Abstract
The mission of cyber defenders is as monumental as it is unprecedented: protect information systems from ongoing cyber-attacks while simultaneously fortifying those systems against tomorrow's unrealized threats. The pressing imperative to react quickly to these constant attacks makes it difficult to find the time and resources needed to build capabilities focused on anticipating tomorrow's threats before they result in costly systems damage or information leakage. This chapter focuses on the role defensive measures play in spurring cyber-attack adaptation, especially with respect to malware. While the need to react to today's attacks will likely persist indefinitely, this chapter aims to begin helping defenders and researchers channel its wealth of tacit knowledge, deep expertise, and sophisticated capabilities into establishing more anticipative defensive postures.
Reference2 articles.
1. An internet control device embedded sensor agent
2. Designing attack infrastructure for offensive cyberspace operations.;G.Huskaj;European Conference on Information Warfare and Security,2020