The new cyberattack pattern of advanced persistent threat (APT) has posed a serious threat to modern society. This paper addresses the APT defense problem, that is, the problem of how to effectively defend against an APT campaign. Based on a novel APT attack-defense model, the effectiveness of an APT defense strategy is quantified. Thereby, the APT defense problem is modeled as an optimal control problem, in which an optimal control stands for a most effective APT defense strategy. The existence of an optimal control is proved, and an optimality system is derived. Consequently, an optimal control can be figured out by solving the optimality system. Some examples of the optimal control are given. Finally, the influence of some factors on the...
In this paper, we present a novel representation for cyber-physical systems wherein the states of th...
Mission critical systems are prevalent in the military and industry which renders them attractive as...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
IEEE Advanced persistent threat (APT) for cyber espionage poses a great threat to modern organizatio...
Advanced persistent threat (APT) is a kind of stealthy, sophisticated, and long-term cyberattack tha...
Abstract. Active cyber defense is one important defensive method for combating cyber attacks. Unlike...
© 2005-2012 IEEE. Advanced persistent threat (APT) is a new kind of cyberattack that poses a serious...
Since the number of compromised computers, or botnet, continues to grow, the cyber security problem ...
Industrial Control Systems (ICS) play a critical role in controlling industrial processes. Wide use ...
Industrial Control Systems (ICS) play a critical role in controlling industrial processes. Wide use ...
With the increasing connectivity among computational cyber-connected elements and physical entities,...
Disruptive computer viruses have inflicted huge economic losses. This paper addresses the developmen...
Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all th...
The expansion of information technology infrastructure is encountered with Advanced Persistent Threa...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
In this paper, we present a novel representation for cyber-physical systems wherein the states of th...
Mission critical systems are prevalent in the military and industry which renders them attractive as...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
IEEE Advanced persistent threat (APT) for cyber espionage poses a great threat to modern organizatio...
Advanced persistent threat (APT) is a kind of stealthy, sophisticated, and long-term cyberattack tha...
Abstract. Active cyber defense is one important defensive method for combating cyber attacks. Unlike...
© 2005-2012 IEEE. Advanced persistent threat (APT) is a new kind of cyberattack that poses a serious...
Since the number of compromised computers, or botnet, continues to grow, the cyber security problem ...
Industrial Control Systems (ICS) play a critical role in controlling industrial processes. Wide use ...
Industrial Control Systems (ICS) play a critical role in controlling industrial processes. Wide use ...
With the increasing connectivity among computational cyber-connected elements and physical entities,...
Disruptive computer viruses have inflicted huge economic losses. This paper addresses the developmen...
Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all th...
The expansion of information technology infrastructure is encountered with Advanced Persistent Threa...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
In this paper, we present a novel representation for cyber-physical systems wherein the states of th...
Mission critical systems are prevalent in the military and industry which renders them attractive as...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...