Modeling Cyber Situational Awareness Through Data Fusion Evan L

Total Page:16

File Type:pdf, Size:1020Kb

Modeling Cyber Situational Awareness Through Data Fusion Evan L Air Force Institute of Technology AFIT Scholar Theses and Dissertations Student Graduate Works 3-21-2013 Modeling Cyber Situational Awareness through Data Fusion Evan L. Raulerson Follow this and additional works at: https://scholar.afit.edu/etd Part of the Digital Communications and Networking Commons Recommended Citation Raulerson, Evan L., "Modeling Cyber Situational Awareness through Data Fusion" (2013). Theses and Dissertations. 898. https://scholar.afit.edu/etd/898 This Thesis is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. MODELING CYBER SITUATIONAL AWARENESS THROUGH DATA FUSION THESIS Evan L. Raulerson, Captain, USAF AFIT-ENG-13-M-41 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio DISTRIBUTION STATEMENT A. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED The views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, the Department of Defense, or the United States Government. This material is declared a work of the U.S. Government and is not subject to copyright protection in the United States. AFIT-ENG-13-M-41 MODELING CYBER SITUATIONAL AWARENESS THROUGH DATA FUSION THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of Engineering and Management Air Force Institute of Technology Air University Air Education and Training Command in Partial Fulfillment of the Requirements for the Degree of Master of Science in Electrical Engineering Evan L. Raulerson, B.S.C.S. Captain, USAF March 2013 DISTRIBUTION STATEMENT A. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED AFIT-ENG-13-M-41 MODELING CYBER SITUATIONAL AWARENESS THROUGH DATA FUSION Evan L. Raulerson, B.S.C.S. Captain, USAF Approved: Kenneth Hopkinson, PhD (Chairman) Date Maj Kennard Laviers, PhD (Committee Member) Date Timothy Lacey, PhD (Committee Member) Date AFIT-ENG-13-M-41 Abstract Cyber attacks are compromising networks faster than administrators can respond. Network defenders are unable to become oriented with these attacks, determine the potential impacts, and assess the damages in a timely manner. Since the observations of network sensors are normally disjointed, analysis of the data is overwhelming and time is not spent efficiently. This time would be better used to determine and implement the best responses to network events to minimize damage. Automation in defending cyber networks requires a level of reasoning for adequate response. For the automated response systems that exist, they are mostly limited to scripted responses based on data from a single sensor. Better defense tools are required. For network administrators and automated decision- making agents to develop suitable response plans, they must know the correct and current information about the network. This research develops a system framework that aggregates data from heterogeneous network sensors, including intrusion detection systems, antivirus software, network mapping tools, and host monitoring software. The collected data is correlated into a single model that is easily interpreted by decision-making entities. This research proposes and tests an impact rating system that estimates the feasibility of an attack and its potential level of impact against the targeted network host as well the other hosts that reside on the network. The impact assessments would allow decision makers to prioritize attacks in real-time and attempt to mitigate the attacks in order of their estimated impact to the network. Additionally, this system provides the range of potential actions that an administrator would be allowed to perform on the network. For automated agents, the inclusion of the action set reduces the search space, allowing quicker results. The ultimate goal of this system is to provide computer network defense tools the situational awareness required to make the right decisions to mitigate cyber attacks in real-time. iv To my adoring wife and children. Thank you for supporting me every step of the way and for the sacrifices you made during this research. v Acknowledgments I would like to express my sincere appreciation to my wife. She always stood by me and gave me encouragement to overcome the stressful times. I am eternally grateful for her patience and inspiration. I am thankful to Captain James Hannan and Captain James Emge for helping test the output of my system. Since their research systems used the data produced from the tools that I built, they further drove my system’s requirements. Additionally, Captain Emge helped set up the test environment and the attack scenarios for the experiment. The feedback and assistance they gave me helped make my system more usable and easily interoperable with other systems. Finally, I would like to thank my advisor, Dr. Kenneth Hopkinson, and my committee, Dr. Timothy Lacey and Major Kennard Laviers. Their guidance and mentorship were invaluable during this research. Evan L. Raulerson vi Table of Contents Page Abstract......................................... iv Dedication........................................v Acknowledgments.................................... vi Table of Contents.................................... vii List of Figures...................................... xi List of Tables...................................... xiii List of Acronyms.................................... xiv I. Introduction.....................................1 1.1 Overview...................................1 1.2 Problem Statement..............................3 1.3 Goals and Approach.............................4 1.4 Contribution..................................4 1.5 Summary...................................5 II. Literature Review..................................6 2.1 Cyber Warfare.................................6 2.1.1 Cyber Attack Vectors.........................7 2.1.2 Cyber Defensive Maneuvers.....................8 2.1.3 Warfare decision making....................... 11 2.2 Gathering network information........................ 12 2.2.1 Detection mechanisms........................ 13 2.2.2 Vulnerability databases........................ 15 2.3 Cyber attack vectoring prediction....................... 16 2.3.1 State Modeling............................ 17 2.3.2 Attack Trees and Graphs....................... 19 2.4 Data Fusion.................................. 20 2.5 Intrusion Detection System (IDS) Alert Aggregation............ 25 2.6 Impact Assessments.............................. 26 2.7 Uses of Cyber Situational Awareness..................... 27 vii Page 2.7.1 Scripted Responses.......................... 27 2.7.2 Artificial Intelligence Systems.................... 28 2.8 Conclusion.................................. 30 III. System Design................................... 31 3.1 Overview................................... 31 3.2 Requirements................................. 32 3.3 Approach................................... 33 3.4 Design..................................... 33 3.4.1 System Framework.......................... 33 3.4.2 Data acquisition........................... 35 3.4.3 Sensors Selection........................... 36 3.4.3.1 Snort............................ 36 3.4.3.2 Nmap........................... 39 3.4.3.3 Host Monitoring...................... 40 3.4.3.4 Antivirus.......................... 40 3.5 Data repository................................ 41 3.5.1 Snort database............................ 41 3.5.2 PBNJ database............................ 43 3.5.3 Monitor database........................... 43 3.5.4 Vuln database............................. 45 3.6 Primary data orientation process....................... 46 3.7 Action set identification process....................... 48 3.7.1 Process Mechanics.......................... 48 3.7.2 Contribution of Action Set Identification.............. 50 3.8 Attack criticality classification process.................... 51 3.8.1 Process Mechanics.......................... 51 3.8.2 Rating System............................ 52 3.8.3 Contribution of Criticality Rating.................. 54 3.8.4 Example Execution of Criticality Assessment Process....... 54 3.8.5 CVSS Scores and Predicted Impacts................. 56 3.9 Modeler execution.............................. 63 3.10 Summary................................... 64 IV. Methodology.................................... 65 4.1 Introduction.................................. 65 4.1.1 Problem Statement.......................... 65 4.1.2 Goals and Hypothesis........................ 66 4.1.3 Approach............................... 67 4.2 System environment............................. 68 viii Page 4.3 Attack Traffic Selection............................ 72 4.3.1 BackTrack5 and Metasploit Framework............... 72 4.3.1.1 Network mapping and port scanning........... 72 4.3.1.2 Structured Query Language (SQL) injection....... 72 4.3.1.3 Operating System (OS) exploit.............. 73 4.3.1.4 Denial-of-Service (DoS).................. 73 4.3.1.5 Password guessing..................... 73 4.3.1.6 Mail Blitz......................... 73 4.3.1.7 Netcat connection..................... 74 4.4 Experiment Design.............................. 74 4.5 System Boundaries.............................. 75 4.5.1 Performance Metrics......................... 75 4.5.1.1 Data-to-Information Ratio
Recommended publications
  • Television Academy Awards
