Systems Engineering最新文献

筛选
英文 中文
Impact of computer users on cyber defense strategies 计算机用户对网络防御战略的影响
Systems Engineering Pub Date : 2023-11-28 DOI: 10.1002/sys.21737
C. D. Colvett, Mikel D. Petty, J. Bland
{"title":"Impact of computer users on cyber defense strategies","authors":"C. D. Colvett, Mikel D. Petty, J. Bland","doi":"10.1002/sys.21737","DOIUrl":"https://doi.org/10.1002/sys.21737","url":null,"abstract":"Cybersecurity research often focuses primarily or exclusively on the interactions between the attacker, trying to exploit the computer system, and the defender, trying to protect it. However, including the computer users is important because the users’ requirements are the reason the computer system exists.An extension of the Petri net formalism, Petri Nets with Players, Strategies, and Costs (PNPSC) was used to model cyberattacks described in the MITRE Common Attack Pattern Enumeration and Classification database. PNPSC models include the attacker, defender, and computer user as “players” attempting to achieve competing goals. Each player can observe the current marking of a subset of the PNPSC net's places and change the stochastic firing rates of a subset of the net's transitions in order to achieve their goals. A mapping between the markings of a player's observable places and the desired firing rates of player's controllable transitions is the player's strategy.A reinforcement learning algorithm was integrated with PNPSC models of three cyberattack patterns to learn strategies for the defender in simulations both with and without a representation of the computer user. A simulation experiment showed that the defender's reward was lower and the defender's learned strategy was different when the user was represented. A second simulation experiment and statistical analysis confirmed that the differences were not due simply to randomness. With the user represented, the system defender must balance security against usability. This research provides a more complete cyberattack model and shows that user models are important in future cybersecurity simulation.","PeriodicalId":509213,"journal":{"name":"Systems Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139222807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A reliability evaluation method for complex systems based on the editable GSPN and adaptive Monte Carlo simulation 基于可编辑 GSPN 和自适应蒙特卡罗模拟的复杂系统可靠性评估方法
Systems Engineering Pub Date : 2023-11-20 DOI: 10.1002/sys.21736
Yining Zeng, Youchao Sun, Tao Xu, Siyu Su
{"title":"A reliability evaluation method for complex systems based on the editable GSPN and adaptive Monte Carlo simulation","authors":"Yining Zeng, Youchao Sun, Tao Xu, Siyu Su","doi":"10.1002/sys.21736","DOIUrl":"https://doi.org/10.1002/sys.21736","url":null,"abstract":"This paper presents an innovative EGSPN (Editable Generalized Stochastic Petri Net) model, optimizing the size of GSPN (Generalized Stochastic Petri Net) while preserving its core benefits. Specifically, the EGSPN introduces a transition termed “editable transition,” which allows for the establishment of any dynamic logic, thereby circumventing the intricacies associated with the EGSPN model structure. A Monte Carlo (MC) simulation technique is put forth for EGSPN analysis, enhanced by the integration of Sobol sequences with a Bayesian optimizer. This MC simulation approach, unbounded by any specific distribution constraints, exhibits accelerated convergence rates. To address the issue of preset sampling size, an adaptive sampling strategy rooted in confidence intervals has been proposed. By real‐time computation of margin of errors under varying confidence levels, simulations can be halted prior to reaching the preset sampling size. This method strikes a balance between reduced simulation time and maintained accuracy. The applicability and efficacy of the proposed method are further elucidated through a numerical example of a flight control system.","PeriodicalId":509213,"journal":{"name":"Systems Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139255310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信