2022
DOI: 10.1007/978-3-031-02067-4_6
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Decision Support for Cybersecurity Incident Response Teams: Autonomic Architecture and Mitigation Search

Abstract: Critical infrastructures must be able to mitigate, at runtime, suspected ongoing cyberattacks that have eluded preventive security measures. To tackle this issue, we first propose an autonomic computing architecture for a Cyber-Security Incident Response Team Intelligent Decision Support System (CSIRT-IDSS) with a precise set of technologies for each of its components. We then zoom in on the component responsible for proposing to the CSIRT, automatically ranked sets of runtime actions to mitigate suspected ong… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 34 publications
(25 reference statements)
0
5
0
Order By: Relevance
“…We were inspired by these works in the creation of our own mission decomposition model presented in our earlier paper 4 . The model used in our work uses the AND/OR notation and is based on the constraint satisfaction problem 17,20,24,25 . The difference between our approach and the related work is that we do not consider mission capacity; functional requirements, that is, constraints, are a binary matter.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…We were inspired by these works in the creation of our own mission decomposition model presented in our earlier paper 4 . The model used in our work uses the AND/OR notation and is based on the constraint satisfaction problem 17,20,24,25 . The difference between our approach and the related work is that we do not consider mission capacity; functional requirements, that is, constraints, are a binary matter.…”
Section: Related Workmentioning
confidence: 99%
“…However, the paper's main contribution is a proposed stochastic optimization model to handle uncertainties in breach probability estimation. Correa et al 25 optimized the selection of countermeasures at runtime, formalized the attack mitigation search task as a constraint optimization problem, and proposed an autonomic computing architecture including a precise set of technologies for each of its components to mitigate suspected ongoing cyber attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The Cyber-Attack Runtime Mitigation Action Search (CAR-MAS) component is presented in detail in [34]. It takes as input from the Advanced Visualization Toolkit (AVT), a set of detected attack actions, each accompanied with the business loss that they would bring about if left unmitigated.…”
Section: Mitigation Engine -Sdn Controllermentioning
confidence: 99%
“…The COP builder takes as parameter a heuristic function to build a COP that tailors relevant general knowledge that its reuses from the ontology to the specific attack input description received from AVT. In [34], we show that such heuristically built COP can then be solved by the COP solver in a few seconds even for large coordinated attacks involving up to 10 attack actions targeting up to 15 network assets.…”
Section: Mitigation Engine -Sdn Controllermentioning
confidence: 99%