A framework to evaluate cyber agility

Lisa M. Marvel, Scott Brown, Iulian Neamtiu, Richard Harang, David Harman, Brian Henz

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

In this paper, we propose a framework to help evaluate the cost and utility of cyber agility maneuvers within networks that have constrained resources such as bandwidth and energy (e.g., MANETs). Many new methods of cyber agility and defensive maneuvers have been proposed; however, a framework to evaluate cost and utility of these maneuvers in the context of mission success is lacking. We outline preliminary considerations such as mission goals, operating conditions and maneuvers to be evaluated. Then, we introduce notional measures of health, security and capability and their interrelationship resulting in an initial framework design. A simple defensive cyber operation of securing a critical communication path for some time duration, both with and without the presence of a detected infection, is provided to illustrate the framework components and mission considerations that must be made before selecting a sequence of maneuvers.

Original languageEnglish (US)
Title of host publication2015 IEEE Military Communications Conference, MILCOM 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages31-36
Number of pages6
ISBN (Electronic)9781509000739
DOIs
StatePublished - Dec 14 2015
Externally publishedYes
Event34th Annual IEEE Military Communications Conference, MILCOM 2015 - Tampa, United States
Duration: Oct 26 2015Oct 28 2015

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM
Volume2015-December

Other

Other34th Annual IEEE Military Communications Conference, MILCOM 2015
Country/TerritoryUnited States
CityTampa
Period10/26/1510/28/15

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Keywords

  • Computer Network Defense
  • Computer Network Operations
  • Cyber Security

Fingerprint

Dive into the research topics of 'A framework to evaluate cyber agility'. Together they form a unique fingerprint.

Cite this