REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response

05/23/2023
by   Damodar Panigrahi, et al.
0

Automated Intelligent Cyberdefense Agents (AICAs) that are part Intrusion Detection Systems (IDS) and part Intrusion Response Systems (IRS) are being designed to protect against sophisticated and automated cyber-attacks. An AICA based on the ideas of Self-Adaptive Autonomic Computing Systems (SA-ACS) can be considered as a managing system that protects a managed system like a personal computer, web application, critical infrastructure, etc. An AICA, specifically the IRS components, can compute a wide range of potential responses to meet its security goals and objectives, such as taking actions to prevent the attack from completing, restoring the system to comply with the organizational security policy, containing or confining an attack, attack eradication, deploying forensics measures to enable future attack analysis, counterattack, and so on. To restrict its activities in order to minimize collateral/organizational damage, such an automated system must have set Rules of Engagement (RoE). Automated systems must determine which operations can be completely automated (and when), which actions require human operator confirmation, and which actions must never be undertaken. In this paper, to enable this control functionality over an IRS, we create Rules of EngaGement for Automated cybeR Defense (REGARD) system which holds a set of Rules of Engagement (RoE) to protect the managed system according to the instructions provided by the human operator. These rules help limit the action of the IRS on the managed system in compliance with the recommendations of the domain expert. We provide details of execution, management, operation, and conflict resolution for Rules of Engagement (RoE) to constrain the actions of an automated IRS. We also describe REGARD system implementation, security case studies for cyber defense, and RoE demonstrations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/06/2023

Intrusion Response Systems: Past, Present and Future

The rapid expansion of the Internet of Things and the emergence of edge ...
research
04/17/2023

Training Automated Defense Strategies Using Graph-based Cyber Attack Simulations

We implemented and evaluated an automated cyber defense agent. The agent...
research
09/03/2020

Developing Enterprise Cyber Situational Awareness

The topic will focus on the U.S. Department of Defense strategy towards ...
research
03/15/2023

Joint Security-vs-QoS Game Theoretical Optimization for Intrusion Response Mechanisms for Future Network Systems

Network connectivity exposes the network infrastructure and assets to vu...
research
02/24/2020

Cry Wolf: Toward an Experimentation Platform and Dataset for Human Factors in Cyber Security Analysis

Computer network defense is a partnership between automated systems and ...
research
02/18/2020

Framework to Describe Intentions of a Cyber Attack Action

The techniques and tactics used by cyber adversaries are becoming more s...
research
12/16/2019

Misconfiguration Management of Network Security Components

Many companies and organizations use firewalls to control the access to ...

Please sign up or login with your details

Forgot password? Click here to reset