Skip to main content

Adaptive Cyber Defense

  • Living reference work entry
  • First Online:
Encyclopedia of Cryptography, Security and Privacy
  • 32 Accesses

Synonyms

Autonomous cyber response; Intrusion tolerance; Survivability

Definition

Adaptive Cyber Defense (ACD in short) covers the general area of cyber security that is outside of its classical focus, namely, protection and detection. Specifically, ACD incorporates adaptive and autonomous responses – proactive, or reactive, to detected attacks or observed cyber incidents – that dynamically change some combination of the configuration of the protected system, its behavior, and the security policies and mechanisms that govern the system, with the aim of achieving tolerance, survivability, and resilience to future attacks.

Background

The initial focus of cyber security was protection – security mechanisms and techniques focused on preventing bad things from happening. Typically, strict enforcement of well-designed static policies prevented any attempts to violate, breach, or bypass the security controls (Lipner 2015). As systems grew more complex, versatile, geographically distributed,...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Atighetchi M et al (2016) Using ontologies to quantify attack surfaces. Semantic Technology for Intelligence, Defense, and Security. CEUR-WS.org

    Google Scholar 

  • Axelsson S (2000) Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Chalmers University

    Google Scholar 

  • Durumeric Z et al (2014) The matter of Heartbleed. Internet Measurement conference. In: Proceedings of the 2014 Conference on Internet Measurement Conference, 14:475–488. Association for Computing Machinery, Vancouver, BC, Canada

    Google Scholar 

  • Lala J (2003) DARPA’s path to self-regenerative systems

    Google Scholar 

  • Lipner SB (2015) The birth and death of the orange book. IEEE Ann Hist Comput 37(2):19–31

    Article  Google Scholar 

  • Pal et al (2001) Survivable by defense-enabling. New security paradigms workshop 8:71–78. Association for Computing Machinery, Cloudcroft, New Mexico

    Google Scholar 

  • Pal et al (2014) Managed execution environment as a moving-target defense infrastructure. IEEE Secur Privacy 12(2):51–59

    Google Scholar 

  • Rose S et al (2020) Zero trust architecture. NIST Special Publication (SP) 800–207. National Institute of Standards and Technology, USA

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Atighetchi .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer Science+Business Media LLC

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Pal, P., Atighetchi, M. (2023). Adaptive Cyber Defense. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1773-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27739-9_1773-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27739-9

  • Online ISBN: 978-3-642-27739-9

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics