Timing and Resilience in Cyber Conflict: A Theoretical Framework

被引:0
|
作者
Connett, Brian [1 ]
机构
[1] US Naval Postgrad Sch, Monterey, CA 93943 USA
关键词
critical infrastructure; cyber physical systems; modeling; cyber threat;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The critical infrastructure is a cyber physical system (CPS) of the global economy, transportation, health and quality of life systems that is poised to fail under precisely, or even loosely, coordinated attacks. Since inception, systems assets within critical infrastructures were seemingly safe from the exploitation or attack by nefarious cyberspace actors. Now, critical infrastructure is a target because the resources to exploit the cyber physical systems exist. The fragility of critical infrastructure networks is a product of poor planning and an aging technology-dependent distributed system. That fragility is amplified with a decreasing learning curve associated with the growing population of cyber-actors. To compound this aggregated problem, the immeasurable scale of connected and complex networked cyber physical systems limits the resources with which the system, itself, can adequately monitor the entirety of its ongoing processes. A lack of ability to effectively monitor complex systems, and correctly identify when an anomaly is present motivates the research this work uses to build its position. System owners are obligated to maintain a high level of protection measures against exploitation resources, characterized in terms of patience, stealth, replication-ability and extraordinary robustness. The difficulty lies in knowing when, how and where to fortify a critical infrastructure against an impending attack. Models currently exist that theorize the value of knowing the attacker's capabilities in the cyber realm, taking into consideration of the strength of the target, but they are not designed to respond to the inherent fast timing of an attack, an impetus that can be derived based on open-source reporting, common knowledge of exploits and the physical architecture of the infrastructure. This dissertation seeks to build a framework and architecture with a useful model that will inform systems owners how to align infrastructure architecture in a manner that is responsive to the capability, willingness and timing of the attacker. This research group will use existing theoretical models for estimating the functional parameters, and through analysis, develop a decision tool for would-be target owners. Systems owner requires a decision system that can be scalable across temporal and physical boundaries and is capable of detecting an anomaly, and then informing the system owner of an attack's potential dispersion. The complement to this capability need is a system which demonstrates a triad of availability, namely in the terms of resilience, adaptability and predictability. An architecture is introduced to ensure that the observed anomaly, if allowed to persist, will only do so at the thresholds within the triad set by the system owner. While not static through time iterations, the thresholds provide a situationally aware decision to allow an overall availability, consistent with the need and utility of a critical infrastructure service.
引用
收藏
页码:415 / 418
页数:4
相关论文
共 50 条
  • [41] A Cyber Resilience Framework for NG-IoT Healthcare Using Machine Learning and Blockchain
    Kelli, Vasiliki
    Sarigiannidis, Panagiotis
    Argyriou, Vasileios
    Lagkas, Thomas
    Vitsas, Vasileios
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [42] MTC2: A Command and Control Framework for Moving Target Defense and Cyber Resilience
    Carvalho, Marco
    Eskridge, Thomas C.
    Bunch, Larry
    Dalton, Adam
    Hoffman, Robert
    Kidwell, Daniel
    Shanklin, Teresa
    2013 6TH INTERNATIONAL SYMPOSIUM ON RESILIENT CONTROL SYSTEMS (ISRCS), 2013, : 175 - 180
  • [43] Resilience Framework for Power Electronic Systems Against Cyber-Physical Attacks: A Review
    Liu, Chang
    Ye, Jin
    Fang, Gaoliang
    Wang, Di
    Zhou, Linke
    Emadi, Ali
    IEEE OPEN JOURNAL OF POWER ELECTRONICS, 2025, 6 : 28 - 55
  • [44] Combining Cybersecurity and Cyber Defense to achieve Cyber Resilience
    Galinec, Darko
    Steingartner, William
    2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 87 - 93
  • [45] Cyber war versus cyber realities: cyber conflict in the international system
    Nocetti, Julien
    INTERNATIONAL AFFAIRS, 2016, 92 (02) : 463 - 465
  • [46] Cyber Resilience: by Design or by Intervention?
    Kott, Alexander
    Golan, Maureen S.
    Trump, Benjamin D.
    Linkov, Igor
    COMPUTER, 2021, 54 (08) : 112 - 117
  • [47] Cyber War versus Cyber Realities: Cyber Conflict in the International System
    O'Connor, Courteney J.
    POLITICAL STUDIES REVIEW, 2017, 15 (02) : 288 - 289
  • [48] CYBER WAR VERSUS CYBER REALITIES: CYBER CONFLICT IN THE INTERNATIONAL SYSTEM
    Domingo, Francis C.
    JOURNAL OF INFORMATION TECHNOLOGY & POLITICS, 2015, 12 (04) : 399 - 401
  • [49] To Improve Cyber Resilience, Measure It
    Kott, Alexander
    Linkov, Igor
    COMPUTER, 2021, 54 (02) : 80 - 85
  • [50] Cyber Resilience Progression Model
    Carias, Juan F.
    Arrizabalaga, Saioa
    Labaka, Leire
    Hernantes, Josune
    APPLIED SCIENCES-BASEL, 2020, 10 (21): : 1 - 32