Proactive Infrastructure Security: Evolutionary Generation of Terrorism Scenarios Stage I: Feasibility Study and Building Demonstration Systems Proactive Security: A Co-evolutionary Approach*

نویسندگان

  • Tomasz Arciszewski
  • Kenneth DeJong
  • Andrew Sage
  • Mike Goode
  • Rafal Kicinger
  • Zbigniew Skolicki
چکیده

The objectives of this working paper are to propose a general concept of proactive security in the context of co-evolutionary computation and to briefly discuss the initial results of research recently began. First, the paper provides an overview of infrastructure security in the context of asymmetric threats. Next, concepts of proactive security are proposed based on co-evolution of terrorist scenarios and security plans. The paper also presents an outline of generation of terrorist scenarios in the context of conceptual design. Finally, it describes TerrorMax/Capitol Hill, a demonstration system being developed for dealing with the generation of terrorist scenarios related to the Capitol Hill in Washington DC. The paper also provides initial discussions of this recently initiated project.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proactive Infrastructure Security: From Evolutionary Approaches to the Use of Cellular Automata

The main objective of the paper is to propose several novel approaches to security of complex infrastructure systems, which can be utilized in the development of a class of computer tools for infrastructure protection. First, the paper introduces the concept of proactive infrastructure security and compares it with reactive security. The comparison is done in the context of the generation and e...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

بررسی نقش عوامل مؤثر بر فراوانی حوادث در لوله‌های اصلی آب رسانی ‌با استفاده از الگوی رگرسیونی ترکیبی

A water distribution network is one of the important parts of infrastructure systems. The efficient management and proactive planning of capital investment of these assets are fundamental for efficient and effective service delivered by water companies. The direct economic costs (i.e. rehabilitation investment, repair costs, water loss, etc.) as well as indirect costs (i.e. service and traffic ...

متن کامل

Chord-PKI: A distributed trust infrastructure based on P2P networks

Many P2P applications require security services such as privacy, anonymity, authentication, and non-repudiation. Such services could be provided through a hierarchical Public Key Infrastructure. However, P2P networks are usually Internet-scale distributed systems comprised of nodes with undetermined trust level, thus making hierarchical solutions unrealistic. In this paper, we propose Chord-PKI...

متن کامل

SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes

Embedded nodes are widely used in several application domains thanks to low-costs and their data acquisition and processing capabilities. In the recent years, particular emphasis was given to pervasive wireless sensor nodes that enabled innovative applications for infrastructure monitoring, crowd-source sensing and mobile cyber-physical infrastructure. Indeed, security is one of the main open c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005