SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense

被引:0
|
作者
Al-Shaer, Ehab [1 ]
Oehmen, Christopher [2 ]
Rahman, M. Ashiqur [3 ]
机构
[1] Univ North Carolina Charlotte, Charlotte, NC 28223 USA
[2] Pacific Northwest Natl Lab, Richland, WA 99352 USA
[3] Tennessee Technol Univ, Cookeville, TN USA
关键词
Active cyber defense; automated decision making; security and resiliency systems;
D O I
10.1145/2810103.2812624
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The 8th SafeConfig Workshop is held in Denver, Colorado USA on October 12, 2015 and being run with the conjunction of the 22nd ACM Conference on Computer and Communications Security (CCS). The title of this year's SafeConfig is "Automated Decision Making for Cyber Security". Today, the use of cyber technology is evolving rapidly. The computing and networking is everywhere, public to private organizations, large enterprises to individuals, and data centers to smart phones and Internet-of-Things. The highly growing use of the Internet also leads to newly evolving security threats. The automated decision making should be able to determine the security and resiliency of networked information systems and services. The integration of security requirements, capabilities, and deployment constraints in a unified framework will enable intelligent response, automated defense, and network resiliency.
引用
收藏
页码:1711 / 1712
页数:2
相关论文
共 50 条
  • [1] SafeConfig17: Applying the Scientific Method to Active Cyber Defense Research
    Multari, Nicholas J.
    Singhal, Anoop
    Miller, Erin
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2641 - 2642
  • [2] SafeConfig'16-Testing and Evaluation for Active and Resilient Cyber Systems
    Multari, Nicholas J.
    Singhal, Anoop
    Manz, David
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1871 - 1872
  • [3] Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks
    Alsaleh, Mohammed Noraden
    Al-Shaer, Ehab
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON AUTOMATED DECISION MAKING FOR ACTIVE CYBER DEFENSE (SAFECONFIG'16), 2016, : 23 - 29
  • [4] Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game
    Hu, Hao
    Liu, Yuling
    Chen, Chen
    Zhang, Hongqi
    Liu, Yi
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (03): : 1683 - 1700
  • [5] An Active Security Defense Strategy for Wind Farm Based on Automated Decision
    Lai, Jun
    Duan, Bin
    Su, Yongxin
    Li, Lan
    Yin, Qiaoxuan
    2017 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, 2017,
  • [6] Research and Challenges of Reinforcement Learning in Cyber Defense Decision-Making for Intranet Security
    Wang, Wenhao
    Sun, Dingyuanhao
    Jiang, Feng
    Chen, Xingguo
    Zhu, Cheng
    ALGORITHMS, 2022, 15 (04)
  • [7] SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel Verification of Active and Resilient Systems: Practical or Utopian?
    Multari, Nicholas J.
    Singhal, Anoop
    Manz, David O.
    Cowles, Robert
    Cuellar, Jorge
    Oehmen, Christopher
    Shannon, Gregory
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON AUTOMATED DECISION MAKING FOR ACTIVE CYBER DEFENSE (SAFECONFIG'16), 2016, : 53 - 54
  • [8] US Policy on Active Cyber Defense
    Flowers, Angelyn
    Zeadally, Sherali
    JOURNAL OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT, 2014, 11 (02) : 289 - 308
  • [9] Framework and principles for active cyber defense
    Denning, Dorothy E.
    COMPUTERS & SECURITY, 2014, 40 : 108 - 113
  • [10] Cyber Threat Hunting Through Automated Hypothesis and Multi-Criteria Decision Making
    Horta Neto, Antonio Jose
    Pereira dos Santos, Anderson Fernandes
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 1823 - 1830