MILCOM 2015 - 2015 IEEE Military Communications Conference 2015
DOI: 10.1109/milcom.2015.7357414
|View full text |Cite
|
Sign up to set email alerts
|

A framework to evaluate cyber agility

Abstract: In this paper, we propose a framework to help evaluate the cost and utility of cyber agility maneuvers within networks that have constrained resources such as bandwidth and energy (e.g., MANETs). Many new methods of cyber agility and defensive maneuvers have been proposed; however, a framework to evaluate cost and utility of these maneuvers in the context of mission success is lacking. We outline preliminary considerations such as mission goals, operating conditions and maneuvers to be evaluated. Then, we intr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 2 publications
(2 reference statements)
0
8
0
Order By: Relevance
“…, T . triangle area as security gain in [2,3] triangle area as security loss in [5,6] 3) Aggregated-Generational-Impact (AGI): This metric aims to measure the overall security gained by the defender over time horizon [0, T ]. We propose measuring the security gain over time interval [t i−1 , t i ], denoted by G s (i), for i = 1, .…”
Section: ) Evolutionary Effectiveness (Ee)mentioning
confidence: 99%
See 3 more Smart Citations
“…, T . triangle area as security gain in [2,3] triangle area as security loss in [5,6] 3) Aggregated-Generational-Impact (AGI): This metric aims to measure the overall security gained by the defender over time horizon [0, T ]. We propose measuring the security gain over time interval [t i−1 , t i ], denoted by G s (i), for i = 1, .…”
Section: ) Evolutionary Effectiveness (Ee)mentioning
confidence: 99%
“…In the cybersecurity domain, agility often refers to reasoned changes to a system or environment in response to functional or security needs, but has not been paid due attention until very recently [15], [1], [2], [3], [4], [5]. While it would be intuitive to understand agility as how fast (e.g., response ability [23]) and how effective a system can adapt its configuration to unexpected attacks against it (e.g., considering the cost incurred by the degraded system performance or the cost incurred by response actions [1], [24]), the concept of agility is, like other metrics, elusive to formalize.…”
Section: Background and Related Work A Concept Of Agility And Agility...mentioning
confidence: 99%
See 2 more Smart Citations
“…Marvel et al propose a framework to evaluate cyber agility, but they focus on scenarios in which either a specific vulnerability or infected node is known to exist, and attempt to optimize the patching and isolation process in the network to preserve network integrity under various constraints including connectivity and power usage [8]. Huber et al examine a similar problem using a decision support system in a small network of 10 active nodes [5].…”
Section: Related Workmentioning
confidence: 99%