Formulating Cyber-Security as Convex Optimization Problems

8Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Mission-centric cyber-security analysts require a complete overview and understanding of the state of a mission and any potential threats to their completion. To facilitate this, we propose optimization based algorithms that can be used to predict in real-time how an attacker may try to compromise a cyber-mission with a limited amount of resources, based on a model that takes into account potential damage to the mission and probabilistic uncertainty. Two different optimization schemes are considered: one where all the mission data is known a priori to the attacker and another where system identification and a moving horizon optimization is used to produce the estimates based on historical data. Our schemes are compared with real attacks carried our by human players in the 2011 international Capture The Flag (iCTF) hacking competition. © Springer International Publishing Switzerland 2013.

Cite

CITATION STYLE

APA

Vamvoudakis, K. G., Hespanha, J. P., Kemmerer, R. A., & Vigna, G. (2013). Formulating Cyber-Security as Convex Optimization Problems. In Lecture Notes in Control and Information Sciences (Vol. 449 LNCIS, pp. 85–100). Springer Verlag. https://doi.org/10.1007/978-3-319-01159-2_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free