Leveraging Traditional Battle Damage Assessment Procedures to Measure Effects from a Computer Network Attack Graduate Research Project
نویسنده
چکیده
The art of warfare in cyberspace is evolving. Cyberspace, as the newest warfighting domain, requires the tools to synchronize effects from the cyber domain with those of the traditional land, maritime, space, and air domains. Cyberspace can compliment a commander’s theater strategy supporting strategic, operational, and tactical objectives. To be effective, or provide an effect, commanders must have a mechanism that allows them to understand if a desired cyber effect was successful which requires a comprehensive cyber battle damage assessment capability. The purpose of this research is to analyze how traditional kinetic battle damage assessment is conducted and apply those concepts in cyberspace. This requires indepth nodal analysis of the cyberspace target as well as what second and third order effects can be measured to determine if the cyber-attack was successful. This is necessary to measure the impact of the cyber-attack which can be used to increase or decrease the risk level to personnel operating in traditional domains.
منابع مشابه
Seismic Risk Assessment of Power Substations
Power networks are among the most important infrastructures that without them, industrial, economic and social procedures will halt. Therefore, they should be planned for the most difficult conditions to provide services with minimum disruption. Power substations are of great importance to a power network, because any disruption in their components can produce extensive problems through the net...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملNeural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملA New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
متن کاملBayesian Inference for the Community Seismic Network
The California Integrated Seismic Network uses a large array of expensive seismometers that measure ground motion. However, the network is unable to provide reliable real-time source estimation due to the sparseness of the sensors. The Community Seismic Network project at Caltech plans to create a dense seismic network by leveraging small, inexpensive accelerometers attached to personal compute...
متن کامل