Proactive Cyber Defense and Reconfigurable Framework for Cyber Security


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Defense of online information in today’s time is much critical due to the attacks of different malicious objects such as virus, worm, Trojans, spam, malwares, etc.  Everyone should at prime importance to consider the implementation of proper cyber security methods such as firewalls, encryptions, cryptography, biometrics, digital certificates, proxy servers, intrusion detectors, etc. to ensure that all their online information is secured. In this paper, we present a framework for cyber defense after analyzing all the possible aspects of the cyber space. This framework is implemented and found suitable in many aspects such as good sensory features, flexibility, extensibility, reconfigurable, economic, and user friendly. The paper also gives a methodology for implementing the framework in an enterprise/organization having already existing cyber defense system.
Copyright © 2016 Praise Worthy Prize - All rights reserved.

Keywords


Cyber Defense; Cyber Space; Cyber Defense Framework; Cyber Attack

Full Text:

PDF


References


F. Harmantzis, M. Malek, Security Risk Analysis and Evaluation, IEEE Communications Society, 2004, pp. 1897-1901.

P. Liu, W. Zang, M. Yu, Incentive-Based Modeling and Inference of Attacker Intent, Objectives, and Strategies, ACM Transactions on Information and System Security, Vol. 8, No. 1, 2005, pp. 1–41.

P. Ning, Dingbang, Learning attack strategies from intrusion alerts, Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C., USA, 2003, pp. 200-209.

C. C. Zou, W. Gong, D. Towsley, Formation and simulation: Worm propagation modeling and analysis under dynamic quarantine defense, proceedings of the 2003 ACM workshop on Rapid malcode, Washington, DC, USA, 2003, pp. 51 – 60.

C. C. Zou, W. Gong, D. Towsley, Code Red Worm Propagation Modeling and Analysis, CCS’02, Washington, DC, USA, 2002, pp. 138-147.

Z. Chen, L. Gao, K. Kwiat, Modeling the Spread of Active Worms, Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’03), San Francisco, California, USA, 2003.

D. Moore, C. Shannon, K. Claffy, Code-Red: a case study on the spread and victims of an Internet worm, ACM Internet Measurement Workshop, 2002.

C. Shannon, CAIDA Analysis of Code-Red, 2001, Retrieved on January, 2007, Available at: http://www.caida.org/analysis/security/code-red/

M. E. Kabay, Studies and Surveys of Computer Crime, Computer Security Handbook, 4th Ed., Wiley 2001.

F. Cohen, C. Phillips, P. L. Swiler, T. Gaylor, P. Leary, F. Rupley, E. R. Dart Isler, A Preliminary Classification Scheme for Information System Threats, Attacks, and Defenses; A Cause and Effect Model; and Some Analysis Based on That Model, Sandia National Laboratories, 1998.

C. Taylor., (2003). Attack of the world wide worms. Time.

M. G. Mcguinn, A technical report on Prioritizing Cyber Vulnerabilities, 2006, Retrieved on January, 2007. Available at: http://www.dhs.gov/xlibrary/assets/niac/NIAC_CyberVulnerabilitiesPaper_Feb05.pdf

K. Poulsen, Slammer worm crashed Ohio nuke plant network, SecurityFocus, 2003. Retrieved on January, 2007. Available at: http://www.securityfocus.com/news/6767.

K. Hausman, N. Alston, M. Chapple, K. K. Hausman, Protecting Your Network from Security Risks and Threats Sample Chapter is provided courtesy of Addison Wesley Professional, 2005.

J. T. Chambers, J. W. Thompson, The Common Vulnerability System, A Technical Report, 2004, Retrieved on January, 2007, Available at: http://www.first.org/cvss/cvss-dhs-12-02-04.pdf

D. Liddle, Trojan: Remotely Operated Vehicle, IEEE Journal of Oceanin Engineering, Vol. OE-11, No. 3, 1986, pp. 364-372.

G. P. Schaffer, Worms and Viruses and Botnets, Oh My!, Published By The IEEE Computer Society, IEEE Security & Privacy, 2006, pp. 52-58.

D. Sancho, J. Yaneza, Trend micro: 2006 Annual Threat Roundup and 2007 Forcast, Retrieved on January, 2007, 2006, Available at: http://www.trendmicro.com/NR/rdonlyres/9175A03C-122D-4BAD-B6E8-93CEE21128E3/21901/2006AnnualThreatRoundupand2007Forecast16122006.pdf


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize