Modeling Network Systems Under Simultaneous Cyber-Attacks

被引:6
|
作者
Da, Gaofeng [1 ]
Xu, Maochao [2 ,3 ]
Zhao, Peng [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Econ & Management, Nanjing 210016, Jiangsu, Peoples R China
[2] Illinois State Univ, Dept Math, Normal, IL 61701 USA
[3] Jiangsu Normal Univ, Sch Math & Stat, Xuzhou 221116, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Dependence; epidemic spreading; majorization; stochastic orders; STOCHASTIC-MODEL; PROPAGATION; EXTINCTION; SPREAD;
D O I
10.1109/TR.2019.2911106
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modeling cyber-attacks is a very attractive area of research because of its practical importance. However, most of the related research in the literature does not consider the simultaneous (or coordinated) attacks, which, in fact, is an important attack instrument in practice. This is mainly because of the complicated evolution of cyber-attacks over networks. In this paper, we propose a novel model, which can accommodate different types of simultaneous attacks with possible heterogeneous compromise probabilities. Our results show that simultaneous attacks have a significant effect on the reliability/ dynamics of network systems. In particular, we present a sufficient condition for the epidemics dying out over the network, and upper bounds for the time to extinction. We also provide upper bounds for compromise probabilities of network systems when the evolution enters the quasi-equilibrium state. The effects of strength of simultaneous attacks and heterogeneity among successful attack probabilities on epidemic spreading are studied as well. The theoretical results are further validated by the simulation evidence.
引用
收藏
页码:971 / 984
页数:14
相关论文
共 50 条
  • [41] Probabilistic event-triggered distributed filtering for fuzzy systems under cyber-attacks
    Zhou, Zhidong
    Cai, Ying
    Cheng, Jun
    Wang, Yunliang
    Cao, Jinde
    INFORMATION SCIENCES, 2025, 700
  • [42] A Deep Neural Network Strategy to Distinguish and Avoid Cyber-Attacks
    Agarwal, Siddhant
    Tyagi, Abhay
    Usha, G.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 673 - 681
  • [43] Detecting network cyber-attacks using an integrated statistical approach
    Benamar Bouyeddou
    Fouzi Harrou
    Benamar Kadri
    Ying Sun
    Cluster Computing, 2021, 24 : 1435 - 1453
  • [44] On the Security of Cyber-Physical Systems Against Stochastic Cyber-Attacks Models
    Abu Al-Haija, Qasem
    2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, : 155 - 160
  • [45] Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems
    Rasim Alguliyev
    Yadigar Imamverdiyev
    Lyudmila Sukhostat
    Neural Computing and Applications, 2021, 33 : 10211 - 10226
  • [46] Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    Sukhostat, Lyudmila
    NEURAL COMPUTING & APPLICATIONS, 2021, 33 (16): : 10211 - 10226
  • [47] DDoS Cyber-Attacks Network: Who's Attacking Whom
    Kumar, Sumeet
    Carley, Kathleen M.
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 218 - 218
  • [48] Staying ahead of cyber-attacks
    Green, John
    Network Security, 2015, 2015 (02) : 13 - 16
  • [49] Enhanced robust frequency stabilization of a microgrid against simultaneous cyber-attacks
    Kerdphol, Thongchart
    Ngamroo, Issarachai
    Surinkaew, Tossaporn
    ELECTRIC POWER SYSTEMS RESEARCH, 2024, 228
  • [50] Asynchronous attack tolerant control for Markov jump cyber-physical systems under hybrid cyber-attacks
    Wang, Lanxin
    Long, Yue
    Li, Tieshan
    Yang, Hanqing
    Chen, C. L. Philip
    APPLIED MATHEMATICS AND COMPUTATION, 2024, 470