Modeling Network Systems Under Simultaneous Cyber-Attacks

被引:6
|
作者
Da, Gaofeng [1 ]
Xu, Maochao [2 ,3 ]
Zhao, Peng [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Econ & Management, Nanjing 210016, Jiangsu, Peoples R China
[2] Illinois State Univ, Dept Math, Normal, IL 61701 USA
[3] Jiangsu Normal Univ, Sch Math & Stat, Xuzhou 221116, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Dependence; epidemic spreading; majorization; stochastic orders; STOCHASTIC-MODEL; PROPAGATION; EXTINCTION; SPREAD;
D O I
10.1109/TR.2019.2911106
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modeling cyber-attacks is a very attractive area of research because of its practical importance. However, most of the related research in the literature does not consider the simultaneous (or coordinated) attacks, which, in fact, is an important attack instrument in practice. This is mainly because of the complicated evolution of cyber-attacks over networks. In this paper, we propose a novel model, which can accommodate different types of simultaneous attacks with possible heterogeneous compromise probabilities. Our results show that simultaneous attacks have a significant effect on the reliability/ dynamics of network systems. In particular, we present a sufficient condition for the epidemics dying out over the network, and upper bounds for the time to extinction. We also provide upper bounds for compromise probabilities of network systems when the evolution enters the quasi-equilibrium state. The effects of strength of simultaneous attacks and heterogeneity among successful attack probabilities on epidemic spreading are studied as well. The theoretical results are further validated by the simulation evidence.
引用
收藏
页码:971 / 984
页数:14
相关论文
共 50 条
  • [1] Modeling cyber-attacks on Industrial Control Systems
    Paliath, Vivin
    Shakarian, Paulo
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 316 - 318
  • [2] A Survey on Cyber-Attacks for Cyber-Physical Systems: Modeling, Defense, and Design
    Lian, Zhi
    Shi, Peng
    Chen, Mou
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 1471 - 1483
  • [3] Stabilization for networked control systems under stochastic cyber-attacks
    Wei, Lili
    Liu, Jinliang
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 8020 - 8025
  • [4] Communications Network Analysis in a SCADA System Testbed Under Cyber-Attacks
    Miciolino, Estefania Etcheves
    Bernieri, Giuseppe
    Pascucci, Federica
    Setola, Roberto
    2015 23RD TELECOMMUNICATIONS FORUM TELFOR (TELFOR), 2015, : 341 - 344
  • [5] Research on secure control and communication for cyber-physical systems under cyber-attacks
    Li, Wei
    Shi, Yahong
    Li, Yajie
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2019, 41 (12) : 3421 - 3437
  • [6] Network-Based Modeling and Sampling Guaranteed Cost Control for Unmanned Surface Vehicle Systems Under Stochastic Cyber-Attacks
    Ding, Kui
    Zhu, Quanxin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (06) : 6173 - 6185
  • [7] Probabilistic modeling and analysis of sequential cyber-attacks
    Liu, Qisi
    Xing, Liudong
    Zhou, Chencheng
    ENGINEERING REPORTS, 2019, 1 (04)
  • [8] Secure Control for Networked Control Systems under Multiple Cyber-attacks
    Wu, Yuliang
    Qu, Gang
    Wu, Jing
    Long, Chengnian
    Li, Shaoyuan
    2023 AMERICAN CONTROL CONFERENCE, ACC, 2023, : 1966 - 1971
  • [9] Cyber-attacks on health-care systems
    Devi, Sharmila
    LANCET ONCOLOGY, 2023, 24 (04): : 148 - 148
  • [10] TAXONOMY OF SEVERITY OF CYBER-ATTACKS IN CYBER-MANUFACTURING SYSTEMS
    Espinoza-Zelaya, Carlos
    Moon, Young
    PROCEEDINGS OF ASME 2022 INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, IMECE2022, VOL 2B, 2022,