ABSTRACT
We explore the emerging field of Cybersecurity Dynamics, a candidate foundation for the Science of Cybersecurity.
- D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, and C. Faloutsos. Epidemic thresholds in real networks. ACM Trans. Inf. Syst. Secur., 10(4):1--26, 2008. Google ScholarDigital Library
- D. Gao, M. Xu, and S. Xu. A new approach to modeling and analyzing security of networked systems. In HotSoS'14.Google Scholar
- Y. Han, W. Lu, and S. Xu. Characterizing the power of moving target defense via cyber epidemic dynamics. In HotSoS'14. Google ScholarDigital Library
- S. Hofmeyr and S. Forrest. Architecture for an artificial immune system. Evolutionary Computation, 8(4):443--473, 2000. Google ScholarDigital Library
- K. Hoover. Idealizing reduction: The microfoundations of macroeconomics. Erkenntnis, 73:329--347, 2010.Google ScholarCross Ref
- A. Kott. Towards fundamental science of cyber security. In Network Science and Cybersecurity, pp 1--13. 2014.Google ScholarCross Ref
- T. Liggett. Interacting Particle Systems. Springer, 1985.Google ScholarCross Ref
- W. Lu, S. Xu, and X. Yi. Optimizing Active Cyber Defense. Proc. GameSec'13, pp 206--225.Google Scholar
- A. McKendrick. Applications of mathematics to medical problems. Proc. of Edin. Math. Soceity, 14:98--130, 1926.Google Scholar
- R. Pastor-Satorras and A. Vespignani. Epidemic dynamics and endemic states in complex networks. Physical Review E, 63:066117, 2001.Google ScholarCross Ref
- M. Xu and S. Xu. An extended stochastic model for quantitative security analysis of networked systems. Internet Mathematics, 8(3):288--320, 2012.Google ScholarCross Ref
- S. Xu, W. Lu, and H. Li. A stochastic model of active cyber defense dynamics. Internet Mathematics, 2014 (to appear).Google Scholar
- S. Xu, W. Lu, and L. Xu. Push- and pull-based epidemic spreading in arbitrary networks: Thresholds and deeper insights. ACM TAAS, 7(3):32:1--32:26 (2012). Google ScholarDigital Library
- S. Xu, W. Lu, L. Xu, and Z. Zhan. Adaptive Epidemic Dynamics in Networks: Thresholds and Control. ACM TAAS, 8(4):19 (2014) Google ScholarDigital Library
- S. Xu, W. Lu, and Z. Zhan. A stochastic model of multivirus dynamics. IEEE TDSC, 9(1):30--45, 2012. Google ScholarDigital Library
- Z. Zhan, M. Xu, and S. Xu. Characterizing honeypot-captured cyber attacks: Statistical framework and case study. IEEE TIFS, 8(11):1775--1789, 2013.Google Scholar
Index Terms
- Cybersecurity dynamics
Recommendations
The Cybersecurity Dynamics Way of Thinking and Landscape
MTD'20: Proceedings of the 7th ACM Workshop on Moving Target DefenseThe Cybersecurity Dynamics framework offers an approach to systematically understanding, characterizing, quantifying and managing cybersecurity from a holistic perspective. The framework looks into cyberspace through the dynamics lens because ...
Active cyber defense dynamics exhibiting rich phenomena
HotSoS '15: Proceedings of the 2015 Symposium and Bootcamp on the Science of SecurityThe Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses. In ...
Characterizing the power of moving target defense via cyber epidemic dynamics
HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of SecurityMoving Target Defense (MTD) can enhance the resilience of cyber systems against attacks. Although there have been many MTD techniques, there is no systematic understanding and quantitative characterization of the power of MTD. In this paper, we propose ...
Comments