2018
DOI: 10.1002/itl2.38
|View full text |Cite
|
Sign up to set email alerts
|

Hypergraph‐driven mitigation of cyberattacks

Abstract: We extend a mitigation model that evaluates individual and combined countermeasures against multistep cyberattack scenarios. The goal is to anticipate the actions of an attacker that wants to disrupt a given system (eg, an information system). The process is driven by a hypergraph formalism, enforced with a stateful return on response investment metric that optimally evaluates, ranks, and selects appropriate countermeasures to handle ongoing and potential attacks. KEYWORDSattack graphs, countermeasure selectio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…All the other previous works tackle simpler search problems by only focusing on a single mitigation class (Marsa-Maestre et al [21]), a one-to-one mapping from attack action classes to mitigation action classes (Sandor et al [28]) or a one-to-many mapping from the former to the latter (Lysenko et al [19], Huertas-Celdran et al [5], [20]). While Gonzales-Granadillo et al [12], Kanoun et al [16], Javornik et, al. [15], Yuan et al [36], and Vieira et al [33] make other original proposals, they either do not discuss their implementation or do not evaluate it through an experiment or simulation, making it difficult to assess their practical applicability.…”
Section: Related Workmentioning
confidence: 99%
“…All the other previous works tackle simpler search problems by only focusing on a single mitigation class (Marsa-Maestre et al [21]), a one-to-one mapping from attack action classes to mitigation action classes (Sandor et al [28]) or a one-to-many mapping from the former to the latter (Lysenko et al [19], Huertas-Celdran et al [5], [20]). While Gonzales-Granadillo et al [12], Kanoun et al [16], Javornik et, al. [15], Yuan et al [36], and Vieira et al [33] make other original proposals, they either do not discuss their implementation or do not evaluate it through an experiment or simulation, making it difficult to assess their practical applicability.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al 59 in 2020 encountered countermeasures selection for multipath attacks formulated as an optimization problem and proved the problem to be NP‐hard. Gonzalez‐Granadillo et al 60 proposed a countermeasure selection using hypergraph, a concept defined in the author's previous work 61 …”
Section: Related Workmentioning
confidence: 99%
“…Gonzalez-Granadillo et al 60 proposed a countermeasure selection using hypergraph, a concept defined in the author's previous work. 61 Kotenko and Doynikova 62 outlined the uncertainty of attacker behavior and the complexity of interconnections between resources in modern distributed systems. The authors propose a model-driven approach to the security assessment and countermeasure selection that is based on integration with security information and event management systems, namely the open standards and databases.…”
Section: Decision Support In Cybersecuritymentioning
confidence: 99%