skip to main content
article
Free Access

Cyber defense: art to science

Published:01 March 2004Publication History
Skip Abstract Section

Abstract

Seeking the knowledge and means to more methodically detect, defend against, and better understand attacks on networked computer resources.

References

  1. Committee on Information Systems Trustworthiness, National Research Council. Trust in Cyberspace. National Academy Press, Washington, D.C., 1999.Google ScholarGoogle Scholar
  2. Haines, J., Ryder, D., Tinnel, L., and Taylor, S. Validation of sensor alert correlators. IEEE Security and Privacy 1 (Jan./Feb. 2003), 45--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Hamilton, S.N., Miller, W.L., Ott, A., and Saydjari, O.S. The role of game theory in information warfare. In Proceedings of the The Fourth Information Survivability Workshop, Vancouver, B.C., Canada, March 2002.Google ScholarGoogle Scholar
  4. Letter to President Bush, February 27, 2002; www.uspcd.org/letter.html.Google ScholarGoogle Scholar
  5. Neumann, P. Principled Assuredly Trustworthy Composable Architectures. Draft Final Report (Oct. 2003); www.csl.sri.com/users/neumann/chats4.pdf.Google ScholarGoogle Scholar
  6. President's Commission on Critical Infrastructure Protection. Critical Foundations: Protecting America's Infrastructure. Washington, D.C., 1997; www.ciao.gov/resource/pccip/PCCIP_Report.pdf.Google ScholarGoogle Scholar
  7. Salter, C., Saydjari, O., Schneier, B., and Wallner, J. Toward a secure system engineering methodology. In Proceedings of New Security Paradigms Workshop (Sept. 1998), ACM Press, New York, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Saydjari, O.S. Defending cyberspace. IEEE Computer 35 (Dec. 2002), 125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Saydjari, O., Tinnel, L., and Farrell, D. Cyberwar strategy and tactics: An analysis of cyber goals, strategies, tactics, and techniques. In Proceedings of the 2002 IEEE Workshop on Information Assurance, June 2002, U.S. Military Academy, West Point, NY.Google ScholarGoogle Scholar
  10. Schudel, G. and Wood, B. Adversary work factor as a metric for information assurance. In Proceedings of New Security Paradigms Workshop (Sept. 2000), ACM Press, New York, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Tan, K.M. and Maxion, R.A. Determining the operational limits of an anomaly-based intrusion detector. IEEE Journal on Selected Areas in Communications, Special Issue on Design and Analysis Techniques for Security Assurance 21 (Jan. 2003), 96--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Tinnel, L., Saydjari, O., and Haines, J. An Integrated Cyber Panel System. Supplement to DARPA Information Survivability Conference and Exposition, April 2003, Crystal City, VA.Google ScholarGoogle Scholar

Index Terms

  1. Cyber defense: art to science

        Recommendations

        Reviews

        Robert Edward Mahan

        This article argues for a strengthening of the scientific foundations of cyber defense. The author approaches the argument logically and vigorously, in five areas: the principal elements of cyber defense, the need for a dynamic rather than static defense posture, cyber defense compared to the conduct of war, current science and technology deficiencies that need improvement, and the systems engineering discipline compared to today's black art defense. Finally, he argues for action in the style of the Manhattan Project, to develop the capability to protect the national infrastructure, and to improve our national defense policy. This is a well-written, cogent account of the current state of cyber defense capabilities and shortcomings. The technical sections are high level, and the information in them is presented in the abstract. It would be hard to disagree with the author's observations. One can argue that there are neglected deficiencies, such as traffic filtering, or tracking down bad actors. My main issue with this article is the intense call to arms. The call for a Manhattan Project-style project-with appropriate national priority, resource levels, and structure-is arguable. Clearly, we must do better, and more resources are needed, but there are many competing priorities, such as physical defense and meeting unmet human needs, that must be balanced against increased investments in cyber defense. That the author raises these questions in the context of a technical discussion is refreshing, and gives one pause to think about these priorities, and how each of us would answer the call. That alone makes this article a recommended read. Online Computing Reviews Service

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 47, Issue 3
          Homeland security
          March 2004
          91 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/971617
          Issue’s Table of Contents

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 March 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format