occurring but can struggle with high false positive rates and often do not provide easily digestible information that an analyst or an operator needs to effectively respond to an active threat. Two factors compound this issue: (1) nuclear power operational technology systems have unique architectures and use diverse and potentially proprietary protocols, making general cybersecurity solutions for information technology infeasible to apply, and (2) any cybersecurity solution must not interfere with the normal operations of the nuclear power plant. Ensuring that nuclear power operational technology systems are secure is critical to maintain correct and safe operating conditions for nuclear power plants. Similarly, responses need to be fast and reliable to avoid potentially disastrous consequences. This proposal will result in a cyberattack detection and inference solution for nuclear power plant operational technology systems that provides actionable feedback to security personnel, allowing for faster attack classification and response times. The solution will run on its own device, interfacing with the control system architecture in a way that avoids interfering with normal activity. The solution will also run an anomaly detection framework that provides the evidence of an anomaly to an engine that uses systemic functional grammars, a concept from computational linguistics, to represent the attack space. The engine will use the evidence provided by the anomaly detection component to probabilistically determine what attack is currently ongoing, the most likely alternatives, and recommended mitigations. The engine will then send appropriate information to reactor operators and security personnel, who can take the steps necessary to remediate the attack. Under Phase I, a feasibility analysis of each of the solution’s software components will be performed. By accessing a subcontractors’ subject matter expertise and reactor facility to obtain normal operating data from a research reactor, as well as attack data from a simulated reactor control system and then building upon the data to build a demonstration of the solution, our feasibility analysis will show: (1) data ingestion and transformation, (2) ensemble anomaly detection, (3) a systemic functional grammar–based attack inference engine, (4) attack evidence to attack class mapping, and (5) mitigation recommendations. Phase II will consist of integrating the software component with hardware and integrating the full device with a physical system for testing. The proposed approach offers significant commercial benefit, not only because of its leading-edge anomaly detection component, but because the grammar engine can interface with any anomaly detection capabilities. This means the attack mapping engine can be extended to other anomaly detection solutions. The ability to support ground attack classification using probabilistic evidence allows for higher confidence in detected attack vectors, permitting more concrete mitigation recommendations. These capabilities will lead to better actionable cyber intelligence solutions across the power generation sector.
Topic Code
C56-40h
Solicitation Number
DE-FOA-0002903
Status
(Complete)
Last Modified 7/31/23
Period of Performance
7/10/23
Start Date
7/9/24
End Date
Funding Split
$200.0K
Federal Obligation
$0.0
Non-Federal Obligation
$200.0K
Total Obligated
Activity Timeline
Additional Detail
Award ID FAIN
DESC0023776
SAI Number
None
Award ID URI
SAI EXEMPT
Awardee Classifications
Small Business
Awarding Office
892430 SC CHICAGO SERVICE CENTER
Funding Office
892401 SCIENCE
Awardee UEI
DD1BYN8SN355
Awardee CAGE
9W641
Performance District
MA-05
Senators
Edward Markey
Elizabeth Warren
Elizabeth Warren
Budget Funding
Federal Account | Budget Subfunction | Object Class | Total | Percentage |
---|---|---|---|---|
Science, Energy Programs, Energy (089-0222) | General science and basic research | Grants, subsidies, and contributions (41.0) | $199,963 | 100% |
Modified: 7/31/23