skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies

Abstract

This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF can be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit bothmore » our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.« less

Authors:
;
Publication Date:
Research Org.:
Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1059207
Report Number(s):
PNNL-21854
400470000
DOE Contract Number:  
AC05-76RL01830
Resource Type:
Technical Report
Country of Publication:
United States
Language:
English
Subject:
Digital Ants; Genetic Algorithms; MLSTONES; Bioinformatic Classification; Moving target; cyber defense

Citation Formats

Fink, Glenn A, and Oehmen, Christopher S. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies. United States: N. p., 2012. Web. doi:10.2172/1059207.
Fink, Glenn A, & Oehmen, Christopher S. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies. United States. https://doi.org/10.2172/1059207
Fink, Glenn A, and Oehmen, Christopher S. 2012. "Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies". United States. https://doi.org/10.2172/1059207. https://www.osti.gov/servlets/purl/1059207.
@article{osti_1059207,
title = {Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies},
author = {Fink, Glenn A and Oehmen, Christopher S},
abstractNote = {This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF can be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.},
doi = {10.2172/1059207},
url = {https://www.osti.gov/biblio/1059207}, journal = {},
number = ,
volume = ,
place = {United States},
year = {Sat Sep 01 00:00:00 EDT 2012},
month = {Sat Sep 01 00:00:00 EDT 2012}
}