Skip to main content

Modeling Cyber-Security

  • Chapter
  • First Online:
Modern Discrete Mathematics and Analysis

Part of the book series: Springer Optimization and Its Applications ((SOIA,volume 131))

  • 1542 Accesses

Abstract

This paper documents a holistic mathematical modeling theory to provide a rigorous description of cyber-attacks and cyber-security. After determining valuations and vulnerabilities of parts of a node constituent, we recall the definitions of cyber-effect and cyber-interaction. Based on these concepts, we give the mathematical definitions of cyber navigation and infected node and we explain what is meant by dangerous cyber navigation and protection of cyber nodes from unplanned attacks. Our discussion proceeds to a rigorous description of passive and active cyber-attacks, as well as the relevant protections.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adams, N., Heard, N. (eds.): Data Analysis for Network Cyber-Security, 200 pp. World Scientific, Singapore (2014). ISBN: 978-1-78326-374-5 (hardcover)/ISBN: 978-1-78326-376-9 (ebook)

    Google Scholar 

  2. Alexopoulos, A., Daras, N.: Case study of proactive defense against various types of cyber attacks, submitted

    Google Scholar 

  3. Colbaugh, R., Glass, K.: Proactive Cyber Defense. Springer Integrated Series on Intelligent Systems. Springer, Berlin (2012). Document No. 5299122, SAND 2011-8794P

    Google Scholar 

  4. Daras, N.J.: On the mathematical definition of cyberspace. 4th International Conference on Operational Planning, Technological Innovations and Mathematical Applications (OPTIMA), Hellenic Army Academy, Vari Attikis, Greece (2017)

    Google Scholar 

  5. Daras, N., Alexopoulos, A.: Mathematical description of cyber-attacks and proactive defenses. Journal of Applied Mathematics & Bioinformatics, 7(1), 71–142 (2017)

    Google Scholar 

  6. Dunlavy, D.M., Hendrickson, B., Kolda, T.G.: Mathematical challenges in cyber-security. Sandia National Laboratories (2009). www.sandia.gov/~dmdunla/publications/SAND2009-0805.pdf

  7. Luccio, F., Pagli, L., Stee, G.: Mathematical and Algorithmic Foundations of the Internet, pp. 221. CRC, Boca Raton (2011)

    Google Scholar 

  8. Malkevitch, J.: Mathematics and internet security (2015). http://www.ams.org/samplings/feature-column/fcarc-internet

  9. Meza, J., Campbell, S., Bailey, D.: Mathematical and statistical opportunities in cyber security (2009). http://arxiv.org/pdf/0904.1616v1.pdf. http://www.davidhbailey.com/dhbpapers/CyberMath.pdf

  10. Ramsey, D.: Mathematical problems in cyber security. In: DOE Workshop on Mathematical Research Challenges in Optimization of Complex Systems, 7–8 December 2006. http://www.courant.nyu.edu/ComplexSystems/

  11. Rowe, N.C., Custy E.J., Duong B.T.: Defending cyberspace with fake honeypots. J. Comput. 2(2), 25–36 (2007). http://www.academypublisher.com/jcp/vol02/no02/jcp02022536.pdf

    Article  Google Scholar 

  12. Ryan, P.Y.A.: Mathematical models of computer security. In: Focardi, R., Gorrieri, R. (eds.) Foundations of Security Analysis and Design: Tutorial Lectures (FOSAD 2000). Lecture Notes in Computer Science, vol. 2171, pp. 1–62. Springer, Berlin, Heidelberg (2001). http://www.ece.cmu.edu/~ece732/readings/mathematical-models-of-computer-security.pdf

    Google Scholar 

  13. Saini, D.K.: Cyber defense: mathematical modeling and simulation. Int. J. Appl. Phys. Math. 2(5), 312–315 (2012)

    Article  Google Scholar 

  14. Shen, D., Chen, G., Cruz, J.B. Jr., Blasch, E., Pham, K.: An adaptive Markov game model for cyber threat intent inference. In: Theory and Novel Applications of Machine Learning, pp. 376. I-Tech, Vienna (2009). ISBN 978-3-902613-55-4. http://cdn.intechweb.org/pdfs/6200.pdf

  15. Subil, A., Suku, N.: Cyber security analytics: a stochastic model for security quantification using absorbing Markov chains. J. Commun. 9(12), 899–907 (2014)

    Google Scholar 

  16. Wendelberger, J., Griffin, C., Wilder, L., Jiao, Y., Kolda T.: A mathematical basis for science-based cyber-security (with alternate title “Mathematical Underpinnings for Science-Based Cyber-Security”), February 2008, Sandia National Laboratories, Chad Scherrer, Pacific Northwest National Laboratory. https://wiki.cac.washington.edu/download/attachments/7479040/doecybermath25feb08.doc

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nicholas J. Daras .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Daras, N.J., Alexopoulos, A. (2018). Modeling Cyber-Security. In: Daras, N., Rassias, T. (eds) Modern Discrete Mathematics and Analysis . Springer Optimization and Its Applications, vol 131. Springer, Cham. https://doi.org/10.1007/978-3-319-74325-7_3

Download citation

Publish with us

Policies and ethics