Foundations for Cyber Zone Defense

We will introduce a new framework called cyber zone defense (CZD) that treats malware like a black box: a process we can study solely based on its internal and external communication. We can reduce the impact of malware, without regard to its functionality or even existence, by limiting only these connections. In this paper, we propose two metrics for measuring CZD effectiveness and an illustrative simulation and a closed form mathematical model that predicts these statistics. The simulation is intuitive; it allows the analyst to provision arbitrary configurations and see how changes in topology affect the efficacy of the CZD. The model provides a mathematical verification for CZD and matches the results of the simulation well. These artifacts test the feasibility of CZD while deferring implementation details.

[1]  Cao Wantian,et al.  Intelligent communication network research of isolation security model based on the anomaly detection , 2014, Proceedings of 2nd International Conference on Information Technology and Electronic Commerce.

[2]  Ming Liu,et al.  Type Based Network Isolation Against Net Virus , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[3]  Otto Carlos Muniz Bandeira Duarte,et al.  Virtual networks: isolation, performance, and trends , 2011, Ann. des Télécommunications.

[4]  Yeu-Pong Lai,et al.  Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard , 2007, NBiS.

[5]  Athanasios V. Vasilakos,et al.  Leveraging software-defined networking for security policy enforcement , 2016, Inf. Sci..

[6]  R. Subramanian,et al.  Innovative and effective methodology for implementing network isolation for manufacturing environments , 2005, ISSM 2005, IEEE International Symposium on Semiconductor Manufacturing, 2005..

[7]  Wm. Arthur Conklin State Based Network Isolation for Critical Infrastructure Systems Security , 2015, 2015 48th Hawaii International Conference on System Sciences.

[8]  Luís Henrique Maciel Kosmalski Costa,et al.  Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environments , 2015, Journal of Internet Services and Applications.

[9]  Dorgival O. Guedes,et al.  Virtualized network isolation using Software Defined Networks , 2013, 38th Annual IEEE Conference on Local Computer Networks.

[10]  Hongliang Liang,et al.  A Lightweight Security Isolation Approach for Virtual Machines Deployment , 2014, Inscrypt.

[11]  Iñigo Cuiñas,et al.  Using Vegetation Barriers to Improving Wireless Network Isolation and Security , 2008, ICETE.

[12]  Seth Bullock,et al.  Improving measures of topological robustness in networks of networks and suggestion of a novel way to counter both failure propagation and isolation , 2015 .

[13]  Sandia Report,et al.  Complexity Science Challenges in Cybersecurity , 2009 .

[14]  Yong Zhao,et al.  Research on the Application Security Isolation Model , 2010, e-Forensics.