Mathematically Modelling Cyber-Attacks Utilizing Engineering Techniques

被引:1
|
作者
Easttom, Chuck [1 ]
机构
[1] CEC Secur LLC, Plano, TX 75093 USA
关键词
cybersecurity engineering; cyberthreat analysis; cyberthreat modelling; mathematical modelling; SIR MODEL; VULNERABILITY;
D O I
10.34190/ICCWS.20.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There currently exists a wide array of methods to examine cyber-attacks. Many of those are effective in specific narrow scenarios. These methods allow for analysis and improved understanding of cyber-attacks, but they have limited applicability. What is absent from the literature are two elements. The first element is a broadly applicable method to model and analyse any cyber-attack. The second issue that is absent, is the precise mathematical quantifying of attacks. This paper will be examining methods of modelling cyber-attacks using systems engineering techniques including failure analysis. This allows for a quantitative understanding of the attack. The process will include a variety of failure analysis metrics designed to create a specific scoring for the attacks impact. This also provides a mechanism for improving cyber-resiliency by applying engineering analysis techniques to potential cyber-attacks.
引用
收藏
页码:119 / 126
页数:8
相关论文
共 50 条
  • [1] Social Engineering Based Cyber-Attacks in Kenya
    Obuhuma, James
    Zivuku, Shingai
    2020 IST-AFRICA CONFERENCE (IST-AFRICA), 2020,
  • [2] Modelling of Cyber-Attacks and Defenses in Local Metering System
    Liu, Shou-Zhou
    Li, Yan-Fu
    Yang, Zhou
    RENEWABLE ENERGY INTEGRATION WITH MINI/MICROGRID, 2018, 145 : 421 - 426
  • [3] Futuristic cyber-attacks
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Rathnam, M. Venkata
    Srinithi, K.
    Vaidehi, V.
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2018, 22 (03) : 195 - 204
  • [4] Advanced Predictive Techniques for detection of Cyber-Attacks in Water Infrastructures
    Toe, Teoh Teik
    Yi, Lim Han
    Josephlal, Edwin Franco Myloth
    2020 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (IEEE ICSPCC 2020), 2020,
  • [5] Social Engineering as the Art of Deception in Cyber-Attacks: A Mapping Review
    Guana-Moya, Javier
    Avila-Pesantez, Diego
    INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, WORLDCIST 2023, 2024, 799 : 155 - 163
  • [6] Cyber-attacks and banking intermediation
    Boungou, Whelsy
    ECONOMICS LETTERS, 2023, 233
  • [7] Predicting Consequences of Cyber-Attacks
    Datta, Prerit
    Lodinger, Natalie
    Namin, Akbar Siami
    Jones, Keith S.
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2073 - 2078
  • [8] Cyber-attacks and international law
    Grove, GD
    Goodman, SE
    Lukasik, SJ
    SURVIVAL, 2000, 42 (03) : 89 - +
  • [9] Staying ahead of cyber-attacks
    Green, John
    Network Security, 2015, 2015 (02) : 13 - 16
  • [10] On the modeling of cyber-attacks associated with social engineering: A parental control prototype
    Zambrano, Patricio
    Torres, Jenny
    Tello-Oquendo, Luis
    Yanez, Angel
    Velasquez, Luis
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75