Skip to main content
Erschienen in:
Buchtitelbild

2014 | OriginalPaper | Buchkapitel

Towards Fundamental Science of Cyber Security

verfasst von : Alexander Kott

Erschienen in: Network Science and Cybersecurity

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Terms like “Science of Cyber” or “Cyber Science” have been appearing in literature with growing frequency, and influential organizations initiated research initiatives toward developing such a science even though it is not clearly defined. We propose to define the domain of the science of cyber security by noting the most salient artifact within cyber security—malicious software—and defining the domain as comprised of phenomena that involve malicious software (as well as legitimate software and protocols used maliciously) used to compel a computing device or a network of computing devices to perform actions desired by the perpetrator of malicious software (the attacker) and generally contrary to the intent (the policy) of the legitimate owner or operator (the defender) of the computing device(s). We further define the science of cyber security as the study of relations—preferably expressed as theoretically-grounded models—between attributes, structures and dynamics of: violations of cyber security policy; the network of computing devices under attack; the defenders’ tools and techniques; and the attackers’ tools and techniques where malicious software plays the central role. We offer a simple formalism of these key objects within cyber science and systematically derive a classification of primary problem classes within cyber science.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
7.
Zurück zum Zitat F.B. Schneider, Blueprint for a science of cybersecurity. Next Wave 19(2), 27–57 (2012) F.B. Schneider, Blueprint for a science of cybersecurity. Next Wave 19(2), 27–57 (2012)
8.
Zurück zum Zitat J. Bau, J.C. Mitchell, Security modeling and analysis. Secur. Priv. IEEE 9(3), 18–25 (2011) J. Bau, J.C. Mitchell, Security modeling and analysis. Secur. Priv. IEEE 9(3), 18–25 (2011)
10.
Zurück zum Zitat Nancy Cartwright, How the Laws of Physics Lie (Oxford University Press, Oxford, 1983)CrossRef Nancy Cartwright, How the Laws of Physics Lie (Oxford University Press, Oxford, 1983)CrossRef
11.
Zurück zum Zitat Patrick Suppes, Representation and Invariance of Scientific Structures (CSLI Publications, Stanford, 2002)MATH Patrick Suppes, Representation and Invariance of Scientific Structures (CSLI Publications, Stanford, 2002)MATH
12.
Zurück zum Zitat L. Ge, H. Liu, D. Zhang; W. Yu, R. Hardy, R. Reschly, On effective sampling techniques for host-based intrusion detection in MANET, Military Communications Conference – MILCOM 2012 (2012) L. Ge, H. Liu, D. Zhang; W. Yu, R. Hardy, R. Reschly, On effective sampling techniques for host-based intrusion detection in MANET, Military Communications ConferenceMILCOM 2012 (2012)
13.
Zurück zum Zitat S. Jajodia, A.K. Ghosh, V. Swarup, C. Wang, X.S. Wang (eds.), Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Advances in Information Security, vol. 54 (Springer, Berlin, 2011) S. Jajodia, A.K. Ghosh, V. Swarup, C. Wang, X.S. Wang (eds.), Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Advances in Information Security, vol. 54 (Springer, Berlin, 2011)
14.
Zurück zum Zitat S. Jajodia, A.K. Ghosh, V.S. Subrahmanian, V. Swarup, C. Wang, X.S. Wang (eds.), Moving Target Defense: Application of Game Theory & Adversarial Modeling, Advances in Information Security, vol. 100 (Springer, Berlin, 2013) S. Jajodia, A.K. Ghosh, V.S. Subrahmanian, V. Swarup, C. Wang, X.S. Wang (eds.), Moving Target Defense: Application of Game Theory & Adversarial Modeling, Advances in Information Security, vol. 100 (Springer, Berlin, 2013)
15.
Zurück zum Zitat H. Bojinov et al., Address space randomization for mobile devices, in Proceedings of Fourth ACM Conference on Wireless Network Security, 2011, pp. 127–138 H. Bojinov et al., Address space randomization for mobile devices, in Proceedings of Fourth ACM Conference on Wireless Network Security, 2011, pp. 127–138
16.
Zurück zum Zitat E.G. Barrantes et al., Randomized instruction set emulation. ACM Trans. Inf. Syst. Secur. 8(1), 3–30 (2005)CrossRef E.G. Barrantes et al., Randomized instruction set emulation. ACM Trans. Inf. Syst. Secur. 8(1), 3–30 (2005)CrossRef
17.
Zurück zum Zitat S. Boyd, G. Kc, M. Locasto, A. Keromytis, V. Prevelakis, On the general applicability of instruction-set randomization’. IEEE Trans. Dependable Secure Comput. 7(3), 255–270 (2010)CrossRef S. Boyd, G. Kc, M. Locasto, A. Keromytis, V. Prevelakis, On the general applicability of instruction-set randomization’. IEEE Trans. Dependable Secure Comput. 7(3), 255–270 (2010)CrossRef
