skip to main content
10.1145/3465481.3470084acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Adaptive Mitigation of Tactical Denial of Sustainability

Published: 17 August 2021 Publication History

Abstract

As the military sector digitalizes, there is a broader need for distributed computation and storage solutions deployable at the operational edge, which pose the potential of minimizing the conventional information exchanges by among others, proved enhancements in terms of latency and communication cost. The state of the art refers to multiple applications of edge computing with a vast value on tactical clouds, with may range from enabling optimized transmissions, to federated machine learning and data fusion services. However, very few of them explore the risks they entail in terms of sustainability, were an inappropriate orchestration of the edge capabilities may for example, mistakenly or maliciously deplete the energy sources that feed their supportive infrastructure, or cause electromagnetic alterations exploitable by electronic warfare actuations. In order to facilitate their understanding and contribute to their mitigation, this paper delves into the problematic inherent in Tactical Denial of Sustainability (TDoS) against tactical clouds. The conducted research introduces a framework to prevent TDoS and if required, identify their symptoms and mitigate their damage. The proposal is settled on the Self-Organizing Network (SON) paradigm and its Self-Protection (SP) applications, which benefits of their synergy with the Observe-Orient-Decide-Act (OODA) loop towards dynamically and adaptively triggering proportional reactions.

References

[1]
H. Abbasi, N. Ezzati-Jivan, M. Bellaiche, C. Talhi, and M. Dagenais. 2019. Machine learning-based EDoS attack detection technique using execution trace analysis. Journal of Hardware and Systems Security 3, 2 (2019), 164–176.
[2]
Arwa Aldweesh, Abdelouahid Derhab, and Ahmed Z. Emam. 2020. Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues. Knowledge-Based Systems 189 (2020), 105124. https://doi.org/10.1016/j.knosys.2019.105124
[3]
H. Bastiaansen, J. van der Geest, C. van den Broek, T. Kudla, A. Isenor, S. Webb, N. Suri, M. Fogli, B. Canessa, A. Masini, R. Goniacz, and J. Sliwa. 2020. Federated Control of Distributed Multi-Partner Cloud Resources for Adaptive C2 in Disadvantaged Networks. IEEE Communications Magazine 58, 8 (2020), 21–27. https://doi.org/10.1109/MCOM.001.2000246
[4]
B. Bigelow. 2019. What are Military Cyberspace Operations Other Than War?. In Proc. of the 11th International Conference on Cyber Conflict (CyCon), Vol. 900. Tallinn, Estonia, 1–17. https://doi.org/10.23919/CYCON.2019.8756835
[5]
Tero Bodström and Timo Hämäläinen. 2018. A novel method for detecting APT attacks by using OODA loop and black swan theory. In International Conference on Computational Social Networks. Springer, 498–509.
[6]
A. Bushby. 2019. How deception can change cyber security defences. Computer Fraud & Security 2019, 1 (2019), 12–14. https://doi.org/10.1016/S1361-3723(19)30008-9
[7]
S. Choi, O.J. Kwon, H. Oh, and D. Shin. 2020. Method for Effectiveness Assessment of Electronic Warfare Systems in Cyberspace. Symmetry 12, 12 (2020). https://doi.org/10.3390/sym12122107
[8]
P.T. Dinh and M. Park. 2021. R-EDoS: Robust Economic Denial of Sustainability Detection in an SDN-Based Cloud Through Stochastic Recurrent Neural Network. IEEE Access 9(2021), 35057–35074. https://doi.org/10.1109/ACCESS.2021.3061601
[9]
P. Dinh and M. Park. 2021. R-EDoS: Robust Economic Denial of Sustainability Detection in an SDN-Based Cloud Through Stochastic Recurrent Neural Network. IEEE Access 9(2021), 35057–35074.
[10]
Diogo A.B. Fernandes, Mrio M. Freire, Paulo A.P. Fazendeiro, and Pedro R.M. Incio. 2017. Applications of Artificial Immune Systems to Computer Security. Journal of Information Security and Applications 35 (2017), 138–159. https://doi.org/10.1016/j.jisa.2017.06.007
[11]
L.A. Gordon, M.P. Loeb, and L Zhou. 2020. Integrating cost–benefit analysis into the NIST Cybersecurity Framework via the Gordon-Loeb Model. Journal of Cybersecurity 23 (2020). Issue 1.
