A biodiversity approach to cyber security

[thumbnail of WRAP_Theses_Jackson_2017.pdf]
Preview
PDF
WRAP_Theses_Jackson_2017.pdf - Submitted Version - Requires a PDF viewer.

Download (4MB) | Preview

Request Changes to record.

Abstract

Cyber crime is a significant threat to modern society that will continue to grow as technology is integrated further into our lives. Cyber attackers can exploit vulnerabilities to access computing systems and propagate malware. Of growing concern is the use of multiple exploits across layers of the software stack, plus faster criminal response times to newly disclosed vulnerabilities creating surges in attacks before signature-based malware protection can take effect. The wide scale adoption of few software systems fuels the problem, allowing identical vulnerabilities to be exploited across networks to maximise infection in a single attack. This requires new perspectives to tackle the threat. Biodiversity is critical in the functioning of healthy ecosystems. Whilst the idea of diversity benefiting computer security is not new, there are still gaps in understanding its advantages.

A mathematical and an agent-based model have been developed using the ecosystem as a framework. Biodiversity is generated by individualised software stacks defined as genotypes with multiple loci. The models allow the protection offered by diversity to be quantified for ad hoc networks which are expected to become prevalent in the future by specifying how much diversity is needed to tolerate or mitigate two abstract representations of malware encompassing different ways multiple exploits target software stack layers. Outputs include the key components of ecosystem stability: resistance and resilience. Results show that diversity by itself can reduce susceptibility, increase resistance, and increase the time taken for malware to spread, thereby allowing networks to tolerate malware and maintain Quality of Service. When dynamic diversity is used as part of a multi-layered defence strategy with additional mechanisms such as blacklisting, virtualisation, and recovery through patching and signature based protection, diversity becomes more effective since the power of dynamic software updating can be utilised to mitigate attacks whilst maintaining network operations.

Item Type: Thesis [via Doctoral College] (PhD)
Subjects: Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software
Library of Congress Subject Headings (LCSH): Computer crimes -- Prevention, Computer security -- Mathematics, Biodiversity, Peer-to-peer architecture (Computer networks), Computer viruses -- Prevention
Official Date: May 2017
Dates:
Date
Event
May 2017
Submitted
Institution: University of Warwick
Theses Department: Centre for Complexity Science
Thesis Type: PhD
Publication Status: Unpublished
Supervisor(s)/Advisor: Leeson, Mark S., 1963- ; Creese, Sadie
Sponsors: Engineering and Physical Sciences Research Council
Format of File: pdf
Extent: xv, 357 leaves : illustrations, charts
Language: eng
Related URLs:
URI: https://wrap.warwick.ac.uk/106820/

Export / Share Citation


Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item