Flow-Graph and Markovian Methods for Cyber Security Analysis

Flow-Graph and Markovian Methods for Cyber Security Analysis

Kouroush Jenab, Sam Khoury, Kim LaFevor
Copyright: © 2016 |Pages: 26
DOI: 10.4018/IJEIS.2016010104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated. This paper reports analytical approaches to analyze time to security threats and probability of security threat occurrence. Considering embedded threat detection functions in a safe-guard unit, the proposed approaches use the flow-graph concept, and Markovian method to calculate time to security threat occurrence and its probability. The threat detection functions are featured by incident detection and recovery mechanisms. The results of this study can be used by all parties (public and private sector organizations, service providers, IT, and insurance companies) to better deal with cyber security issues with respect to utilizing technology, investment, and insurance. An illustrative example is demonstrated to present the application of the approach.
Article Preview
Top

1. Introduction

The term “cyber security” refers to three things: 1) a set of activities and other measures, technical and non-technical, intended to protect computers, computer networks, related hardware devices and software, and the information they contain and communicate, including software and data, as well as other elements of cyberspace, from all threats, including threats to national security, 2) the degree of protection resulting from the application of these activities and measures, and 3) the associated field of professional endeavor, including research and analysis, aimed at implementing those activities and improving their quality. Cyber security problems exist in Grid/Power System/Distribution, Networks/Telecom, Computers, Organizations, Information Systems, Industrial Controls, Transportation, Energy, and Healthcare Systems.

In industrial cyber security, the security risk is a function of both the Likelihood of Successful Attack (LAS) against an asset and the Consequence (C) of such an attack. The consequence of a security threat can be classified as financial losses, acute health effects, or environmental impacts. Estimating the LAS is far more difficult. It is a function of three additional variables:

  • Threat (T): Any indication, circumstance, or event with the potential to cause the loss of or damage to an asset.

  • Vulnerabilities (V): Any weakness that can be exploited by an adversary to gain access to an asset.

  • Target Attractiveness (AT): An estimate of the value of a target to an adversary.

These aforementioned terms are more difficult to estimate, particularly with respect to cyber security. In detail, threats to cyber security include the following aspects resulting from data hierarchy as data is transformed into security situation awareness (Figure 1):

Figure 1.

Security situation awareness

IJEIS.2016010104.f01
  • Malware attack with Social Engineering Tactics

  • SPAM

  • Denial of Service (DoS)

  • Phishing and Pharming

  • Botnets

  • Instant Messaging (IM) attack

  • Mobile and Wireless attack

  • Root kits

  • Web Application attack

  • Hacking with Google

As shown in Figure 1, incidents can results in intrusions and cyber security problems. Chou et al. (1999) explored the security problems in an organization that resulted in proposing security frameworks for the cyberspace environment. They also discussed privacy training for users, and the need for procedures and policies for improving cyber security.

Palfrey (2000) studied the interception/surveillance response in the context of other attempts to regulate crime in cyberspace. Napoleon (2007) discussed the needs of modern society for information systems for commerce, communication, and defense. Therefore, security threats to the systems would potentially cost society.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 19: 1 Issue (2023)
Volume 18: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing