Optimal Countermeasures Selection Against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks

被引:0
|
作者
Nespoli, Pantaleone [1 ]
Papamartzivanos, Dimitrios [2 ]
Gomez Marmol, Felix [1 ]
Kambourakis, Georgios [2 ,3 ]
机构
[1] Univ Murcia, Dept Informat & Commun Engn, E-30100 Murcia, Spain
[2] Univ Aegean, Dept Informat & Commun Syst Engn, Samos 83200, Greece
[3] George Mason Univ, Comp Sci Dept, Fairfax, VA 22030 USA
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2018年 / 20卷 / 02期
基金
欧盟地平线“2020”;
关键词
Cyber attack countermeasures; security risk assessment; intrusion prevention and response systems; decision support systems; optimal countermeasure strategy; dynamic reaction selection; NETWORK INTRUSION DETECTION; GENETIC ALGORITHM; SECURITY RISK; OPTIMIZATION; SYSTEMS;
D O I
10.1109/COMST.2017.2781126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is without doubt that today the volume and sophistication of cyber attacks keeps consistently growing, militating an endless arm race between attackers and defenders. In this context, full-fledged frameworks, methodologies, or strategies that are able to offer optimal or near-optimal reaction in terms of countermeasure selection, preferably in a fully or semiautomated way, are of high demand. This is reflected in the literature, which encompasses a significant number of major works on this topic spanning over a time period of 5 years, that is, from 2012 to 2016. The survey at hand has a dual aim, namely, first, to critically analyze all the pertinent works in this field, and second to offer an in-depth discussion and side-by-side comparison among them based on seven common criteria. Also, a quite extensive discussion is offered to highlight on the shortcomings and future research challenges and directions in this timely area.
引用
收藏
页码:1361 / 1396
页数:36
相关论文
共 50 条
  • [1] Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures
    Tsiknas, Konstantinos
    Taketzis, Dimitrios
    Demertzis, Konstantinos
    Skianis, Charalabos
    IOT, 2021, 2 (01): : 163 - 186
  • [2] A Study on the Government's Countermeasures against Cyber Attacks
    Byeon, Seo-hui
    Suh, Woo-jong
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP 2020), 2020, : 495 - 499
  • [3] Optimal Switching Attacks and Countermeasures in Cyber-Physical Systems
    Wu, Guangyu
    Wang, Gang
    Sun, Jian
    Xiong, Lu
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (08): : 4825 - 4835
  • [4] Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets
    Telecom ParisTech, 19 Place Marguerite Perey, Palaiseau
    91120, France
    Cyber Secur. Netw. Conf., CSNet, 1600, (49-54):
  • [5] A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning
    Tian, Zhiyi
    Cui, Lei
    Liang, Jie
    Yu, Shui
    ACM COMPUTING SURVEYS, 2023, 55 (08)
  • [6] Comprehensive Analysis of Software Countermeasures Against Fault Attacks
    Theissing, Nikolaus
    Merli, Dominik
    Smola, Michael
    Stumpf, Frederic
    Sigl, Georg
    DESIGN, AUTOMATION & TEST IN EUROPE, 2013, : 404 - 409
  • [7] Cyber Attacks, Countermeasures, and Protection Schemes- A State of the Art Survey
    Shabut, Antesar M.
    Lwin, K. T.
    Hossain, M. A.
    PROCEEDINGS OF 2016 10TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT & APPLICATIONS (SKIMA), 2016, : 37 - 44
  • [8] Ransomware-based Cyber Attacks: A Comprehensive Survey
    Park, Jin Ho
    Singh, Sushil Kumar
    Salim, Mikail Mohammed
    El Azzaoui, Abir
    Park, Jong Hyuk
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (07): : 1557 - 1564
  • [9] Unified Countermeasures against Physical Attacks in Internet of Things - A survey
    Dofe, Jaya
    Nguyen, Aaron
    Nguyen, Andy
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2021), 2021, : 194 - 199
  • [10] Security Issues in IIoT: A Comprehensive Survey of Attacks on IIoT and Its Countermeasures
    Panchal, Abhijeet C.
    Khadse, Vijay M.
    Mahalle, Parikshit N.
    2018 2ND IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN - 2018), VOL II, 2018, : 124 - 130