Towards a theory of autonomous reconstitution of compromised cyber-systems

Pradeep Ramuhalli, Mahantesh Halappanavar, Jamie Coble, Mukul Dixit

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

17 Scopus citations

Abstract

Effective reconstitution approaches for cyber systems are needed to keep critical infrastructure operational in the face of an intelligent adversary. The reconstitution response, including recovery and adaptation, may require significant reconfiguration of the system at all levels to render the cyber-system resilient to ongoing and future attacks or faults while maintaining continuity of operations. A theoretical basis for optimal dynamic reconstitution is needed to address the challenge of ensuring that dynamic reconstitution is optimal with respect to resilience metrics, and is being developed and evaluated in this project. Such a framework provides the technical basis for evaluating cyber-defense and reconstitution approaches. This paper describes a preliminary framework that may be used to develop and evaluate concepts for effective autonomous reconstitution of compromised cyber systems.

Original languageEnglish
Title of host publication2013 IEEE International Conference on Technologies for Homeland Security, HST 2013
Pages577-583
Number of pages7
DOIs
StatePublished - 2013
Externally publishedYes
Event2013 13th IEEE International Conference on Technologies for Homeland Security, HST 2013 - Waltham, MA, United States
Duration: Nov 12 2013Nov 14 2013

Publication series

Name2013 IEEE International Conference on Technologies for Homeland Security, HST 2013

Conference

Conference2013 13th IEEE International Conference on Technologies for Homeland Security, HST 2013
Country/TerritoryUnited States
CityWaltham, MA
Period11/12/1311/14/13

Keywords

  • evolution
  • reconstitution
  • recovery
  • resilient cyber-systems

Fingerprint

Dive into the research topics of 'Towards a theory of autonomous reconstitution of compromised cyber-systems'. Together they form a unique fingerprint.

Cite this