18.
Zurück zum Zitat D. Torrieri, S. Zhu, S. Jajodia, Cyber Maneuver Against External Adversaries and Compromised Nodes, Moving Target Defense – Advances in Information Security, vol. 100 (Springer, New York, 2013), pp. 87–96 D. Torrieri, S. Zhu, S. Jajodia, Cyber Maneuver Against External Adversaries and Compromised Nodes, Moving Target Defense – Advances in Information Security, vol. 100 (Springer, New York, 2013), pp. 87–96
19.
Zurück zum Zitat K. Dempsey, et al., Information Security Continuous Monitoring ISCM_ for Federal Information Systems and Organizations (NIST Special Publication, Gaithersburg, MD, 2011), pp. 800–137 K. Dempsey, et al., Information Security Continuous Monitoring ISCM_ for Federal Information Systems and Organizations (NIST Special Publication, Gaithersburg, MD, 2011), pp. 800–137
20.
Zurück zum Zitat A. Kott, C. Arnold, Promises and challenges of continuous monitoring and risk scoring. IEEE Priv. Secur. 11(1), 90–93 (2013) A. Kott, C. Arnold, Promises and challenges of continuous monitoring and risk scoring. IEEE Priv. Secur. 11(1), 90–93 (2013)
21.
Zurück zum Zitat W. Jensen, Directions in Security Metrics Research, National Institute of Standards and Technology, (NISTIR 7564), Apr 2009 W. Jensen, Directions in Security Metrics Research, National Institute of Standards and Technology, (NISTIR 7564), Apr 2009
22.
Zurück zum Zitat N. Bartol et al., Measuring cyber security and information assurance: a state of the art report, Defense Technical Information Center, May 2009 N. Bartol et al., Measuring cyber security and information assurance: a state of the art report, Defense Technical Information Center, May 2009
23.
Zurück zum Zitat R.P. Lippman, et al., Continuous security metrics for prevalent network threats: introduction and first four metrics, Technical Report ESCTR- 2010-090, MIT, May 2012 R.P. Lippman, et al., Continuous security metrics for prevalent network threats: introduction and first four metrics, Technical Report ESCTR- 2010-090, MIT, May 2012
24.
Zurück zum Zitat H. Cam, PeerShield: determining control and resilience criticality of collaborative cyber assets in networks, in Proceedings of SPIE 8408, Cyber Sensing 2012, 840808 (1 May 2012) H. Cam, PeerShield: determining control and resilience criticality of collaborative cyber assets in networks, in Proceedings of SPIE 8408, Cyber Sensing 2012, 840808 (1 May 2012)
25.
Zurück zum Zitat J.P. Anderson, Computer Security Threat Monitoring and Surveillance (James P. Anderson Co., Fort Washington, 1980) J.P. Anderson, Computer Security Threat Monitoring and Surveillance (James P. Anderson Co., Fort Washington, 1980)
26.
Zurück zum Zitat Stefan Axelsson, The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inf. Syst. Secur. 3(3), 186–205 (2000)MathSciNetCrossRef Stefan Axelsson, The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inf. Syst. Secur. 3(3), 186–205 (2000)MathSciNetCrossRef
27.
Zurück zum Zitat Animesh Patcha, Jung-Min Park, An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448–3470 (2007)CrossRef Animesh Patcha, Jung-Min Park, An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448–3470 (2007)CrossRef
28.
Zurück zum Zitat M. McNeese, Perspectives on the role of cognition in cyber security, in Proceedings of the Human Factors and Ergonomics Society 56th Annual Meeting, vol. 56, 2012, p. 268 M. McNeese, Perspectives on the role of cognition in cyber security, in Proceedings of the Human Factors and Ergonomics Society 56th Annual Meeting, vol. 56, 2012, p. 268
29.
Zurück zum Zitat M. Boyce, K. Duma, L. Hettinger, T. Malone, D. Wilson, J. Lockett-Reynolds, Human performance in cyber security: a research agenda. in Proceedings of the Human Factors and Ergonomics Society 55th Annual Meeting, vol. 55, 2011, p. 1115 M. Boyce, K. Duma, L. Hettinger, T. Malone, D. Wilson, J. Lockett-Reynolds, Human performance in cyber security: a research agenda. in Proceedings of the Human Factors and Ergonomics Society 55th Annual Meeting, vol. 55, 2011, p. 1115
30.
Zurück zum Zitat R.E. Harang, W.J. Glodek, Identification of anomalous network security token usage via clustering and density estimation, in 46th Annual Conference on Information Sciences and Systems (CISS), 21–23 Mar 2012, pp.1–6 R.E. Harang, W.J. Glodek, Identification of anomalous network security token usage via clustering and density estimation, in 46th Annual Conference on Information Sciences and Systems (CISS), 21–23 Mar 2012, pp.1–6
Metadaten
Titel
Towards Fundamental Science of Cyber Security
verfasst von
Alexander Kott
Copyright-Jahr
2014
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-7597-2_1