Cyber Maneuvers and Maneuver Keys

被引:2
|
作者
Torrieri, Don [1 ]
机构
[1] US Army Res Lab, Adelphi, MD 20783 USA
关键词
INTRUSION DETECTION; ATTACKS;
D O I
10.1109/MILCOM.2014.48
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper presents an overview of cyber maneuvers and their roles in cyber security. As the cyber war escalates, a strategy that preemptively limits and curtails attacks is required. Such a proactive strategy is called a cyber maneuver and is a refinement of the concept of a moving-target defense, which includes both reactive and proactive network changes. The major advantages of cyber maneuvers relative to other moving-target defenses are described. The use of maneuver keys in making cyber maneuvers much more feasible and affordable is explained. As specific examples, the applications of maneuver keys in encryption algorithms and as spread-spectrum keys are described. The integration of cyber maneuvers into a complete cyber security system with intrusion detection, identification of compromised nodes, and secure rekeying is presented. An example of secure rekeying despite the presence of compromised nodes is described.
引用
收藏
页码:262 / 267
页数:6
相关论文
共 50 条
  • [1] Implementation of tactical maneuvers with maneuver libraries
    Lee, Do Hyeon
    Kim, Chang-Joo
    Hur, Sung Wook
    Lee, Seong Han
    CHINESE JOURNAL OF AERONAUTICS, 2020, 33 (01) : 255 - 270
  • [2] Implementation of tactical maneuvers with maneuver libraries
    Do hyeon LEE
    Chang-Joo KIM
    Sung wook HUR
    Seong han LEE
    Chinese Journal of Aeronautics , 2020, (01) : 255 - 270
  • [3] Implementation of tactical maneuvers with maneuver libraries
    Do hyeon LEE
    Chang-Joo KIM
    Sung wook HUR
    Seong han LEE
    Chinese Journal of Aeronautics, 2020, 33 (01) : 255 - 270
  • [4] Presenting a method to perform cyber maneuvers
    Shakibazad, Mohammad
    Rashidi, AliJabar
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2018, 26 (04) : 1977 - 1988
  • [5] Proactive Restart as Cyber Maneuver for Android
    Shan, Zhiyong
    Neamtiu, Iulian
    Qian, Zhiyun
    Torrieri, Don
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 19 - 24
  • [6] CYBER DEFENSE NETWORK MANEUVER COMMANDER
    Beraud, Paul
    Cruz, Alen
    Hassell, Suzanne
    Sandoval, Juan
    Wiley, Jeffrey J.
    44TH ANNUAL 2010 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2010, : 112 - 120
  • [7] A Framework to Create a Virtual Cyber Battlefield for Cyber Maneuvers and Impact Assessment
    Mohammad Shakibazad
    Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 2019, 43 : 615 - 625
  • [8] A Framework to Create a Virtual Cyber Battlefield for Cyber Maneuvers and Impact Assessment
    Shakibazad, Mohammad
    IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING, 2019, 43 (03) : 615 - 625
  • [9] Possible Scenarios and Maneuvers for Cyber Operational Area
    Akyazi, Ugur
    PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 1 - 7
  • [10] Understaning maneuver uncertainties during inclination maneuvers of the aqua spacecraft
    McKinley, David P.
    ASTRODYNAMICS 2007, PTS I-III, 2008, 129 : 2767 - 2783