Visible to the public Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks

TitleEmpirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks
Publication TypeConference Paper
Year of Publication2015
AuthorsClark, Shane S., Paulos, Aaron, Benyo, Brett, Pal, Partha, Schantz, Richard
Conference Name2015 10th International Conference on Availability, Reliability and Security
KeywordsA3 defensive technology, A3 environment, adaptive security, app store, capture the flag tournament, composability, computer network security, critical system, CTF tournament, defense, empirical evaluation, execution management environment, File systems, Fires, IP networks, mediation, Monitoring, network service, network-facing application, novel attacks, Predictive Metrics, pubcrawl, record & replay, Red Team exercise, Resiliency, security, survivability, Testing, Zero day attacks, Zero Day Attacks and Defense, zero-day attack, Zero-day attacks
Abstract

A3 is an execution management environment that aims to make network-facing applications and services resilient against zero-day attacks. A3 recently underwent two adversarial evaluations of its defensive capabilities. In one, A3 defended an App Store used in a Capture the Flag (CTF) tournament, and in the other, a tactically relevant network service in a red team exercise. This paper describes the A3 defensive technologies evaluated, the evaluation results, and the broader lessons learned about evaluations for technologies that seek to protect critical systems from zero-day attacks.

DOI10.1109/ARES.2015.89
Citation Keyclark_empirical_2015