Modeling Host OSI Layers Cyber-Attacks Using System Dynamics
نویسندگان
چکیده
Cyber security modeling is the process of creating a normalized view of the cyber security situation. A typical cyber security model has information about the network infrastructure, security settings, and a list of possible vulnerabilities and threats. By using known vulnerabilities, and information about the infrastructure and security controls in place, the cyber security simulation allows an organization to imitate the attacker activities and helps to assess the system’s risk exposure. Networks are normally modeled or simulated through discrete-event techniques. But the discreteevent simulations can only simulate a few seconds worth of network operations and the primary focus of discrete-event models is on packet traffic. This means that cyberattacks/defenses are viewed from the network layer, layer 3, in the OSI model. This obscures more insidious attacks at higher layers in the OSI model. This paper presents a study which models a computer network as a systems dynamic model to explore more insidious cyber-attacks and the resulting systemlevel effects that might occur on host OSI layers, layer 4 and above, in the OSI model.
منابع مشابه
System Dynamics as a Tool for Modeling Application Layer Cyber Security
System dynamics (SD) is a methodology used to understand how systems change over time. In the 1960s, the SD modeling technique was developed to solve long-term, chronic, dynamic industrial management problems; today, SD is applied to solve various business policies and strategic problems. A typical SD study focuses on understanding how the components of a system interact; how and why the dynami...
متن کاملAn Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine
Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...
متن کاملOn the use of watermark-based schemes to detect cyber-physical attacks
We address security issues in cyber-physical systems (CPSs). We focus on the detection of attacks against cyber-physical systems. Attacks against these systems shall be handled both in terms of safety and security. Networked-control technologies imposed by industrial standards already cover the safety dimension. However, from a security standpoint, using only cyber information to analyze the se...
متن کاملTradeoffs of Service, Security and Attack for Cyber System Survivability
Tradeoffs within the limitation of given system resources often have to be made for a cyber system to sustain its more critical services under the damage of cyber attacks. Understanding and modeling cause-effect dynamics of activities (service, security and attack), system state and Quality of Service (QoS) are essential to establish the dynamic adaptation capability of making tradeoffs among s...
متن کاملModeling of Future Cyber-Physical Energy Systems for Distributed Sensing and Control
This paper proposes modeling the rapidly evolving energy systems as cyber-based physical systems. It introduces a novel cyber-based dynamical model whose mathematical description depends on the cyber technologies supporting the physical system. This paper discusses how such a model can be used to ensure full observability through a cooperative information exchange among its components; this is ...
متن کامل