Policies and innovative self-adaptive techniques to counter adversarial attacks in network and cyber environments

Reza Montasari, Amin Hosseinian-Far, Richard Hill, Hamid Jahankhani (Editor)

Research output: Contribution to Book/ReportChapter

Abstract

Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging to identify a solution to create an effective defensive posture. As the cyber phenomenon becomes a fundamental part of our society, it is essential to identify adaptive methods to increase the worldwide defensive condition in the most effective manner possible. A decade ago, it was not possible to imagine today’s cyber-threat landscape. Cybercriminals have adapted their methods to circumvent traditional defenses and hide undetected on systems for months or even years. Therefore, enterprise security also needs to be adapted with an intelligence, multi-layered approach to IT security. This paper surveys the latest research on the foundation of Adaptive Enterprise Security (AEC). To this end, it discusses potential security policies and strategies that are easy to develop, are established, and have a major effect on an enterprises security practices. These policies and strategies can then efficiently be applied to an enterprises cyber policies for the purposes of enhancing security and defense. The study also discusses various adaptive security measures that enterprises can adopt to continue with securing their network and cyber environments. To this end, the paper continues to survey and analyze the effectiveness of some of the latest adaptation techniques deployed to secure these network and cyber environments.
Original languageEnglish
Title of host publicationCyber Criminology
PublisherSpringer
Publication statusAccepted/In press - 12 Jun 2018

Fingerprint

Industry

Cite this

Montasari, R., Hosseinian-Far, A., Hill, R., & Jahankhani, H. (Ed.) (Accepted/In press). Policies and innovative self-adaptive techniques to counter adversarial attacks in network and cyber environments. In Cyber Criminology Springer.
Montasari, Reza ; Hosseinian-Far, Amin ; Hill, Richard ; Jahankhani, Hamid (Editor). / Policies and innovative self-adaptive techniques to counter adversarial attacks in network and cyber environments. Cyber Criminology. Springer, 2018.
@inbook{e936352dd9274e7ca2306464b7837fb5,
title = "Policies and innovative self-adaptive techniques to counter adversarial attacks in network and cyber environments",
abstract = "Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging to identify a solution to create an effective defensive posture. As the cyber phenomenon becomes a fundamental part of our society, it is essential to identify adaptive methods to increase the worldwide defensive condition in the most effective manner possible. A decade ago, it was not possible to imagine today’s cyber-threat landscape. Cybercriminals have adapted their methods to circumvent traditional defenses and hide undetected on systems for months or even years. Therefore, enterprise security also needs to be adapted with an intelligence, multi-layered approach to IT security. This paper surveys the latest research on the foundation of Adaptive Enterprise Security (AEC). To this end, it discusses potential security policies and strategies that are easy to develop, are established, and have a major effect on an enterprises security practices. These policies and strategies can then efficiently be applied to an enterprises cyber policies for the purposes of enhancing security and defense. The study also discusses various adaptive security measures that enterprises can adopt to continue with securing their network and cyber environments. To this end, the paper continues to survey and analyze the effectiveness of some of the latest adaptation techniques deployed to secure these network and cyber environments.",
author = "Reza Montasari and Amin Hosseinian-Far and Richard Hill and Hamid Jahankhani",
year = "2018",
month = "6",
day = "12",
language = "English",
booktitle = "Cyber Criminology",
publisher = "Springer",

}

Policies and innovative self-adaptive techniques to counter adversarial attacks in network and cyber environments. / Montasari, Reza; Hosseinian-Far, Amin; Hill, Richard; Jahankhani, Hamid (Editor).

Cyber Criminology. Springer, 2018.

Research output: Contribution to Book/ReportChapter

TY - CHAP

T1 - Policies and innovative self-adaptive techniques to counter adversarial attacks in network and cyber environments

AU - Montasari, Reza

AU - Hosseinian-Far, Amin

AU - Hill, Richard

A2 - Jahankhani, Hamid

PY - 2018/6/12

Y1 - 2018/6/12

N2 - Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging to identify a solution to create an effective defensive posture. As the cyber phenomenon becomes a fundamental part of our society, it is essential to identify adaptive methods to increase the worldwide defensive condition in the most effective manner possible. A decade ago, it was not possible to imagine today’s cyber-threat landscape. Cybercriminals have adapted their methods to circumvent traditional defenses and hide undetected on systems for months or even years. Therefore, enterprise security also needs to be adapted with an intelligence, multi-layered approach to IT security. This paper surveys the latest research on the foundation of Adaptive Enterprise Security (AEC). To this end, it discusses potential security policies and strategies that are easy to develop, are established, and have a major effect on an enterprises security practices. These policies and strategies can then efficiently be applied to an enterprises cyber policies for the purposes of enhancing security and defense. The study also discusses various adaptive security measures that enterprises can adopt to continue with securing their network and cyber environments. To this end, the paper continues to survey and analyze the effectiveness of some of the latest adaptation techniques deployed to secure these network and cyber environments.

AB - Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging to identify a solution to create an effective defensive posture. As the cyber phenomenon becomes a fundamental part of our society, it is essential to identify adaptive methods to increase the worldwide defensive condition in the most effective manner possible. A decade ago, it was not possible to imagine today’s cyber-threat landscape. Cybercriminals have adapted their methods to circumvent traditional defenses and hide undetected on systems for months or even years. Therefore, enterprise security also needs to be adapted with an intelligence, multi-layered approach to IT security. This paper surveys the latest research on the foundation of Adaptive Enterprise Security (AEC). To this end, it discusses potential security policies and strategies that are easy to develop, are established, and have a major effect on an enterprises security practices. These policies and strategies can then efficiently be applied to an enterprises cyber policies for the purposes of enhancing security and defense. The study also discusses various adaptive security measures that enterprises can adopt to continue with securing their network and cyber environments. To this end, the paper continues to survey and analyze the effectiveness of some of the latest adaptation techniques deployed to secure these network and cyber environments.

M3 - Chapter

BT - Cyber Criminology

PB - Springer

ER -