    2019 Primetime Emmy® Awards Ballot Outstanding Comedy Series A.P. Bio Abby's After Life American Housewife American Vandal Arrested Development Atypical Ballers Barry Better Things The Big Bang Theory The Bisexual Black Monday black-ish Bless This Mess Boomerang Broad City Brockmire Brooklyn Nine-Nine Camping Casual Catastrophe Champaign ILL Cobra Kai The Conners The Cool Kids Corporate Crashing Crazy Ex-Girlfriend Dead To Me Detroiters Easy Fam Fleabag Forever Fresh Off The Boat Friends From College Future Man Get Shorty GLOW The Goldbergs The Good Place Grace And Frankie grown-ish The Guest Book Happy! High Maintenance Huge In France I’m Sorry Insatiable Insecure It's Always Sunny in Philadelphia Jane The Virgin Kidding The Kids Are Alright The Kominsky Method Last Man Standing The Last O.G. Life In Pieces Loudermilk Lunatics Man With A Plan The Marvelous Mrs. Maisel Modern Family Mom Mr Inbetween Murphy Brown The Neighborhood No Activity Now Apocalypse On My Block One Day At A Time The Other Two PEN15 Queen America Ramy The Ranch Rel Russian Doll Sally4Ever Santa Clarita Diet Schitt's Creek Schooled Shameless She's Gotta Have It Shrill Sideswiped Single Parents SMILF Speechless Splitting Up Together Stan Against Evil Superstore Tacoma FD The Tick Trial & Error Turn Up Charlie Unbreakable Kimmy Schmidt Veep Vida Wayne Weird City What We Do in the Shadows Will & Grace You Me Her You're the Worst Young Sheldon Younger End of Category Outstanding Drama Series The Affair All American American Gods American Horror Story: Apocalypse American Soul Arrow Berlin Station Better Call Saul Billions Black Lightning Black Summer The Blacklist Blindspot Blue Bloods Bodyguard The Bold Type Bosch Bull Chambers Charmed The Chi Chicago Fire Chicago Med Chicago P.D.
    [Show full text]
  • People's Republic of China: Town-Based
    People’s Republic of China Town-Based Urbanization Strategy Study ADB TA 4335-PRC Final Report Volume 1: Main Report Prepared for Asian Development Bank National Development and Reform Commission Prepared by PADCO, Washington, DC CCTRD, Beijing August 2005 PLANNING AND DEVELOPMENT COLLABORATIVE INTERNATIONAL Setting the Standard for Our Industry® The findings, interpretations, and conclusions expressed in this publication do not necessarily represent the views of the Asian Development Bank or those of its member governments. ADB does not guarantee the accuracy of the data included in this publication and accepts no responsibility for any consequences of their use. Table of Contents Volume 1 Executive Summary.........................................................................................................ES-1 Section 1: Introduction..........................................................................................................1 1.1 Background and Objectives ...................................................................................1 1.2 Study Methodology.................................................................................................4 Section 2: Urbanization Case Studies: Main Findings .......................................................7 2.1 Town Management.................................................................................................7 2.2 Economic Development.......................................................................................11 2.3 Economic Infrastructure.......................................................................................13
    [Show full text]
  • Protecting the Poor a Microinsurance Compendium
    Munich Re Foundation From Knowledge to Action International Labour Office Geneva Protecting the poor A microinsurance compendium Edited by Craig Churchill Protecting the poor A microinsurance compendium Protecting the poor A microinsurance compendium Edited by Craig Churchill Munich Re Foundation From Knowledge to Action International Labour Office Geneva International Labour Office, CH-1211 Geneva, ILO Cataloguing in Publication Data: micro- Switzerland insurance, life insurance, health insurance, low www.ilo.org income, developing countries. 11.02.3 in association with Munich Re Foundation Publications of the International Labour Office 80791 München, enjoy copyright under Protocol 2 of the Uni- Germany versal Copyright Convention. Nevertheless, www.munichre-foundation.org short excerpts from them may be reproduced without authorization, on condition that the Copyright source is indicated. For rights of reproduction © International Labour Organization 2006 or translation, application should be made to First published 2006 the ILO Publications (Rights and Permissions), International Labour Office, CH-1211 Geneva ISBN 978-92-2-119254-1 (ILO) 22, Switzerland, or by email: [email protected]. Munich Re Foundation order number The International Labour Office welcomes 302-05140 such applications. Libraries, institutions and other users Cover photo: M. Crozet, ILO registered in the United Kingdom with the Copyright Licensing Agency, 90 Tottenham Printed in Germany Court Road, London W1T 4LP [Fax: (+44) (0)20 7631 5500; email: [email protected]], in the United States with the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923 [Fax: (+1) (978) 750 4470; email: [email protected]] or in other countries with associated Reproduction Rights Organizations, may make photocopies in accordance with the licences issued to them for this purpose.
