ABSTRACT
The high mobility of Army tactical networks, combined with their close proximity to hostile actors, elevates the risks associated with short-range network attacks. The connectivity model for such short range connections under active operations is extremely fluid, and highly dependent upon the physical space within which the element is operating, as well as the patterns of movement within that space. To handle these dependencies, we introduce the notion of "key cyber-physical terrain": locations within an area of operations that allow for effective control over the spread of proximity-dependent malware in a mobile tactical network, even as the elements of that network are in constant motion with an unpredictable pattern of node-to-node connectivity. We provide an analysis of movement models and approximation strategies for finding such critical nodes, and demonstrate via simulation that we can identify such key cyber-physical terrain quickly and effectively.
- M. Boguná, R. Pastor-Satorras, A. Vespignani, et al. Epidemic spreading in complex networks with degree correlations. In Proceedings of the XVIII Sitges Conference on Statistical Mechanics, Lecture Notes in Physics, Springer, Berlin, 2003.Google Scholar
- S. Brin and L. Page. The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems, 30(1):107 -- 117, 1998. Google ScholarDigital Library
- Z. Dezs\Ho and A.-L. Barabási. Halting viruses in scale-free networks. Physical Review E, 65(5):055103, 2002.Google ScholarCross Ref
- L. C. Freeman. A set of measures of centrality based on betweenness. Sociometry, 40(1):35--41, 1977.Google ScholarCross Ref
- C. Huber, P. McDaniel, S. E. Brown, and L. Marvel. Cyber fighter associate: A decision support system for cyber agility. In 2016 Annual Conference on Information Science and Systems (CISS), pages 198--203. IEEE, 2016.Google ScholarCross Ref
- J. Kephart and S. White. Directed-graph epidemiological models of computer viruses. In Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on, pages 343--359, May 1991.Google ScholarCross Ref
- W. O. Kermack and A. G. McKendrick. A contribution to the mathematical theory of epidemics. Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 115(772):700--721, 1927.Google ScholarCross Ref
- L. M. Marvel, S. Brown, I. Neamtiu, R. Harang, D. Harman, and B. Henz. A framework to evaluate cyber agility. In Military Communications Conference, MILCOM 2015--2015 IEEE, pages 31--36. IEEE, 2015.Google ScholarCross Ref
- J. W. Mickens and B. D. Noble. Modeling epidemic spreading in mobile environments. In Proceedings of the 4th ACM Workshop on Wireless Security, WiSe '05, pages 77--86, New York, NY, USA, 2005. ACM. Google ScholarDigital Library
- J. W. Mickens and B. D. Noble. Analytical models for epidemics in mobile networks. In Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), pages 77--77. IEEE, 2007. Google ScholarDigital Library
- J. Su, K. K. Chan, A. G. Miklas, K. Po, A. Akhavan, S. Saroiu, E. de Lara, and A. Goel. A preliminary investigation of worm infections in a bluetooth environment. In Proceedings of the 4th ACM Workshop on Recurring Malcode, pages 9--16. ACM, 2006. Google ScholarDigital Library
- B. Thompson and R. Harang. Identifying key cyber-physical terrain (extended version). https://arxiv.org/abs/1701.07331, January 2017. Google ScholarDigital Library
- B. Thompson and J. Morris-King. The impact of hierarchy on bluetooth-based malware spread in mobile tactical networks. In Proceedings of the Summer Computer Simulation Conference, SCSC '16, pages 34:1--34:7, San Diego, CA, USA, 2016. Society for Computer Simulation International. Google ScholarDigital Library
- N. C. Valler, B. A. Prakash, H. Tong, M. Faloutsos, and C. Faloutsos. Epidemic spread in mobile ad hoc networks: Determining the tipping point. In Proceedings of the 10th International IFIP TC 6 Conference on Networking - Volume Part I, NETWORKING'11, pages 266--280, Berlin, Heidelberg, 2011. Springer-Verlag. Google ScholarDigital Library
- P. Wang, M. C. González, C. A. Hidalgo, and A.-L. Barabási. Understanding the spreading patterns of mobile phone viruses. Science, 324(5930):1071--1076, 2009.Google ScholarCross Ref
Index Terms
- Identifying Key Cyber-Physical Terrain
Recommendations
Towards Independent In-Cloud Evolution of Cyber-Physical Systems
CPSNA '14: Proceedings of the 2014 IEEE International Conference on Cyber-Physical Systems, Networks, and ApplicationsThe capabilities of Cyber-Physical Systems (CPSs) are increasingly being extended towards new composite services deployed across a range of smart sensing and controlling devices. These services enable the emergence of multiple end-to-end cyber-physical ...
Robust Cyber-Physical Systems
In this paper we comprehensively survey the concept and strategies for building a resilient and integrated cyber-physical system (CPS). Here resilience refers to a 3S-oriented design, that is, stability, security, and systematicness: Stability means the ...
Towards a Unified Framework for Cyber-Physical Systems (CPS)
CDEE '10: Proceedings of the 2010 First ACIS International Symposium on Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded SystemsCyber-Physical Systems (CPS) integrate computation with physical processes. By merging computing and communication with physical processes CPS allows computer systems to monitor and interact with the physical world. However, today's computing and ...
Comments