Reasoning about Attack Goals for Cyber Resilience

نویسندگان

  • Ugur Kuter
  • Mark Burstein
  • Robert P. Goldman
  • R. P. GOLDMAN
چکیده

This paper describes our approach to anticipating and recognizing potential cyber threats in order to provide timely responses to those threats. Our approach anticipates attacks on distributed systems by generating a diverse set of attack plans on key system components and then determining the probabilities that these attacks may threaten those components or others that are stepping stones to those systems. The results enable our overall system, STRATUS, to defend these systems by preparing backups and controlling communications pathways appropriately. We present a preliminary empirical study of our techniques, demonstrating their promise.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intellige...

متن کامل

Markov Task Network: A Framework for Service Composition under Uncertainty in Cyber-Physical Systems

In novel collaborative systems, cooperative entities collaborate services to achieve local and global objectives. With the growing pervasiveness of cyber-physical systems, however, such collaboration is hampered by differences in the operations of the cyber and physical objects, and the need for the dynamic formation of collaborative functionality given high-level system goals has become practi...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

Towards Actionable Mission Impact Assessment in the Context of Cloud Computing

Today’s cyber-attacks towards enterprise networks often un­ dermine and even fail the mission assurance of victim net­ works. Mission cyber resilience (or active cyber defense) is critical to prevent or minimize negative consequences to­ wards missions. Without effective mission impact assess­ ment, mission cyber resilience cannot be really achieved. However, there is an overlooked gap between ...

متن کامل

Modalities for Cyber Security and Privacy Resilience: The NIST Approach

Cybersecurity was a major topic of discussion at the 2015 World Economic Forum in Davos the Sony attack; huge data breaches at Target and Adobe; a 91% increase in targeted cyber-attacks; annual losses of over $400 billion; the exposure of 904 million personal data records; cyber-attacks on a Finnish bank, a South Korean credit bureau, a German factory’s industrial controls, and the Ukrainian go...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015