Active defense
Active defense can refer to a defensive strategy in the military or cybersecurity arena.
In the cybersecurity arena, active defense may mean "asymmetric defenses," namely defenses that increase costs to cyber-adversaries by reducing costs to cyber-defenders.[1] For example, an active defense data protection strategy invented by CryptoMove[2] leverages dynamic data movement, distribution, and re-encryption to make data harder to attack, steal, or destroy.[3] Prior data protection approaches relied on encryption of data at rest, which leaves data vulnerable to attacks including stealing of ciphertext, cryptographic attack, attacks on encryption keys, destruction of encrypted data, ransomware attacks, insider attacks, and others. Three ACM computing conferences have explored Moving Target Defense as a strategy for network and application-level security as well, for instance by rotating IP addresses or dynamically changing network topologies.[4] Production implementations of MTD are provided by companies such as Dispel for applications including legacy systems, communications, and election security.[5] Additionally, "active defense measures" are often another term used to define and refer to offensive cyber operations (OCOs) or computer network attacks (CNAs).
Some have defined active defenses as including of deception or honeypots, which seek to confuse attackers with traps and advanced forensics.[6] Examples of such honeypot technologies include Illusive Networks,[7] TrapX,[8] Cymmetria,[9] Attivo,[10] and others. Other types of active defenses might include automated incident response, which attempts to tie together different response strategies in order to increase work for attackers and decrease work for defenders.[11]
The Department of Defense defines active defense as: "The employment of limited offensive action and counterattacks to deny a contested area or position to the enemy."[12] This definition does not specify whether it refers to physical actions, or cyber-related actions. Recently, the Department of Homeland Security and financial institutions have identified Active Defense as a top priority for security industrial infrastructure systems.[13] As part of a broader push for greater resiliency, the National Institute of Standards and Technology 800-160 Volume 2 framework has gone further, providing guidance on standardization for active defense.[14] [15]
See also
References
- ↑ Burshteyn, Mike (2016-12-22). "What does 'Active Defense' mean?". CryptoMove. https://blog.cryptomove.com/what-does-active-defense-mean-4ecff93c4bc4.
- ↑ "CryptoMove | Active Defense Data Protection". http://www.cryptomove.com.
- ↑ CryptoMove invented such technology that protects data by constantly moving, distributing, mutating, and re-encrypting it.
- ↑ "Second ACM Workshop on Moving Target Defense (MTD 2015)". http://mtd.mobicloud.asu.edu/.
- ↑ "Dispel Launches Election Security Platform". https://www.securityweek.com/dispel-launches-election-security-platform.
- ↑ "Implementing Active Defense Systems". SANS White Paper. https://www.sans.org/reading-room/whitepapers/detection/implementing-active-defense-systems-private-networks-34312.
- ↑ "illusive networks: The Leader In Deception Technology". https://www.illusivenetworks.com/.
- ↑ "TrapX Security". https://trapx.com/.
- ↑ "Home - Cymmetria" (in en-US). https://www.cymmetria.com/.
- ↑ "Deception-Based Threat Detection - Attivo Networks" (in en-US). https://attivonetworks.com/.
- ↑ SANS WhitePaper on Incident Response and Active Defense, https://www.sans.org/reading-room/whitepapers/detection/implementing-active-defense-systems-private-networks-34312
- ↑ "U.S. DoD Terminology: active defense". http://www.militaryfactory.com/dictionary/military-terms-defined.asp?term_id=37.
- ↑ "Financial Services Cyber Security Active Defense (FSCSAD) - Federal Business Opportunities: Opportunities". https://www.fbo.gov/index?s=opportunity&mode=form&id=bbef769b0349f41d40d472d58b445306&tab=core&_cview=0.
- ↑ "Systems Security Engineering: Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems". https://csrc.nist.gov/CSRC/media/Publications/sp/800-160/vol-2/draft/documents/sp800-160-vol2-draft.pdf.
- ↑ Woods, Dan. "5 Ways to Fight Back Against Cybersecurity Attacks: The Power of Active Defense". https://www.forbes.com/sites/danwoods/2018/06/27/5-ways-to-fight-back-against-cybersecurity-attacks-the-power-of-active-defense/.