Mission cyber security situation assessment using impact dependency graphs

The paper proposes a conceptual framework and a method for assessing impact that cyber attacks might have to cyber assets, services, and missions. The paper describes the model of a cyber attack based on an extended conceptual graph. It introduces the notion of a cyber-terrain as a multilevel inform...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Jakobson, G.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 8
container_issue
container_start_page 1
container_title
container_volume
creator Jakobson, G.
description The paper proposes a conceptual framework and a method for assessing impact that cyber attacks might have to cyber assets, services, and missions. The paper describes the model of a cyber attack based on an extended conceptual graph. It introduces the notion of a cyber-terrain as a multilevel information structure containing assets and services, and their inter-dependencies. It also describes the model of a mission, and impact dependency graph that in a uniform way presents the dependencies between the cyber terrain and missions. The paper presents an algorithmic base how to calculate impacts that cyber attacks cause to the directly attacked assets, how the direct impacts propagate through the inter-asset, service, and mission dependencies and affect the operational capacity of ongoing missions.
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5977648</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5977648</ieee_id><sourcerecordid>5977648</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-77995bd787eb2ed4fdd583e793ade25e503c288e3a33a1b686c1f4a59284b5443</originalsourceid><addsrcrecordid>eNotj81KxDAURiMiqGOfwE1eoNDm794sZfCXGdzMfkiT2zFia-lNF317R_TbnMWBA9-FuG08KmM0arwUlQdsjQVolAN_LSrmz-Y857wycCPe9pk5f48yrh3Nkikucy6r5FyWUH5FYCbmgcYiF87jSeZhCrHIRBONica4ytMcpg--E1d9-GKq_rkRh6fHw_al3r0_v24fdnX2TakBvLddAgTqFCXTp2RRE3gdEilLttFRIZIOWoe2c-hi25tgvULT2fOtjbj_y2YiOk5zHsK8Hq0HcAb1Dzx5SbI</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Mission cyber security situation assessment using impact dependency graphs</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Jakobson, G.</creator><creatorcontrib>Jakobson, G.</creatorcontrib><description>The paper proposes a conceptual framework and a method for assessing impact that cyber attacks might have to cyber assets, services, and missions. The paper describes the model of a cyber attack based on an extended conceptual graph. It introduces the notion of a cyber-terrain as a multilevel information structure containing assets and services, and their inter-dependencies. It also describes the model of a mission, and impact dependency graph that in a uniform way presents the dependencies between the cyber terrain and missions. The paper presents an algorithmic base how to calculate impacts that cyber attacks cause to the directly attacked assets, how the direct impacts propagate through the inter-asset, service, and mission dependencies and affect the operational capacity of ongoing missions.</description><identifier>ISBN: 9781457702679</identifier><identifier>ISBN: 1457702673</identifier><identifier>EISBN: 0982443838</identifier><identifier>EISBN: 9780982443828</identifier><identifier>EISBN: 098244382X</identifier><identifier>EISBN: 9780982443835</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer security ; cyber attack ; cyber situation ; cyber terrain ; Hardware ; impact dependency graph ; impact propagation ; IP networks ; mission ; Monitoring ; Network topology ; Software</subject><ispartof>14th International Conference on Information Fusion, 2011, p.1-8</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5977648$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5977648$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Jakobson, G.</creatorcontrib><title>Mission cyber security situation assessment using impact dependency graphs</title><title>14th International Conference on Information Fusion</title><addtitle>ICIF</addtitle><description>The paper proposes a conceptual framework and a method for assessing impact that cyber attacks might have to cyber assets, services, and missions. The paper describes the model of a cyber attack based on an extended conceptual graph. It introduces the notion of a cyber-terrain as a multilevel information structure containing assets and services, and their inter-dependencies. It also describes the model of a mission, and impact dependency graph that in a uniform way presents the dependencies between the cyber terrain and missions. The paper presents an algorithmic base how to calculate impacts that cyber attacks cause to the directly attacked assets, how the direct impacts propagate through the inter-asset, service, and mission dependencies and affect the operational capacity of ongoing missions.