Metrics Towards Measuring Cyber Agility

作者: Jin-Hee Cho , Shouhuai Xu , Patrick Hurley , Jose David Mireles , Eric Ficke

DOI: 10.1109/TIFS.2019.2912551

关键词:

摘要: In cyberspace, evolutionary strategies are commonly used by both attackers and defenders. For example, an attacker’s strategy often changes over the course of time, as new vulnerabilities discovered and/or mitigated. Similarly, a defender’s time. These may or not be in direct response to change opponent’s strategy. any case, it is important have set quantitative metrics characterize understand effectiveness attackers’ defenders’ strategies, which reflect their cyber agility . Despite its clear importance, few systematic been developed quantify this paper, we propose first metric framework for measuring terms dynamic evolution attacks defenses. The proposed generic applicable transform relevant, quantitative, conventional static security (e.g., false positives negatives) into capture dynamics system behaviors. order validate usefulness framework, conduct case studies on defenses using two real-world datasets. We discuss limitations current work identify future research directions.

参考文章(45)
Marc Kührer, Christian Rossow, Thorsten Holz, Paint It Black: Evaluating the Effectiveness of Malware Blacklists recent advances in intrusion detection. pp. 1- 21 ,(2014) , 10.1007/978-3-319-11379-1_1
Fabian Monrose, Moheeb Abu Rajab, Andreas Terzis, On the effectiveness of distributed worm monitoring usenix security symposium. pp. 15- 15 ,(2005)
Niels Provos, A virtual honeypot framework usenix security symposium. pp. 1- 1 ,(2004)
Y.Y Yusuf, M Sarhadi, A Gunasekaran, Agile manufacturing: The drivers, concepts and attributes International Journal of Production Economics. ,vol. 62, pp. 33- 43 ,(1999) , 10.1016/S0925-5273(98)00219-9
David S. Alberts, Agility Quotient (AQ) Defense Technical Information Center. ,(2014) , 10.21236/ADA605273
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
Yu-Zhong Chen, Zi-Gang Huang, Shouhuai Xu, Ying-Cheng Lai, Spatiotemporal Patterns and Predictability of Cyberattacks PLOS ONE. ,vol. 10, pp. e0124472- ,(2015) , 10.1371/JOURNAL.PONE.0124472