via Sécurité publique Canada
Army researchers developed a new machine learning-based framework to enhance the security of computer networks inside vehicles without undermining performance.
With the widespread prevalence of modern automobiles that entrust control to onboard computers, this research looks toward to a larger Army effort to invest in greater cybersecurity protection measures for its aerial and land platforms, especially heavy vehicles.
In collaboration with an international team of experts from Virginia Tech, the University of Queensland and Gwangju Institute of Science and Technology, researchers at the U.S. Army Combat Capabilities Development Command, known as DEVCOM, Army Research Laboratory devised a technique called DESOLATOR to help optimize a well-known cybersecurity strategy known as the moving target defense.
“The idea is that it’s hard to hit a moving target,” said Dr. Terrence Moore, Army mathematician. “If everything is static, the adversary can take their time looking at everything and choosing their targets. But if you shuffle the IP addresses fast enough, then the information assigned to the IP quickly becomes lost, and the adversary has to look for it again.”
DESOLATOR, which stands for deep reinforcement learning-based resource allocation and moving target defense deployment framework, helps the in-vehicle network identify the optimal IP shuffling frequency and bandwidth allocation to deliver effective, long-term moving target defense.
According to Army computer scientist and program lead Dr. Frederica Free-Nelson, achievement of the former keeps uncertainty high enough to thwart potential attackers without it becoming too costly to maintain, while attainment of the latter prevents slowdowns in critical areas of the network with high priority.
“This level of fortification of prioritized assets on a network is an integral component for any kind of network protection,” Nelson said. “The technology facilitates a lightweight protection whereby fewer resources are used for maximized protection. The utility of fewer resources to protect mission systems and connected devices in vehicles while maintaining the same quality of service is an added benefit.”
The research team used deep reinforcement learning to gradually shape the behavior of the algorithm based on various reward functions, such as exposure time and the number of dropped packets, to ensure that DESOLATOR took both security and efficiency into equal consideration.
“Existing legacy in-vehicle networks are very efficient, but they weren’t really designed with security in mind,” Moore said. “Nowadays, there’s a lot of research out there that looks solely at either enhancing performance or enhancing security. Looking at both performance and security is in itself a little rare, especially for in-vehicle networks.”
In addition, DESOLATOR is not limited to identifying the optimal IP shuffling frequency and bandwidth allocation. Since this approach exists as a machine learning-based framework, other researchers can modify the technique to pursue different goals within the problem space.
“This ability to retool the technology is very valuable not only for extending the research but also marrying the capability to other cyber capabilities for optimal cybersecurity protection,” Nelson said.
Researchers detail information about their approach in the research paper, DESOLATER: Deep Reinforcement Learning-Based Resource Allocation and Moving Target Defense Deployment Framework, in the peer-reviewed journal IEEE Access.
Original Article: New cybersecurity technique keeps hackers guessing
The Latest Updates from Bing News & Google News
Go deeper with Bing News on:
Cybersecurity protection for vehicles
- Railway Cybersecurity Market | Trends, Growth, Analysison August 20, 2021 at 10:10 pm
According to the new market research report “ Railway Cybersecurity Market by Type (Infrastructural & Onboard), Offering, Security Type (Network, Application, Endpoint, System Administration and Data ...
- Next-Gen GPS Satellites Get Ground-Control Modernizationon August 20, 2021 at 12:07 pm
The U.S. Space Force’s Space Systems Command and Raytheon Intelligence & Space are enhancing mission management and mission-data processing to shift the focus of GPS operations from satellite command ...
- Thieves raid warm Liquid wallets. CISA offers ransomware guidelines. China's new privacy law. FCC looks into T-Mobile breach.on August 20, 2021 at 8:09 am
Thieves raid warm Liquid wallets. CISA offers anti-ransomware guidelines. China's new privacy law. FCC looks into T-Mobile breach. FTC refiles anti-monopoly complaint against Facebook.
- Cyber Daily: Watch for Identity Theft, SIM Swapping in T-Mobile Hack, Security Researchers Warnon August 19, 2021 at 5:22 am
The hack and data breach at T-Mobile offers corporate security chiefs a grim lesson in how quickly cybersecurity trouble can trigger business problems, including potentially sweeping customers into ...
- Didi’s ride-hailing dominance grows in China despite cybersecurity crackdown from Beijingon August 19, 2021 at 4:08 am
continued to expand its dominance of China’s ride-hailing market last month despite a ban on new user registrations as part of an ongoing cybersecurity investigation ... such as licensing requirements ...
Go deeper with Google Headlines on:
Cybersecurity protection for vehicles
Go deeper with Bing News on:
- Nokia Unleashes New 5G Certification Program for Network Securityon August 22, 2021 at 6:50 pm
Nokia last week announced a new professional level 5G course and certification aimed at network security. The Nokia Bell Labs 5G Secured Networks course is part of Nokia’s program to train and certify ...
- Fortinet, HashiCorp Partner to Automate and Simplify Cloud Securityon August 22, 2021 at 5:57 pm
Fortinet recently announced integration between Fortinet's FortiManager and HashiCorp Terraform to simplify and automate ...
- Network Security Firewall Market 2021 Strategic Assessments - SAP SE, Cisco System Inc., Mobileum Inc, ANAM Technologies, Fortinet Incon August 21, 2021 at 2:29 am
The research report studies the Network Security Firewall market using different methodologies and analyzers to provide accurate and in depth information about the market For a clearer understanding ...
- Hacker returns $600M to Poly Network, is offered position as Chief Security Advisoron August 19, 2021 at 12:28 pm
This week nearly all of the crypto stolen from Poly Network has been returned, but then something bizarre happened. Instead of turning the thief, who Poly ...
- Hardline Haqqani Network Put in Charge of Kabul Securityon August 19, 2021 at 8:13 am
The Taliban has placed security for the Afghan capital, Kabul, in the hands of senior members of the Haqqani Network, which has close ties with foreign jihadist groups including a long-standing ...