Cyber risk and vulnerability estimation

IF 1 Q3 ENGINEERING, MULTIDISCIPLINARY
H. Çam
{"title":"Cyber risk and vulnerability estimation","authors":"H. Çam","doi":"10.1177/15485129211070058","DOIUrl":null,"url":null,"abstract":"Recent strides in cyber operations, including description of the threat lifecycle, and component threat models, are currently limited only by the ability to estimate current system state, in terms of vulnerability and subsequent risk. Therefore, it is highly desirable to lay down a testable, repeatable, set of rules, policies, machine learning (ML) and artificial intelligence techniques for modeling and estimating cyber risk, vulnerabilities, and exploits in systems and networks. Recent improvements in learning models, deep learning, and big data analytics have the potential to capture the relationships among the security features and adversary activities to enhance cybersecurity defense and estimation of risk and vulnerabilities. This special issue is composed of six papers that provide insight into cyber risk and vulnerability from various perspectives, including modeling a cybersecurity environment, leveraging ML capabilities, assessing cybersecurity attacks and vulnerabilities, optimizing limited resources of cybersecurity security operation centers, and agent-based target evaluation in an air defense simulation environment. The paper by Dasari, Im, and Geerhart presents an approach to accomplishing mission computation goals and resource requirements for the time-sensitive data processing tasks in tactical computing platforms that are mostly mobile, with limited computing and communication resources. To optimize the computation platforms and algorithms for the mission requirements such as performing computation in mission time, the paper describes a socalled mission class with deterministic polynomial time complexity, wherein the computations must complete in mission time within an environment with limited resources. The paper also investigates feasible models that can minimize energy and maximize memory, efficiency, and computational power. The paper by Shah, Farris, Ganesan, and Jajodia investigates various optimization methods of vulnerability selection against some constraints (e.g., personnel-hour allocations, as well as vulnerability age, severity, and persistence score requirements) of Cyber-Security Operations Centers. The paper presents two different mathematical models and approaches to vulnerability selection for mitigation with either single attribute value selection or multiple attribute value selection in decision-making process. The empirical results indicate that the multiple attribute value optimization policy performs better in satisfying all vulnerability attribute requirements. The paper by Werth, Griffith, Hairston, and Morris focuses on the development of a virtual, modular testbed to provide a high-fidelity model of the cyber and physical components of a networked generator system. A highfidelity model of the generator was included to allow the evaluation of more types of threat models. Supply chain attacks with simulated hardware and software trojans are examined in case studies. The proposed testbed provides an opportunity for researchers to implement and observe the effects of cybersecurity attacks without inflicting damage on actual costly systems. The paper by Krall, Kuhl, and Yang investigates estimation of cyber network risk by providing a rare event simulation modeling and analysis technique, namely, importance sampling for cyber networks, that parametrically amplifies certain aspects of the network to enable a rare event to happen more frequently. The investigation has applied a tailored importance sampling methodology to a security framework, which is capable of analytically comparing network configurations against each other. The simulation modeling approach considers attacker behavior and attack progression through the network, including the selection of target machines, vulnerabilities, and likelihood of attack success, along with the estimate of network risk. The paper by Dasgupta, Akhtar, and Sen provides a comprehensive survey of the analysis on ML vulnerability issues, security breaches, and their corresponding defensive techniques in cybersecurity, where ML algorithms are vulnerable to attacks in the training and testing phases. This survey of ML in cybersecurity describes the basics of","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"46 1","pages":"3 - 4"},"PeriodicalIF":1.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1177/15485129211070058","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

Abstract

Recent strides in cyber operations, including description of the threat lifecycle, and component threat models, are currently limited only by the ability to estimate current system state, in terms of vulnerability and subsequent risk. Therefore, it is highly desirable to lay down a testable, repeatable, set of rules, policies, machine learning (ML) and artificial intelligence techniques for modeling and estimating cyber risk, vulnerabilities, and exploits in systems and networks. Recent improvements in learning models, deep learning, and big data analytics have the potential to capture the relationships among the security features and adversary activities to enhance cybersecurity defense and estimation of risk and vulnerabilities. This special issue is composed of six papers that provide insight into cyber risk and vulnerability from various perspectives, including modeling a cybersecurity environment, leveraging ML capabilities, assessing cybersecurity attacks and vulnerabilities, optimizing limited resources of cybersecurity security operation centers, and agent-based target evaluation in an air defense simulation environment. The paper by Dasari, Im, and Geerhart presents an approach to accomplishing mission computation goals and resource requirements for the time-sensitive data processing tasks in tactical computing platforms that are mostly mobile, with limited computing and communication resources. To optimize the computation platforms and algorithms for the mission requirements such as performing computation in mission time, the paper describes a socalled mission class with deterministic polynomial time complexity, wherein the computations must complete in mission time within an environment with limited resources. The paper also investigates feasible models that can minimize energy and maximize memory, efficiency, and computational power. The paper by Shah, Farris, Ganesan, and Jajodia investigates various optimization methods of vulnerability selection against some constraints (e.g., personnel-hour allocations, as well as vulnerability age, severity, and persistence score requirements) of Cyber-Security Operations Centers. The paper presents two different mathematical models and approaches to vulnerability selection for mitigation with either single attribute value selection or multiple attribute value selection in decision-making process. The empirical results indicate that the multiple attribute value optimization policy performs better in satisfying all vulnerability attribute requirements. The paper by Werth, Griffith, Hairston, and Morris focuses on the development of a virtual, modular testbed to provide a high-fidelity model of the cyber and physical components of a networked generator system. A highfidelity model of the generator was included to allow the evaluation of more types of threat models. Supply chain attacks with simulated hardware and software trojans are examined in case studies. The proposed testbed provides an opportunity for researchers to implement and observe the effects of cybersecurity attacks without inflicting damage on actual costly systems. The paper by Krall, Kuhl, and Yang investigates estimation of cyber network risk by providing a rare event simulation modeling and analysis technique, namely, importance sampling for cyber networks, that parametrically amplifies certain aspects of the network to enable a rare event to happen more frequently. The investigation has applied a tailored importance sampling methodology to a security framework, which is capable of analytically comparing network configurations against each other. The simulation modeling approach considers attacker behavior and attack progression through the network, including the selection of target machines, vulnerabilities, and likelihood of attack success, along with the estimate of network risk. The paper by Dasgupta, Akhtar, and Sen provides a comprehensive survey of the analysis on ML vulnerability issues, security breaches, and their corresponding defensive techniques in cybersecurity, where ML algorithms are vulnerable to attacks in the training and testing phases. This survey of ML in cybersecurity describes the basics of
网络风险和脆弱性评估
网络操作的最新进展,包括对威胁生命周期的描述和组件威胁模型,目前仅受限于评估当前系统状态的能力,即脆弱性和后续风险。因此,非常需要制定一套可测试、可重复的规则、策略、机器学习(ML)和人工智能技术,用于建模和评估系统和网络中的网络风险、漏洞和利用。最近在学习模型、深度学习和大数据分析方面的改进有可能捕捉安全特征和对手活动之间的关系,以增强网络安全防御和风险和漏洞的评估。本期特刊由六篇论文组成,从不同的角度提供了对网络风险和漏洞的洞察,包括网络安全环境建模,利用机器学习功能,评估网络安全攻击和漏洞,优化网络安全运营中心的有限资源,以及防空模拟环境中基于代理的目标评估。Dasari, Im和Geerhart的论文提出了一种在战术计算平台中完成任务计算目标和时间敏感数据处理任务的资源需求的方法,战术计算平台主要是移动的,计算和通信资源有限。为了优化计算平台和算法,满足在任务时间内进行计算等任务需求,本文描述了一种具有确定性多项式时间复杂度的任务类,即在有限资源的环境下,必须在任务时间内完成计算。本文还研究了可以最小化能量和最大化内存,效率和计算能力的可行模型。Shah, Farris, Ganesan和Jajodia的论文研究了针对网络安全运营中心的一些约束条件(如人员小时分配、漏洞年龄、严重性和持久性评分要求)的各种漏洞选择优化方法。本文提出了决策过程中单属性值选择和多属性值选择两种不同的脆弱性选择数学模型和方法。实证结果表明,多属性值优化策略能更好地满足所有漏洞属性需求。这篇由Werth、Griffith、Hairston和Morris撰写的论文主要关注虚拟模块化测试平台的开发,以提供网络发电机系统的网络和物理组件的高保真模型。该生成器包含了一个高保真模型,以便对更多类型的威胁模型进行评估。供应链攻击与模拟硬件和软件木马进行了案例研究。提出的测试平台为研究人员提供了一个机会,可以在不损害实际昂贵系统的情况下实施和观察网络安全攻击的影响。Krall、Kuhl和Yang的论文通过提供一种罕见事件模拟建模和分析技术(即网络的重要性抽样)来研究网络风险的估计,该技术参数化地放大了网络的某些方面,使罕见事件更频繁地发生。该调查已将定制的重要性抽样方法应用于安全框架,该框架能够对网络配置进行分析比较。仿真建模方法考虑攻击者的行为和通过网络的攻击进程,包括目标机器的选择、漏洞和攻击成功的可能性,以及对网络风险的估计。Dasgupta, Akhtar和Sen的论文提供了对ML漏洞问题,安全漏洞及其相应的网络安全防御技术的分析的全面调查,其中ML算法在训练和测试阶段容易受到攻击。这个关于网络安全中的机器学习的调查描述了基本的
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
2.80
自引率
12.50%
发文量
40
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信