[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2459976.2460018acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Evolutionary drift models for moving target defense

Published: 08 January 2013 Publication History

Abstract

One of the biggest challenges faced by cyber defenders is that attacks evolve more rapidly than our ability to recognize them. We propose a moving target defense concept in which the means of detection is set in motion. This is done by moving away from static signature-based detection and instead adopting biological modeling techniques that describe families of related sequences. We present here one example for how to apply evolutionary models to cyber sequences, and demonstrate the feasibility of this technique on analysis of a complex, evolving software project. Specifically, we applied sequence-based and profile-based evolutionary models and report the ability of these models to recognize highly volatile code regions. We found that different drift models reliably identify different types of evolutionarily related code regions. The impact is that these (and possibly other) evolutionary models could be used in a moving target defense in which the "signature" being used to detect sequence-based behaviors is not a fixed signature but one that can recognize new variants of a known family based on multiple evolutionary models.

References

[1]
C. Oehmen, E. Peterson and S. Dowson, "An Organic Model for Detecting Cyber Events," in CSIIRW'10, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, 2010.
[2]
C. Oehmen and J. Nieplocha, "ScalaBLAST: A scalable implementation of BLAST for High Performance Data-Intensive Bioinformatics Analysis," IEEE Trans. Parallel. Dist. Sys., vol. 17, pp. 740--749, 2006.
[3]
S. Altschul, W. Gish, W. Miller, E. Myers, and D. Lipman, "Basic local alignment search tool," J. Mol. Biol., vol. 215, pp. 403--410, 1990.
[4]
K. Katoh, K. Kuma, H. Toh, and T. Miyata, "MAFFT version 5: improvement in accuracy of multiple sequence alignment," Nucl. Acid. Res., vol. 33, pp. 511--518, 2005.
[5]
S. Eddy, "A new generation of homology search tools based on probabilistic inference," Genome Inform, vol 23, pp. 205--211, 2009.

Cited By

View all
  • (2017)Evolutionary computation in network management and securityProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3067695.3067726(1094-1112)Online publication date: 15-Jul-2017
  • (2016)Moving target defense: state of the art and characteristicsFrontiers of Information Technology & Electronic Engineering10.1631/FITEE.160132117:11(1122-1153)Online publication date: 11-Nov-2016
  • (2016)LINEBACKER: LINE-Speed Bio-Inspired Analysis and Characterization for Event Recognition2016 IEEE Security and Privacy Workshops (SPW)10.1109/SPW.2016.44(88-95)Online publication date: May-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. BLAST
  2. bioinformatics
  3. cybersecurity
  4. network security

Qualifiers

  • Research-article

Funding Sources

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2017)Evolutionary computation in network management and securityProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3067695.3067726(1094-1112)Online publication date: 15-Jul-2017
  • (2016)Moving target defense: state of the art and characteristicsFrontiers of Information Technology & Electronic Engineering10.1631/FITEE.160132117:11(1122-1153)Online publication date: 11-Nov-2016
  • (2016)LINEBACKER: LINE-Speed Bio-Inspired Analysis and Characterization for Event Recognition2016 IEEE Security and Privacy Workshops (SPW)10.1109/SPW.2016.44(88-95)Online publication date: May-2016
  • (2014)Domain-Specific Languages for Developing and Deploying Signature Discovery WorkflowsComputing in Science & Engineering10.1109/MCSE.2013.9716:1(52-64)Online publication date: Jan-2014
  • (2013)LINEBACkER: Bio-inspired data reduction toward real time network traffic analysis2013 6th International Symposium on Resilient Control Systems (ISRCS)10.1109/ISRCS.2013.6623771(170-174)Online publication date: Aug-2013
  • (2013)A generalized bio-inspired method for discovering sequence-based signatures2013 IEEE International Conference on Intelligence and Security Informatics10.1109/ISI.2013.6578853(330-332)Online publication date: Jun-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media