2016
DOI: 10.14232/actacyb.22.3.2016.3
|View full text |Cite
|
Sign up to set email alerts
|

On Cyber Attacks and the Maximum-Weight Rooted-Subtree Problem

Abstract: This paper makes three contributions to cyber-security research. First, we define a model for cyber-security systems and the concept of a cyber-security attack within the model's framework. The model highlights the importance of game-over components-critical system components which if acquired will give an adversary the ability to defeat a system completely. The model is based on systems that use defense-in-depth/layered-security approaches, as many systems do. In the model we define the concept of penetration… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…As a result, quite a bit of work has been done where cybersecurity systems, or more generally layered computer systems, are modeled as a fixed weighted trees. For example, in [1,3,4,8,10,12] the authors consider finding weight-constrained, maximum-density subtrees and similar structures given a fixed weighting of a tree as part of the input. In these cases weights are specified on both vertices and edges.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…As a result, quite a bit of work has been done where cybersecurity systems, or more generally layered computer systems, are modeled as a fixed weighted trees. For example, in [1,3,4,8,10,12] the authors consider finding weight-constrained, maximum-density subtrees and similar structures given a fixed weighting of a tree as part of the input. In these cases weights are specified on both vertices and edges.…”
Section: Introductionmentioning
confidence: 99%
“…Building on the work done in [3], in this paper we study a layered-security model and strategies for assigning penetration costs and target-acquisition values so as to minimize the amount of damage an attacker can do to a system. That is, we examine security systems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation