Filters








8,500 Hits in 4.8 sec

Defense Strategies for Asymmetric Networked Systems with Discrete Components

Nageswara Rao, Chris Ma, Kjell Hausken, Fei He, David Yau, Jun Zhuang
2018 Sensors  
We consider infrastructures consisting of a network of systems, each composed of discrete components.  ...  We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.  ...  Discrete System Models We consider infrastructures with constituent systems consisting of discrete components [5, 8] and connected over a communications network [1] .  ... 
doi:10.3390/s18051421 pmid:29751588 pmcid:PMC5982420 fatcat:eq7d5juhjze23l2dyhxi3gfkj4

Preface to the Focused Issue on Dynamic Games in Cyber Security

Saurabh Amin, Karl Henrik Johansson
2019 Dynamic Games and Applications  
The authors consider a model of networked system with strategic agents who have private information about their security state.  ...  strategies.  ...  The authors consider a zero-sum multi-adversary version of the supervisory control problem for discrete-event systems.  ... 
doi:10.1007/s13235-019-00335-x fatcat:vy3uplj7aze5pjp6oiz5snnuyy

Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems

Jiajun Shen, Dongqin Feng
2017 Security and Communication Networks  
With the integration of physical plant and network, cyber-physical systems (CPSs) are increasingly vulnerable due to their distributed and hierarchical framework.  ...  The pure-strategy equilibria for two-player symmetric SISG are firstly analyzed with the strategy gap between individual and social optimum being characterized, which is known as negative externalities  ...  Acknowledgments This work was supported by the Science Fund for Creative Research Groups of NSFC (Grant no. 61621002).  ... 
doi:10.1155/2017/9017039 fatcat:jbgydsj3tzghvp4wrv5rizdzea

Network Intelligence: An Emerging Discipline

David E.A. Johnson, Newton Howard
2012 2012 European Intelligence and Security Informatics Conference  
Figure 1 . 1 Network Intelligence Layers and Components  ...  The Center for Advanced Defense Studies has developed and implemented a NETINT analyst training program that combines OSINT research and data with open source tools [CADS, 2012] .  ... 
doi:10.1109/eisic.2012.52 dblp:conf/eisic/JohnsonH12 fatcat:jf6zx43tgjeg7mpnfrhyzur6oe

In quest of benchmarking security risks to cyber-physical systems

S. Amin, G. A. Schwartz, A. Hussain
2013 IEEE Network  
These infrastructures are spatially distributed across large physical areas, and consist of heterogeneous cyber-physical components interconnected by communication networks with complex peering and hierarchies  ...  networks.  ...  Acknowledgments We are grateful to the anonymous reviewers for their feedback, and thank Professors S. Shankar Sastry (UC Berkeley) and Joseph M. Sussman (MIT) for useful discussions.  ... 
doi:10.1109/mnet.2013.6423187 fatcat:ecu3kwviorgitfudez5la7gcca

A general cause based methodology for analysis of common cause and dependent failures in system risk and reliability assessments

Andrew O'Connor, Ali Mosleh
2016 Reliability Engineering & System Safety  
However, popular CCF models do not recognized system specific defenses against dependencies and are restricted to identical components in redundant configuration.  ...  This paper proposes the General Dependency Model (GDM), which uses Bayesian Network to model the probabilistic dependencies between components.  ...  Jeffrey Wood for his interest and support throughout the project. The authors also appreciate valuable technical guidance and feedback offered by Dr. Song Hua Shen, Dr. Kevin Coyne, Mr.  ... 
doi:10.1016/j.ress.2015.06.007 fatcat:mcmmseoiq5atta3yisyij3vioa

Application Layer Distributed Denial of Service Attacks Defense Techniques : A review

Subhi R. M. Zeebaree, Karzan H. Sharif, Roshna M. Mohammed Amin
2018 Academic Journal of Nawroz University  
In this paper we give a review on application layer DDoS attacks defense or detection mechanisms.  ...  However the more challenge and difficult types to detect is application layer DDoS attacks because of using legitimate client to create connection with victims.  ...  In addition, the mining algorithm was combined with defense system which was modularized.  ... 
doi:10.25007/ajnu.v7n4a279 fatcat:hkagx5nl2bgvffvibo7m4qdzvq

IoDM: A Study on a IoT-Based Organizational Deception Modeling with Adaptive General-Sum Game Competition

Sang Seo, Dohoon Kim
2022 Electronics  
Moving target defense (MTD) and decoy strategies, measures of active defense, were introduced to secure both the proactive security and reactive adaptability of internet-of-things (IoT) networks that have  ...  and defense competition for IoT in real-time based on the general-sum game.  ...  systems, and networks  ... 
doi:10.3390/electronics11101623 fatcat:rhj5ccmnsbdcri5mzpsxl7xmum

Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets [chapter]

Ashish R. Hota, Abraham A. Clements, Shreyas Sundaram, Saurabh Bagchi
2016 Lecture Notes in Computer Science  
Each defender is responsible for the security of multiple assets, with the interdependencies between the assets captured by an interdependency graph.  ...  We apply our proposed framework in two case studies on interdependent SCADA networks and distributed energy resources, respectively.  ...  . , x |D| ] be a joint defense strategy of the defenders, with x k ∈ X k for every defender D k .  ... 
doi:10.1007/978-3-319-47413-7_6 fatcat:f2xi5h7c5vf6fogx3cftozvxny

Moving Target Defense Techniques: A Survey

Cheng Lei, Hong-Qi Zhang, Jing-Lei Tan, Yu-Chen Zhang, Xiao-Hu Liu
2018 Security and Communication Networks  
After that, the applications of moving target defense in different network architectures are illustrated.  ...  Secondly, literature analysis method is adopted to explain the design principles and system architecture of moving target defense.  ...  Security and Communication Networks  ... 
doi:10.1155/2018/3759626 fatcat:4ywagqoxhbeyhpxjhtuienvvea

SOD2G: A Study on a Social-Engineering Organizational Defensive Deception Game Framework through Optimization of Spatiotemporal MTD and Decoy Conflict

Sang Seo, Dohoon Kim
2021 Electronics  
Existing moving target defense (MTD) and decoy systems are conceptually limited in avoiding and preventing attackers' social-engineering real-time attacks by organization through either structural mutations  ...  This framework could handle incomplete private information better than existing models and non-sequentially stratified, and also contributed to the configuration of the optimal defender deception strategy  ...  game intelligence while protecting existing network and system components.  ... 
doi:10.3390/electronics10233012 fatcat:gvxk4qx6grcxdainz73t5auxyq

Methodical and Applied Aspects of Creation and Application of Cyber Ranges

Yuriy Danyk
2019 Theoretical and Applied Cybersecurity  
These cyber ranges can be used for: research issues of cyber monitoring, cyber defense and cyber influence; design of fundamental and applied bases of constructing mathematical support of software and  ...  The new solutions for analysis, synthesis and the development of applied scientific and technological principles of construction and realization of cyber ranges are given.  ...  different intensity; -Modelling of cyber security activities and means for wired and wireless networks of datacenter; -Modelling of cyber security activities and means for control systems, network (physical  ... 
doi:10.20535/tacs.2664-29132019.1.169089 fatcat:3jxys65vmfdixbtisalywbwqki

Moving target defense: state of the art and characteristics

Gui-lin Cai, Bao-sheng Wang, Wei Hu, Tian-zuo Wang
2016 Frontiers of Information Technology & Electronic Engineering  
Moving target defense (MTD) has emerged as one of the game-changing themes to alter the asymmetric situation between attacks and defenses in cyber-security.  ...  Specifically, in the area of MTD strategy, the common characteristics shared by the MTD strategies to improve system security and effectiveness are identified and extrapolated.  ...  The root source of the severe network security problem is the asymmetric situation between attacks and defenses.  ... 
doi:10.1631/fitee.1601321 fatcat:a237eemsfjhsxjrar3fmwbmceu

Dynamic Hypergames for Synthesis of Deceptive Strategies with Temporal Logic Objectives [article]

Lening Li, Haoxiang Ma, Abhishek N. Kulkarni, Jie Fu
2020 arXiv   pre-print
To synthesize a deceptive strategy, we introduce a class of hypergame models that capture the interaction between the agent and its adversary given asymmetric, incomplete information.  ...  We develop the solution concept of this class of hypergames and show that the subjectively rationalizable strategy for the agent is deceptive and maximizes the probability of satisfying the task in temporal  ...  For applications to cyber-physical security, the practitioners can employ temporal logic for specifying security properties in the system and analyze defense with deception using the proposed methods.  ... 
arXiv:2007.15726v1 fatcat:pl6kh7nz4jf47odj4sdfxsqley

The Science of Mission Assurance

Kamal Jabbour, Sarah Muccio
2011 Journal of Strategic Security  
Muccio works with scientists to mathematically model systems and analyze information. She conducts research on emerging technologies and maps missionessential functions to their cyber assets. Dr.  ...  Abstract The intent of this article is to describe-and prescribe-a scientific framework for assuring mission essential functions in a contested cyber environment.  ...  IBM's Research Queuing RESQ package achieved similar efficiency by representing communications networks as queuing systems rather than discrete systems. 6 While availability and mean time between failures  ... 
doi:10.5038/1944-0472.4.2.4 fatcat:pmqvzaju6zhcpeqcecmaltnm5u
« Previous Showing results 1 — 15 out of 8,500 results