Creating a cyber moving target for critical infrastructure applications using platform diversity
نویسندگان
چکیده
Despite the significant effort that often goes into securing critical infrastructure assets, many systems remain vulnerable to advanced, targeted cyber attacks. This paper describes the design and implementation of the Trusted Dynamic Logical Heterogeneity System (TALENT), a framework for live-migrating critical infrastructure applications across heterogeneous platforms. TALENT permits a running critical application to change its hardware platform and operating system, thus providing cyber survivability through platform diversity. TALENT uses containers (operating-system-level virtualization) and a portable checkpoint compiler to create a virtual execution environment and to migrate a running application across different platforms while preserving the state of the application (execution state, open files and network connections). TALENT is designed to support general applications written in the C programming language. By changing the platform on-the-fly, TALENT creates a cyber moving target and significantly raises the bar for a successful attack against a critical application. Experiments demonstrate that a complete migration can be completed within about one second. c ⃝ 2012 Elsevier B.V. All rights reserved.
منابع مشابه
Creating a Cyber Moving Target for Critical Infrastructure Applications
Despite the significant amount of effort that often goes into securing critical infrastructure assets, many systems remain vulnerable to advanced, targeted cyber attacks. This paper describes the design and implementation of the Trusted Dynamic Logical Heterogeneity System (TALENT), a framework for live-migrating critical infrastructure applications across heterogeneous platforms. TALENT permit...
متن کاملAdaptive Attacker Strategy Development Against Moving Target Cyber Defenses
A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the temporal ordering of resource investments that bring targeted zero-da...
متن کاملAchieving Cyber Survivability in a Contested Environment Using a Cyber Moving Target
E cyber threats in a contested environment provide a challenge in protecting operations and critical assets. Traditional cyber protection mechanisms can prove ineffective when facing a motivated, well-resourced adversary. As a result, many mission critical systems remain vulnerable to advanced, targeted cyber attacks despite the significant amount of effort and resources used to secure them. Co...
متن کاملArtificial Diversity as Maneuvers in a Control Theoretic Moving Target Defense
Moving target cyber-defense systems encompass a wide variety of techniques in multiple areas of cyber-security. The dynamic system reconfiguration aspect of moving target cyber-defense can be used as a basis for providing an adaptive attack surface. The goal of this research is to develop novel control theoretic mechanisms by which a range of cyber maneuver techniques are provided such that whe...
متن کاملMoving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats
Excellent book is always being the best friend for spending little time in your office, night time, bus, and everywhere. It will be a good way to just look, open, and read the book while in that time. As known, experience and skill don't always come with the much money to acquire them. Reading this book with the PDF moving target defense creating asymmetric uncertainty for cyber threats will le...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJCIP
دوره 5 شماره
صفحات -
تاریخ انتشار 2012