[12]
C. Hoff. 2009. A Couple of Follow-Ups On The EDoS (Economic Denial Of Sustainability) Concept...http://rationalsecurity.typepad.com/blog/edos/.
[13]
M. G. Jaatun, L. Bodsberg, T. O. Grøtan, and M. Elisabeth Gaup Moe. 2020. An Empirical Study of CERT Capacity in the North Sea. In Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). 1–8.
[14]
J. Johnson. 2019. Artificial intelligence & future warfare: implications for international security. Defense & Security Analysis 35, 2 (2019), 147–169. https://doi.org/10.1080/14751798.2019.1600800
[15]
P.V. Klaine, M.A. Imran, O. Onireti, and R.D. Souza. 2017. A Survey of Machine Learning Techniques Applied to Self-Organizing Cellular Networks. IEEE Communications Surveys & Tutorials 19, 4 (2017), 2392–2431. https://doi.org/10.1109/COMST.2017.2727878
[16]
C. Lalropuia, K and V. Khaitan. 2021. Availability and reliability analysis of cloud computing under economic denial of sustainability (EDoS) attack: a semi-Markov approach. Cluster Computing (2021). https://doi.org/10.1007/s10586-021-03257-9
[17]
X. Li, N. Bo, W. Pang, and J. Tang. 2017. Software architecture of C2 mission system based on MAS and SOA for manned/unmanned aerial vehicle formation. In Proc. of the 8th IEEE International Conference on Software Engineering and Service Science (ICSESS). 842–845.
[18]
S. Llopis, J. Hingant, I. Perez, M. Esteve, F. Carvajal, W. Mees, and T. Debatty. 2018. A comparative analysis of visualisation techniques to achieve cyber situational awareness in the military. In Proceedings of the 2018 International Conference on Military Communications and Information Systems. Warsaw, Poland, 1–7.
[19]
J. Maestre Vidal and M.A. Sotelo Monge. 2020. Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features. Sensors 20(7), 2084 (2020).
[20]
J. Maestre Vidal and M.A. Sotelo Monge. 2020. Denial of sustainability on military tactical clouds. In Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES). Dublin, Ireland, 1–9. https://doi.org/10.1145/3407023.3409226
[21]
J. Maestre Vidal, M. A. Sotelo Monge, and L. J. García Villalba. 2018. Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES). Hamburg, Germany, Article 50, 50:1–50:8 pages. https://doi.org/10.1145/3230833.3233247
[22]
J. Maestre Vidal, M. A. Sotelo Monge, and S. M. Martínez Monterrubio. 2020. EsPADA: enhanced payload analyzer for malware detection robust against adversarial threats. Future Generation Computer Systems 104 (2020), 159–173.
[23]
E. Matania, L. Yoffe, and T. Goldstein. 2017. Structuring the national cyber defence: in evolution towards a Central Cyber Authority. Journal of Cyber Policy 2, 1 (2017), 16–25. https://doi.org/10.1080/23738871.2017.1299193
[24]
A.F. Mendi, T. Erol, and D. Dogan. 2021. Digital Twin in the Military Field. IEEE Internet Computing(2021). https://doi.org/10.1109/MIC.2021.3055153
[25]
NATO. 2020. Allied Joint Doctrine for cyberspace operation (AJP-3.20). https://www.gov.uk/government/publications/allied-joint-doctrine-for-cyberspace-operations-ajp-320.
[26]
P. Nespoli, F. Gomez Marmol, and Jorge Maestre Vidal. 2021. A Bio-Inspired Reaction Against Cyberattacks: AIS-Powered Optimal Countermeasures Selection. IEEE Access 9(2021), 60971–60996. https://doi.org/10.1109/ACCESS.2021.3074021
[27]
P.K. Sharma, J. Park, J.H. Park, and K. Cho. 2020. Wearable Computing for Defence Automation: Opportunities and Challenges in 5G Network. IEEE Access 8(2020), 65993–66002. https://doi.org/10.1109/ACCESS.2020.2985313
[28]
A. Shawahna, M. Abu-Amara, A. Mahmoud, and Y. Osais. 2018. EDoS-ADS: an enhanced mitigation technique against economic denial of sustainability (EDoS) attacks. IEEE Transactions on Cloud Computing 8, 3 (2018), 790–804.
[29]
F.R.L. Silva and P. Jacob. 2018. Mission-Centric Risk Assessment to Improve Cyber Situational Awareness. In Proc. of the 13th International Conference on Availability, Reliability and Security. New York, NY, USA, Article 56. https://doi.org/10.1145/3230833.3233281
[30]
