Proactive Infrastructure Security: Evolutionary Generation of Terrorism Scenarios Stage I: Feasibility Study and Building Demonstration Systems Proactive Security: A Co-evolutionary Approach*
نویسندگان
چکیده
The objectives of this working paper are to propose a general concept of proactive security in the context of co-evolutionary computation and to briefly discuss the initial results of research recently began. First, the paper provides an overview of infrastructure security in the context of asymmetric threats. Next, concepts of proactive security are proposed based on co-evolution of terrorist scenarios and security plans. The paper also presents an outline of generation of terrorist scenarios in the context of conceptual design. Finally, it describes TerrorMax/Capitol Hill, a demonstration system being developed for dealing with the generation of terrorist scenarios related to the Capitol Hill in Washington DC. The paper also provides initial discussions of this recently initiated project.
منابع مشابه
Proactive Infrastructure Security: From Evolutionary Approaches to the Use of Cellular Automata
The main objective of the paper is to propose several novel approaches to security of complex infrastructure systems, which can be utilized in the development of a class of computer tools for infrastructure protection. First, the paper introduces the concept of proactive infrastructure security and compares it with reactive security. The comparison is done in the context of the generation and e...
متن کاملA hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...
متن کاملبررسی نقش عوامل مؤثر بر فراوانی حوادث در لولههای اصلی آب رسانی با استفاده از الگوی رگرسیونی ترکیبی
A water distribution network is one of the important parts of infrastructure systems. The efficient management and proactive planning of capital investment of these assets are fundamental for efficient and effective service delivered by water companies. The direct economic costs (i.e. rehabilitation investment, repair costs, water loss, etc.) as well as indirect costs (i.e. service and traffic ...
متن کاملChord-PKI: A distributed trust infrastructure based on P2P networks
Many P2P applications require security services such as privacy, anonymity, authentication, and non-repudiation. Such services could be provided through a hierarchical Public Key Infrastructure. However, P2P networks are usually Internet-scale distributed systems comprised of nodes with undetermined trust level, thus making hierarchical solutions unrealistic. In this paper, we propose Chord-PKI...
متن کاملSIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes
Embedded nodes are widely used in several application domains thanks to low-costs and their data acquisition and processing capabilities. In the recent years, particular emphasis was given to pervasive wireless sensor nodes that enabled innovative applications for infrastructure monitoring, crowd-source sensing and mobile cyber-physical infrastructure. Indeed, security is one of the main open c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005