نتایج جستجو برای: cyber defense
تعداد نتایج: 91877 فیلتر نتایج به سال:
As Defense agencies and services expand their reliance on computer networks, risk to information availability and integrity increases. It is no longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare, and deploy our resources using the strategy and tactics of warfare. Most Defense organizations ha...
Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading “white” or “benign” worms to combat against the attackers’ malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of optimal a...
This report describes an initial reference architecture for intelligent software agents performing active, largely autonomous cyber defense actions on military networks of computing and communicating devices. The report is produced by the North Atlantic Treaty Organization (NATO) Research Task Group (RTG) IST-152"Intelligent Autonomous Agents for Cyber Defense and Resilience". In a conflict wit...
Cyber attacks have greatly increased over the years, where the attackers have progressively improved in devising attacks towards a specific target. To aid in identifying and defending against cyber attacks we propose a cyber attack taxonomy called AVOIDIT (Attack Vector, Operational Impact, Defense, Information Impact, and Target). We use five major classifiers to characterize the nature of an ...
1. Be aware of the current situation. This aspect can also be called situation perception. Situation perception includes both situation recognition and identification. Situation identification can include identifying the type of attack (recognition is only recognizing that an attack is occurring), the source (who, what) of an attack, the target of an attack, etc. Situation perception is beyond ...
This paper considers the impact of Stuxnet on cyber-attacks and cyber-defense. It first reviews trends in cyber-weapons and how Stuxnet fits into these trends. Because Stuxnet targeted an industrial control system in order to wreak physical damage, the focus is on weapons that target systems of that type and produce physical effects. The paper then examines the impact of Stuxnet on various doma...
In this work, the author develops and explains a set of economic models under the decision theoretic framework to conceptualize the requisite levels of investment in the defense against cyber terrorism. This paper begins with a naïve model of cyber defense, on which the author progressively implements aspects of layered defense and domain conditionality to investigate practicable investment lev...
As governments become increasingly involved in cyberspace for military purposes, they tend to consider the cyber domain as critical part of their security strategies. This growing reliance on cyber assets calls for deeper investigation on the features of cyberspace as well as their impact on state rivalry. The paper draws from the insights of Offence/Defense Balance (ODB) theory to discuss whet...
In this paper a novel method for detection of network attacks and malicious code is described. The method is based on main principles of Artificial Immune Systems where immune detectors have an Artificial Neural Network’s structure. The main goal of proposed approach is to detect unknown, previous unseen cyber attacks (malicious code, intrusion detection, etc.). The mechanism of evolution of th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید