共 50 条
Cyber Maneuvers and Maneuver Keys
被引:2
|作者:
Torrieri, Don
[1
]
机构:
[1] US Army Res Lab, Adelphi, MD 20783 USA
关键词:
INTRUSION DETECTION;
ATTACKS;
D O I:
10.1109/MILCOM.2014.48
中图分类号:
TN [电子技术、通信技术];
学科分类号:
0809 ;
摘要:
This paper presents an overview of cyber maneuvers and their roles in cyber security. As the cyber war escalates, a strategy that preemptively limits and curtails attacks is required. Such a proactive strategy is called a cyber maneuver and is a refinement of the concept of a moving-target defense, which includes both reactive and proactive network changes. The major advantages of cyber maneuvers relative to other moving-target defenses are described. The use of maneuver keys in making cyber maneuvers much more feasible and affordable is explained. As specific examples, the applications of maneuver keys in encryption algorithms and as spread-spectrum keys are described. The integration of cyber maneuvers into a complete cyber security system with intrusion detection, identification of compromised nodes, and secure rekeying is presented. An example of secure rekeying despite the presence of compromised nodes is described.
引用
收藏
页码:262 / 267
页数:6
相关论文