</description><subject>Computer security</subject><subject>cyber attack</subject><subject>cyber situation</subject><subject>cyber terrain</subject><subject>Hardware</subject><subject>impact dependency graph</subject><subject>impact propagation</subject><subject>IP networks</subject><subject>mission</subject><subject>Monitoring</subject><subject>Network topology</subject><subject>Software</subject><isbn>9781457702679</isbn><isbn>1457702673</isbn><isbn>0982443838</isbn><isbn>9780982443828</isbn><isbn>098244382X</isbn><isbn>9780982443835</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81KxDAURiMiqGOfwE1eoNDm794sZfCXGdzMfkiT2zFia-lNF317R_TbnMWBA9-FuG08KmM0arwUlQdsjQVolAN_LSrmz-Y857wycCPe9pk5f48yrh3Nkikucy6r5FyWUH5FYCbmgcYiF87jSeZhCrHIRBONica4ytMcpg--E1d9-GKq_rkRh6fHw_al3r0_v24fdnX2TakBvLddAgTqFCXTp2RRE3gdEilLttFRIZIOWoe2c-hi25tgvULT2fOtjbj_y2YiOk5zHsK8Hq0HcAb1Dzx5SbI</recordid><startdate>201107</startdate><enddate>201107</enddate><creator>Jakobson, G.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201107</creationdate><title>Mission cyber security situation assessment using impact dependency graphs</title><author>Jakobson, G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-77995bd787eb2ed4fdd583e793ade25e503c288e3a33a1b686c1f4a59284b5443</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computer security</topic><topic>cyber attack</topic><topic>cyber situation</topic><topic>cyber terrain</topic><topic>Hardware</topic><topic>impact dependency graph</topic><topic>impact propagation</topic><topic>IP networks</topic><topic>mission</topic><topic>Monitoring</topic><topic>Network topology</topic><topic>Software</topic><toplevel>online_resources</toplevel><creatorcontrib>Jakobson, G.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jakobson, G.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Mission cyber security situation assessment using impact dependency graphs</atitle><btitle>14th International Conference on Information Fusion</btitle><stitle>ICIF</stitle><date>2011-07</date><risdate>2011</risdate><spage>1</spage><epage>8</epage><pages>1-8</pages><isbn>9781457702679</isbn><isbn>1457702673</isbn><eisbn>0982443838</eisbn><eisbn>9780982443828</eisbn><eisbn>098244382X</eisbn><eisbn>9780982443835</eisbn><abstract>The paper proposes a conceptual framework and a method for assessing impact that cyber attacks might have to cyber assets, services, and missions. The paper describes the model of a cyber attack based on an extended conceptual graph. It introduces the notion of a cyber-terrain as a multilevel information structure containing assets and services, and their inter-dependencies. It also describes the model of a mission, and impact dependency graph that in a uniform way presents the dependencies between the cyber terrain and missions. The paper presents an algorithmic base how to calculate impacts that cyber attacks cause to the directly attacked assets, how the direct impacts propagate through the inter-asset, service, and mission dependencies and affect the operational capacity of ongoing missions.</abstract><pub>IEEE</pub><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781457702679
ispartof 14th International Conference on Information Fusion, 2011, p.1-8
issn
language eng
recordid cdi_ieee_primary_5977648
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Computer security
cyber attack
cyber situation
cyber terrain
Hardware
impact dependency graph
impact propagation
IP networks
mission
Monitoring
Network topology
Software
title Mission cyber security situation assessment using impact dependency graphs
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T16%3A50%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Mission%20cyber%20security%20situation%20assessment%20using%20impact%20dependency%20graphs&rft.btitle=14th%20International%20Conference%20on%20Information%20Fusion&rft.au=Jakobson,%20G.&rft.date=2011-07&rft.spage=1&rft.epage=8&rft.pages=1-8&rft.isbn=9781457702679&rft.isbn_list=1457702673&rft_id=info:doi/&rft_dat=%3Cieee_6IE%3E5977648%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=0982443838&rft.eisbn_list=9780982443828&rft.eisbn_list=098244382X&rft.eisbn_list=9780982443835&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5977648&rfr_iscdi=true