2023
DOI: 10.1109/tdsc.2022.3151462
|View full text |Cite
|
Sign up to set email alerts
|

Redundancy Planning for Cost Efficient Resilience to Cyber Attacks

Abstract: We investigate the extent to which redundancy (including with diversity) can help mitigate the impact of cyber attacks that aim to reduce system performance. Using analytical techniques, we estimate impacts, in terms of monetary costs, of penalties from breaching Service Level Agreements (SLAs), and find optimal resource allocations to minimize the overall costs arising from attacks. Our approach combines attack impact analysis, based on performance modeling using queueing networks, with an attack model based … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 36 publications
(58 reference statements)
0
2
0
Order By: Relevance
“…Further approaches have considered how to associate the attack progression through the system to its impact on the system model (e.g. [19]). It is then possible to conduct a cost based analysis to identify the most cost effective countermeasures or to evaluate the cost effectiveness of different mitigating strategies.…”
Section: Tamelessmentioning
confidence: 99%
See 1 more Smart Citation
“…Further approaches have considered how to associate the attack progression through the system to its impact on the system model (e.g. [19]). It is then possible to conduct a cost based analysis to identify the most cost effective countermeasures or to evaluate the cost effectiveness of different mitigating strategies.…”
Section: Tamelessmentioning
confidence: 99%
“…For example, when system elements are compromised, this can be taken into account and the new probabilities of compromise can be calculated [22], [17]. The new probabilities of compromise can be used to choose countermeasures [23] and can also be combined with system models and cost models for resilience analysis as shown in [19]. However, our focus here is on the analysis and the generation of the graph for hybrid systems and we leave such extensions for further work.…”
Section: Attack Graphsmentioning
confidence: 99%