Redundancy Planning for Cost Efficient Resilience to Cyber Attacks

被引:4
|
作者
Soikkeli, Jukka [1 ]
Casale, Giuliano [1 ]
Munoz-Gonzalez, Luis [1 ]
Lupu, Emil C. [1 ]
机构
[1] Imperial Coll London, Dept Comp, London SW7 2AZ, England
基金
英国工程与自然科学研究理事会;
关键词
Costs; Redundancy; Resource management; Cyberattack; Servers; Resilience; Production; Cyber security; redundancy; diversity; performance; cyber resilience; FRAMEWORK; NETWORKS;
D O I
10.1109/TDSC.2022.3151462
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We investigate the extent to which redundancy (including with diversity) can help mitigate the impact of cyber attacks that aim to reduce system performance. Using analytical techniques, we estimate impacts, in terms of monetary costs, of penalties from breaching Service Level Agreements (SLAs), and find optimal resource allocations to minimize the overall costs arising from attacks. Our approach combines attack impact analysis, based on performance modeling using queueing networks, with an attack model based on attack graphs. We evaluate our approach using a case study of a website, and show how resource redundancy and diversity can improve the resilience of a system by reducing the likelihood of a fully disruptive attack. We find that the cost-effectiveness of redundancy depends on the SLA terms, the probability of attack detection, the time to recover, and the cost of maintenance. In our case study, redundancy with diversity achieved a saving of up to around 50 percent in expected attack costs relative to no redundancy. The overall benefit over time depends on how the saving during attacks compares to the added maintenance costs due to redundancy.
引用
收藏
页码:1154 / 1168
页数:15
相关论文
共 50 条
  • [31] Efficient Detection of Electricity Theft Cyber Attacks in AMI Networks
    Ismail, Muhammad
    Shahin, Mostafa
    Shaaban, Mostafa F.
    Serpedin, Erchin
    Qaraqe, Khalid
    2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,
  • [32] Experiments with a testbed for automated defensive deception planning for cyber-attacks
    Rowe, Neil
    Goh, Han
    Lim, Sze
    Duong, Binh
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 185 - 194
  • [33] Impact of Cyber Attacks on Cost Oriented Power Routing Schemes in Microgrids
    Gupta, Kirti
    Sahoo, Subham
    Panigrahi, Bijaya Ketan
    Blaabjerg, Frede
    2022 24TH EUROPEAN CONFERENCE ON POWER ELECTRONICS AND APPLICATIONS (EPE'22 ECCE EUROPE), 2022,
  • [34] Improving resilience of cyber-physical power systems against cyber attacks through strategic energy storage deployment
    Zhao, Tianxiang
    Tu, Haicheng
    Jin, Rui
    Xia, Yongxiang
    Wang, Fangfang
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2024, 252
  • [35] Resilience enhancement of renewable cyber-physical power system against malware attacks
    Xu, Sheng
    Tu, Haicheng
    Xia, Yongxiang
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2023, 229
  • [36] Deep learning offering resilience from trending cyber-attacks, a review.
    Khanday, Shahbaz Ahmad
    Fatima, Hoor
    Rakesh, Nitin
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 741 - 749
  • [37] Resilience Assessment of Water Quality Sensor Designs under Cyber-Physical Attacks
    Nikolopoulos, Dionysios
    Ostfeld, Avi
    Salomons, Elad
    Makropoulos, Christos
    WATER, 2021, 13 (05)
  • [38] Teacher Digital and Media Competence in Cyber Security - A Perspective on Individual Resilience to Online Attacks
    Tomczyk, Lukasz
    Guillen-Gamez, Francisco David
    Llorent, Vicente J.
    NEW MEDIA PEDAGOGY: RESEARCH TRENDS, METHODOLOGICAL CHALLENGES, AND SUCCESSFUL IMPLEMENTATIONS, NMP 2023, 2024, 2130 : 1 - 23
  • [39] Cyber-Physical Resilience of Electrical Power Systems Against Malicious Attacks: a Review
    Mehrdad S.
    Mousavian S.
    Madraki G.
    Dvorkin Y.
    Current Sustainable/Renewable Energy Reports, 2018, 5 (1): : 14 - 22
  • [40] Resilience of Cyber-Physical Systems to Covert Attacks by Exploiting an Improved Encryption Scheme
    Fauser, Moritz
    Zhang, Ping
    2020 59TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2020, : 5489 - 5494