Skip to main content

Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion

  • Conference paper
  • First Online:
Book cover Mobile Internet Security (MobiSec 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 797))

Included in the following conference series:

Abstract

The paper suggests an approach to computer network resilience assessment under exposure of cyber attacks, based on analytical attack modeling using the method of stochastic networks transformations. The network resilience assessment methodology and main stages of the proposed method for analytical modeling of cyber attacks are studied. It is shown how the proposed method can be used to generate the reference analytical model of the computer attack. Experimental evaluation of the proposed method for analytical modeling of attacks and developed methodology for assessing resilience of the network under exposure of cyber attacks showed high adequacy of the obtained results and high efficiency of their calculation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Luvanda, A., Kimani, S., Kimwele, M.: Identifying threats associated with man-in-the middle attacks during communications between a mobile device and the back end server in mobile banking applications. IOSR J. Comput. Eng. (IOSR-JCI) 12(2), 35–42 (2014)

    Article  Google Scholar 

  2. Kelly, F., Yudovina, E.: Stochastic Networks, p. 230. Cambridge University Press, Cambridge (2014)

    Book  MATH  Google Scholar 

  3. Saenko, I., Lauta, O., Kotenko, I.: Analytical modeling of mobile banking attacks based on a stochastic network conversion technique. IT Converg. Pract. 4(4), 1–10 (2016)

    Google Scholar 

  4. OPNET Technologies. http://www.opnet.com/

  5. Ahuja, S.P.: COMNET III: a network simulation laboratory environment for a course in communications networks. In: Proceedings of the 28th Annual Frontiers in Education Conference (FIE 1998), vol. 3, pp. 1085–1088 (1998)

    Google Scholar 

  6. Kotenko, I., Chechulin, A.: A cyber attack modeling and impact assessment framework. In: Proceedings of the 5th IEEE International Conference on Cyber Conflict (CyCon), pp. 1–24 (2013)

    Google Scholar 

  7. Kotenko, I., Doynikova, E.: Evaluation of computer network security based on attack graphs and security event processing. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 5(3), 14–29 (2014)

    Google Scholar 

  8. Dudorov, D., Stupples, D., Newby, M.: Probability analysis of cyber attack paths against business and commercial enterprise systems. In: Proceedings of the 2013 European Intelligence and Security Informatics Conference, pp. 38–44 (2013)

    Google Scholar 

  9. Abraham, S., Nair, S.: A predictive framework for cyber security analytics using attack graphs. Int. J. Comput. Netw. Commun. (IJCNC) 7(1), 1–17 (2015)

    Google Scholar 

  10. Matlof, N.: From Algorithms to Z-Scores: Probabilistic and Statistical Modeling in Computer Science. http://heather.cs.ucdavis.edu/probstatbook

  11. Goldman, R.P.: A stochastic model for intrusions. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 199–218. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36084-0_11

    Chapter  Google Scholar 

  12. Zöhrer, M., Pernkopf, F.: General stochastic networks for classification. Adv. Neural. Inf. Process. Syst. 27, 2015–2023 (2014)

    Google Scholar 

  13. Bengio, Y., Thibodeau-Laufer, E., Alain, G., Yosinski, J.: Deep Generative Stochastic Networks Trainable by Backprop (2014). http://arxiv.org/abs/1306.1091

  14. Serfozo, R.F.: Introduction to Stochastic Networks. Applications of Mathematics, vol. 44. Springer, New York (1999). https://doi.org/10.1007/978-1-4612-1482-3

    Book  MATH  Google Scholar 

  15. Williams, J.: Laplace Transforms, Problem Solvers. George Allen & Unwin, London (1973)

    Google Scholar 

  16. Phillips, D.T., Garsia-Diaz, A.: Fundamentals of Network Analysis. Prentice-Hall, Englewood Cliffs (1981)

    MATH  Google Scholar 

  17. Petrova, S.S.: Heaviside and the development of the symbolic calculus. Arch. Hist. Exact Sci. 37(1), 1–23 (1987)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This research is being supported by the grants of the Russian Foundation of Basic Research (15-07-07451, 16-37-00338, 16-29-09482), partial support of budgetary subjects 0073-2015-0004 and 0073-2015-0007, and Grant 074-U01.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Igor Kotenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kotenko, I., Saenko, I., Lauta, O., Kocinyak, M. (2018). Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion. In: You, I., Leu, FY., Chen, HC., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2016. Communications in Computer and Information Science, vol 797. Springer, Singapore. https://doi.org/10.1007/978-981-10-7850-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7850-7_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7849-1

  • Online ISBN: 978-981-10-7850-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics