Towards Fundamental Science of Cyber Security

作者: Alexander Kott

DOI: 10.1007/978-1-4614-7597-2_1

关键词: Key (cryptography)MalwareIntrusion detection systemSalientComputer scienceArtifact (software development)SoftwareFormalism (philosophy)Domain (software engineering)Computer security

摘要: Terms like “Science of Cyber” or “Cyber Science” have been appearing in literature with growing frequency, and influential organizations initiated research initiatives toward developing such a science even though it is not clearly defined. We propose to define the domain cyber security by noting most salient artifact within security—malicious software—and defining as comprised phenomena that involve malicious software (as well legitimate protocols used maliciously) compel computing device network devices perform actions desired perpetrator (the attacker) generally contrary intent policy) owner operator defender) device(s). further study relations—preferably expressed theoretically-grounded models—between attributes, structures dynamics of: violations policy; under attack; defenders’ tools techniques; attackers’ techniques where plays central role. offer simple formalism these key objects systematically derive classification primary problem classes science.

参考文章(26)
Don Torrieri, Sencun Zhu, Sushil Jajodia, Cyber Maneuver Against External Adversaries and Compromised Nodes Moving Target Defense. pp. 87- 96 ,(2013) , 10.1007/978-1-4614-5416-8_5
Tom Ziemke, Marcus Brohede, Lars Niklasson, Henrik Boström, Sten F. Andler, Anne Persson, Ronnie Johansson, Joeri van Laere, Alexander Karlsson, Marie Nilsson, On the Definition of Information Fusion as a Field of Research Institutionen för kommunikation och information. ,(2007)
Linqiang Ge, Hui Liu, Difan Zhang, Wei Yu, Rommie Hardy, Robert Reschly, None, On effective sampling techniques for host-based intrusion detection in MANET military communications conference. pp. 1- 6 ,(2012) , 10.1109/MILCOM.2012.6415605
Animesh Patcha, Jung-Min Park, None, An overview of anomaly detection techniques: Existing solutions and latest technological trends Computer Networks. ,vol. 51, pp. 3448- 3470 ,(2007) , 10.1016/J.COMNET.2007.02.001
Alexander Kott, Curtis Arnold, The Promises and Challenges of Continuous Monitoring and Risk Scoring ieee symposium on security and privacy. ,vol. 11, pp. 90- 93 ,(2013) , 10.1109/MSP.2013.19
Nancy Cartwright, How the laws of physics lie ,(1983)