A Supervisory Control Approach to Dynamic Cyber-Security

被引:0
|
作者
Rasouli, Mohammad [1 ]
Miehling, Erik [1 ]
Teneketzis, Demosthenis [1 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
关键词
Cyber-Security; Computer Networks; Discrete Event Systems; Finite State Automata; Dynamic Programming;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An analytical approach for a dynamic cyber-security problem that captures progressive attacks to a computer network is presented. We formulate the dynamic security problem from the defender's point of view as a supervisory control problem with imperfect information, modeling the computer network's operation by a discrete event system. We consider a min-max performance criterion and use dynamic programming to determine, within a restricted set of policies, an optimal policy for the defender. We study and interpret the behavior of this optimal policy as we vary certain parameters of the supervisory control problem.
引用
收藏
页码:99 / 117
页数:19
相关论文
共 50 条
  • [21] On Cyber-security of Augmentation Networks
    Neri, Alessandro
    Baldoni, Sara
    Capua, Roberto
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL TECHNICAL MEETING OF THE INSTITUTE OF NAVIGATION, 2019, : 408 - 422
  • [22] Challenging confidence in cyber-security
    [J]. Strand, Chris, 1600, Elsevier Ltd (2014):
  • [23] A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed
    Noorizadeh, Mohammad
    Shakerpour, Mohammad
    Meskin, Nader
    Unal, Devrim
    Khorasani, Khashayar
    [J]. IEEE ACCESS, 2021, 9 : 16239 - 16253
  • [24] On Cyber-Security of Information Systems
    Sneps-Sneppe, Manfred
    Sukhomlin, Vladimir
    Namiot, Dmitry
    [J]. DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2018), 2018, 919 : 201 - 211
  • [25] The Science of Social Cyber-Security
    Carley, Kathleen
    [J]. MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 459 - 459
  • [26] A CYBER-SECURITY STORM MAP
    Ferebee, Denise
    Dasgupta, Dipankar
    Wu, Qishi
    [J]. 2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 93 - 102
  • [27] Cyber-Security Internals of a Skoda Octavia vRS: A Hands on Approach
    Urquhart, Colin
    Bellekens, Xavier
    Tachtatzis, Christos
    Atkinson, Robert
    Hindy, Hanan
    Seeam, Amar
    [J]. IEEE ACCESS, 2019, 7 : 146057 - 146069
  • [28] Optimal Resource Allocation in Cyber-Security: A Game Theoretic Approach
    Sokri, Abderrahmane
    [J]. 15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 283 - 288
  • [29] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs
    Gallego-Nicasio Crespo, Beatriz
    Garwood, Alan
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198
  • [30] Agent-based approach to the design of a multimodal interface for cyber-security event visualisation control
    Kasprzak, W.
    Szynkiewicz, W.
    Stefanczyk, M.
    Dudek, W.
    Wegierek, M.
    Seredynski, D.
    Figat, M.
    Zielinski, C.
    [J]. BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES, 2020, 68 (05) : 1187 - 1205