Architecture for Cyber Command and Control: Experiences and future directions

被引:0
作者
Vukelich, DF [1 ]
Levin, D [1 ]
Lowry, J [1 ]
机构
[1] BBN Technol LLC, Cambridge, MA 02138 USA
来源
DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS | 2001年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, enterprises deploy sets of information assurance (IA) tools-firewalls, intrusion detectors, vulnerability assessors, and so forth-to protect information assets. Each tool operates independently and may be individually useful; however, issues of representation, management, and maintenance, make it difficult to integrate a set of independent tools to create an effective IA Command and Control (C2) system. The Cyber Command System (CCS) was developed under DARPA funding as a prototype to act as a single integration point for C2. This paper explores the lessons learned throughout the course of Integration Feasibility Experiments conducted at the Technology Integration Center. This paper concludes with future approaches that will propel the fundamental CCS architecture into a new generation of agent-based, distributed solutions. In particular, since the discipline of IA is in its infancy, it makes sense to consider reactive agents and emergent behavior as means of discovering and evolving essential functionality.
引用
收藏
页码:155 / 164
页数:10
相关论文
共 10 条
[1]  
CAVENDON L, 1996, INTELLIGENT AGENT SY
[2]  
FEIERTAG R, 1999, COMMON INTRUSION SPE
[3]  
LASHKARI Y, 1994, P 12 NAT C ART INT, V1
[4]  
Lee W, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P79
[5]  
Maes P., 1989, Connection Science, V1, P291, DOI 10.1080/09540098908915643
[6]  
MANGANARIS S, 1999, 2 INT WORKSH REC ADV
[7]  
MITCHELL T, 1999, COMMUNICATIONS ASS C, V42
[8]  
SAHOTA MK, 1994, PROCEEDINGS OF THE TWELFTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOLS 1 AND 2, P1303
[9]  
SCHNACKENBERG D, 2000, P DARPA INF SURV C E
[10]  
Stolfo S., 1997, Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, P74