2018
DOI: 10.1109/tnse.2017.2734904
|View full text |Cite
|
Sign up to set email alerts
|

Preventive and Reactive Cyber Defense Dynamics Is Globally Stable

Abstract: Abstract-The recently proposed cybersecurity dynamics approach aims to understand cybersecurity from a holistic perspective by modeling the evolution of the global cybersecurity state. These models describe the interactions between the various kinds of cyber defenses and the various kinds of cyber attacks. We study a particular kind of cybersecurity dynamics caused by the interactions between preventive and reactive defenses (e.g., filtering and malware detection) against push-and pull-based cyber attacks (e.g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
28
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
5

Relationship

2
8

Authors

Journals

citations
Cited by 53 publications
(28 citation statements)
references
References 44 publications
0
28
0
Order By: Relevance
“…Consequently, multiobjective reinforcement learning algorithm is designed to obtain the optimal security strategy so as to minimize attack surface and maximize configuration diversity. For the high computational complexity of optimal strategy generation, Zheng et al [50] proposed a novel of a method to analyze different MTD strategies. By analyzing the defensive computational complexity in known special parameter domain and the entire parameter domain, it shows optimal defensive strategy in known special parameter domain convergences in polynomial complexity and defensive strategy formulation in remaining parameter domain convergences in an exponential complexity.…”
Section: (1) Strategy Selection Under Complete Information Assumptionmentioning
confidence: 99%
“…Consequently, multiobjective reinforcement learning algorithm is designed to obtain the optimal security strategy so as to minimize attack surface and maximize configuration diversity. For the high computational complexity of optimal strategy generation, Zheng et al [50] proposed a novel of a method to analyze different MTD strategies. By analyzing the defensive computational complexity in known special parameter domain and the entire parameter domain, it shows optimal defensive strategy in known special parameter domain convergences in polynomial complexity and defensive strategy formulation in remaining parameter domain convergences in an exponential complexity.…”
Section: (1) Strategy Selection Under Complete Information Assumptionmentioning
confidence: 99%
“…For example, the effectiveness of antimalware tools (e.g., the false positive rate or false negative rate) is often measured based on malware samples collected during a period of time (e.g., one year), while ignoring their instantaneous evolution over time. Taking one step further from static metrics, time-dependent security metrics have been studied to characterize and quantify system states at different times, such as the proportion of compromised computers in a network [6], [7], [8], [9], [10], [11], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42].…”
Section: B Dynamic Security Metrics Vs Agility Metricsmentioning
confidence: 99%
“…The individual-level epidemic modeling technique has been successfully applied to areas such as the epidemic spreading [34][35][36][37], the malware spreading [38][39][40][41][42][43], and the rumor spreading [44]. In particular, a number of APT attack-defense models have recently been proposed by employing this technique [45][46][47][48].…”
Section: Introductionmentioning
confidence: 99%