2013 IEEE International Conference on Intelligence and Security Informatics 2013
DOI: 10.1109/isi.2013.6578796
|View full text |Cite
|
Sign up to set email alerts
|

Towards a network-of-networks framework for cyber security

Abstract: Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this position paper we build towards a three-layered NoN model for an enterprise cyber system. Each layer captures a d… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…Including different critical infrastructure networks, cyberspace is a multi-layer network of network [8] . Through decomposition, cyberspace model can uniformly describe homogeneous and heterogeneous entities interacting with their complex relationships in multi-layer cyberspace.…”
Section: Sub-hypergraphs Represent Multi-layersmentioning
confidence: 99%
See 1 more Smart Citation
“…Including different critical infrastructure networks, cyberspace is a multi-layer network of network [8] . Through decomposition, cyberspace model can uniformly describe homogeneous and heterogeneous entities interacting with their complex relationships in multi-layer cyberspace.…”
Section: Sub-hypergraphs Represent Multi-layersmentioning
confidence: 99%
“…However, a graph can only capture binary relations between homogeneous entities [8] , it is not able to distinguish between heterogeneous entities and different types of entity relationships in cyberspace. Cyberspace covers from network equipment, physical environment, to people and organization.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, we color an edge blue if at least one of the ports is well known (i.e., less than 1024) and red if both ports are not well known (1024 or greater). 2 Since multiple flows can occur between the same pair of IPs in the time interval, H is a multi-digraph, meaning it admits multiple edges between any pair of vertices, and we aggregate the multi-edges to create the desired graph, G. Specifically, for each source vertex i and destination vertex j of H, let Bi,j (Ri,j) be the sum of edge weights, total bytes, over the blue (red) edges from i to j. If Bi,j > Ri,j (Ri,j ≥ Bi,j), create a blue (red) edge from i to j in G. Thus our final graph, G, has colored,…”
Section: Representation Of Flow Data As Graphsmentioning
confidence: 99%
“…We note that the idea for multi-level anomaly detection on time-varying graph data follows contributions of Bridges et al [1], which create a generative model for detection on synthetic graph data at node, community, and whole graph levels. Additionally, a position paper of Halappanavar et al [2] outlines a network-of-network design for cyber security applications and calls for graphlet analysis of flow data, but to our knowledge no implementation of these ideas has yet been pursued.…”
Section: Introductionmentioning
confidence: 99%
“…We adopt the later solution as the former solution is perfect but no feasible. In real cyber environment, cyberspace is a network of network [7] . Form the horizontal view, cyberspace consists many network such as telecommunications networks, computer systems, and embedded processors and controllers [1] .…”
Section: Introductionmentioning
confidence: 99%