Abstract
The paper suggests an approach to computer network resilience assessment under exposure of cyber attacks, based on analytical attack modeling using the method of stochastic networks transformations. The network resilience assessment methodology and main stages of the proposed method for analytical modeling of cyber attacks are studied. It is shown how the proposed method can be used to generate the reference analytical model of the computer attack. Experimental evaluation of the proposed method for analytical modeling of attacks and developed methodology for assessing resilience of the network under exposure of cyber attacks showed high adequacy of the obtained results and high efficiency of their calculation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Luvanda, A., Kimani, S., Kimwele, M.: Identifying threats associated with man-in-the middle attacks during communications between a mobile device and the back end server in mobile banking applications. IOSR J. Comput. Eng. (IOSR-JCI) 12(2), 35–42 (2014)
Kelly, F., Yudovina, E.: Stochastic Networks, p. 230. Cambridge University Press, Cambridge (2014)
Saenko, I., Lauta, O., Kotenko, I.: Analytical modeling of mobile banking attacks based on a stochastic network conversion technique. IT Converg. Pract. 4(4), 1–10 (2016)
OPNET Technologies. http://www.opnet.com/
Ahuja, S.P.: COMNET III: a network simulation laboratory environment for a course in communications networks. In: Proceedings of the 28th Annual Frontiers in Education Conference (FIE 1998), vol. 3, pp. 1085–1088 (1998)
Kotenko, I., Chechulin, A.: A cyber attack modeling and impact assessment framework. In: Proceedings of the 5th IEEE International Conference on Cyber Conflict (CyCon), pp. 1–24 (2013)
Kotenko, I., Doynikova, E.: Evaluation of computer network security based on attack graphs and security event processing. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 5(3), 14–29 (2014)
Dudorov, D., Stupples, D., Newby, M.: Probability analysis of cyber attack paths against business and commercial enterprise systems. In: Proceedings of the 2013 European Intelligence and Security Informatics Conference, pp. 38–44 (2013)
Abraham, S., Nair, S.: A predictive framework for cyber security analytics using attack graphs. Int. J. Comput. Netw. Commun. (IJCNC) 7(1), 1–17 (2015)
Matlof, N.: From Algorithms to Z-Scores: Probabilistic and Statistical Modeling in Computer Science. http://heather.cs.ucdavis.edu/probstatbook
Goldman, R.P.: A stochastic model for intrusions. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 199–218. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36084-0_11
Zöhrer, M., Pernkopf, F.: General stochastic networks for classification. Adv. Neural. Inf. Process. Syst. 27, 2015–2023 (2014)
Bengio, Y., Thibodeau-Laufer, E., Alain, G., Yosinski, J.: Deep Generative Stochastic Networks Trainable by Backprop (2014). http://arxiv.org/abs/1306.1091
Serfozo, R.F.: Introduction to Stochastic Networks. Applications of Mathematics, vol. 44. Springer, New York (1999). https://doi.org/10.1007/978-1-4612-1482-3
Williams, J.: Laplace Transforms, Problem Solvers. George Allen & Unwin, London (1973)
Phillips, D.T., Garsia-Diaz, A.: Fundamentals of Network Analysis. Prentice-Hall, Englewood Cliffs (1981)
Petrova, S.S.: Heaviside and the development of the symbolic calculus. Arch. Hist. Exact Sci. 37(1), 1–23 (1987)
Acknowledgements
This research is being supported by the grants of the Russian Foundation of Basic Research (15-07-07451, 16-37-00338, 16-29-09482), partial support of budgetary subjects 0073-2015-0004 and 0073-2015-0007, and Grant 074-U01.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kotenko, I., Saenko, I., Lauta, O., Kocinyak, M. (2018). Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion. In: You, I., Leu, FY., Chen, HC., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2016. Communications in Computer and Information Science, vol 797. Springer, Singapore. https://doi.org/10.1007/978-981-10-7850-7_10
Download citation
DOI: https://doi.org/10.1007/978-981-10-7850-7_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7849-1
Online ISBN: 978-981-10-7850-7
eBook Packages: Computer ScienceComputer Science (R0)