Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

被引:0
|
作者
Bhuiyan, Tanveer Hossain [1 ]
Nandi, Apurba K. [1 ]
Medal, Hugh [1 ]
Halappanavar, Maltantcsh [2 ]
机构
[1] Mississippi State Univ, Dept Ind & Syst Engn, POB 9542, Mississippi State, MS 39762 USA
[2] Pacific North West Natl Lab, Phys & Computat Sci Directorate, 902 Battelle Blvd,POB 999, Richland, WA 99354 USA
关键词
attack graph; two-stage stochastic programming; mixed-integer programming;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations are being hit by small and large multi-stage cyber-attacks every day. One tool for integrating and analyzing many potential multi-stage attacks is the attack graph. Nodes of an attack graph represent attack states, and the arcs represent atomic attacks. The attack graph as a whole represents all the potential attack paths to compromise target nodes beginning from a set of initially vulnerable nodes. Given a limited budget, finding an optimal subset of arcs in the attack graph is an important problem in seeking to optimally deploy security countermeasures to minimize risks associated with potential cyber-attacks. In this research, we develop a stochastic network interdiction model based on a probabilistic attack graph with uncertain attack success probabilities on arcs and formulate it as a two-stage stochastic mixed-integer linear program. We employ the sample average approximation scheme in conjunction with Benders decomposition approach to solve the resulting problem. Our model provides an optimal recommendation for countermeasure deployment in a stochastic environment. Results demonstrate the value of stochastic solutions and the variation of risk with the accuracy of estimates of attack success probabilities.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI
    Bingjun Wan
    Chengwei Xu
    Rajendra Prasad Mahapatra
    P. Selvaraj
    [J]. Wireless Personal Communications, 2022, 127 : 1207 - 1224
  • [42] A Risk Management Plan Against Cyber-Attacks in Radiation Oncology: An Emergency Plan for Continuation of Safe Treatments
    Yi, B.
    Zhang, B.
    Prado, K.
    Chen, S.
    Rahman, S.
    D'Souza, W.
    [J]. MEDICAL PHYSICS, 2017, 44 (06) : 3162 - 3162
  • [43] Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI
    Wan, Bingjun
    Xu, Chengwei
    Mahapatra, Rajendra Prasad
    Selvaraj, P.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) : 1207 - 1224
  • [44] Risk-based contingency analysis for power systems considering a combination of different types of cyber-attacks
    Zhao, Yirui
    Li, Yong
    Cao, Yijia
    Yan, Mingyu
    [J]. APPLIED ENERGY, 2023, 348
  • [45] Estimating economic losses from cyber-attacks on shipping ports: An optimization-based approach
    Weaver, Gabriel A.
    Feddersen, Brett
    Marla, Lavanya
    Wei, Dan
    Rose, Adam
    Van Moer, Mark
    [J]. TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2022, 137
  • [46] Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems
    Miller, Thomas
    Staves, Alexander
    Maesschalck, Sam
    Sturdee, Miriam
    Green, Benjamin
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2021, 35
  • [47] Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies
    Lykou, Georgia
    Moustakas, Dimitrios
    Gritzalis, Dimitris
    [J]. SENSORS, 2020, 20 (12) : 1 - 35
  • [48] From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
    Polatidis, Nikolaos
    Pimenidis, Elias
    Pavlidis, Michalis
    Papastergiou, Spyridon
    Mouratidis, Haralambos
    [J]. EVOLVING SYSTEMS, 2020, 11 (03) : 479 - 490
  • [49] From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
    Nikolaos Polatidis
    Elias Pimenidis
    Michalis Pavlidis
    Spyridon Papastergiou
    Haralambos Mouratidis
    [J]. Evolving Systems, 2020, 11 : 479 - 490
  • [50] Securing Industrial Control Systems From Cyber-Attacks: A Stacked Neural-Network-Based Approach
    Jagtap, Sujeet S.
    Sriram, V. S. Shankar
    Subramaniyaswamy, V.
    Kotecha, Ketan
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2024, 13 (01) : 30 - 38