2 research outputs found

    Malware Epidemics Effects in a Lanchester Conflict Model

    Full text link
    For developing a better comprehension of the large-scale effects of a cyber attack, the paper examines the effects of infections with self-replicating malware --- described by an SIR model --- on a distributed system. A Lanchester model of military forces engaged in kinetic combat serves as sample system affected by the malware. Its game-like setting illustrates the effects of malware in a concise way. Corresponding evaluation criteria are derived. Basic knowledge about the expected circumstances restricts the set of scenarios to be analyzed. Remaining uncertainties are taken into account by applying Monte-Carlo simulations, whereby the scenarios to be processed are selected randomly by information-theoretic principles. The resulting framework allows a model-based calculation of the risk and the fraction of scenarios, in which malware attacks can assure the win for kinetically inferior forces, depending on the specifical circumstances. For showing the value and the validity of the method, the proposed analysis method is applied to an exemplary situation, in which sparse knowledge causes large uncertainties about the situation. Based on the example we have derived some key findings: (1) Malware attacks affecting availability can turn around the outcome of the kinetic combat in a significant fraction of scenarios. (2) Cyber capabilities tend to soften out kinetic superiority or inferiority. (3) Using the most aggressive malware is not necessarily the best decision for an aggressor. (4) Starting countermeasures against a malware attack at the earliest possible time is not always the best decision for a defender

    Formalized Risk Assessment for Safety and Security

    Full text link
    The manifold interactions between safety and security aspects makes it plausible to handle safety and security risks in an unified way. The paper develops a corresponding approach based on the discrete event systems (DEVS) paradigm. The simulation-based calculation of an individual system evolution path provides the contribution of this special path of dynamics to the overall risk of running the system. Accidentally and intentionally caused failures are distinguished by the way, in which the risk contributions of the various evolution paths are aggregated to the overall risk. The consistency of the proposed risk assessment method with 'traditional' notions of risk shows its plausibility. Its non-computability, on the other hand, makes the proposed risk assessment better suitable to the IT security domain than other concepts of risk developed for both safety and security. Power grids are discussed as an application example and demonstrates some of the advantages of the proposed method
    corecore