An Evolutionary Strategy for Resilient Cyber Defense

被引:4
|
作者
Fulp, Errin W. [1 ]
Gage, H. Donald [1 ]
John, David J. [1 ]
McNiece, Matthew R. [1 ]
Turkett, William H. [1 ]
Zhou, Xin [1 ]
机构
[1] Wake Forest Univ, Dept Comp Sci, Winston Salem, NC 27109 USA
关键词
D O I
10.1109/GLOCOM.2015.7417814
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Many cyber attacks can be attributed to poorly configured software, where administrators are often unaware of insecure settings due to the configuration complexity or the novelty of an attack. A resilient configuration management approach would address this problem by updating configuration settings based on current threats while continuing to render useful services. This responsive and adaptive behavior can be obtained using an evolutionary algorithm, where security measures of current configurations are employed to evolve new configurations. Periodically, these configurations are applied across a collection of computers, changing the systems' attack surfaces and reducing their exposure to vulnerabilities. The effectiveness of this evolutionary strategy for defending RedHat Linux Apache web-servers is analyzed experimentally through a study of configuration fitness, population diversity, and resiliency observations. Configuration fitness reflects the level of system confidentiality, integrity and availability; whereas, population diversity gauges the heterogeneous nature of the configuration sets. The computers' security depends upon the discovery of a diverse set of highly fit parameter configurations. Resilience reflects the evolutionary algorithm's adaptability to new security threats. Experimental results indicate the approach is able to determine and maintain secure parameter settings when confronted with a variety of simulated attacks over time.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Coordinated Cyber Physical Attacks and Defense Strategy in Cyber-Physical Power Systems Based on Game Theory
    Yang, Jun
    Zhao, Yulong
    Dong, Chenchen
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2025,
  • [32] Optimal defense strategy based on the mean field game model for cyber security
    Miao, Li
    Wang, Lina
    Li, Shuai
    Xu, Haitao
    Zhou, Xianwei
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (02)
  • [33] A Diversity-Based Substation Cyber Defense Strategy Utilizing Coloring Games
    Touhiduzzaman, Md
    Hahn, Adam
    Srivastava, Anurag K.
    IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (05) : 5405 - 5415
  • [34] Cyber Attack-Defense Game Strategy Solving Based on Reinforcement Learning and Self-play Cyber Attack-Defense Game Solver
    Zhang, Jie
    Luo, Yunfeng
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 135 - 141
  • [35] A cyber defense framework
    Kang, MH
    Mayfield, T
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTING TECHNIQUES, 2004, : 526 - 531
  • [36] Cyber diplomacy and cyber defense in the European Union
    Segura, Antonio
    REVISTA GENERAL DE DERECHO EUROPEO, 2021, (54): : 377 - 379
  • [37] Cyber Diplomacy and Cyber Defense in the European Union
    Perez Bernardez, Carmela
    REVISTA ELECTRONICA DE ESTUDIOS INTERNACIONALES, 2021, (41):
  • [38] Defense Strategy Selection Model Based on Multistage Evolutionary Game Theory
    Liu Y.
    Chen H.
    Zhang H.
    Liu X.
    Security and Communication Networks, 2021, 2021
  • [39] Distributed Resilient Mitigation Strategy for False Data Injection Attack in Cyber-Physical Microgrids
    Cao, Ge
    Jia, Rong
    Dang, Jian
    FRONTIERS IN ENERGY RESEARCH, 2022, 10
  • [40] RESILIENT CYBER-MANUFACTURING SYSTEMS UNDER CYBER ATTACKS
    Espinoza-Zelaya, Carlos
    Moon, Young
    PROCEEDINGS OF ASME 2021 INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION (IMECE2021), VOL 2B, 2021,