publication . Part of book or chapter of book . Preprint . 2016

Optimizing Active Cyber Defense

Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei;
Open Access
  • Published: 28 Mar 2016
  • Publisher: Springer International Publishing
Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specifically, we investigate infinite-time horizon optimal control and fast optimal control for strategic defenders (who want to minimize their cost) against non-strategic attackers...
free text keywords: Optimal control, Computer security, computer.software_genre, computer, Nash equilibrium, symbols.namesake, symbols, Cyber defense, Computer science, Computer Science - Cryptography and Security, Computer Science - Social and Information Networks, Computer Science - Systems and Control, Mathematics - Dynamical Systems, Mathematics - Optimization and Control
Related Organizations
Funded by
Integration of Analyses among fMRI, Biophysical Models and Genetic Data
  • Funder: European Commission (EC)
  • Project Code: 302421
  • Funding stream: FP7 | SP3 | PEOPLE
Download fromView all 2 versions
Part of book or chapter of book
Provider: UnpayWall
Part of book or chapter of book
Provider: Crossref
35 references, page 1 of 3

1. D. Aitel. Nematodes - beneficial worms. downloads/nematodes.pdf, Sept. 2005.

2. T. Alpcan and T. Ba¸sar. Network Security: A Decision and Game Theoretic Approach. Cambridge University Press, 2011. [OpenAIRE]

3. M. Bardi and I. Capuzzo-Dolcetta. Optimal control and viscosity solutions of Hamilton-Jacobi-Bellman equations. Birkhauser, 2008. [OpenAIRE]

4. Alain Bensoussan, Murat Kantarcioglu, and SingRu Hoe. A game-theoretical approach for finding optimal strategies in a botnet defense model. In Proc. GameSec'10, pages 135-148, 2010.

5. F. Castaneda, E. Sezer, and J. Xu. Worm vs. worm: preliminary study of an active counter-attack mechanism. In Proc. ACM WORM'04, pages 83-93, 2004.

6. D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, and C. Faloutsos. Epidemic thresholds in real networks. ACM Trans. Inf. Syst. Secur., 10(4):1-26, 2008.

7. M. Collins. A cost-based mechanism for evaluating the effectiveness of moving target defenses. In Proc. GameSec'12, pages 221-233, 2012.

8. Neal Fultz and Jens Grossklags. Blue versus Red: Towards a Model of Distributed Security Attacks. In Proc. Financial cryptography and data security (FC'99), pages 167-183. 2009. [OpenAIRE]

9. A. Ganesh, L. Massoulie, and D. Towsley. The effect of network topology on the spread of epidemics. In Proc. of IEEE Infocom 2005, 2005. [OpenAIRE]

10. J. Kephart and S. White. Directed-graph epidemiological models of computer viruses. In Proc. IEEE Symposium on Security and Privacy, pages 343-361, 1991.

11. J. Kephart and S. White. Measuring and modeling computer virus prevalence. In Proc. IEEE Symposium on Security and Privacy, pages 2-15, 1993.

12. W. Kermack and A. McKendrick. A contribution to the mathematical theory of epidemics. Proc. of Roy. Soc. Lond. A, 115:700-721, 1927.

13. J. Kesan and C. Hayes. Mitigative counterstriking: Self-defense and deterrence in cyberspace. Harvard Journal of Law and Technology (forthcoming, available at SSRN: http: // ssrn. com/ abstract= 1805163 ).

14. M. Khouzani, S. Sarkar, and E. Altman. A dynamic game solution to malware attack. In Proc. IEEE INFOCOM, pages 2138-2146, 2011. [OpenAIRE]

15. M. Khouzani, S. Sarkar, and E. Altman. Saddle-point strategies in malware attack. IEEE Journal on Selected Areas in Communications, 30(1):31-43, 2012.

35 references, page 1 of 3
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue