首页> 外文会议>International Conference on Cyber Conflict >Mission-centricity in cyber security: Architecting cyber attack resilient missions
【24h】

Mission-centricity in cyber security: Architecting cyber attack resilient missions

机译:Cyber Security的特色中心:架构网络攻击有弹性任务

获取原文

摘要

Until recently the information technology (IT)-centricity was the prevailing paradigm in cyber security that was organized around confidentiality, integrity and availability of IT assets. Despite of its widespread usage, the weakness of IT-centric cyber security became increasingly obvious with the deployment of very large IT infrastructures and introduction of highly mobile tactical missions where the IT-centric cyber security was not able to take into account the dynamics of time and space bound behavior of missions and changes in their operational context. In this paper we will show that the move from IT-centricity towards to the notion of cyber attack resilient missions opens new opportunities in achieving the completion of mission goals even if the IT assets and services that are supporting the missions are under cyber attacks. The paper discusses several fundamental architectural principles of achieving cyber attack resilience of missions, including mission-centricity, survivability through adaptation, synergistic mission C2 and mission cyber security management, and the real-time temporal execution of the mission tasks. In order to achieve the overall system resilience and survivability under a cyber attack, both, the missions and the IT infrastructure are considered as two interacting adaptable multi-agent systems. While the paper is mostly concerned with the architectural principles of achieving cyber attack resilient missions, several models and algorithms that support resilience of missions are discussed in fairly detailed manner.
机译:直到最近信息技术(IT) - 康复是网络安全的主要范式,围绕IT资产的机密性,完整性和可用性组织。尽管使用了广泛的使用情况,但在非常大的IT基础架构和引入高度移动战术任务的情况下,以其为中心的网络安全性的弱点越来越明显,其以其为中心的网络安全无法考虑时间的动态和空间的任务行为和运行背景的变化。在本文中,我们将表明,即使支持任务的IT资产和服务处于网络攻击下,它也会向网络攻击的概念朝向网络攻击的概念朝向网络攻击的概念开辟了新的机会。本文讨论了若干基本架构原则,实现了多种特派团的网络攻击恢复力,包括通过适应,协同任务C2和使命网络安全管理的特定度,生存能力,以及使命任务的实时暂时执行。为了实现网络攻击下的整体系统弹性和生存能力,既是,任务和IT基础架构都被视为两个交互适应性多种代理系统。虽然本文主要涉及实现网络攻击的建筑原则,但以相当详细的方式讨论了支持任务的抵御能力的若干模型和算法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号