Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Linked to FindBook
Google Book
Amazon
博客來
Constructive Research: Cyber Maneuvers in Blue Space.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Constructive Research: Cyber Maneuvers in Blue Space./
Author:
Ayenson, Michael Demetrius.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2021,
Description:
140 p.
Notes:
Source: Dissertations Abstracts International, Volume: 82-10, Section: B.
Contained By:
Dissertations Abstracts International82-10B.
Subject:
Computer science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28315632
ISBN:
9798708754103
Constructive Research: Cyber Maneuvers in Blue Space.
Ayenson, Michael Demetrius.
Constructive Research: Cyber Maneuvers in Blue Space.
- Ann Arbor : ProQuest Dissertations & Theses, 2021 - 140 p.
Source: Dissertations Abstracts International, Volume: 82-10, Section: B.
Thesis (Ph.D.)--Northcentral University, 2021.
This item must not be sold to any third party vendors.
The United States cyber military must shift their mindsets and approaches from a defensive posture to a preemptive stance using maneuvers to end the cyber race war and gain an advantage over the adversary. Maturing cyber defense regarding preemptive cyber approaches, also known as cyber maneuvers, involves testing theories, frameworks, or artifacts to explain new tactics' effects. The problem addressed by this study is that network defenders do not have experimentally tested, cost-effective cyber maneuvers that have been demonstrated to be viably effective against the adversary in blue space and shift the advantage to the defender. The purpose of this constructive study was to assess the effectiveness of constructed proof-of-concept cyber maneuvers that were designed to automatically execute and defend against adversary techniques in cyber operational, blue space in the United States. The constructive research approach aimed at producing a novel solution to these practical and theoretical relevant problems, with the key objectives to assess the cyber maneuvers' quality, cost, and timeliness. Through constructive research, two automated cyber maneuvers were identified to reduce the harmful outcomes of defensive evasion techniques and identify relevant datasets available and necessary to assess their effects. In particular, the leverage perishability cyber maneuver and moving target defense cyber maneuver reduced bad outcomes 64 percent and 25 percent respectively, with a major takeaway that the performance load is directly proportional to the cloud provider's API performance not exceeding the average VMware 70% utilization threshold per minute.
ISBN: 9798708754103Subjects--Topical Terms:
523869
Computer science.
Subjects--Index Terms:
Constructive research
Constructive Research: Cyber Maneuvers in Blue Space.
LDR
:02861nmm a2200397 4500
001
2343987
005
20220513115341.5
008
241004s2021 ||||||||||||||||| ||eng d
020
$a
9798708754103
035
$a
(MiAaPQ)AAI28315632
035
$a
AAI28315632
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Ayenson, Michael Demetrius.
$3
3682667
245
1 0
$a
Constructive Research: Cyber Maneuvers in Blue Space.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2021
300
$a
140 p.
500
$a
Source: Dissertations Abstracts International, Volume: 82-10, Section: B.
500
$a
Advisor: Appunn, Frank.
502
$a
Thesis (Ph.D.)--Northcentral University, 2021.
506
$a
This item must not be sold to any third party vendors.
520
$a
The United States cyber military must shift their mindsets and approaches from a defensive posture to a preemptive stance using maneuvers to end the cyber race war and gain an advantage over the adversary. Maturing cyber defense regarding preemptive cyber approaches, also known as cyber maneuvers, involves testing theories, frameworks, or artifacts to explain new tactics' effects. The problem addressed by this study is that network defenders do not have experimentally tested, cost-effective cyber maneuvers that have been demonstrated to be viably effective against the adversary in blue space and shift the advantage to the defender. The purpose of this constructive study was to assess the effectiveness of constructed proof-of-concept cyber maneuvers that were designed to automatically execute and defend against adversary techniques in cyber operational, blue space in the United States. The constructive research approach aimed at producing a novel solution to these practical and theoretical relevant problems, with the key objectives to assess the cyber maneuvers' quality, cost, and timeliness. Through constructive research, two automated cyber maneuvers were identified to reduce the harmful outcomes of defensive evasion techniques and identify relevant datasets available and necessary to assess their effects. In particular, the leverage perishability cyber maneuver and moving target defense cyber maneuver reduced bad outcomes 64 percent and 25 percent respectively, with a major takeaway that the performance load is directly proportional to the cloud provider's API performance not exceeding the average VMware 70% utilization threshold per minute.
590
$a
School code: 1443.
650
4
$a
Computer science.
$3
523869
650
4
$a
Military studies.
$3
2197382
653
$a
Constructive research
653
$a
Cyber military
653
$a
Cyber maneuvers
653
$a
experimentation
653
$a
pyvmomi
653
$a
VMware
653
$a
Blue space
653
$a
Cyber defense
690
$a
0984
690
$a
0750
710
2
$a
Northcentral University.
$b
School of Business and Technology Management.
$3
2099493
773
0
$t
Dissertations Abstracts International
$g
82-10B.
790
$a
1443
791
$a
Ph.D.
792
$a
2021
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28315632
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9466425
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login