This is a conference paper submission describing research and software implementation of a cybersecurity concept that uses behavior models to trigger changes in routing of network traffic. As user behavior deviates more and more from baseline models, traffic is routed through more elevated layers of analysis and control.
Revised: January 20, 2016 |
Published: October 12, 2015
Citation
Oehmen C.S., T.E. Carroll, P.R. Paulson, D.M. Best, C.F. Noonan, S.R. Thompson, and J.L. Jensen, et al. 2015.Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures. In SafeConfig 2015: Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, October 12-16, 2015, Denver, Colorado, 55-58. New York, New York:Association for Computing Machinery.PNNL-SA-111823.doi:10.1145/2809826.2809835