US Navy Will Use Data Analytics For Maritime Security

The US Navy has been drowning in data it cannot organise and make sense of. Now, it  is beginning to use automation and data analytics to improve cyber defenses for its unclassified networks and work on improving Naval cyber operators’ work.

Data collected will be used to create structured data sets to support the organisation’s move towards more predictive maintenance planning in the future.

“Instead of an operator having to read through millions and millions of pieces of data to try to identify commonalities and what's going on on one part of the network, and what's going on across another part of the network that might be significantly spread across the world, the analytic is able to point to us and say, ‘This is where you should be concerned,’” said Vice Adm. Craig Clapperton, the head of US Fleet Cyber Command and 10th Fleet said during WEST 2024, an annual Navy IT conference.

These tools, which use a combination of data analysis and automation, can search out suspicious activity and group incidents together. But the helpfulness stops at attribution, which is where the human operators come in. 

“Sometimes the machines aren't as great at dissecting and getting down to the attribution of it and how you should solve the problem,” he said. “So this is where the AI and machine learning and the human [operator] have to come together to maximise the benefit from that.”

Over the past year, US Fleet Cyber Command has expanded its use of these tools that detect when devices are logged onto the network  and those needed for identity verification to all of the Navy’s unclassified networks Clapperton said.

“That includes our overseas platforms, [education] platforms. And…we're in the process of, no kidding, eliminating what we call accepted networks, which have been networks that have been able to operate outside our visibility of those endpoints and that identity, which then poses the greatest risk to adversarial access,” he said.

The US Navy also wants to use the same data analytics capabilities that can help decipher malicious network activity on land to secure platforms at sea.

 USNI     |    Defense One   |   CSO   |    Twitter     |    LinkedIn     |      DTIC    |   Robots & Automation Magazine

Image: Pixabay

You Might Also Read: 

Maritime Cyber Attacks Are A Deadly Threat:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« A Goal Without A Plan Is Just A Wish
Nation State Hackers Deploy AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Awen Collective

Awen Collective

Awen Collective develops software-based tools for performing Digital Forensics, Incident Response and Cyber-Crime Investigation.

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute is an independent non-governmental organization that focuses on research and analysis of security challenges including defence and cyber security.

OneSpan

OneSpan

OneSpan (formerly Vasco Data Security) is a global leader in digital identity security, transaction security and business productivity.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

CyberSN

CyberSN

CyberSN is your essential partner in cybersecurity workforce risk management offering solutions that empower leaders to diversify, acquire, retain, and develop their cybersecurity teams.

GRSi

GRSi

GRSi deliver next-generation systems engineering, cybersecurity, technology insertion and best practices-based Enterprise Operations (EOps) management.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

SafeStack Academy

SafeStack Academy

SafeStack Academy is an online cyber security and privacy education platform. Our content is designed by experts to suit small businesses, growing companies, and development teams.

Phished

Phished

Phished is an AI-driven platform that focuses on the human side of cybersecurity. By combining fully automated training software with personalised, realistic simulations of cyberattacks.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

Finite State

Finite State

Finite State enables product security teams to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management.

TrustMe

TrustMe

TrustMe’s integrated platform for business trust and resilience keeps organizations safe, secure, and trustworthy.

WeVerify

WeVerify

WeVerify is a platform for collaborative, decentralised content verification, tracking, and debunking.