How to spend it: optimal investment for cyber security Position paper

被引:20
|
作者
Smeraldi, Fabrizio [1 ]
Malacaria, Pasquale [1 ]
机构
[1] Queen Mary Univ London, Sch Elect Engn & Comp Sci, London, England
基金
英国工程与自然科学研究理事会;
关键词
KNAPSACK-PROBLEM;
D O I
10.1145/2602945.2602952
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A basic cyber security problem is how to optimally spend a security budget. We cast this problem in the framework of combinatorial optimization and explore its relationship with the classical knapsack problem. As in the latter, given a budget, we wish to optimally select a set of resources, each having a cost and a benefit. We propose optimisation algorithms that can deal with resources that depend non linearly on each other, and an optimal budget allocation algorithm for the case of several targets covered by target-specific resources. The general case of resources each of which benefits multiple targets leads to the multiple objective knapsack problem. Also in this case, we extend the standard dynamic programming solution to deal with non-linear dependencies between resources.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Keep spending: Beyond optimal cyber-security investment
    Zhang, Yunxiao
    Malacaria, Pasquale
    [J]. 2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF, 2023, : 123 - 136
  • [2] Integrating Cyber Security and Data Science for Social Media: A Position Paper
    Thuraisingham, Bhavani
    Kantarcioglu, Murat
    Khan, Latifur
    [J]. 2018 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW 2018), 2018, : 1163 - 1165
  • [3] Optimal Investment in Cyber-Security under Cyber Insurance for a Multi-Branch Firm
    Mazzoccoli, Alessandro
    Naldi, Maurizio
    [J]. RISKS, 2021, 9 (01) : 1 - 28
  • [4] Cyber KPI for Return on Security Investment
    Onwubiko, Cyril
    Onwubiko, Austine
    [J]. 2019 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2019,
  • [6] IT Security for SCADA: A Position Paper
    Rastogi, Rahul
    von Solms, Rossouw
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2015, 5 (03) : 19 - 27
  • [7] Position paper: Security in TACOMA
    Sudmann, NP
    [J]. OBJECT-ORIENTED TECHNOLOGY: ECOOP'98 WORKSHOP READER, 1998, 1543 : 302 - 303
  • [8] Decision support approaches for cyber security investment
    Fielder, Andrew
    Panaousis, Emmanouil
    Malacaria, Pasquale
    Hankin, Chris
    Smeraldi, Fabrizio
    [J]. DECISION SUPPORT SYSTEMS, 2016, 86 : 13 - 23
  • [9] The SPIDER Cyber Security Investment Component (CIC)
    Tsiodra, Maria
    Chronopoulos, Michail
    Ghering, Matthias
    Karapistoli, Eirini
    Gerosavva, Neofytos
    Kylilis, Nicolas
    [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 415 - 421
  • [10] Literature Review on Cyber Security Investment Decisions
    Senturk, Hakan
    Cil, Celal Zaim
    Sagiroglu, Seref
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2016, 19 (01): : 39 - 51