首页> 外文学位 >Monitoring critical infrastructure assets and strategic signaling to deter aggression in cyberspace.
【24h】

Monitoring critical infrastructure assets and strategic signaling to deter aggression in cyberspace.

机译:监控关键基础设施资产和战略信号,以阻止对网络空间的侵略。

获取原文
获取原文并翻译 | 示例

摘要

At 6:00 a.m., just before power consumption reaches its peak, a computer security expert at an electrical power utility receives the text message, "Fireball Express," indicating that a cyber operation is being executed on the utility's assets. The expert is a covert government agent, who is embedded in the power utility to monitor cybersecurity breaches. Only the CEO of the company is aware of her status as a government agent.;Months earlier, the embedded agent created a honeynet at the utility to draw cyber operations conducted by adversaries. The honeynet presents an intruder with a carbon copy of the utility's SCADA systems. Meanwhile, to enhance situational awareness, U.S. intelligence has secretly implanted sensors in core Internet routers across America. The Fireball Express alert was triggered by correlating information gathered from the honeynet and the Internet sensors; the analysis indicates that the operations are being conducted by a nation state adversary.;This dissertation considers three important questions raised by the Fireball Express scenario. Does the government's placement of the honeynet and the embedded agent at the privately-owned utility violate the Constitution? How can the U.S. clearly demonstrate its disapproval of the intrusion at the utility to the nation state adversary? Since a direct confrontation with the adversary could reveal the existence of the honeynet and, possibly, the presence of the embedded agent, how can the U.S. maintain the secrecy of its sensors while responding strongly to the intrusion?;In particular, the dissertation focuses on three components. First, it describes government monitoring scenarios and outlines the constitutional authorities and principal legal issues associated with government monitoring of private critical infrastructure assets. Second, it presents a signaling framework based on adversary-defender interactions that can be used to help deter aggression in cyberspace. Finally, it discusses the application of deception techniques to shield cyberspace sensors. Well-executed and nuanced deception with regard to the deployment and use of sensors can help a defender gain tactical and strategic superiority in cyberspace.
机译:在功耗达到峰值之前的凌晨6:00,电力公用事业部门的计算机安全专家收到了文本消息“ Fireball Express”,表示正在对该公用事业的资产执行网络操作。专家是一位秘密的政府特工,他嵌入电力公司来监视网络安全漏洞。只有该公司的首席执行官才知道她作为政府代理人的身份。几个月前,嵌入式代理人在公用事业公司创建了一个蜜网,以吸引对手进行的网络运营。蜜网向入侵者展示了该实用程序的SCADA系统的副本。同时,为了增强态势感知,美国情报部门已在整个美国的核心Internet路由器中秘密植入了传感器。 Fireball Express警报是通过关联从蜜网和Internet传感器收集的信息而触发的;分析表明该操作正在由一个国家的对手进行。本论文考虑了Fireball Express场景提出的三个重要问题。政府将蜜网和嵌入式代理放置在私有公用事业上是否违反宪法?美国怎么能清楚地表明它反对公用事业向国家对手的入侵?由于与对手的直接对抗可能揭示出蜜网的存在,甚至可能揭示嵌入式代理的存在,因此美国如何在强烈响应入侵的同时保持其传感器的保密性?尤其是,本文的重点是三个组成部分。首先,它描述了政府的监控方案,并概述了与政府对私人关键基础设施资产的监控相关的宪法授权和主要法律问题。其次,它提出了一个基于对手-防御者交互的信号框架,可以用来帮助阻止网络空间的侵略。最后,它讨论了欺骗技术在屏蔽网络空间传感器中的应用。关于传感器的部署和使用,执行得当且细微差别的欺骗可以帮助防御者获得网络空间的战术和战略优势。

著录项

  • 作者

    Rice, Mason J.;

  • 作者单位

    The University of Tulsa.;

  • 授予单位 The University of Tulsa.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2011
  • 页码 90 p.
  • 总页数 90
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号