The Structure of Rooted Weighted Trees Modeling Layered Cyber-security Systems

نویسندگان

  • Geir Agnarsson
  • Raymond Greenlaw
  • Sanpawat Kantabutra
چکیده

In this paper we consider the structure and topology of a layered-security model in which the containers and their nestings are given in the form of a rooted tree T . A cyber-security model is an ordered three-tuple M = (T,C, P ) where C and P are multisets of penetration costs for the containers and targetacquisition values for the prizes that are located within the containers, respectively, both of the same cardinality as the set of the non-root vertices of T . The problem that we study is to assign the penetration costs to the edges and the target-acquisition values to the vertices of the tree T in such a way that minimizes the total prize that an attacker can acquire given a limited budget. The attacker breaks into containers starting at the root of T and once a vertex has been broken into, its children can be broken into by paying the associated penetration costs. The attacker must deduct the corresponding penetration cost from the budget, as each new container is broken into. For a given assignment of costs and target values we obtain a security system. We show that in general it is not possible to develop an optimal security system for a given cyber-security model M . We define Pand C-models where the penetration costs and prizes, respectively, all have unit value. We show that if T is a rooted tree such that any Por C-model M = (T,C, P ) has an optimal security system, then T is one of the following types: (i) a rooted path, (ii) a rooted star, (iii) a rooted 3-caterpillar, or (iv) a rooted 4-spider. Conversely, if T is one of these four types of trees, then we show that any Por C-model M = (T,C, P ) does have an optimal security system. Finally, we study a duality between Pand C-models that allows us to translate results for P-models into corresponding results for C-models and vice versa. The results obtained give us some mathematical insights into how layered-security defenses should be organized.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The structure and topology of rooted weighted trees modeling layered cyber-security systems

In this paper we consider a layered-security model in which the containers and their nestings are given in the form of a rooted tree T . A cyber-security model is an ordered three-tuple M = (T,C, P ) where C and P are multisets of penetration costs for the containers and targetacquisition values for the prizes that are located within the containers, respectively, both of the same cardinality as...

متن کامل

The complexity of cyber attacks in a new layered-security model and the maximum-weight, rooted-subtree problem

This paper makes three contributions to cyber-security research. First, we define a model for cyber-security systems and the concept of a cyber-security attack within the model’s framework. The model highlights the importance of game-over components—critical system components which if acquired will give an adversary the ability to defeat a system completely. The model is based on systems that u...

متن کامل

On Cyber Attacks and the Maximum-Weight Rooted-Subtree Problem

This paper makes three contributions to cyber-security research. First, we define a model for cyber-security systems and the concept of a cyber-security attack within the model’s framework. The model highlights the importance of game-over components—critical system components which if acquired will give an adversary the ability to defeat a system completely. The model is based on systems that u...

متن کامل

Modeling and Analysis of Safety-Critical Cyber Physical Systems using State/Event Fault Trees

Modern cyber physical systems (CPSs) are becoming more and more vulnerable to security related attacks, due to the growing number of interconnectivity and standardized communication channels. This evolution make the traditional approaches considering the safety and security domains as two disjunctive areas obsolete. In this paper we propose state/event fault tree for modeling and analyzing the ...

متن کامل

A multi-layered and kill-chain based security analysis framework for cyber-physical systems

This paper introduces a novel framework for understanding cyber attacks and the related risks to cyber-physical systems. The framework consists of two elements, a three-layered logical model and reference architecture for cyber-physical systems, and a meta-model of cyber-physical system attacks that is referred to as the cyber-physical system kill-chain. The layered reference architecture provi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Acta Cybern.

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2016