    [Show full text]
  • IAJC’S Centenary Celebrations; AWARE of the Valuable Assistance Given by Dr
    PERMANENT COUNCIL OEA/Ser.G CP/doc.4695/12 8 March 2012 Original: Spanish ANNUAL REPORT OF THE INTER-AMERICAN JURIDICAL COMMITTEE TO THE FORTY-SECOND REGULAR OF THE GENERAL ASSEMBLY ORGANIZATION OF AMERICAN STATES INTER-AMERICAN JURIDICAL COMMITTEE 79th REGULAR SESSION OEA/Ser.Q/IV.42 August 1 to 6, 2011 CJI/doc.399/11 Rio de Janeiro, Brazil 5 August 2011 Original: Spanish ANNUAL REPORT OF THE INTER-AMERICAN JURIDICAL COMMITTEE TO THE GENERAL ASSEMBLY 2011 General Secretariat Organization of the American States www.oas.org/cji [email protected] EXPLANATORY NOTE Until 1990, the OAS General Secretariat published the “Final Acts” and “Annual Reports of the Inter-American Juridical Committee” under the series classified as “Reports and Recommendations”. In 1997, the Department of International Law of the Secretariat for Legal Affairs began to publish those documents under the title “Annual Report of the Inter-American Juridical Committee to the General Assembly”. According to the “Classification Manual for the OAS official records series”, the Inter- American Juridical Committee is assigned the classification code OEA/Ser.Q, followed by CJI, to signify documents issued by this body (see attached lists of resolutions and documents). iii TABLE OF CONTENTS Page EXPLANATORY NOTE......................................................................................................................................... III TABLE OF CONTENTS .........................................................................................................................................
    [Show full text]
  • Privacy Policies on Global Banks' Websites: Does Culture Matter?
    Communications of the IIMA Volume 13 Issue 4 Article 7 2013 Privacy Policies on Global Banks' Websites: Does Culture Matter? Donald R. Moscato Iona College Shoshana Altschuller Iona College Eric D. Moscato Iona College Follow this and additional works at: https://scholarworks.lib.csusb.edu/ciima Recommended Citation Moscato, Donald R.; Altschuller, Shoshana; and Moscato, Eric D. (2013) "Privacy Policies on Global Banks' Websites: Does Culture Matter?," Communications of the IIMA: Vol. 13 : Iss. 4 , Article 7. Available at: https://scholarworks.lib.csusb.edu/ciima/vol13/iss4/7 This Article is brought to you for free and open access by CSUSB ScholarWorks. It has been accepted for inclusion in Communications of the IIMA by an authorized editor of CSUSB ScholarWorks. For more information, please contact [email protected]. Privacy Policies on Global Banks’ Websites: Does Culture Matter? Moscato, Altschuller, & Moscato Privacy Policies on Global Banks' Websites: Does Culture Matter? Donald R. Moscato Iona College, USA [email protected] Shoshana Altschuller Iona College, USA [email protected] Eric D. Moscato Iona College, USA [email protected] ABSTRACT Information privacy, the ability to control the information about oneself, is increasingly relevant as advancing technologies provide opportunities for ever faster and more extensive data collection. Electronic business continues to see the collection and storage of various types of customer information for use in increasingly innovative ways, resulting in enhanced marketing and services as well as concern from the customer about privacy. Online banking, in particular, is strongly impacted by customers' concerns for privacy due to the sensitivity of the information it handles. Previous research has examined privacy concerns, including the impact of culture.
