Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense 2015
DOI: 10.1145/2809826.2809837
|View full text |Cite
|
Sign up to set email alerts
|

Action Recommendation for Cyber Resilience

Abstract: This paper presents an unifying graph-based model for representing the infrastructure, behavior and missions of an enterprise. We describe how the model can be used to achieve resiliency against a wide class of failures and attacks. We introduce an algorithm for recommending resilience establishing actions based on dynamic updates to the models. Without loss of generality, we show the effectiveness of the algorithm for preserving latency based quality of service (QoS). Our models and the recommendation algorit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…[70]. Sutanay Choudhury et al introduced a straightforward and deterministic graph-based model that depicts the infrastructure, behavior, and missions of an enterprise, serving as a means to attain resilience against failures and attacks [71].…”
Section: Mapping the Landscape Of Cyber Resilience Research: A Review...mentioning
confidence: 99%
“…[70]. Sutanay Choudhury et al introduced a straightforward and deterministic graph-based model that depicts the infrastructure, behavior, and missions of an enterprise, serving as a means to attain resilience against failures and attacks [71].…”
Section: Mapping the Landscape Of Cyber Resilience Research: A Review...mentioning
confidence: 99%
“…Research projects conducted in recent years have helped companies develop frameworks to build resilience against cyber threats. This framework emphasizes goals such as anticipating, defending, recovering, and adapting to reduce the effects of actual or anticipated cyber threats and adapt to changes in mission and business operations [39,40]. The framework provides a step-by-step guide that companies can follow to build resilience against cyber threats [41].…”
Section: Cyber Resilience Frameworkmentioning
confidence: 99%
“…Additionally, papers considering reactive response and recovery apply to narrow settings which do not apply to our work. For example, the approaches by [4,21] only apply to settings where a control action to correct for a deviation from desired performance is easy to determine in advance, and to apply automatically.…”
Section: Related Workmentioning
confidence: 99%