Image
volume 3 issue 09

SECURITY RESEARCH THAT ALLOW FOR THE COEVOLUTIONARY PROTECTION OF NETWORKS

Abstract

A cyber-attack can be described as any hostile act designed to compromise the supply, privacy or integrity of a network. But, for the purposes of this lesson, distinguish between computer network exploitation (CNE), which is typically associated with the theft of records, and PC community attacks (CNA), which typically involve disruption of information structures or are associated with destruction. Yes, not critical. Many organizations within the cyber security community make a distinction between computer network exploitation (CNE), which is generally related to information theft, and computer network attacks (CNA). Consequently, for the sake of convenience, those two different styles of malicious hoaxes can be lumped together under the umbrella term "cyberattack". In the early days of the Internet, completely laptop-based attacks on the general public took the form of computer worms and viruses.

Keywords
  • Security,
  • Coevolutionary,
  • Networks,
  • computer network exploitation,
  • Information Theft
References
  • Andrew Tphillips. Now here it is—the asymmetric nature of cyber warfare
  • USNaval Institute, Vol 138/10/1,316, October 2012.
  • Travis Service and Daniel Toritz. Enhancing infrastructure resilience through competitive co-development . New Mathematics and Natural Computation, 5(2):441-457, July 2009.
  • Mr. Narayan. Hingorani, LászlóGugi, and Mohammad Al-Hawari. Understanding Facts: Concepts and Technology of Flexible AC Transmission Systems. Wiley-IEEE Press, December 1999.
  • Holly Arnold, David Massad, Giuliano Andrea Pagani, Johannes Schmidt and Elena Stepanova.
  • Richard Colbaugh and Kristin Glass. Prediction-oriented defense against adaptive rivals. In 2012, IEEE International Conference on Systems, Man and Cy-Bernetics (SMC), pages 2721–2727, 2012.
  • Richard Colbaugh and Kristin Glass. Leveraging Sociological Models for Prediction I: Inferring Adverse Relationships. In 2012, IEEE International Conference on Intelligence and Security Informatics (ISI), pages 66–71. IEEE, 2012.
  • Guanhua Yan, Richie Lee, Alex Kent, and David Wolpert. Toward a Bayesian network game framework for evaluating DDoS attacks and defense. In Proceedings of the 2012 AMC Conference on Computer and Communications Security (CCS'12), pages 553–566, 2012.
  • Justin Grana, David Wolpert, Joshua Neill, Dongping Zi, Tanmay Bhattacharya, and Russell Bent. HMM for optimal detection of cybernet attacks. Technical ReportSFI-2014-06-022, Santa Fe Institute, June 2014.
  • Maarten van Dijk, ArieJuels, AlinaOprea, and Ronald L. Rivest. FlipIt: A game of "stealth takeover". Journal of Cryptology, 26(4):655–713, 2013.
  • TerryBenzel, Bob Braden, Ted Faber, JelenaMirkovic, Steve Schwab, Karen Solins, and John Wroklaski. Current developments in DETR cyber security testing technology. In Proceedings of the Cyber Security Applications and Technologies for Homeland Security (CATCH) Conference, pages 57–70. IEEE, 2009.
  • Lori Pridmore, Patrick Lardieri and Robert Hollister. National cyber range (NCR) automated testing tools: implications and applications for network-centric support tools. In Proceedings of the 2010 IEEE System Readiness Technology Conference (AutoTestCon), pages 1-4, September 2010.
  • Dave Cliff and Geoffrey F. Miller. Tracking the Red Queen: Measuring Adaptive Progress in Co-Evolutionary Simulations. Advances in Artificial Life, pages 200–218. Springer, 1995.
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

How to Cite

Rakesh Kumar. (2020). SECURITY RESEARCH THAT ALLOW FOR THE COEVOLUTIONARY PROTECTION OF NETWORKS. International Journal of Multidisciplinary Research and Studies, 3(09), 01–09. Retrieved from https://ijmras.com/index.php/ijmras/article/view/194

Download Citation

Downloads

Download data is not yet available.

Most read articles by the same author(s)

Similar Articles

You may also start an advanced similarity search for this article.