Mathematically Modelling Cyber-Attacks Utilizing Engineering Techniques

被引:1
|
作者
Easttom, Chuck [1 ]
机构
[1] CEC Secur LLC, Plano, TX 75093 USA
关键词
cybersecurity engineering; cyberthreat analysis; cyberthreat modelling; mathematical modelling; SIR MODEL; VULNERABILITY;
D O I
10.34190/ICCWS.20.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There currently exists a wide array of methods to examine cyber-attacks. Many of those are effective in specific narrow scenarios. These methods allow for analysis and improved understanding of cyber-attacks, but they have limited applicability. What is absent from the literature are two elements. The first element is a broadly applicable method to model and analyse any cyber-attack. The second issue that is absent, is the precise mathematical quantifying of attacks. This paper will be examining methods of modelling cyber-attacks using systems engineering techniques including failure analysis. This allows for a quantitative understanding of the attack. The process will include a variety of failure analysis metrics designed to create a specific scoring for the attacks impact. This also provides a mechanism for improving cyber-resiliency by applying engineering analysis techniques to potential cyber-attacks.
引用
收藏
页码:119 / 126
页数:8
相关论文
共 50 条
  • [21] Cyber-attacks and stock market activity
    Tosun, Onur Kemal
    INTERNATIONAL REVIEW OF FINANCIAL ANALYSIS, 2021, 76
  • [22] Companies shoddy about cyber-attacks
    Sterlicchi, John
    Computer Fraud and Security, 2002, 2002 (03): : 7 - 8
  • [23] Resisting the persistent threat of cyber-attacks
    Russell G.
    Computer Fraud and Security, 2017, 2017 (12): : 7 - 11
  • [24] A Review on Research of Cyber-attacks and Defense in Cyber Physical Power Systems Part One Modelling and Evaluation
    Wang Q.
    Li M.
    Tang Y.
    Ni M.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2019, 43 (09): : 9 - 21
  • [25] Artificial Intelligence techniques to mitigate cyber-attacks within vehicular networks: Survey?
    Haddaji, Achref
    Ayed, Samiha
    Fourati, Lamia Chaari
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [26] A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition
    Altalhi, Sahar
    Gutub, Adnan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (11) : 10209 - 10221
  • [27] Mindfulness in Cyber Security - Examining Responder Behaviors in Cyber-Attacks
    Tapanainen, Tommi
    AMCIS 2017 PROCEEDINGS, 2017,
  • [28] TAXONOMY OF SEVERITY OF CYBER-ATTACKS IN CYBER-MANUFACTURING SYSTEMS
    Espinoza-Zelaya, Carlos
    Moon, Young
    PROCEEDINGS OF ASME 2022 INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, IMECE2022, VOL 2B, 2022,
  • [29] Analysis of jamming and spoofing cyber-attacks on drones
    Pey, Jeferson Nascimento Aquilar
    Nze, Georges Daniel Amvame
    Albuquerque, Robson de Oliveira
    Iberian Conference on Information Systems and Technologies, CISTI, 2022, 2022-June
  • [30] The potential for massive cyber-attacks is no longer futuristic
    不详
    NEW SCIENTIST, 2008, 198 (2661) : 29 - 29