An Evolutionary Strategy for Resilient Cyber Defense

被引:4
|
作者
Fulp, Errin W. [1 ]
Gage, H. Donald [1 ]
John, David J. [1 ]
McNiece, Matthew R. [1 ]
Turkett, William H. [1 ]
Zhou, Xin [1 ]
机构
[1] Wake Forest Univ, Dept Comp Sci, Winston Salem, NC 27109 USA
关键词
D O I
10.1109/GLOCOM.2015.7417814
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Many cyber attacks can be attributed to poorly configured software, where administrators are often unaware of insecure settings due to the configuration complexity or the novelty of an attack. A resilient configuration management approach would address this problem by updating configuration settings based on current threats while continuing to render useful services. This responsive and adaptive behavior can be obtained using an evolutionary algorithm, where security measures of current configurations are employed to evolve new configurations. Periodically, these configurations are applied across a collection of computers, changing the systems' attack surfaces and reducing their exposure to vulnerabilities. The effectiveness of this evolutionary strategy for defending RedHat Linux Apache web-servers is analyzed experimentally through a study of configuration fitness, population diversity, and resiliency observations. Configuration fitness reflects the level of system confidentiality, integrity and availability; whereas, population diversity gauges the heterogeneous nature of the configuration sets. The computers' security depends upon the discovery of a diverse set of highly fit parameter configurations. Resilience reflects the evolutionary algorithm's adaptability to new security threats. Experimental results indicate the approach is able to determine and maintain secure parameter settings when confronted with a variety of simulated attacks over time.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game
    Hu, Hao
    Liu, Yuling
    Chen, Chen
    Zhang, Hongqi
    Liu, Yi
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (03): : 1683 - 1700
  • [22] Research survey on defense strategy of attack threat in cyber physical systems
    Wen, Cheng-Lin
    Yang, Li
    Kongzhi Lilun Yu Yingyong/Control Theory and Applications, 2024, 41 (12): : 2224 - 2236
  • [23] Robust Defense Strategy Against Cyber Physical Attacks In Networked Microgrids
    Poursmaeil, Babak
    Ravadanegh, Sajad Najafi
    34TH INTERNATIONAL POWER SYSTEM CONFERENCE (PSC2019), 2019, : 709 - 715
  • [24] A Study of Effective Defense-In-Depth Strategy of Cyber Security on ICS
    Choi, Seong-Muk
    Kim, Rae-Hyung
    Kim, Ga-Ye
    Lee, Hyeon-Kyung
    Gim, GwangYong
    Kim, Jong-Bae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 235 - 242
  • [25] Defense-in-Depth Strategy for Smart Service Sever Cyber Security
    Son, Hanseong
    Kim, Soongohn
    COMPUTER APPLICATIONS FOR COMMUNICATION, NETWORKING, AND DIGITAL CONTENTS, 2012, 350 : 181 - +
  • [26] Formalizing Agents' Beliefs for Cyber-Security Defense Strategy Planning
    Martiny, Karsten
    Motzek, Alexander
    Moeller, Ralf
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 15 - 25
  • [27] Resilient predictive control strategy of cyber-physical systems against FDI attack
    He, Ning
    Ma, Kai
    Li, Huiping
    IET CONTROL THEORY AND APPLICATIONS, 2022, 16 (11): : 1098 - 1109
  • [28] A resilient defense strategy against false data injection attack in smart grid
    Xu, Zheng
    Ma, Qiang
    Lin, Lin
    Nie, Qi-Gui
    Liu, Xin
    Yang, De-Fu
    Li, Jian
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 4726 - 4731
  • [29] Resilient strategy design for cyber-physical system under active eavesdropping attack
    Yuan, Huanhuan
    Xia, Yuanqing
    Yuan, Yuan
    Yang, Hongjiu
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (10): : 5281 - 5304
  • [30] Bio-inspired Evolutionary Sensory System for Cyber-Physical System Defense
    Azab, Mohamed
    Eltoweissy, Mohamed
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 79 - 86