    [Show full text]
  • Mike Mccarthy, Who Trains GISW City of Light (Quality Road) Breeding Can Say About John O'connor It That He's a Poor Considers Himself an “Optimistic Realist”
    MONDAY, 12 FEBRUARY 2018 O'Connor's assured stewardship of Ballylinch has placed him in BETTER LATE THAN great demand for a number of key roles within the sport he loved from a young age. A former ITBA chairman and current NEVER FOR O=CONNOR council member, he has also been involved with the HRI Flat Pattern and race programming committees, the Irish Champions Weekend committee, and is currently chairman of the Irish wing of the European Breeders' Fund. He is also a successful breeder in his own right and his experience in all manner of bloodstock roles includes him being the pinhooker of a 3-year-old National Hunt store back in 1975 who would go on to be named Silver Buck (Ire) and win the Cheltenham Gold Cup. "I have a fairly strong belief that if you can do so then you should put something back into the industry that you make your living from, and that if you can make the industry better for everybody then that's something worthwhile," says O'Connor. "I was very lucky in a sense that although I was running a busy operation I had the support of first the Mahonys and then the Malones, which allowed me to put some of my time back into industry bodies." Cont. p2 John O=Connor | Tattersalls photo By Emma Berry IN TDN AMERICA TODAY It would be boring to be completely perfect, but it seems that MCCARTHY: AN “OPTIMISTIC REALIST” the only bad thing many of his colleagues in Irish racing and Mike McCarthy, who trains GISW City of Light (Quality Road) breeding can say about John O'Connor it that he's a poor considers himself an “optimistic realist”.
    [Show full text]
  • Easter Activity Pack
    St. Joseph’s Patrician College ‘The Bish’ Easter Activity Pack 2020 1 | P a g e Table of Contents Arts & Crafts ..................................................................................................................................... 3 Gluksman Gallery ………………………………………………………………………………………………………………………3 Get Crafty .................................................................................................................................. 6 Improve your Art Skills ............................................................................................................... 6 Creativity & Art Challenges…………………………………………………………………………………………………….….7 Wellbeing........................................................................................................................................ 10 Some useful wellbeing & meditation resources ....................................................................... 12 A good deed a day .................................................................................................................. 13 Learning New Tricks ........................................................................................................................ 14 Join the Circus ......................................................................................................................... 14 Become a Magician .................................................................................................................. 14 Card Games ............................................................................................................................
    [Show full text]
  • 2020 Virtual CONFERENCE COVERAGE
    WINTER 2021 2020 Virtual CONFERENCE COVERAGE ALSO INSIDE ... MEET THE 2021 BOARD | GRANDE DAME LEADERSHIP INTERVIEW | HOTEL TREND REPORT London Dame Miranda 2021 LDEI BOARD Gore Brown bakes a PRESIDENT'S MESSAGE Coffee and Walnut OF DIRECTORS Slice Cake (Page 25). Leadership in Action The mission of the LDEI Board is to with 2021 Grande Dame Looking Ahead: Riding the Wave of Momentum foster the growth and success of Carolyn Wente (Page the organization by supporting the 20). Personalized YETI Feeling very honored and privileged, I sit down development of new and existing Rambler Mug. to write a president’s message. chapters and by implementing program Let me share a little about my background. initiatives. It provides leadership, For the last 12 years, I have been a small busi- guidance, education, connectivity, and ness owner. In 2009, I formed a consulting and effective communication among LDEI executive search company with a focus on the members. food, hospitality, and beverage industries. Most President of my clients were privately owned businesses on JUDITH HOLLIS-JONES the path to significant growth. I truly enjoyed Kentucky Chapter Hollis Jones and Associates feeling that I made a difference for some amazing [email protected] companies. A couple of my clients made the IPO (502)-403-9689 trip, which was exhilarating. First Vice President FROM THE EDITOR Then, in 2019, I realized that being a native DEBORAH MINTCHEFF Kentuckian, a boomerang who had returned to New York Chapter her home state after the “Corporate Tourism” of PEN&INK Recognizing Beauty in Imperfection [email protected] WINTER 2021 living in several (seven) different cities.
