skip to main content
10.1145/2459976.2459989acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Mission-aware time-dependent cyber asset criticality and resilience

Published: 08 January 2013 Publication History

Abstract

Determining mission-aware criticality, dependency, and resilience of cyber assets is required to support mission assurance in cyber defense and continuous operation of networks. This paper addresses the characterization of mission-aware asset criticality and the real-time dependencies of assets, services, tasks, and missions using Time Petri Nets and impact dependency graphs. In order to assess whether a system is resilient enough to keep supporting mission assurance in the face of cyber attacks, this paper introduces a new approach to determining whether the required resources will be available at the required time intervals. This approach leads to a better assessment of whether missions can be accomplished in a given time window over a mission-oriented network.

References

[1]
A. D. Amico, L. Buchanan, J. Goodall, and P. Walczak, "Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Missions and Users," Proc. of the Int. Conference on Information Warfare and Security, Dayton, Ohio, April 2010.
[2]
A. Doupe, M. Egele, B. Caillat, G. Stringhini, G. Yakin, A. Zand, L. Cavedon, and G. Vigna, "Hit 'em Where it Hurts: A Live Security Exercise on Cyber Situational Awareness," ACSAC, Dec. 5--9, 2011, Orlando, USA.
[3]
J. Wang, "Timed Petri Nets: Theory and Applications", Springer publishing, 1998
[4]
G. Jakobson, "Extending Situation Modeling with Inference of Plausible Future Cyber Situations," Proc. of 2011 IEEE Int. Multi-Disciplinary Conf. on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), Miami Beach, FL, 2011.
[5]
A. Kim and M. H. Kang, "Determining Asset Criticality for Cyber Defense," Technical Report, Naval Research Laboratory, September 23, 2011.
[6]
V. Naga, J. Colombi, M. Grimaila, K. Hopkinson. "A Method to Determine Superior QoS Configurations for Mission Objectives: Aligning the Network with the Mission" Proceedings of the 2011 International Conference on Security and Management (SAM11), Las Vegas, Nevada, July 18--21, 2011.
[7]
H. Cam, "PeerShield: Determining Control and Resilience Criticality of Collaborative Cyber Assets in Networks," Cyber Sensing 2012, SPIE Defense, Security, and Sensing, 23--27 April 2012, Baltimore, MD, USA.

Cited By

View all
  • (2017)Cyber terrain mission mapping: Tools and methodologies2017 International Conference on Cyber Conflict (CyCon U.S.)10.1109/CYCONUS.2017.8167504(105-111)Online publication date: Nov-2017
  • (2016)Mission-Centric Cyber Security Assessment of Critical SystemsAIAA SPACE 201610.2514/6.2016-5603Online publication date: 9-Sep-2016
  • (2015)Ecology-inspired cyber risk model for propagation of vulnerability exploitation in tactical edgeMILCOM 2015 - 2015 IEEE Military Communications Conference10.1109/MILCOM.2015.7357465(336-341)Online publication date: 26-Oct-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. asset criticality
  2. cyber security
  3. dependency graph
  4. mission-awareness
  5. resilience

Qualifiers

  • Research-article

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)6
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Cyber terrain mission mapping: Tools and methodologies2017 International Conference on Cyber Conflict (CyCon U.S.)10.1109/CYCONUS.2017.8167504(105-111)Online publication date: Nov-2017
  • (2016)Mission-Centric Cyber Security Assessment of Critical SystemsAIAA SPACE 201610.2514/6.2016-5603Online publication date: 9-Sep-2016
  • (2015)Ecology-inspired cyber risk model for propagation of vulnerability exploitation in tactical edgeMILCOM 2015 - 2015 IEEE Military Communications Conference10.1109/MILCOM.2015.7357465(336-341)Online publication date: 26-Oct-2015
  • (2014)Towards scalable critical alert miningProceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining10.1145/2623330.2623729(1057-1066)Online publication date: 24-Aug-2014
  • (2014)Modeling impact of attacks, recovery, and attackability conditions for situational awareness2014 IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)10.1109/CogSIMA.2014.6816560(181-187)Online publication date: Mar-2014
  • (2013)Mission assurance policy and risk management in cybersecurityEnvironment Systems and Decisions10.1007/s10669-013-9468-z33:4(500-507)Online publication date: 30-Aug-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media