Skip to main content

2015 | OriginalPaper | Buchkapitel

7. Automated Adversary Profiling

verfasst von : Samuel N. Hamilton

Erschienen in: Cyber Warfare

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber warfare is currently an information poor environment, where knowledge of adversary identity, goals, and resources is critical, yet difficult to come by. Reliably identifying adversaries through direct attribution of cyber activities is not currently a realistic option, but it may be possible to deduce the presence of an adversary within a collection of network observables, and build a profile consistent with those observations. In this paper, we explore the challenges of automatically generating cyber adversary profiles from network observations in the face of highly sophisticated adversaries whose goals, objectives, and perceptions may be very different from ours, and who may be utilizing deceptive activities to disguise their activities and intentions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat T. Alpcan and T. Baser, “An Intrusion Detection game with Limited Observations”, Proceedings of the International Symposium on Dynamic Games and Applications, 2006. T. Alpcan and T. Baser, “An Intrusion Detection game with Limited Observations”, Proceedings of the International Symposium on Dynamic Games and Applications, 2006.
Zurück zum Zitat M. Boddy, J. Gohde, T. Haigh, and S. Harp. “Course of Action Generation for Cyber Security Using Classical Planning”, ICAPS, 2005. M. Boddy, J. Gohde, T. Haigh, and S. Harp. “Course of Action Generation for Cyber Security Using Classical Planning”, ICAPS, 2005.
Zurück zum Zitat W. Charles V., C. Connelly, et. al. “Generating client workloads and high-fidelity network traffic for controllable, repeatable experiments in computer security.” In Recent Advances in Intrusion Detection, pp. 218–237, 2010. W. Charles V., C. Connelly, et. al. “Generating client workloads and high-fidelity network traffic for controllable, repeatable experiments in computer security.” In Recent Advances in Intrusion Detection, pp. 218–237, 2010.
Zurück zum Zitat D. P. Dugan, S. R. Thomas, et. al., Categorizing Threat: Building and Using a Generic Threat Matrix: Sandia National Laboratories, 2007. D. P. Dugan, S. R. Thomas, et. al., Categorizing Threat: Building and Using a Generic Threat Matrix: Sandia National Laboratories, 2007.
Zurück zum Zitat J. Glasser, B. Lindauer, “Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data”, IEEE Security and Privacy Workshop, 2013. J. Glasser, B. Lindauer, “Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data”, IEEE Security and Privacy Workshop, 2013.
Zurück zum Zitat S. N. Hamilton, W. Hamilton. “Adversary Modeling and Simulation in Cyber Warfare”, International Information Security Conference, p. 461–475, 2008. S. N. Hamilton, W. Hamilton. “Adversary Modeling and Simulation in Cyber Warfare”, International Information Security Conference, p. 461–475, 2008.
Zurück zum Zitat S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, The Role of Game Theory in Information Warfare, The Information Survivability Workshop, 2001a. S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, The Role of Game Theory in Information Warfare, The Information Survivability Workshop, 2001a.
Zurück zum Zitat S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, “Challenges in Applying Game Theory to the Domain of Information Warfare”, The Information Survivability Workshop, 2001b. S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, “Challenges in Applying Game Theory to the Domain of Information Warfare”, The Information Survivability Workshop, 2001b.
Zurück zum Zitat S. Kirkpatrick; Gelatt Jr, C. D.; Vecchi, M. P. (1983). “Optimization by Simulated Annealing”, Science 220 (4598): 671–680.CrossRefMATHMathSciNet S. Kirkpatrick; Gelatt Jr, C. D.; Vecchi, M. P. (1983). “Optimization by Simulated Annealing”, Science 220 (4598): 671–680.CrossRefMATHMathSciNet
Zurück zum Zitat K. Lye and J. Wing, Game Strategies in Network Security, Proceedings of the Foundations of Computer Security, 2002. K. Lye and J. Wing, Game Strategies in Network Security, Proceedings of the Foundations of Computer Security, 2002.
Zurück zum Zitat K. Meyers, O. S. Saydjari, et. al., ARDA Cyber Strategy and Tactics Workshop Final Report, 2002. K. Meyers, O. S. Saydjari, et. al., ARDA Cyber Strategy and Tactics Workshop Final Report, 2002.
Zurück zum Zitat S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, Q. Wu, “A Survey of Game Theory as Applied to Network Security”. In Proceedings of the 2010 43rd Hawaii International Conference on System Sciences (HICSS ’10). S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, Q. Wu, “A Survey of Game Theory as Applied to Network Security”. In Proceedings of the 2010 43rd Hawaii International Conference on System Sciences (HICSS ’10).
Zurück zum Zitat L. Wang, S. Noel, S. Jajodia, “Minimum-cost network hardening using attack graphs”, Computer Communications, Vol. 29, No. 18, pp. 3812–3824, 2006.CrossRef L. Wang, S. Noel, S. Jajodia, “Minimum-cost network hardening using attack graphs”, Computer Communications, Vol. 29, No. 18, pp. 3812–3824, 2006.CrossRef
Metadaten
Titel
Automated Adversary Profiling
verfasst von
Samuel N. Hamilton
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-14039-1_7