Modeling Network Systems Under Simultaneous Cyber-Attacks

被引:6
|
作者
Da, Gaofeng [1 ]
Xu, Maochao [2 ,3 ]
Zhao, Peng [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Econ & Management, Nanjing 210016, Jiangsu, Peoples R China
[2] Illinois State Univ, Dept Math, Normal, IL 61701 USA
[3] Jiangsu Normal Univ, Sch Math & Stat, Xuzhou 221116, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Dependence; epidemic spreading; majorization; stochastic orders; STOCHASTIC-MODEL; PROPAGATION; EXTINCTION; SPREAD;
D O I
10.1109/TR.2019.2911106
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modeling cyber-attacks is a very attractive area of research because of its practical importance. However, most of the related research in the literature does not consider the simultaneous (or coordinated) attacks, which, in fact, is an important attack instrument in practice. This is mainly because of the complicated evolution of cyber-attacks over networks. In this paper, we propose a novel model, which can accommodate different types of simultaneous attacks with possible heterogeneous compromise probabilities. Our results show that simultaneous attacks have a significant effect on the reliability/ dynamics of network systems. In particular, we present a sufficient condition for the epidemics dying out over the network, and upper bounds for the time to extinction. We also provide upper bounds for compromise probabilities of network systems when the evolution enters the quasi-equilibrium state. The effects of strength of simultaneous attacks and heterogeneity among successful attack probabilities on epidemic spreading are studied as well. The theoretical results are further validated by the simulation evidence.
引用
收藏
页码:971 / 984
页数:14
相关论文
共 50 条
  • [21] INVESTIGATION ON CYBER-ATTACKS AGAINST IN-VEHICLE NETWORK
    Kumar, S. Vishnu
    Mary, G. Aloy Anuja
    Suresh, P.
    Uthirasamy, R.
    2021 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENERGY SYSTEMS (ICEES), 2021, : 305 - 311
  • [22] Cyber-Attacks with Resource Constraints on Discrete Event Systems Under Supervisory Control
    He, Zhaoyang
    Wu, Naiqi
    Su, Rong
    Li, Zhiwu
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2025, 12 (03) : 585 - 595
  • [23] Fraud in Academic Publishing: Researchers Under Cyber-Attacks
    Dadkhah, Mehdi
    Borchardt, Glenn
    Maliszewski, Tomasz
    AMERICAN JOURNAL OF MEDICINE, 2017, 130 (01): : 27 - 30
  • [24] Detection and Prevention of Cyber-Attacks in Networked Control Systems
    Li, Yike
    Tong, Yin
    Giua, Alessandro
    IFAC PAPERSONLINE, 2020, 53 (04): : 7 - 13
  • [25] On Resilient Design of Cooperative Systems in Presence of Cyber-Attacks
    Sadabadi, Mahdieh S.
    Gusrialdi, Azwirman
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 946 - 951
  • [26] Reliability Analysis of Cyber-Physical Systems Considering Cyber-Attacks
    Fang, Z. H.
    Mo, H. D.
    Wang, Y.
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2017, : 364 - 368
  • [27] Robust H∞ cyber-attacks estimation for control systems
    Li Yumei
    Holger, Voos
    Mohamed, Daroijach
    2014 33RD CHINESE CONTROL CONFERENCE (CCC), 2014, : 3124 - 3129
  • [28] A Triggering Mechanism for Cyber-Attacks in Naval Sensors and Systems
    Leite Junior, Walmor Cristino
    de Moraes, Claudio Coreixas
    de Albuquerque, Carlos E. P.
    Machado, Raphael Carlos Santos
    de Sa, Alan Oliveira
    SENSORS, 2021, 21 (09)
  • [29] A model of deception during cyber-attacks on information systems
    Rowe, NC
    2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY, 2004, : 21 - 30
  • [30] Interval forecasting of cyber-attacks on industrial control systems
    Ivanyo, Y. M.
    Krakovsky, Y. M.
    Luzgin, A. N.
    INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING, AUTOMATION AND CONTROL SYSTEMS 2017, 2018, 327