Agent Based Cybersecurity Model for Business Entity Risk Assessment

被引:5
作者
Ashiku, Lirim [1 ]
Dagli, Cihan [1 ]
机构
[1] Missouri Univ Sci & Technol, Engn Management & Syst Engn, Rolla, MO 65409 USA
来源
2020 6TH IEEE INTERNATIONAL SYMPOSIUM ON SYSTEMS ENGINEERING (IEEE ISSE 2020) | 2020年
关键词
agent-based modelling; cybersecurity; risk assessment; network threats; defense strategies;
D O I
10.1109/isse49799.2020.9272234
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
Computer networks and surging advancements of innovative information technology construct a critical infrastructure for network transactions of business entities. Information exchange and data access though such infrastructure is scrutinized by adversaries for vulnerabilities that lead to cyber-attacks. This paper presents an agent-based system modelling to conceptualize and extract explicit and latent structure of the complex enterprise systems as well as human interactions within the system to determine common vulnerabilities of the entity. The model captures emergent behavior resulting from interactions of multiple network agents including the number of workstations, regular, administrator and third-party users, external and internal attacks, defense mechanisms for the network setting, and many other parameters. A risk-based approach to modelling cybersecurity of a business entity is utilized to derive the rate of attacks. A neural network model will generalize the type of attack based on network traffic features allowing dynamic state changes. Rules of engagement to generate self-organizing behavior will be leveraged to appoint a defense mechanism suitable for the attack-state of the model. The effectiveness of the model will be depicted by time-state chart that shows the number of affected assets for the different types of attacks triggered by the entity risk and the time it takes to revert into normal state. The model will also associate a relevant cost per incident occurrence that derives the need for enhancement of security solutions.
引用
收藏
页数:6
相关论文
共 12 条
[1]  
[Anonymous], ANYLOGIC
[2]  
Ashiku L, 2019, 2019 14TH ANNUAL CONFERENCE SYSTEM OF SYSTEMS ENGINEERING (SOSE), P140, DOI [10.1109/sysose.2019.8753872, 10.1109/SYSOSE.2019.8753872]
[3]  
Boccara N, 2010, GRAD TEXTS PHYS, P1, DOI 10.1007/978-1-4419-6562-2
[4]  
Calkins H, 2017, J ARRYTHM, V33, P369, DOI 10.1016/j.joa.2017.08.001
[5]  
Grigoryev I, 2012, ANYLOGIC N AM
[6]  
Ibnugraha Prajna Deshanta, 2018, 2018 International Conference on Information and Communications Technology (ICOIACT), P275, DOI 10.1109/ICOIACT.2018.8350675
[7]  
Moschovitis C., 2018, Cybersecurity Program Development for Business: The Essential Planning Guide
[8]  
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
[9]  
Ucedavelez T, 2015, RISK CENTRIC THREAT MODELING: PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS, P1, DOI 10.1002/9781118988374
[10]  
Wagner N., 2015, Proceedings of the Symposium on Agent-Directed Simulation, P18