W. Smith, G. Kuperman, M. Chan, E. Morgan, H. Nguyen, N. Schear, B. Vu, A. Weinert, M. Weyant, and D. Whisman. 2017. Cloud computing in tactical environments. In Proc. of the IEEE Military Communications Conference (MILCOM). Baltimore, MD, USA, 882–887. https://doi.org/10.1109/MILCOM.2017.8170823
[31]
Warren Smith, Greg Kuperman, Michael Chan, Eric Morgan, Huy Nguyen, Nabil Schear, Bich Vu, Andrew Weinert, Matthew Weyant, and Daniel Whisman. 2017. Cloud computing in tactical environments. In Proc. of the IEEE Military Communications Conference (MILCOM). Baltimore, MD, USA, 882–887. https://doi.org/10.1109/MILCOM.2017.8170823
[32]
C. Song. 2018. A System Analysis of the US Army’s human dimension Strategy. In Proceedings of the International Annual Conference of the American Society for Engineering Management (ASEM). Coeur d’Alene, Idaho, USA.
[33]
M.A. Sotelo Monge, J. Maestre Vidal, and L.J.G Villalba. 2017. Entropy-Based Economic Denial of Sustainability Detection. Entropy 19, 12 (2017). https://doi.org/10.3390/e19120649
[34]
M. A. Sotelo Monge and J. Maestre Vidal. 2021. Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge. arXiv preprint arXiv:2101.08676(2021).
[35]
M. A. Sotelo Monge, J. Maestre Vidal, and L. J. García Villalba. 2018. A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES). Hamburg, Germany, Article 48, 48:1–48:10 pages.
[36]
M. A. Sotelo Monge, J. Maestre Vidal, and G. Martínez Pérez. 2019. Detection of economic denial of sustainability (EDoS) threats in self-organizing networks. Computer Communications 145 (2019), 284–308. https://doi.org/10.1016/j.comcom.2019.07.002
[37]
H. Tang, D. Zhou, and D. Chen. 2018. Dynamic network function instance scaling based on traffic forecasting and VNF placement in operator data centers. IEEE Transactions on Parallel and Distributed Systems 30, 3 (2018), 530–543.
[38]
W. Tounsi and H. Rais. 2018. A survey on technical threat intelligence in the age of sophisticated cyber attacks. Computers & Security 72(2018), 212–233.
[39]
M. Usama, J. Qadir, and A. Al-Fuqaha. 2018. Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward. In Proc. of the 43rd IEEE Conference on Local Computer Networks Workshops (LCN Workshops). Chicago, IL, USA, 90–97. https://doi.org/10.1109/LCNW.2018.8628538
[40]
S. VivinSandar and S. Shenai. 2012. Economic Denial of Sustainability (EDoS) in Cloud Services using HTTP and XML based DDoS Attacks. International Journal of Computer Applications 41 (2012), 11–16. https://doi.org/10.5120/5807-8063
[41]
J.N. Wang, A. Narula-Tam, and R. Byan. [n. d.]. Interconnecting Heterogeneous MANET Networks at the Tactical Edge. In Proc. of the IEEE Military Communications Conference (MILCON).
[42]
Hui Yu, Jiahai Yang, and Carol Fung. 2018. Elastic network service chain with fine-grained vertical scaling. In 2018 IEEE Global Communications Conference (GLOBECOM). IEEE, 1–7.
[43]
Robert Zager and John Zager. 2017. OODA loops in cyberspace: A new cyber-defense model. Journal Article| October 20, 11 (2017), 33pm.
[44]
Zejian Zhou, Lijun Qian, and Hao Xu. 2019. Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game Theory. In MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM). 604–609. https://doi.org/10.1109/MILCOM47813.2019.9020866

Cited By

View all
  • (2021)Measuring the Impact of Tactical Denial of SustainabilityComputer Security. ESORICS 2021 International Workshops10.1007/978-3-030-95484-0_31(537-556)Online publication date: 4-Oct-2021

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security
August 2021
1447 pages
ISBN:9781450390514
DOI:10.1145/3465481
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 August 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cloud Computing
  2. Cyber Defence
  3. Denial of Sustainability
  4. Network Function Virtualization
  5. Self-Organizing Networks

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • European Defence Industrial Development Programme (EDIDP)

Conference

ARES 2021

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Measuring the Impact of Tactical Denial of SustainabilityComputer Security. ESORICS 2021 International Workshops10.1007/978-3-030-95484-0_31(537-556)Online publication date: 4-Oct-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media