Jump to content

Active defense

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by CopperOwl (talk | contribs) at 20:12, 15 June 2018 (Added NIST 800-160 Vol 2 framework (note appendix D, page 100) because it's a new framework for implementing active defense. Added Dispel as an example of MTD as being commercially available, and not merely academic.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Active defense can refer to a defensive strategy in the military or cybersecurity arena.

The Department of Defense defines active defense as: "The employment of limited offensive action and counterattacks to deny a contested area or position to the enemy."[1] This definition does not specify whether it refers to physical actions, or cyber-related actions.

In the cybersecurity arena, active defense may mean "asymmetric defenses," namely defenses that increase costs to cyber-adversaries by reducing costs to cyber-defenders.[2] For example, an active defense data protection strategy invented by CryptoMove[3] leverages dynamic data movement, distribution, and re-encryption to make data harder to attack, steal, or destroy.[4] Prior data protection approaches relied on encryption of data at rest, which leaves data vulnerable to attacks including stealing of ciphertext, cryptographic attack, attacks on encryption keys, destruction of encrypted data, ransomware attacks, insider attacks, and others. Three ACM computing conferences have explored Moving Target Defense as a strategy for network and application-level security as well, for instance by rotating IP addresses or dynamically changing network topologies.[5] Production implementations of MTD are provided by companies such as Dispel for applications including legacy systems, communications, and election security.[6]

Some have defined active defenses as including of deception or honeypots, which seek to confuse attackers with traps and advanced forensics.[7] Examples of such honeypot technologies include Illusive Networks,[8] TrapX,[9] Cymmetria,[10] Attivo,[11] and others. Other types of active defenses might include automated incident response, which attempts to tie together different response strategies in order to increase work for attackers and decrease work for defenders.[12]

Recently, the Department of Homeland Security and financial institutions have identified Active Defense as a top priority for security industrial infrastructure systems.[13] As part of a broader push for greater resiliency, the National Institute of Standards and Technology 800-160 Volume 2 framework has gone further, providing guidance on standardization for active defense.[14]

See also

References

  1. ^ "U.S. DoD Terminology: active defense". Retrieved 2016-12-24.
  2. ^ Burshteyn, Mike (2016-12-22). "What does 'Active Defense' mean?". CryptoMove. Retrieved 2016-12-24.
  3. ^ "CryptoMove | Active Defense Data Protection". CryptoMove. Retrieved 2016-12-24.
  4. ^ CryptoMove invented such technology that protects data by constantly moving, distributing, mutating, and re-encrypting it.
  5. ^ "Second ACM Workshop on Moving Target Defense (MTD 2015)". mtd.mobicloud.asu.edu. Retrieved 2016-12-25.
  6. ^ "Dispel Launches Election Security Platform". securityweek.com. Retrieved 2018-06-15.
  7. ^ "Implementing Active Defense Systems". SANS White Paper.
  8. ^ "illusive networks: The Leader In Deception Technology". www.illusivenetworks.com. Retrieved 2016-12-24.
  9. ^ trapx.com https://trapx.com/. Retrieved 2016-12-24. {{cite web}}: Missing or empty |title= (help)
  10. ^ "Home - Cymmetria". Cymmetria | Cyber deception. Retrieved 2016-12-24.
  11. ^ "Deception-Based Threat Detection - Attivo Networks". Attivo Networks. Retrieved 2016-12-24.
  12. ^ SANS WhitePaper on Incident Response and Active Defense, https://www.sans.org/reading-room/whitepapers/detection/implementing-active-defense-systems-private-networks-34312
  13. ^ "Financial Services Cyber Security Active Defense (FSCSAD) - Federal Business Opportunities: Opportunities". www.fbo.gov. Retrieved 2016-12-25.
  14. ^ "Systems Security Engineering: Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems" (PDF). www.nist.gov. Retrieved 2018-06-15.