CYBER RESILIENCE

K. Levitt
{"title":"CYBER RESILIENCE","authors":"K. Levitt","doi":"10.2307/j.ctv19shhms.6","DOIUrl":null,"url":null,"abstract":"The term resilience has been in various uses for over 400 years and has been applied to characterize the ability of something to withstand unexpected threats, where the \"something\" can be an individual, a community, an object, species, an ecosystem, etc. The dependable community has embraced the term primarily under the threat of natural faults by asserting that a resilient system should fail operational (provide the full service as if no cyber disturbance occurred) but if this is not possible fail safe (preserve a safety requirement) and as a last resort fail stop. Increasingly, organizations embrace cyber resilience as a general strategy for security where the goal is to deliver an intended cyber service in the presence of cyber events to the extent possible. Although there are differing views of it, Symantec among others associates five \"pillars\" with the resilience concept: Prepare/Identify, Protect, Detect, Respond, Recover In its Cyber R&D Strategic Plan, NITRD has proposed a similar structure, again reflecting a multi-step and a dynamic approach to cyber resilience. In recent years, the security community has under the rubric of resilience begun to consider systems that dynamically cope with attacks, unexpected or previously unseen. DARPA has run several programs along this line, for example SRS (SelfRegenerative Systems), which explored many techniques towards systems that dynamically respond to attacks. Although there are fairly straightforward approaches, such as intrusion-prevention systems, today's systems mostly rely on human-driven responses to attacks. For the rapidly emerging applications, such as connected cars, cyber-controlled processing plants, and smart grids, human-level response is too slow; but fully automated response is considered too dangerous and too easily thwarted by an informed adversary, particularly when triggered by imperfect detection. Thus there is a clear need for the research community to take on the challenge of resilience. This breakout session is open to all of the research topics that bear on resilience, including but not limited to: System architectures in support of resilience The specification of \"intended\" cyber service for different situations The specification of \"safety\" requirements for different applications Approaches to detection, particularly approaches to cope with imperfect detection. \"Moves\" a system can take to achieve resilience Overall, does the automation of resilience introduce too many new and undefendable attack surfaces that preclude its serious consideration? Can \"risk\" to the mission be the overarching principle that characterizes the components of resilience? Are there measurable metrics to characterize cyber resilience? Other available formats: Cyber Resilience Switch to normal viewerSwitch to experimental viewer Karl Levitt License: Creative Commons 2.5 Presentations Presentations SaTC Pi Meeting 2017 2017 Presentation","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Cyber Security Handbook","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2307/j.ctv19shhms.6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18

Abstract

The term resilience has been in various uses for over 400 years and has been applied to characterize the ability of something to withstand unexpected threats, where the "something" can be an individual, a community, an object, species, an ecosystem, etc. The dependable community has embraced the term primarily under the threat of natural faults by asserting that a resilient system should fail operational (provide the full service as if no cyber disturbance occurred) but if this is not possible fail safe (preserve a safety requirement) and as a last resort fail stop. Increasingly, organizations embrace cyber resilience as a general strategy for security where the goal is to deliver an intended cyber service in the presence of cyber events to the extent possible. Although there are differing views of it, Symantec among others associates five "pillars" with the resilience concept: Prepare/Identify, Protect, Detect, Respond, Recover In its Cyber R&D Strategic Plan, NITRD has proposed a similar structure, again reflecting a multi-step and a dynamic approach to cyber resilience. In recent years, the security community has under the rubric of resilience begun to consider systems that dynamically cope with attacks, unexpected or previously unseen. DARPA has run several programs along this line, for example SRS (SelfRegenerative Systems), which explored many techniques towards systems that dynamically respond to attacks. Although there are fairly straightforward approaches, such as intrusion-prevention systems, today's systems mostly rely on human-driven responses to attacks. For the rapidly emerging applications, such as connected cars, cyber-controlled processing plants, and smart grids, human-level response is too slow; but fully automated response is considered too dangerous and too easily thwarted by an informed adversary, particularly when triggered by imperfect detection. Thus there is a clear need for the research community to take on the challenge of resilience. This breakout session is open to all of the research topics that bear on resilience, including but not limited to: System architectures in support of resilience The specification of "intended" cyber service for different situations The specification of "safety" requirements for different applications Approaches to detection, particularly approaches to cope with imperfect detection. "Moves" a system can take to achieve resilience Overall, does the automation of resilience introduce too many new and undefendable attack surfaces that preclude its serious consideration? Can "risk" to the mission be the overarching principle that characterizes the components of resilience? Are there measurable metrics to characterize cyber resilience? Other available formats: Cyber Resilience Switch to normal viewerSwitch to experimental viewer Karl Levitt License: Creative Commons 2.5 Presentations Presentations SaTC Pi Meeting 2017 2017 Presentation
网络弹性
弹性这个术语已经有了400多年的不同用途,被用来描述某物抵御意外威胁的能力,其中的“某物”可以是个人、社区、物体、物种、生态系统等。可靠的社区主要在自然故障的威胁下接受了这个术语,声称弹性系统应该失败运行(提供完整的服务,如果没有发生网络干扰),但如果不可能失败安全(保持安全要求),并作为最后的手段失败停止。越来越多的组织将网络弹性作为一种通用的安全策略,其目标是在网络事件发生时尽可能提供预期的网络服务。尽管对此有不同的看法,赛门铁克和其他公司将五个“支柱”与弹性概念联系在一起:准备/识别,保护,检测,响应,恢复在其网络研发战略计划中,NITRD提出了类似的结构,再次反映了多步骤和动态的方法来实现网络弹性。近年来,安全社区在弹性的标题下开始考虑动态应对攻击的系统,意外的或以前未见过的。DARPA已经沿着这条路线运行了几个项目,例如SRS(自我再生系统),它探索了许多动态响应攻击的系统技术。虽然有一些相当直接的方法,比如入侵防御系统,但今天的系统主要依赖于人为驱动的攻击响应。对于快速兴起的应用,如联网汽车、网络控制的加工厂和智能电网,人类层面的反应太慢;但是,完全自动化的反应被认为太危险,太容易被知情的对手挫败,尤其是在检测不完善的情况下。因此,研究界显然需要接受韧性的挑战。本次分组会议面向所有与弹性有关的研究主题,包括但不限于:支持弹性的系统架构、不同情况下“预期”网络服务的规范、不同应用程序的“安全”要求的规范、检测方法,特别是应对不完美检测的方法。总的来说,弹性的自动化是否引入了太多新的和不可防御的攻击面,从而排除了对其的认真考虑?使命的“风险”是否可以成为表征弹性组成部分的首要原则?是否有可衡量的指标来描述网络弹性?其他可用格式:Cyber Resilience切换到普通观众切换到实验观众Karl Levitt许可:知识共享2.5演示文稿演示文稿SaTC Pi会议2017 2017演示文稿
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信