Abstract
Mission-centric cyber-security analysts require a complete overview and understanding of the state of a mission and any potential threats to their completion. To facilitate this, we propose optimization based algorithms that can be used to predict in real-time how an attacker may try to compromise a cyber-mission with a limited amount of resources, based on a model that takes into account potential damage to the mission and probabilistic uncertainty. Two different optimization schemes are considered: one where all the mission data is known a priori to the attacker and another where system identification and a moving horizon optimization is used to produce the estimates based on historical data. Our schemes are compared with real attacks carried our by human players in the 2011 international Capture The Flag (iCTF) hacking competition.
This material is based upon work supported by ARO MURI Grant number W911NF0910553.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press (2004)
Doupe, A., Egele, M., Caillat, B., Stringhini, G., Yakin, G., Zand, A., Cavedon, L., Vigna, G.: Hit’em where it hurts: A live security exercise on cyber situational awareness. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC 2011), Orlando, FL (December 2011)
Endsley, M.: Theoretical Underpinnings of Situation Awareness: A Critical Review, ch. 1, pp. 3–32. L. Erlbaum Assoc. (2000)
Stockman, N., Vamvoudakis, K.G., Devendorf, L., Höllerer, T., Kemmerer, R., Hespanha, J.P.: A Mission-Centric Visualization Tool for Cybersecurity Situation Awareness. Technical Report, University of California, Santa Barbara (August 2012)
Vigna, G.: The 2011 UCSB iCTF: Description of the game (2011), http://ictf.cs.ucsb.edu/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Vamvoudakis, K.G., Hespanha, J.P., Kemmerer, R.A., Vigna, G. (2013). Formulating Cyber-Security as Convex Optimization Problems. In: Tarraf, D. (eds) Control of Cyber-Physical Systems. Lecture Notes in Control and Information Sciences, vol 449. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-01159-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-01159-2_5
Publisher Name: Springer, Heidelberg
Print ISBN: 978-3-319-01158-5
Online ISBN: 978-3-319-01159-2
eBook Packages: EngineeringEngineering (R0)