A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Defense Strategies for Asymmetric Networked Systems with Discrete Components
2018
Sensors
We consider infrastructures consisting of a network of systems, each composed of discrete components. ...
We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models. ...
Discrete System Models We consider infrastructures with constituent systems consisting of discrete components [5, 8] and connected over a communications network [1] . ...
doi:10.3390/s18051421
pmid:29751588
pmcid:PMC5982420
fatcat:eq7d5juhjze23l2dyhxi3gfkj4
Preface to the Focused Issue on Dynamic Games in Cyber Security
2019
Dynamic Games and Applications
The authors consider a model of networked system with strategic agents who have private information about their security state. ...
strategies. ...
The authors consider a zero-sum multi-adversary version of the supervisory control problem for discrete-event systems. ...
doi:10.1007/s13235-019-00335-x
fatcat:vy3uplj7aze5pjp6oiz5snnuyy
Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems
2017
Security and Communication Networks
With the integration of physical plant and network, cyber-physical systems (CPSs) are increasingly vulnerable due to their distributed and hierarchical framework. ...
The pure-strategy equilibria for two-player symmetric SISG are firstly analyzed with the strategy gap between individual and social optimum being characterized, which is known as negative externalities ...
Acknowledgments This work was supported by the Science Fund for Creative Research Groups of NSFC (Grant no. 61621002). ...
doi:10.1155/2017/9017039
fatcat:jbgydsj3tzghvp4wrv5rizdzea
Network Intelligence: An Emerging Discipline
2012
2012 European Intelligence and Security Informatics Conference
Figure 1 . 1 Network Intelligence Layers and Components ...
The Center for Advanced Defense Studies has developed and implemented a NETINT analyst training program that combines OSINT research and data with open source tools [CADS, 2012] . ...
doi:10.1109/eisic.2012.52
dblp:conf/eisic/JohnsonH12
fatcat:jf6zx43tgjeg7mpnfrhyzur6oe
In quest of benchmarking security risks to cyber-physical systems
2013
IEEE Network
These infrastructures are spatially distributed across large physical areas, and consist of heterogeneous cyber-physical components interconnected by communication networks with complex peering and hierarchies ...
networks. ...
Acknowledgments We are grateful to the anonymous reviewers for their feedback, and thank Professors S. Shankar Sastry (UC Berkeley) and Joseph M. Sussman (MIT) for useful discussions. ...
doi:10.1109/mnet.2013.6423187
fatcat:ecu3kwviorgitfudez5la7gcca
A general cause based methodology for analysis of common cause and dependent failures in system risk and reliability assessments
2016
Reliability Engineering & System Safety
However, popular CCF models do not recognized system specific defenses against dependencies and are restricted to identical components in redundant configuration. ...
This paper proposes the General Dependency Model (GDM), which uses Bayesian Network to model the probabilistic dependencies between components. ...
Jeffrey Wood for his interest and support throughout the project. The authors also appreciate valuable technical guidance and feedback offered by Dr. Song Hua Shen, Dr. Kevin Coyne, Mr. ...
doi:10.1016/j.ress.2015.06.007
fatcat:mcmmseoiq5atta3yisyij3vioa
Application Layer Distributed Denial of Service Attacks Defense Techniques : A review
2018
Academic Journal of Nawroz University
In this paper we give a review on application layer DDoS attacks defense or detection mechanisms. ...
However the more challenge and difficult types to detect is application layer DDoS attacks because of using legitimate client to create connection with victims. ...
In addition, the mining algorithm was combined with defense system which was modularized. ...
doi:10.25007/ajnu.v7n4a279
fatcat:hkagx5nl2bgvffvibo7m4qdzvq
IoDM: A Study on a IoT-Based Organizational Deception Modeling with Adaptive General-Sum Game Competition
2022
Electronics
Moving target defense (MTD) and decoy strategies, measures of active defense, were introduced to secure both the proactive security and reactive adaptability of internet-of-things (IoT) networks that have ...
and defense competition for IoT in real-time based on the general-sum game. ...
systems, and networks ...
doi:10.3390/electronics11101623
fatcat:rhj5ccmnsbdcri5mzpsxl7xmum
Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets
[chapter]
2016
Lecture Notes in Computer Science
Each defender is responsible for the security of multiple assets, with the interdependencies between the assets captured by an interdependency graph. ...
We apply our proposed framework in two case studies on interdependent SCADA networks and distributed energy resources, respectively. ...
. , x |D| ] be a joint defense strategy of the defenders, with x k ∈ X k for every defender D k . ...
doi:10.1007/978-3-319-47413-7_6
fatcat:f2xi5h7c5vf6fogx3cftozvxny
Moving Target Defense Techniques: A Survey
2018
Security and Communication Networks
After that, the applications of moving target defense in different network architectures are illustrated. ...
Secondly, literature analysis method is adopted to explain the design principles and system architecture of moving target defense. ...
Security and Communication Networks ...
doi:10.1155/2018/3759626
fatcat:4ywagqoxhbeyhpxjhtuienvvea
SOD2G: A Study on a Social-Engineering Organizational Defensive Deception Game Framework through Optimization of Spatiotemporal MTD and Decoy Conflict
2021
Electronics
Existing moving target defense (MTD) and decoy systems are conceptually limited in avoiding and preventing attackers' social-engineering real-time attacks by organization through either structural mutations ...
This framework could handle incomplete private information better than existing models and non-sequentially stratified, and also contributed to the configuration of the optimal defender deception strategy ...
game intelligence while protecting existing network and system components. ...
doi:10.3390/electronics10233012
fatcat:gvxk4qx6grcxdainz73t5auxyq
Methodical and Applied Aspects of Creation and Application of Cyber Ranges
2019
Theoretical and Applied Cybersecurity
These cyber ranges can be used for: research issues of cyber monitoring, cyber defense and cyber influence; design of fundamental and applied bases of constructing mathematical support of software and ...
The new solutions for analysis, synthesis and the development of applied scientific and technological principles of construction and realization of cyber ranges are given. ...
different intensity; -Modelling of cyber security activities and means for wired and wireless networks of datacenter; -Modelling of cyber security activities and means for control systems, network (physical ...
doi:10.20535/tacs.2664-29132019.1.169089
fatcat:3jxys65vmfdixbtisalywbwqki
Moving target defense: state of the art and characteristics
2016
Frontiers of Information Technology & Electronic Engineering
Moving target defense (MTD) has emerged as one of the game-changing themes to alter the asymmetric situation between attacks and defenses in cyber-security. ...
Specifically, in the area of MTD strategy, the common characteristics shared by the MTD strategies to improve system security and effectiveness are identified and extrapolated. ...
The root source of the severe network security problem is the asymmetric situation between attacks and defenses. ...
doi:10.1631/fitee.1601321
fatcat:a237eemsfjhsxjrar3fmwbmceu
Dynamic Hypergames for Synthesis of Deceptive Strategies with Temporal Logic Objectives
[article]
2020
arXiv
pre-print
To synthesize a deceptive strategy, we introduce a class of hypergame models that capture the interaction between the agent and its adversary given asymmetric, incomplete information. ...
We develop the solution concept of this class of hypergames and show that the subjectively rationalizable strategy for the agent is deceptive and maximizes the probability of satisfying the task in temporal ...
For applications to cyber-physical security, the practitioners can employ temporal logic for specifying security properties in the system and analyze defense with deception using the proposed methods. ...
arXiv:2007.15726v1
fatcat:pl6kh7nz4jf47odj4sdfxsqley
The Science of Mission Assurance
2011
Journal of Strategic Security
Muccio works with scientists to mathematically model systems and analyze information. She conducts research on emerging technologies and maps missionessential functions to their cyber assets. Dr. ...
Abstract The intent of this article is to describe-and prescribe-a scientific framework for assuring mission essential functions in a contested cyber environment. ...
IBM's Research Queuing RESQ package achieved similar efficiency by representing communications networks as queuing systems rather than discrete systems. 6 While availability and mean time between failures ...
doi:10.5038/1944-0472.4.2.4
fatcat:pmqvzaju6zhcpeqcecmaltnm5u
« Previous
Showing results 1 — 15 out of 8,500 results