CYBER DEFENSE NETWORK MANEUVER COMMANDER

被引:3
|
作者
Beraud, Paul [1 ]
Cruz, Alen [1 ]
Hassell, Suzanne [1 ]
Sandoval, Juan [1 ]
Wiley, Jeffrey J. [2 ]
机构
[1] Raytheon Co, 8333 Bryan Dairy Rd, Largo, FL 33777 USA
[2] Raytheon Co, Garland, TX 75042 USA
关键词
cyber security; dynamic defense; command and control; network maneuver; defense metrics;
D O I
10.1109/CCST.2010.5678724
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Network Maneuver Commander (NMC) is a research project to develop a prototype cyber command and control (C2) system that maneuvers network-based elements preemptively, and to develop performance metrics to be used for the evaluation of cyber dynamic defense solutions. The Network Maneuver Commander addresses the gap area between active information operations & reactive information assurance defenses, by focusing on the introduction of artificial diversity of hardware platforms, operating systems, IP addresses and hypervisors. NMC also establishes metrics to determine the benefit of these defensive techniques. The goals of the research were to increase the investment an attacker must make to succeed, increase the exposure of an attacker to detection as the attacker is forced to out-maneuver target reconfigurations, increase the uncertainty of the success of the attack, increase the survivability in the presence of attacks, and to define metrics associated with cyber operations for dynamic defense.
引用
收藏
页码:112 / 120
页数:9
相关论文
共 50 条
  • [31] Building Resilient Cyber Defense
    Kharwal, Rakesh
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 5 - 5
  • [32] Neuroevolution for Autonomous Cyber Defense
    Heckel, Kade M.
    PROCEEDINGS OF THE 2023 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION, GECCO 2023 COMPANION, 2023, : 651 - 654
  • [33] Architecture of a Cyber Defense competition
    Schepens, WJ
    James, JR
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 4300 - 4305
  • [34] Denial and Deception in Cyber Defense
    Heckman, Kristin E.
    Stech, Frank J.
    Schmoker, Ben S.
    Thomas, Roshan K.
    COMPUTER, 2015, 48 (04) : 36 - 44
  • [35] Defense on the Move: Ant-Based Cyber Defense
    Fink, Glenn A.
    Haack, Jereme N.
    McKinnon, A. David
    Fulp, Errin W.
    IEEE SECURITY & PRIVACY, 2014, 12 (02) : 36 - 43
  • [36] Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
    Shukla, Sandeep K.
    2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 30 - 31
  • [37] Generating Network Security Defense Strategy Based on Cyber Threat Intelligence Knowledge Graph
    Zhang, Shuqin
    Li, Shuhan
    Chen, Peng
    Wang, Shijie
    Zhao, Chunxia
    EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 507 - 519
  • [38] MANEUVER, MOBILE DEFENSE, AND THE NATO CENTRAL FRONT
    MEARSHEIMER, JJ
    INTERNATIONAL SECURITY, 1982, 6 (03) : 104 - 122
  • [39] Changing the Face of Cyber Warfare with International Cyber Defense Collaboration
    Grobler, Marthie
    van Vuuren, Joey Jansen
    Zaaiman, Jannie
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 92 - 98
  • [40] Cyber Crime Hospitals lack the Money for a successful Cyber Defense
    不详
    GESUNDHEITSOEKONOMIE UND QUALITAETSMANAGEMENT, 2021, 26 (01): : 21 - +