    [Show full text]
  • Individual Augments Return After 7-Month Iraq Deployment
    iii marine expeditionary force and marine corps bases japan MARCH 7, 2008 WWW.OKINAWA.USMC.MIL Period of reflection ends; curfew in place for service members Consolidated Public Affairs Office CAMP FOSTER — The “Period of Reflec- tion” has concluded and a 10 p.m. to 5 a.m. curfew with alcohol restriction for all service members is in effect. There are no continuing limitations, restrictions or cur- few for civilians or family members. The decision was made by Lt. Gen. Rich- ard C. Zilmer, the Okinawa Area Coordina- tor and senior U.S. military commander on Okinawa March 3rd, following a meeting with senior military and civilian leaders from all services. “The curfew, coupled with ongoing coop- erative initiatives with our Japanese hosts at the national and local level, will offer the best atmosphere for our service members, family members and civilian employees while reducing the possibility and risk of misconduct,” said Zilmer. Maj. Gen. Robert B. Neller, 3rd Marine Division commanding general, greets Okinawa Marines who returned Service members are limited to U.S. from Iraq Feb. 27 at Kadena Air Base. The Marines served as individual augments attached to 3rd Battalion, military installations or the off-base resi- 3rd Marine Regiment for seven months. Photo by Lance Cpl. Robert C. Frenke dences of SOFA status personnel during curfew hours. However, they are authorized to transit between U.S. military installa- tions or off-base residences of SOFA status Individual augments return personnel during curfew hours via pri- vately owned vehicle, military supported transportation, or commercial taxi. Service members are restricted from after 7-month Iraq deployment consuming alcohol off-base, except within the confines of the off-base residences of Lance Cpl.
    [Show full text]
  • Billy Graham: the Tough Road Schedule
    Lariat Alive! App The Baylor Lariat @bulariat @baylorlariat Baylor Lariat WE’RE THERE WHEN YOU CAN’T BE NOVEMBER 9, 2018 FRIDAY BAYLORLARIAT.COM Opinion | 2 TITLE IX UPDATE Who I am The churches people choose to go to every Sunday does not define who they are. Liesje Powers | Multimedia Editor ADJUSTMENTS The Big 12 reported that out of 4,523 Baylor student responses to survey, 17 percent had been sexually harassed by a faculty or staff member. 76 percent of those students felt that they were safe from sexually harassment. The report advises the Baylor Title IX office to get the Centralized Case Management Database in order to be more organized when accessing Title IX cases. The database should be up in a couple months. Arts & Life | 6 Spectacular bachelor Centralizing Title IX Find out more about Leo Dottavio, Jordan Big 12 report emphasizes need for all-encompassing Title IX Kimball and James Taylor from the database; Baylor corrects Social Climate Survey results Bachelor, visit to the MADISON DAY an industry-wide practice and helps to access “The Big 12 did acknowledge that we are great city of Waco. Assistant News Editor cases with ease and organization, according to sharing information and working together in the report. face-to-face case management meetings that Baylor’s Title IX staff has expressed concern The report said this centralized reporting happen on a weekly basis. So, even though the over the past several years about the lack of system would give Baylor the ability to audit full software system isn’t integrated yet, that a centralized case management database for cases and review trends with Title IX and sharing of information is happening on a face- reports that come into their office, according Clery cases in a more streamlined manner and to-face basis,” Cook said.
