An Evolutionary Strategy for Resilient Cyber Defense

被引:4
|
作者
Fulp, Errin W. [1 ]
Gage, H. Donald [1 ]
John, David J. [1 ]
McNiece, Matthew R. [1 ]
Turkett, William H. [1 ]
Zhou, Xin [1 ]
机构
[1] Wake Forest Univ, Dept Comp Sci, Winston Salem, NC 27109 USA
关键词
D O I
10.1109/GLOCOM.2015.7417814
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Many cyber attacks can be attributed to poorly configured software, where administrators are often unaware of insecure settings due to the configuration complexity or the novelty of an attack. A resilient configuration management approach would address this problem by updating configuration settings based on current threats while continuing to render useful services. This responsive and adaptive behavior can be obtained using an evolutionary algorithm, where security measures of current configurations are employed to evolve new configurations. Periodically, these configurations are applied across a collection of computers, changing the systems' attack surfaces and reducing their exposure to vulnerabilities. The effectiveness of this evolutionary strategy for defending RedHat Linux Apache web-servers is analyzed experimentally through a study of configuration fitness, population diversity, and resiliency observations. Configuration fitness reflects the level of system confidentiality, integrity and availability; whereas, population diversity gauges the heterogeneous nature of the configuration sets. The computers' security depends upon the discovery of a diverse set of highly fit parameter configurations. Resilience reflects the evolutionary algorithm's adaptability to new security threats. Experimental results indicate the approach is able to determine and maintain secure parameter settings when confronted with a variety of simulated attacks over time.
引用
收藏
页数:6
相关论文
共 50 条
  • [12] CYDRES: CYber Defense and REsilient System for securing grid-interactive efficient buildings
    Li, Guowen
    O'Neill, Zheng
    Wen, Jin
    Pradhan, Ojas
    Ren, Lingyu
    Wu, Teresa
    Adetola, Veronica
    Candan, K. Selcuk
    Zhu, Qi
    PROCEEDINGS OF THE 10TH ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILDINGS, CITIES, AND TRANSPORTATION, BUILDSYS 2023, 2023, : 307 - 309
  • [13] No-hardware-signature cybersecurity-crypto-module: A resilient cyber defense agent
    Zaghloul, A. R. M.
    Zaghloul, Y. A.
    CYBER SENSING 2014, 2014, 9097
  • [14] Cyber Security Operations Centre Security Monitoring for protecting Business and supporting Cyber Defense Strategy
    Onwubiko, Cyril
    2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015,
  • [15] Cyber resilient ICS
    Cyber, Atkins
    NUCLEAR ENGINEERING INTERNATIONAL, 2017, 62 (759): : 24 - 25
  • [16] Markov Evolutionary Games for Network Defense Strategy Selection
    Huang, Jianming
    Zhang, Hengwei
    Wang, Jindong
    IEEE ACCESS, 2017, 5 : 19505 - 19516
  • [17] On Cyber-resilient Microgrid: A Variable Trust Protocol Based Control Strategy
    Peng, Chen
    Zhou, Quan
    Shen, Yang
    He, Keren
    Shuai, Zhikang
    2023 IEEE/IAS INDUSTRIAL AND COMMERCIAL POWER SYSTEM ASIA, I&CPS ASIA, 2023, : 902 - 907
  • [18] Defense Strategy for Resilient Shipboard Power Systems Considering Sequential Attacks
    Ding, Tao
    Qu, Ming
    Wu, Xiong
    Qin, Boyu
    Yang, Yongheng
    Blaabjerg, Frede
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3443 - 3453
  • [19] Resilient Control Strategy of Cyber-Physical System under DoS Attacks
    Liu, Shan
    Xu, Bugong
    Li, Shanbin
    Liu, Yonggui
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 7760 - 7765
  • [20] CONCEAL: A Strategy Composition for Resilient Cyber Deception- Framework, Metrics and Deployment
    Duan, Qi
    Al-Shaer, Ehab
    Islam, Mazharul
    Jafarian, Haadi
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,