Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks

被引:3
|
作者
Clark, Shane S. [1 ]
Paulos, Aaron [1 ]
Benyo, Brett [1 ]
Pal, Partha [1 ]
Schantz, Richard [1 ]
机构
[1] BBN Technol, Cambridge, MA 02138 USA
关键词
Adaptive Security; Zero-day Attacks; Novel Attacks; Record & Replay; Survivability;
D O I
10.1109/ARES.2015.89
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A3 is an execution management environment that aims to make network-facing applications and services resilient against zero-day attacks. A3 recently underwent two adversarial evaluations of its defensive capabilities. In one, A3 defended an App Store used in a Capture the Flag (CTF) tournament, and in the other, a tactically relevant network service in a red team exercise. This paper describes the A3 defensive technologies evaluated, the evaluation results, and the broader lessons learned about evaluations for technologies that seek to protect critical systems from zero-day attacks.
引用
收藏
页码:80 / 89
页数:10
相关论文
共 50 条
  • [1] Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks
    Wang, Lingyu
    Zhang, Mengyuan
    Jajodia, Sushil
    Singhal, Anoop
    Albanese, Massimiliano
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 494 - 511
  • [2] Defence against the dark art of zero-day attacks
    Madou M.
    Network Security, 2022, 2022 (11)
  • [3] Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks
    Zhang, Mengyuan
    Wang, Lingyu
    Jajodia, Sushil
    Singhal, Anoop
    Albanese, Massimiliano
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) : 1071 - 1086
  • [4] Detection of Zero-day Attacks on IoT
    Reardon, Shay
    Hssayeni, Murtadha D.
    Mahgoub, Imadeldin
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [5] Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
    Ali, Shamshair
    Rehman, Saif Ur
    Imran, Azhar
    Adeem, Ghazif
    Iqbal, Zafar
    Kim, Ki-Il
    ELECTRONICS, 2022, 11 (23)
  • [6] Detecting and Analyzing Zero-day Attacks using Honeypots
    Musca, Constantin
    Mirica, Emma
    Deaconescu, Razvan
    19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 543 - 548
  • [7] Patching zero-day vulnerabilities: an empirical analysis
    Roumani, Yaman
    JOURNAL OF CYBERSECURITY, 2021, 7 (01):
  • [8] Protecting Embedded Systems from Zero-Day Attacks
    Taylor, Stephen
    NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 165 - 168
  • [9] A Zero-Shot Learning-Based Detection Model Against Zero-Day Attacks in IoT
    Gao, Xueqin
    Chen, Kai
    Zhao, Yufei
    Zhang, Peng
    Han, Longxi
    Zhang, Daojuan
    2024 9TH INTERNATIONAL CONFERENCE ON ELECTRONIC TECHNOLOGY AND INFORMATION SCIENCE, ICETIS 2024, 2024, : 309 - 314
  • [10] Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks
    Zhang, Mengyuan
    Wang, Lingyu
    Jajodia, Sushil
    Singhal, Anoop
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 310 - 324