    [Show full text]
  • Surrey Championship Year Book On-Line
    The Travelbag Surrey Championship Year Book On-Line Facts and figures about the 2017 Surrey Championship season Fixtures, details and news about the 2018 Surrey Championship season What’s in your Travelbag? Our top experiences for 2018 STAY IN DUBAI’S ICONIC ATLANTIS THE PALM RESORT Visit your local Travelbag shop call 0207 001 4148 or visit travelbag.co.uk Section 1 – Important Information The Surrey Championship Year Book No. 46 – April 2018 CHAIRMAN: PRESIDENT: HONORARY LIFE Peter Murphy Roland Walton VICE PRESIDENTS (Cont’d) SECRETARY: PAST PRESIDENTS: Mr J B Fox Brian Driscoll Mr Norman Parks Mr D H Franklin TREASURER: Mr Raman Subba Row, CBE M G B Morton Crispin Lyden-Cowan Mr Christopher F. Brown Mr D Newton FIXTURE SECRETARY: Mr Graham Brown Mr A Packham Denham Earl Mr Andy Packham Mr N Parks REGISTRATION SEC: HONORARY LIFE VICE PRESDENTS: Mr A J Shilson Anthony Gamble Mr P Bedford Mr R Subba Row, CBE Mr J Booth Mr C F Woodhouse, CVO Mr G Brown Surrey Championship Year Book 2017 Contents MESSAGE FROM THE CHAIRMAN 2018 . 15 SURREY CHAMPIONSHIP YEAR BOOK - EDitor’S INTRODUCTION . 17 EXECUTIVE COMMITTEE 2018 . 18 Sub-Committees & Special Responsibilities . 19 UMPIRES PANEL 2018 . 20 SEASON 2017 . 21 Surrey Championship - 1st XI League Tables for 2017 . 21 Surrey Championship - 2nd XI League Tables for 2017 . 23 Surrey Championship - 3rd XI League Tables for 2017 . 25 The Constitution and Rules of the Travelbag Surrey Championship . 26 Surrey Championship - 4th XI League Tables for 2017 . 27 Surrey Championship Promotions and Relegations in 2017 . 28 Surrey Championship Twenty20 Competition 2018 .
    [Show full text]
  • Evaluation of the Fussy Baby Network Advanced Training: Final Report
    Evaluation of the Fussy Baby Network Advanced Training: Final Report Julie Spielberger Tiffany Burkhardt Carolyn Winje Marcia Gouvêa Elizabeth Barisik 2016 Evaluation of the Fussy Baby Network Advanced Training: Final Report Julie Spielberger Tiffany Burkhardt Carolyn Winje Marcia Gouvea Elizabeth Barisik Recommended Citation Spielberger, J., Burkhardt, T., Winje, C., Gouvea, M., & Barisik, E. (2016). Evaluation of the Fussy Baby Network advanced training: Final report. Chicago, IL: Chapin Hall at the University of Chicago. ISSN: 1097-3125 © 2017 Chapin Hall at the University of Chicago Chapin Hall at the University of Chicago 1313 East 60th Street Chicago, IL 60637 773-753-5900 (phone) 773-753-5940 (fax) www.chapinhall.org Acknowledgments We would like to acknowledge several individuals and organizations that made this report possible. We would like to thank the 251 mothers who allowed us into their homes and shared their experiences with us. We appreciate the time and contributions of the staff of the ten home visitation programs who participated in this study. At Chapin Hall, we are grateful to Allen Harden, Elissa Gitlow, Jennifer Tobin, and Deborah Daro who contributed in various ways to data collection, research analysis, or advice on study design. Others who provided early guidance that informed the study design were Sydney Hans (School of Social Service Administration, University of Chicago) and Jon Korfmacher (Erikson Institute). In addition, we are grateful to the Erikson Institute, especially Linda Gilkerson, the founding director of the Fussy Baby Network, and other members of the FBN training project, Hannah Jones-Lewis and Dhara Thakar. They have been important partners throughout the development and implementation of the evaluation, and a valuable resource in the development of protocols for data collection and in the analysis and interpretation of data.
    [Show full text]