System Dynamics as a Tool for Modeling Application Layer Cyber Security

نویسندگان

  • Uma Kannan
  • Rajendran Swamidurai
  • David Umphress
چکیده

System dynamics (SD) is a methodology used to understand how systems change over time. In the 1960s, the SD modeling technique was developed to solve long-term, chronic, dynamic industrial management problems; today, SD is applied to solve various business policies and strategic problems. A typical SD study focuses on understanding how the components of a system interact; how and why the dynamics of concern are generated; and how policies and decisions affect system performance. This paper presents a study which models a computer network as a systems dynamic model to explore cyber-attacks and the resulting system-level effects that might occur on host OSI layers, layer 4 and above, in the OSI model. Preliminary results indicate that by using system dynamic cyber security simulation an organization can imitate the attacker(s) activities in OSI layer 4 and above and assess (and/or mitigate) the system’s risk exposure. In this paper we are presenting a proof-of-concept SD model for application layer cyber security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling Host OSI Layers Cyber-Attacks Using System Dynamics

Cyber security modeling is the process of creating a normalized view of the cyber security situation. A typical cyber security model has information about the network infrastructure, security settings, and a list of possible vulnerabilities and threats. By using known vulnerabilities, and information about the infrastructure and security controls in place, the cyber security simulation allows a...

متن کامل

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

ملزومات امنیتی پیاده‌سازی IMS SIP سرور امن

IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...

متن کامل

A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields

Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development of cyberphysical systems is constrained by security factors. According to this situation, this paper put forward a CPS security model, which contains security objectives, basic theories, simulation, and CPS framework, summarizes security...

متن کامل

Analyzing Mission Impacts of Cyber Actions (AMICA)

This paper describes AMICA (Analyzing Mission Impacts of Cyber Actions), an integrated approach for understanding mission impacts of cyber attacks. AMICA combines process modeling, discrete-event simulation, graph-based dependency modeling, and dynamic visualizations. This is a novel convergence of two lines of research: process modeling/simulation and attack graphs. AMICA captures process flow...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016