Cyber Maneuvers and Maneuver Keys
Title | Cyber Maneuvers and Maneuver Keys |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Torrieri, D. |
Conference Name | Military Communications Conference (MILCOM), 2014 IEEE |
Date Published | Oct |
Keywords | computer security, cryptography, cyber maneuvers, cyber security system, Encryption, encryption algorithm, Hardware, Intrusion detection, jamming, maneuver keys, moving-target defenses, proactive network change, proactive strategy, reactive network change, secure rekeying, spread-spectrum key |
Abstract | This paper presents an overview of cyber maneuvers and their roles in cyber security. As the cyber war escalates, a strategy that preemptively limits and curtails attacks is required. Such a proactive strategy is called a cyber maneuver and is a refinement of the concept of a moving-target defense, which includes both reactive and proactive network changes. The major advantages of cyber maneuvers relative to other moving-target defenses are described. The use of maneuver keys in making cyber maneuvers much more feasible and affordable is explained. As specific examples, the applications of maneuver keys in encryption algorithms and as spread-spectrum keys are described. The integration of cyber maneuvers into a complete cyber security system with intrusion detection, identification of compromised nodes, and secure rekeying is presented. An example of secure rekeying despite the presence of compromised nodes is described. |
DOI | 10.1109/MILCOM.2014.48 |
Citation Key | 6956769 |