نتایج جستجو برای: cyber defense

تعداد نتایج: 91877  

2013
Lucas Kello

information age faces formidable challenges. Chief among these is to evaluate correctly the impact of cyberweapons on strategy: Does the new technology require a revolution in how scholars and policymakers think about force and conoict?1 Practitioners confront a predicament in addressing this question: the cyber revolution gives rise to novel threats and opportunities requiring immediate policy...

2003
Laura Tinnel O. Sami Saydjari Joshua W. Haines

The DARPA Cyber Panel program has funded research in defending mission-critical information systems from strategic coordinated attacks. This research spans many areas including novel sensors, alert correlation and reduction, visual correlation, mission impact assessment, and response. This paper describes the integration of Cyber Panel technologies from the different areas into an advanced cybe...

Journal: :CoRR 2013
Michael D. Adams Seth D. Hitefield Bruce Hoy Michael C. Fowler T. Charles Clancy

A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking systems, with defenders detecting attacks, analyzing exploits and patching systems. This reactive nature leaves sensitive systems highly vulnerable to attack due to un-patched sys...

2007
Dan Shen

Game Theoretic Solutions to Cyber Attack and Network Defense Problems There are increasing needs for research in the area of cyber situational awareness. The protection and defense against cyber attacks to computer network is becoming inadequate as the hacker knowledge sophisticates and as the network and each computer system become more complex. Current methods for alert correlation to detect ...

Journal: :CoRR 2017
Mona Lange Alexander Kott Noam Ben-Asher Wim Mees Nazife Baykal Cristian-Mihai Vidu Matteo Merialdo Marek Malowidzki Bhopinder Madahar

Approved for public release; distribution unlimited. NOTICES Disclaimers The findings in this report are not to be construed as an official Department of the Army position unless so designated by other authorized documents. Citation of manufacturer's or trade names does not constitute an official endorsement or approval of the use thereof. Destroy this report when it is no longer needed. Do not...

2010
Igor Kotenko Alexey Konovalov Andrey Shorov

Nowadays we are witnesses of the rapid spread of botnets across the Internet and using them for different cyber attacks against our systems. Botnets join a huge number of compromised computers in the Internet and allow using these computers for performing vulnerability scans, distributing denial-of-service (DDoS) attacks and sending enormous amounts of spam emails. It is a very complex task to ...

2001
Jon Doyle Isaac Kohane Howard Shrobe Peter Szolovits

The Monitoring, Analysis, and Interpretation Tool Arsenal (MAITA) seeks to support rapid construction and empirical reconfiguration of cyber defense monitoring systems inside the opponent decision cycle through a set of mechanisms including a flexible infrastructure for distributed monitoring processes and signal flows, a monitoring executive that coordinates resource allocation and systemic se...

Journal: :CoRR 2014
Michael L. Winterrose Kevin M. Carter Neal Wagner William W. Streilein

A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the temporal ordering of resource investments that bring targeted zero-da...

2016
Michael Atighetchi Borislava I. Simidchieva Fusun Yaman Thomas C. Eskridge Marco M. Carvalho Nicholas Paltzer

Cyber security remains one of the most serious challenges to national security and the economy that we face today. Systems employing well known but static defenses are increasingly vulnerable to penetration from determined, diverse, and well resourced adversaries launching targeted attacks such as Advanced Persistent Threats (APTs). Due to the heavy focus on cyber security technologies in both ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید