An Evolutionary Strategy for Resilient Cyber Defense

被引:4
|
作者
Fulp, Errin W. [1 ]
Gage, H. Donald [1 ]
John, David J. [1 ]
McNiece, Matthew R. [1 ]
Turkett, William H. [1 ]
Zhou, Xin [1 ]
机构
[1] Wake Forest Univ, Dept Comp Sci, Winston Salem, NC 27109 USA
关键词
D O I
10.1109/GLOCOM.2015.7417814
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Many cyber attacks can be attributed to poorly configured software, where administrators are often unaware of insecure settings due to the configuration complexity or the novelty of an attack. A resilient configuration management approach would address this problem by updating configuration settings based on current threats while continuing to render useful services. This responsive and adaptive behavior can be obtained using an evolutionary algorithm, where security measures of current configurations are employed to evolve new configurations. Periodically, these configurations are applied across a collection of computers, changing the systems' attack surfaces and reducing their exposure to vulnerabilities. The effectiveness of this evolutionary strategy for defending RedHat Linux Apache web-servers is analyzed experimentally through a study of configuration fitness, population diversity, and resiliency observations. Configuration fitness reflects the level of system confidentiality, integrity and availability; whereas, population diversity gauges the heterogeneous nature of the configuration sets. The computers' security depends upon the discovery of a diverse set of highly fit parameter configurations. Resilience reflects the evolutionary algorithm's adaptability to new security threats. Experimental results indicate the approach is able to determine and maintain secure parameter settings when confronted with a variety of simulated attacks over time.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach
    Casola, Valentina
    De Benedictis, Alessandra
    Mazzocca, Carlo
    Montanari, Rebecca
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2024, 12 (02) : 631 - 642
  • [42] A Cyber Resilient Design for Control Systems
    Rieger, Craig
    Kolias, Constantinos
    Ulrich, Jacob
    McJunkin, Timothy R.
    2020 RESILIENCE WEEK (RWS), 2020, : 18 - 25
  • [43] Understanding the management of cyber resilient systems
    Annarelli, Alessandro
    Nonino, Fabio
    Palombi, Giulia
    COMPUTERS & INDUSTRIAL ENGINEERING, 2020, 149
  • [44] Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems
    Xiao, Kaiming
    Zhu, Cheng
    Xie, Junjie
    Zhou, Yun
    Zhu, Xianqiang
    Zhang, Weiming
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1799 - 1807
  • [45] Generating Network Security Defense Strategy Based on Cyber Threat Intelligence Knowledge Graph
    Zhang, Shuqin
    Li, Shuhan
    Chen, Peng
    Wang, Shijie
    Zhao, Chunxia
    EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 507 - 519
  • [46] Autonomous Cyber Defense Against Dynamic Multi-strategy Infrastructural DDoS Attacks
    Dutta, Ashutosh
    Al-Shaer, Ehab
    Chatterjee, Samrat
    Duan, Qi
    2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [47] Improved Cyber Defense Modeling Framework for Modeling and Simulating the Lifecycle of Cyber Defense Activities
    Kim, Donghwa
    Ahn, Myung Kil
    Lee, Seongkee
    Lee, Donghwan
    Park, Moosung
    Shin, Dongkyoo
    IEEE ACCESS, 2023, 11 : 114187 - 114200
  • [48] Combining Cybersecurity and Cyber Defense to achieve Cyber Resilience
    Galinec, Darko
    Steingartner, William
    2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 87 - 93
  • [49] Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy
    Su, Qingyu
    Wang, Handong
    Sun, Chaowei
    Li, Bo
    Li, Jian
    APPLIED MATHEMATICS AND COMPUTATION, 2022, 413
  • [50] Agile monitoring for cyber Defense
    Doyle, J
    Kohane, I
    Long, W
    Shrobe, H
    Szolovits, P
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 318 - 328