Optimizing Active Cyber Defense

Preprint English OPEN
Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei;
  • Subject: Mathematics - Optimization and Control | Computer Science - Social and Information Networks | Computer Science - Systems and Control | Mathematics - Dynamical Systems | Computer Science - Cryptography and Security

Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the a... View more
  • References (35)
    35 references, page 1 of 4

    1. D. Aitel. Nematodes - beneficial worms. http://www.immunityinc.com/ downloads/nematodes.pdf, Sept. 2005.

    2. T. Alpcan and T. Ba¸sar. Network Security: A Decision and Game Theoretic Approach. Cambridge University Press, 2011.

    3. M. Bardi and I. Capuzzo-Dolcetta. Optimal control and viscosity solutions of Hamilton-Jacobi-Bellman equations. Birkhauser, 2008.

    4. Alain Bensoussan, Murat Kantarcioglu, and SingRu Hoe. A game-theoretical approach for finding optimal strategies in a botnet defense model. In Proc. GameSec'10, pages 135-148, 2010.

    5. F. Castaneda, E. Sezer, and J. Xu. Worm vs. worm: preliminary study of an active counter-attack mechanism. In Proc. ACM WORM'04, pages 83-93, 2004.

    6. D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, and C. Faloutsos. Epidemic thresholds in real networks. ACM Trans. Inf. Syst. Secur., 10(4):1-26, 2008.

    7. M. Collins. A cost-based mechanism for evaluating the effectiveness of moving target defenses. In Proc. GameSec'12, pages 221-233, 2012.

    8. Neal Fultz and Jens Grossklags. Blue versus Red: Towards a Model of Distributed Security Attacks. In Proc. Financial cryptography and data security (FC'99), pages 167-183. 2009.

    9. A. Ganesh, L. Massoulie, and D. Towsley. The effect of network topology on the spread of epidemics. In Proc. of IEEE Infocom 2005, 2005.

    10. J. Kephart and S. White. Directed-graph epidemiological models of computer viruses. In Proc. IEEE Symposium on Security and Privacy, pages 343-361, 1991.

  • Related Organizations (1)
  • Metrics
Share - Bookmark