Resilent Command and Control Infrastructures for Cyber Operations (Keynote)

被引:0
作者
Carvalho, Marco [1 ]
机构
[1] Florida Inst Technol, Harris Inst Assured Informat, Melbourne, FL 32901 USA
来源
2015 IEEE/ACM 10TH INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS | 2015年
关键词
D O I
10.1109/SEAMS.2015.17
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The concept of command and control (C2) is generally associated with the exercise of authority, direction and coordination of assets and capabilities. Traditionally, the concept has encompassed important operational functions such as the establishment of intent, allocation of roles and responsibilities, definition of rules and constraints, and the monitoring and estimation of system state, situation, and progress. More recently, the notion of C2 has been extended beyond military applications to include cyber operation environments and assets. Unfortunately this evolution has enjoyed faster progress and adoption on the offensive, rather than defensive side of cyber operations. One example is the adoption of advanced peer-to-peer C2 infrastructures for the control of malicious botnets and coordinated attacks, which have successfully yielded very effective and resilient control infrastructures in many instances. Defensive C2 is normally associated with a system's ability to monitor, interpret, reason, and respond to cyber events, often through advanced human-machine interfaces, or automated actions. For defensive operations, the concept is gradually evolving and gaining momentum. Recent research activities in this area are now showing great potential to enable truly resilient cyber defense infrastructures. In this talk I will introduce some of the motivations, requirements, and challenges associated with the design of distributed command and control infrastructures for cyber operations. The talk will primarily focus on the resilience aspects of distributed C2, and will cover a brief overview of the prior research in the field, as well as discussions on some of the current and future challenges in this important research domain.
引用
收藏
页码:97 / 97
页数:1
相关论文
共 50 条
[31]   Cyber security of critical infrastructures [J].
Maglaras, Leandros A. ;
Kim, Ki-Hyung ;
Janicke, Helge ;
Ferrag, Mohamed Amine ;
Rallis, Stylianos ;
Fragkou, Pavlina ;
Maglaras, Athanasios ;
Cruz, Tiago J. .
ICT EXPRESS, 2018, 4 (01) :42-45
[32]   A nonproprietary language for the command and control of cyber defenses-OpenC2 [J].
Mavroeidis, Vasileios ;
Brule, Joe .
COMPUTERS & SECURITY, 2020, 97
[33]   Semi-automated Wrapping of Defenses (SAWD) for Cyber Command and Control [J].
Carvalho, Marco ;
Eskridge, Thomas C. ;
Atighetchi, Michael ;
Paltzer, Nicholas .
MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, :19-24
[34]   Design of Intelligent Command and Control System for Cyberspace Defense Operations [J].
Dai, Wei ;
Jiang, Fei ;
Chen, Lin ;
Huang, Jin-Jie ;
Yan, Hong-Sheng .
PROCEEDINGS OF 2023 11TH CHINA CONFERENCE ON COMMAND AND CONTROL, C2 2023, 2024, 1124 :404-411
[35]   Framework for Interoperable Command & Control of Joint Electromagnetic Spectrum Operations [J].
Posherstnik, Yuriy ;
Rocksvald, Edward Rocky ;
Lussier, Bill ;
Makowski, Mike .
MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
[36]   Command and control in emergency services operations: a social network analysis [J].
Houghton, Robert J. ;
Baber, Chris ;
McMaster, Richard ;
Stanton, Neville A. ;
Salmon, Paul ;
Stewart, Rebecca ;
Walker, Guy .
ERGONOMICS, 2006, 49 (12-13) :1204-1225
[37]   Keynote: Modern Challenges for Cyber Defense [J].
Frincke, Deborah .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
[38]   Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? [J].
Davis, Carlton R. ;
Neville, Stephen ;
Fernandez, Jose M. ;
Robert, Jean-Marc ;
McHugh, John .
COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 :461-+
[39]   Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures [J].
Shukla, Sandeep K. .
2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, :30-31
[40]   KeyNote: Trust management for public-key infrastructures [J].
Blaze, M ;
Feigenbaum, J ;
Keromytis, AD .
SECURITY PROTOCOLS, 1999, 1550 :59-66