Mission cyber security situation assessment using impact dependency graphs
The paper proposes a conceptual framework and a method for assessing impact that cyber attacks might have to cyber assets, services, and missions. The paper describes the model of a cyber attack based on an extended conceptual graph. It introduces the notion of a cyber-terrain as a multilevel inform...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 8 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Jakobson, G. |
description | The paper proposes a conceptual framework and a method for assessing impact that cyber attacks might have to cyber assets, services, and missions. The paper describes the model of a cyber attack based on an extended conceptual graph. It introduces the notion of a cyber-terrain as a multilevel information structure containing assets and services, and their inter-dependencies. It also describes the model of a mission, and impact dependency graph that in a uniform way presents the dependencies between the cyber terrain and missions. The paper presents an algorithmic base how to calculate impacts that cyber attacks cause to the directly attacked assets, how the direct impacts propagate through the inter-asset, service, and mission dependencies and affect the operational capacity of ongoing missions. |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5977648</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5977648</ieee_id><sourcerecordid>5977648</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-77995bd787eb2ed4fdd583e793ade25e503c288e3a33a1b686c1f4a59284b5443</originalsourceid><addsrcrecordid>eNotj81KxDAURiMiqGOfwE1eoNDm794sZfCXGdzMfkiT2zFia-lNF317R_TbnMWBA9-FuG08KmM0arwUlQdsjQVolAN_LSrmz-Y857wycCPe9pk5f48yrh3Nkikucy6r5FyWUH5FYCbmgcYiF87jSeZhCrHIRBONica4ytMcpg--E1d9-GKq_rkRh6fHw_al3r0_v24fdnX2TakBvLddAgTqFCXTp2RRE3gdEilLttFRIZIOWoe2c-hi25tgvULT2fOtjbj_y2YiOk5zHsK8Hq0HcAb1Dzx5SbI</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Mission cyber security situation assessment using impact dependency graphs</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Jakobson, G.</creator><creatorcontrib>Jakobson, G.</creatorcontrib><description>The paper proposes a conceptual framework and a method for assessing impact that cyber attacks might have to cyber assets, services, and missions. The paper describes the model of a cyber attack based on an extended conceptual graph. It introduces the notion of a cyber-terrain as a multilevel information structure containing assets and services, and their inter-dependencies. It also describes the model of a mission, and impact dependency graph that in a uniform way presents the dependencies between the cyber terrain and missions. The paper presents an algorithmic base how to calculate impacts that cyber attacks cause to the directly attacked assets, how the direct impacts propagate through the inter-asset, service, and mission dependencies and affect the operational capacity of ongoing missions.</description><identifier>ISBN: 9781457702679</identifier><identifier>ISBN: 1457702673</identifier><identifier>EISBN: 0982443838</identifier><identifier>EISBN: 9780982443828</identifier><identifier>EISBN: 098244382X</identifier><identifier>EISBN: 9780982443835</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer security ; cyber attack ; cyber situation ; cyber terrain ; Hardware ; impact dependency graph ; impact propagation ; IP networks ; mission ; Monitoring ; Network topology ; Software</subject><ispartof>14th International Conference on Information Fusion, 2011, p.1-8</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5977648$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5977648$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Jakobson, G.</creatorcontrib><title>Mission cyber security situation assessment using impact dependency graphs</title><title>14th International Conference on Information Fusion</title><addtitle>ICIF</addtitle><description>The paper proposes a conceptual framework and a method for assessing impact that cyber attacks might have to cyber assets, services, and missions. The paper describes the model of a cyber attack based on an extended conceptual graph. It introduces the notion of a cyber-terrain as a multilevel information structure containing assets and services, and their inter-dependencies. It also describes the model of a mission, and impact dependency graph that in a uniform way presents the dependencies between the cyber terrain and missions. The paper presents an algorithmic base how to calculate impacts that cyber attacks cause to the directly attacked assets, how the direct impacts propagate through the inter-asset, service, and mission dependencies and affect the operational capacity of ongoing missions.