Javascript must be enabled to continue!
Cyber defense in breadth: Modeling and analysis of integrated defense systems
View through CrossRef
Cybersecurity is one of most critical concerns for any organization, as frequency and severity of cyber attacks constantly increase, resulting in loss of vital assets and/or services. To preserve key security goals such as confidentiality, integrity, and availability, a variety of defense techniques have been introduced. While intrusion detection system (IDS) has played a key role in cybersecurity for a long time, recently new proactive defense techniques, called intrusion prevention techniques, have emerged, aiming to resolve the known IDS limitations. The intrusion prevention techniques have been introduced to control actions of attackers as a proactive defense that can be deployed independently or combined with other defense techniques that have the purpose of achieving “Defense in Breadth.” In this work, we develop a probability model using Stochastic Petri Nets that describes an integrated defense system with the defense techniques of both intrusion detection (i.e., IDS) and intrusion prevention (i.e., honeypots and platform migration) and analyze its performance compared to single defense or partially integrated defense approaches. Our result shows that the integrated defense system outperforms the compared approaches by minimizing attack success while maximizing system lifetime (i.e., mean time to security failure). Further, we investigate the effect of the interplay between different defense techniques in terms of the defense cost and attack cost.
Title: Cyber defense in breadth: Modeling and analysis of integrated defense systems
Description:
Cybersecurity is one of most critical concerns for any organization, as frequency and severity of cyber attacks constantly increase, resulting in loss of vital assets and/or services.
To preserve key security goals such as confidentiality, integrity, and availability, a variety of defense techniques have been introduced.
While intrusion detection system (IDS) has played a key role in cybersecurity for a long time, recently new proactive defense techniques, called intrusion prevention techniques, have emerged, aiming to resolve the known IDS limitations.
The intrusion prevention techniques have been introduced to control actions of attackers as a proactive defense that can be deployed independently or combined with other defense techniques that have the purpose of achieving “Defense in Breadth.
” In this work, we develop a probability model using Stochastic Petri Nets that describes an integrated defense system with the defense techniques of both intrusion detection (i.
e.
, IDS) and intrusion prevention (i.
e.
, honeypots and platform migration) and analyze its performance compared to single defense or partially integrated defense approaches.
Our result shows that the integrated defense system outperforms the compared approaches by minimizing attack success while maximizing system lifetime (i.
e.
, mean time to security failure).
Further, we investigate the effect of the interplay between different defense techniques in terms of the defense cost and attack cost.
Related Results
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract
Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
Cyber-attack and defense simulation framework
Cyber-attack and defense simulation framework
Various papers on cyberwarfare in virtual environments and cybersecurity in intelligent systems have been published. Work has focused on the integration of cyberwarfare communicati...
The challenges of cybersecurity insurance development: The case of Latvia
The challenges of cybersecurity insurance development: The case of Latvia
Purpose. This paper aims to provide an overview of the current challenges of cybersecurity insurance, focusing on the identification of development constraints and opportunities an...
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Abstract
Cyber-Manufacturing Systems (CMS) are vulnerable to cyber-manufacturing attacks ironically because of its very beneficial advance: seamless integration with...
Digital Diplomacy and Cyber Defence
Digital Diplomacy and Cyber Defence
Abstract
Having emerged only two decades ago, the field of digital diplomacy and cyber defence is new relative to other aspects of statecraft. Governments did not pr...
A Survey on Immersive Cyber Situational Awareness Systems
A Survey on Immersive Cyber Situational Awareness Systems
Cyber situational awareness systems are increasingly used for creating cyber common operating pictures for cybersecurity analysis and education. However, these systems face data oc...

