TY - GEN
T1 - Adversarial and uncertain reasoning for adaptive cyber defense
T2 - 10th International Conference on Information Systems Security, ICISS 2014
AU - Cybenko, George
AU - Jajodia, Sushil
AU - Wellman, Michael P.
AU - Liu, Peng
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2014.
PY - 2014
Y1 - 2014
N2 - Today’s cyber defenses are largely static. They are governed by slow deliberative processes involving testing, security patch deployment, and humanin-the-loop monitoring. As a result, adversaries can systematically probe target networks, pre-plan their attacks, and ultimately persist for long times inside compromised networks and hosts. A new class of technologies, called Adaptive Cyber Defense (ACD), is being developed that presents adversaries with optimally changing attack surfaces and system configurations, forcing adversaries to continually re-assess and re-plan their cyber operations. Although these approaches (e.g., moving target defense, dynamic diversity, and bio-inspired defense) are promising, they assume stationary and stochastic, but nonadversarial, environments. To realize the full potential, we need to build the scientific foundations so that system resiliency and robustness in adversarial settings can be rigorously defined, quantified, measured, and extrapolated in a rigorous and reliable manner.
AB - Today’s cyber defenses are largely static. They are governed by slow deliberative processes involving testing, security patch deployment, and humanin-the-loop monitoring. As a result, adversaries can systematically probe target networks, pre-plan their attacks, and ultimately persist for long times inside compromised networks and hosts. A new class of technologies, called Adaptive Cyber Defense (ACD), is being developed that presents adversaries with optimally changing attack surfaces and system configurations, forcing adversaries to continually re-assess and re-plan their cyber operations. Although these approaches (e.g., moving target defense, dynamic diversity, and bio-inspired defense) are promising, they assume stationary and stochastic, but nonadversarial, environments. To realize the full potential, we need to build the scientific foundations so that system resiliency and robustness in adversarial settings can be rigorously defined, quantified, measured, and extrapolated in a rigorous and reliable manner.
UR - http://www.scopus.com/inward/record.url?scp=84918576873&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84918576873&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-13841-1_1
DO - 10.1007/978-3-319-13841-1_1
M3 - Conference contribution
AN - SCOPUS:84918576873
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1
EP - 8
BT - Information Systems Security - 10th International Conference, ICISS 2014, Proceedings
A2 - Prakash, Atul
A2 - Shyamasundar, Rudrapatna
PB - Springer Verlag
Y2 - 16 December 2014 through 20 December 2014
ER -