</description><subject>Computer security</subject><subject>cyber attack</subject><subject>cyber situation</subject><subject>cyber terrain</subject><subject>Hardware</subject><subject>impact dependency graph</subject><subject>impact propagation</subject><subject>IP networks</subject><subject>mission</subject><subject>Monitoring</subject><subject>Network topology</subject><subject>Software</subject><isbn>9781457702679</isbn><isbn>1457702673</isbn><isbn>0982443838</isbn><isbn>9780982443828</isbn><isbn>098244382X</isbn><isbn>9780982443835</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81KxDAURiMiqGOfwE1eoNDm794sZfCXGdzMfkiT2zFia-lNF317R_TbnMWBA9-FuG08KmM0arwUlQdsjQVolAN_LSrmz-Y857wycCPe9pk5f48yrh3Nkikucy6r5FyWUH5FYCbmgcYiF87jSeZhCrHIRBONica4ytMcpg--E1d9-GKq_rkRh6fHw_al3r0_v24fdnX2TakBvLddAgTqFCXTp2RRE3gdEilLttFRIZIOWoe2c-hi25tgvULT2fOtjbj_y2YiOk5zHsK8Hq0HcAb1Dzx5SbI</recordid><startdate>201107</startdate><enddate>201107</enddate><creator>Jakobson, G.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201107</creationdate><title>Mission cyber security situation assessment using impact dependency graphs</title><author>Jakobson, G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-77995bd787eb2ed4fdd583e793ade25e503c288e3a33a1b686c1f4a59284b5443</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computer security</topic><topic>cyber attack</topic><topic>cyber situation</topic><topic>cyber terrain</topic><topic>Hardware</topic><topic>impact dependency graph</topic><topic>impact propagation</topic><topic>IP networks</topic><topic>mission</topic><topic>Monitoring</topic><topic>Network topology</topic><topic>Software</topic><toplevel>online_resources</toplevel><creatorcontrib>Jakobson, G.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jakobson, G.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Mission cyber security situation assessment using impact dependency graphs</atitle><btitle>14th International Conference on Information Fusion</btitle><stitle>ICIF</stitle><date>2011-07</date><risdate>2011</risdate><spage>1</spage><epage>8</epage><pages>1-8</pages><isbn>9781457702679</isbn><isbn>1457702673</isbn><eisbn>0982443838</eisbn><eisbn>9780982443828</eisbn><eisbn>098244382X</eisbn><eisbn>9780982443835</eisbn><abstract>The paper proposes a conceptual framework and a method for assessing impact that cyber attacks might have to cyber assets, services, and missions. The paper describes the model of a cyber attack based on an extended conceptual graph. It introduces the notion of a cyber-terrain as a multilevel information structure containing assets and services, and their inter-dependencies. It also describes the model of a mission, and impact dependency graph that in a uniform way presents the dependencies between the cyber terrain and missions. The paper presents an algorithmic base how to calculate impacts that cyber attacks cause to the directly attacked assets, how the direct impacts propagate through the inter-asset, service, and mission dependencies and affect the operational capacity of ongoing missions.</abstract><pub>IEEE</pub><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781457702679 |
ispartof | 14th International Conference on Information Fusion, 2011, p.1-8 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5977648 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Computer security cyber attack cyber situation cyber terrain Hardware impact dependency graph impact propagation IP networks mission Monitoring Network topology Software |
title | Mission cyber security situation assessment using impact dependency graphs |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T16%3A50%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Mission%20cyber%20security%20situation%20assessment%20using%20impact%20dependency%20graphs&rft.btitle=14th%20International%20Conference%20on%20Information%20Fusion&rft.au=Jakobson,%20G.&rft.date=2011-07&rft.spage=1&rft.epage=8&rft.pages=1-8&rft.isbn=9781457702679&rft.isbn_list=1457702673&rft_id=info:doi/&rft_dat=%3Cieee_6IE%3E5977648%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=0982443838&rft.eisbn_list=9780982443828&rft.eisbn_list=098244382X&rft.eisbn_list=9780982443835&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5977648&rfr_iscdi=true |