skip to main content
10.1145/3041008.3041015acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
short-paper

Identifying Key Cyber-Physical Terrain

Published:24 March 2017Publication History

ABSTRACT

The high mobility of Army tactical networks, combined with their close proximity to hostile actors, elevates the risks associated with short-range network attacks. The connectivity model for such short range connections under active operations is extremely fluid, and highly dependent upon the physical space within which the element is operating, as well as the patterns of movement within that space. To handle these dependencies, we introduce the notion of "key cyber-physical terrain": locations within an area of operations that allow for effective control over the spread of proximity-dependent malware in a mobile tactical network, even as the elements of that network are in constant motion with an unpredictable pattern of node-to-node connectivity. We provide an analysis of movement models and approximation strategies for finding such critical nodes, and demonstrate via simulation that we can identify such key cyber-physical terrain quickly and effectively.

References

  1. M. Boguná, R. Pastor-Satorras, A. Vespignani, et al. Epidemic spreading in complex networks with degree correlations. In Proceedings of the XVIII Sitges Conference on Statistical Mechanics, Lecture Notes in Physics, Springer, Berlin, 2003.Google ScholarGoogle Scholar
  2. S. Brin and L. Page. The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems, 30(1):107 -- 117, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Z. Dezs\Ho and A.-L. Barabási. Halting viruses in scale-free networks. Physical Review E, 65(5):055103, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  4. L. C. Freeman. A set of measures of centrality based on betweenness. Sociometry, 40(1):35--41, 1977.Google ScholarGoogle ScholarCross RefCross Ref
  5. C. Huber, P. McDaniel, S. E. Brown, and L. Marvel. Cyber fighter associate: A decision support system for cyber agility. In 2016 Annual Conference on Information Science and Systems (CISS), pages 198--203. IEEE, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  6. J. Kephart and S. White. Directed-graph epidemiological models of computer viruses. In Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on, pages 343--359, May 1991.Google ScholarGoogle ScholarCross RefCross Ref
  7. W. O. Kermack and A. G. McKendrick. A contribution to the mathematical theory of epidemics. Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 115(772):700--721, 1927.Google ScholarGoogle ScholarCross RefCross Ref
  8. L. M. Marvel, S. Brown, I. Neamtiu, R. Harang, D. Harman, and B. Henz. A framework to evaluate cyber agility. In Military Communications Conference, MILCOM 2015--2015 IEEE, pages 31--36. IEEE, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  9. J. W. Mickens and B. D. Noble. Modeling epidemic spreading in mobile environments. In Proceedings of the 4th ACM Workshop on Wireless Security, WiSe '05, pages 77--86, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. W. Mickens and B. D. Noble. Analytical models for epidemics in mobile networks. In Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), pages 77--77. IEEE, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Su, K. K. Chan, A. G. Miklas, K. Po, A. Akhavan, S. Saroiu, E. de Lara, and A. Goel. A preliminary investigation of worm infections in a bluetooth environment. In Proceedings of the 4th ACM Workshop on Recurring Malcode, pages 9--16. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Thompson and R. Harang. Identifying key cyber-physical terrain (extended version). https://arxiv.org/abs/1701.07331, January 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Thompson and J. Morris-King. The impact of hierarchy on bluetooth-based malware spread in mobile tactical networks. In Proceedings of the Summer Computer Simulation Conference, SCSC '16, pages 34:1--34:7, San Diego, CA, USA, 2016. Society for Computer Simulation International. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. N. C. Valler, B. A. Prakash, H. Tong, M. Faloutsos, and C. Faloutsos. Epidemic spread in mobile ad hoc networks: Determining the tipping point. In Proceedings of the 10th International IFIP TC 6 Conference on Networking - Volume Part I, NETWORKING'11, pages 266--280, Berlin, Heidelberg, 2011. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Wang, M. C. González, C. A. Hidalgo, and A.-L. Barabási. Understanding the spreading patterns of mobile phone viruses. Science, 324(5930):1071--1076, 2009.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Identifying Key Cyber-Physical Terrain

                      Recommendations

                      Comments

                      Login options

                      Check if you have access through your login credentials or your institution to get full access on this article.

                      Sign in
                      • Published in

                        cover image ACM Conferences
                        IWSPA '17: Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics
                        March 2017
                        88 pages
                        ISBN:9781450349093
                        DOI:10.1145/3041008

                        Copyright © 2017 ACM

                        © 2017 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

                        Publisher

                        Association for Computing Machinery

                        New York, NY, United States

                        Publication History

                        • Published: 24 March 2017

                        Permissions

                        Request permissions about this article.

                        Request Permissions

                        Check for updates

                        Qualifiers

                        • short-paper

                        Acceptance Rates

                        IWSPA '17 Paper Acceptance Rate4of14submissions,29%Overall Acceptance Rate18of58submissions,31%

                        Upcoming Conference

                        CODASPY '24

                      PDF Format

                      View or Download as a PDF file.

                      PDF

                      eReader

                      View online with eReader.

                      eReader