Skip to main content

Showing 1–3 of 3 results for author: Carter, K M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1408.0023  [pdf, other

    cs.CR cs.GT

    Strategic Evolution of Adversaries Against Temporal Platform Diversity Active Cyber Defenses

    Authors: Michael L. Winterrose, Kevin M. Carter

    Abstract: Adversarial dynamics are a critical facet within the cyber security domain, in which there exists a co-evolution between attackers and defenders in any given threat scenario. While defenders leverage capabilities to minimize the potential impact of an attack, the adversary is simultaneously developing countermeasures to the observed defenses. In this study, we develop a set of tools to model the a… ▽ More

    Submitted 31 July, 2014; originally announced August 2014.

    Journal ref: Proceedings of the Agent-Directed Simulation Symposium at the Spring Simulation Multiconference (2014): 68-76

  2. arXiv:1407.8540  [pdf

    cs.CR cs.GT

    Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses

    Authors: M. L. Winterrose, K. M. Carter, N. Wagner, W. W. Streilein

    Abstract: A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the temporal ordering of resource investments that bring targeted zero-day e… ▽ More

    Submitted 31 July, 2014; originally announced July 2014.

  3. arXiv:1401.8255  [pdf, other

    cs.CR

    Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity

    Authors: Kevin M. Carter, Hamed Okhravi, James Riordan

    Abstract: Active cyber defenses based on temporal platform diversity have been proposed as way to make systems more resistant to attacks. These defenses change the properties of the platforms in order to make attacks more complicated. Unfortunately, little work has been done on measuring the effectiveness of these defenses. In this work, we use four different approaches to quantitatively analyze these defen… ▽ More

    Submitted 31 January, 2014; originally announced January 2014.