Corpus ID: 227745683

Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive, automatic cyber defense systems and their impact to the industry, society and national security

@article{Ko2020CyberAA,
  title={Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive, automatic cyber defense systems and their impact to the industry, society and national security},
  author={R. Ko},
  journal={ArXiv},
  year={2020},
  volume={abs/2012.04405}
}
  • R. Ko
  • Published 2020
  • Computer Science
  • ArXiv
This paper sets the context for the urgency for cyber autonomy, and the current gaps of the cyber security industry. A novel framework proposing four phases of maturity for full cyber autonomy will be discussed. The paper also reviews new and emerging cyber security automation techniques and tools, and discusses their impact on society, the perceived cyber security skills gap/shortage and national security. We will also be discussing the delicate balance between national security, human rights… Expand

Figures from this paper

Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools
Cybersecurity tools are increasingly automated with artificial intelligent (AI) capabilities to match the exponential scale of attacks, compensate for the relatively slower rate of training newExpand

References

SHOWING 1-10 OF 38 REFERENCES
Hackback: Permitting Retaliatory Hacking by Non-State Actors as Proportionate Countermeasures to Transboundary Cyberharm
Cyber-espionage has received even greater attention in the wake of reports of persistent and brazen cyber-exploitation of U.S. and Canadian firms by the Chinese military. But the recent disclosuresExpand
Stuxnet: Dissecting a Cyberwarfare Weapon
TLDR
Last year marked a turning point in the history of cybersecurity-the arrival of the first cyber warfare weapon ever, known as Stuxnet, which followed a completely new approach that's no longer aligned with confidentiality, integrity, and availability thinking. Expand
Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats
TLDR
The fundamental challenges facing the research community are described and new promising solution paths are identified and an advantage afforded to attackers is reversed and reverses it to advantage defenders. Expand
The All-Purpose Sword: North Korea's Cyber Operations and Strategies
According to a 2013 briefing from the South Korean National Assembly by the South Korean National Intelligence Service, North Korean leader Kim Jong-un stated, “Cyberwarfare is an all-purpose swordExpand
Convention on Cybercrime
Section 1 – Substantive criminal law Title 1 – Offences against the confidentiality, integrity and availability of computer data and systems Article 2 – Illegal access Each Party shall adoptExpand
Vulnerability Black Markets: Empirical Evidence and Scenario Simulation
TLDR
If legal markets expose vulnerabilities that go unresolved, the security and quality of software may suffer more than in the absence of a legal market, and the problem scope expands beyond vulnerability trading to one that requires active participation and reaction by software vendors. Expand
The Cyber Grand Challenge and the Future of Cyber-Autonomy
TLDR
Fion Precision Intuition Brute force Creativity Scalability Brainstorming: Aims to improve upon current state-of-the-art understanding of “what makes a person tick” and develop new “smart” devices to tap into this knowledge. Expand
Understanding the Mirai Botnet
TLDR
It is argued that Mirai may represent a sea change in the evolutionary development of botnets--the simplicity through which devices were infected and its precipitous growth, and that novice malicious techniques can compromise enough low-end devices to threaten even some of the best-defended targets. Expand
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
  • C. Cowan
  • Computer Science
  • USENIX Security Symposium
  • 1998
TLDR
StackGuard is described: a simple compiler technique that virtually eliminates buffer overflow vulnerabilities with only modest performance penalties, and a set of variations on the technique that trade-off between penetration resistance and performance. Expand
Using the Common Criteria for IT Security Evaluation
Introduction Background Purpose Scope Intended Audience Organization What Are the Common Criteria? History Purpose and Intended Use Major Components of the Methodology and How They Work RelationshipExpand
...
1
2
3
4
...