Resilent Command and Control Infrastructures for Cyber Operations (Keynote)

被引:0
作者
Carvalho, Marco [1 ]
机构
[1] Florida Inst Technol, Harris Inst Assured Informat, Melbourne, FL 32901 USA
来源
2015 IEEE/ACM 10TH INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS | 2015年
关键词
D O I
10.1109/SEAMS.2015.17
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The concept of command and control (C2) is generally associated with the exercise of authority, direction and coordination of assets and capabilities. Traditionally, the concept has encompassed important operational functions such as the establishment of intent, allocation of roles and responsibilities, definition of rules and constraints, and the monitoring and estimation of system state, situation, and progress. More recently, the notion of C2 has been extended beyond military applications to include cyber operation environments and assets. Unfortunately this evolution has enjoyed faster progress and adoption on the offensive, rather than defensive side of cyber operations. One example is the adoption of advanced peer-to-peer C2 infrastructures for the control of malicious botnets and coordinated attacks, which have successfully yielded very effective and resilient control infrastructures in many instances. Defensive C2 is normally associated with a system's ability to monitor, interpret, reason, and respond to cyber events, often through advanced human-machine interfaces, or automated actions. For defensive operations, the concept is gradually evolving and gaining momentum. Recent research activities in this area are now showing great potential to enable truly resilient cyber defense infrastructures. In this talk I will introduce some of the motivations, requirements, and challenges associated with the design of distributed command and control infrastructures for cyber operations. The talk will primarily focus on the resilience aspects of distributed C2, and will cover a brief overview of the prior research in the field, as well as discussions on some of the current and future challenges in this important research domain.
引用
收藏
页码:97 / 97
页数:1
相关论文
共 50 条
[41]   Cyber Security of Networked Critical Infrastructures [J].
Abu-Nimeh, Saed ;
Foo, Ernest ;
Fovino, Igor Nai ;
Govindarasu, Manimaran ;
Morris, Thomas .
IEEE NETWORK, 2013, 27 (01) :3-4
[42]   From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacks [J].
Ahmed, Amro ;
Gkioulos, Vasileios .
COMPUTER SECURITY - ESORICS 2022, PT III, 2022, 13556 :535-553
[43]   Command and control concepts within the Network-Centric Operations construct [J].
Phister, Paul W., Jr. ;
Cherry, John D. .
2006 IEEE AEROSPACE CONFERENCE, VOLS 1-9, 2006, :3262-+
[44]   The Approach to Defining the Competencies for Military Professionals in Command and Control in Military Operations [J].
Saibert, Richard .
VOJENSKE ROZHLEDY-CZECH MILITARY REVIEW, 2019, 28 (01) :30-47
[45]   Cyber attacks on financial critical infrastructures [J].
University of Modena and Reggio Emilia, via Vignolese 905, Modena, Italy ;
不详 ;
00185, Italy ;
不详 .
Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middlew., 1600, (53-82)
[46]   MAESTRO: The versatile command and control system software for mission operations and testing [J].
Chevers, David D. ;
Durham, Darcie ;
Itchkawich, Thomas .
2006 IEEE AEROSPACE CONFERENCE, VOLS 1-9, 2006, :4379-+
[47]   Augmented Command and Control Table to Support Network-Centric Operations [J].
Zocco, Alessandro ;
De Paolis, Lucio Tommaso .
DEFENCE SCIENCE JOURNAL, 2015, 65 (01) :39-45
[48]   MANAGEMENT STUDY OF COMMAND-CONTROL OPERATIONS AT ORLANDO POLICE DEPARTMENT [J].
DOERING, RD ;
CLAPP, DE .
JOURNAL OF POLICE SCIENCE AND ADMINISTRATION, 1976, 4 (01) :94-105
[49]   CYBER COMMAND THE RIFT IN US MILITARY CYBER-STRATEGY [J].
Samaan, Jean-Loup .
RUSI JOURNAL, 2010, 155 (06) :16-21
[50]   Budget constrained optimal security hardening of control networks for critical cyber-infrastructures [J].
Anwar, Zahid ;
Montanari, Mirko ;
Gutierrez, Alejandro ;
Campbell, Roy H. .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2009, 2 (1-2) :13-25