The losses arising from a system being hit by cyber attacks can be staggeringly high, but defending against such attacks can also be costly. This work proposes an attack countermeasure selection approach based on cost impact analysis that takes into account the impacts of actions by both the attacker and the defender. We consider a networked system providing services whose functionality depends on other components in the network. We model the costs and losses to service availability from compromises and defensive actions to the components, and show that while containment of the attack can be an effective defense, it may be more cost-efficient to allow parts of the attack to continue further whilst focusing on recovering services to a functi...
This paper gives an analytical method to determine the economic and indirect implications of denial ...
A model of malicious attacks against an infrastructure system is developed that uses a network repre...
Survivability refers to the capability of a system to ful ll its mission, in a timely manner, in the...
We investigate the extent to which redundancy (including with diversity) can help mitigate the impac...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
Cyber-attacks cost businesses millions of dollars every year, a key component of which is the cost o...
International audienceWe propose a mitigation model that evaluates individual and combined counterme...
The increasing amount of network-based attacks evolved to one of the top concerns responsible for ne...
Network services are becoming larger and increasingly complex to manage. It is extremely critical to...
Abstract Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem and ...
When intelligent threats attack a system, they rarely achieve their goals by exploiting a single vul...
Systems and attacks are becoming more complex, and classical cyber security methods are failing to p...
the date of receipt and acceptance should be inserted later Abstract Researchers have previously loo...
Since the 9/11 terrorist attacks, the effective and efficient protection of critical information inf...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
This paper gives an analytical method to determine the economic and indirect implications of denial ...
A model of malicious attacks against an infrastructure system is developed that uses a network repre...
Survivability refers to the capability of a system to ful ll its mission, in a timely manner, in the...
We investigate the extent to which redundancy (including with diversity) can help mitigate the impac...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
Cyber-attacks cost businesses millions of dollars every year, a key component of which is the cost o...
International audienceWe propose a mitigation model that evaluates individual and combined counterme...
The increasing amount of network-based attacks evolved to one of the top concerns responsible for ne...
Network services are becoming larger and increasingly complex to manage. It is extremely critical to...
Abstract Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem and ...
When intelligent threats attack a system, they rarely achieve their goals by exploiting a single vul...
Systems and attacks are becoming more complex, and classical cyber security methods are failing to p...
the date of receipt and acceptance should be inserted later Abstract Researchers have previously loo...
Since the 9/11 terrorist attacks, the effective and efficient protection of critical information inf...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
This paper gives an analytical method to determine the economic and indirect implications of denial ...
A model of malicious attacks against an infrastructure system is developed that uses a network repre...
Survivability refers to the capability of a system to ful ll its mission, in a timely manner, in the...