TY - GEN
T1 - A framework to evaluate cyber agility
AU - Marvel, Lisa M.
AU - Brown, Scott
AU - Neamtiu, Iulian
AU - Harang, Richard
AU - Harman, David
AU - Henz, Brian
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/12/14
Y1 - 2015/12/14
N2 - In this paper, we propose a framework to help evaluate the cost and utility of cyber agility maneuvers within networks that have constrained resources such as bandwidth and energy (e.g., MANETs). Many new methods of cyber agility and defensive maneuvers have been proposed; however, a framework to evaluate cost and utility of these maneuvers in the context of mission success is lacking. We outline preliminary considerations such as mission goals, operating conditions and maneuvers to be evaluated. Then, we introduce notional measures of health, security and capability and their interrelationship resulting in an initial framework design. A simple defensive cyber operation of securing a critical communication path for some time duration, both with and without the presence of a detected infection, is provided to illustrate the framework components and mission considerations that must be made before selecting a sequence of maneuvers.
AB - In this paper, we propose a framework to help evaluate the cost and utility of cyber agility maneuvers within networks that have constrained resources such as bandwidth and energy (e.g., MANETs). Many new methods of cyber agility and defensive maneuvers have been proposed; however, a framework to evaluate cost and utility of these maneuvers in the context of mission success is lacking. We outline preliminary considerations such as mission goals, operating conditions and maneuvers to be evaluated. Then, we introduce notional measures of health, security and capability and their interrelationship resulting in an initial framework design. A simple defensive cyber operation of securing a critical communication path for some time duration, both with and without the presence of a detected infection, is provided to illustrate the framework components and mission considerations that must be made before selecting a sequence of maneuvers.
KW - Computer Network Defense
KW - Computer Network Operations
KW - Cyber Security
UR - http://www.scopus.com/inward/record.url?scp=84959257064&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84959257064&partnerID=8YFLogxK
U2 - 10.1109/MILCOM.2015.7357414
DO - 10.1109/MILCOM.2015.7357414
M3 - Conference contribution
AN - SCOPUS:84959257064
T3 - Proceedings - IEEE Military Communications Conference MILCOM
SP - 31
EP - 36
BT - 2015 IEEE Military Communications Conference, MILCOM 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 34th Annual IEEE Military Communications Conference, MILCOM 2015
Y2 - 26 October 2015 through 28 October 2015
ER -