Defense on the Move: Ant-Based Cyber Defense
Title | Defense on the Move: Ant-Based Cyber Defense |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Fink, G.A., Haack, J.N., McKinnon, A.D., Fulp, E.W. |
Journal | Security Privacy, IEEE |
Volume | 12 |
Pagination | 36-43 |
Date Published | Mar |
ISSN | 1540-7993 |
Keywords | ant-based cyber defense, Computer crime, computer security, cybersecurity, Cyberspace, Database systems, defended systems, Detectors, digital ants, Malware, Mobile communication, mobile resilient defense, Moving-Target Defense, MTD, optimisation, Particle swarm intelligence, protected infrastructure, security of data, Statistics, swarm intelligence, target tracking |
Abstract | Many common cyberdefenses (like firewalls and intrusion-detection systems) are static, giving attackers the freedom to probe them at will. Moving-target defense (MTD) adds dynamism, putting the systems to be defended in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers' ability to rely on prior experience without requiring motion in the protected infrastructure. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The authors' mobile resilient defense, Ant-Based Cyber Defense (ABCD), is a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. ABCD provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures such as the smart electric grid. |
URL | https://ieeexplore.ieee.org/document/6798536/ |
DOI | 10.1109/MSP.2014.21 |
Citation Key | 6798536 |
- Mobile communication
- target tracking
- Swarm Intelligence
- Statistics
- security of data
- protected infrastructure
- Particle swarm intelligence
- optimisation
- MTD
- moving-target defense
- mobile resilient defense
- ant-based cyber defense
- malware
- digital ants
- Detectors
- defended systems
- Database systems
- Cyberspace
- Cybersecurity
- computer security
- Computer crime