Cyber Resilience of Systems and Networks 2018
DOI: 10.1007/978-3-319-77492-3_7
|View full text |Cite
|
Sign up to set email alerts
|

Modeling the Impact of Cyber Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 15 publications
1
6
0
Order By: Relevance
“…To set the attack function of the intruder, consider the process of preparation of DDOS-attack from the point of view of the stochastic network conversion method [22]. Let us present this process as a sequence of events, each characterized by a distribution function, average time, and variance.…”
Section: Methods Of Early Detection Of Cyber-attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…To set the attack function of the intruder, consider the process of preparation of DDOS-attack from the point of view of the stochastic network conversion method [22]. Let us present this process as a sequence of events, each characterized by a distribution function, average time, and variance.…”
Section: Methods Of Early Detection Of Cyber-attacksmentioning
confidence: 99%
“…To implement DDOS attacks, the intruder must fulfill training, which consists of carrying out a group of the following cyber-attacks [22]:…”
mentioning
confidence: 99%
“…In this data transmission network, data transmission routes are organized for information exchange in accordance with the required quality of user service (Figure 2). nisms of telecommunication networks, in [7,8,23] it is proposed to use a complex of GERT models that allows one to estimate the average time and dispersion of the metadata file transmission time, organization and delivery time of control transfer commands to a software client of the telecommunication network. The main restriction of the solutions obtained in [7,8] is the limitation on the type of traffic transmitted in the network and the usage of individual exponential distributions characterizing the realization time of individual processes, namely, the transmission of an information packet and the formation and delivery of control transmission commands.…”
Section: Problem Statementmentioning
confidence: 99%
“…The availability of network elements for the implementation of a cyberattack by a malefactor is characterized by the probability P i that is determined using the known model of the cybercriminal intelligence system [8,24,25]. If the malefactor's actions are successful, then in a random time t di with the distribution function ∆ i (t), i = 1, n, the network administrator detects the impact and realizes measures to restore the functioning of the damaged network element because of the cyberattack, and the data packet received for transmission is transmitted again.…”
Section: Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation