Abstract
This paper documents a holistic mathematical modeling theory to provide a rigorous description of cyber-attacks and cyber-security. After determining valuations and vulnerabilities of parts of a node constituent, we recall the definitions of cyber-effect and cyber-interaction. Based on these concepts, we give the mathematical definitions of cyber navigation and infected node and we explain what is meant by dangerous cyber navigation and protection of cyber nodes from unplanned attacks. Our discussion proceeds to a rigorous description of passive and active cyber-attacks, as well as the relevant protections.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adams, N., Heard, N. (eds.): Data Analysis for Network Cyber-Security, 200 pp. World Scientific, Singapore (2014). ISBN: 978-1-78326-374-5 (hardcover)/ISBN: 978-1-78326-376-9 (ebook)
Alexopoulos, A., Daras, N.: Case study of proactive defense against various types of cyber attacks, submitted
Colbaugh, R., Glass, K.: Proactive Cyber Defense. Springer Integrated Series on Intelligent Systems. Springer, Berlin (2012). Document No. 5299122, SAND 2011-8794P
Daras, N.J.: On the mathematical definition of cyberspace. 4th International Conference on Operational Planning, Technological Innovations and Mathematical Applications (OPTIMA), Hellenic Army Academy, Vari Attikis, Greece (2017)
Daras, N., Alexopoulos, A.: Mathematical description of cyber-attacks and proactive defenses. Journal of Applied Mathematics & Bioinformatics, 7(1), 71–142 (2017)
Dunlavy, D.M., Hendrickson, B., Kolda, T.G.: Mathematical challenges in cyber-security. Sandia National Laboratories (2009). www.sandia.gov/~dmdunla/publications/SAND2009-0805.pdf
Luccio, F., Pagli, L., Stee, G.: Mathematical and Algorithmic Foundations of the Internet, pp. 221. CRC, Boca Raton (2011)
Malkevitch, J.: Mathematics and internet security (2015). http://www.ams.org/samplings/feature-column/fcarc-internet
Meza, J., Campbell, S., Bailey, D.: Mathematical and statistical opportunities in cyber security (2009). http://arxiv.org/pdf/0904.1616v1.pdf. http://www.davidhbailey.com/dhbpapers/CyberMath.pdf
Ramsey, D.: Mathematical problems in cyber security. In: DOE Workshop on Mathematical Research Challenges in Optimization of Complex Systems, 7–8 December 2006. http://www.courant.nyu.edu/ComplexSystems/
Rowe, N.C., Custy E.J., Duong B.T.: Defending cyberspace with fake honeypots. J. Comput. 2(2), 25–36 (2007). http://www.academypublisher.com/jcp/vol02/no02/jcp02022536.pdf
Ryan, P.Y.A.: Mathematical models of computer security. In: Focardi, R., Gorrieri, R. (eds.) Foundations of Security Analysis and Design: Tutorial Lectures (FOSAD 2000). Lecture Notes in Computer Science, vol. 2171, pp. 1–62. Springer, Berlin, Heidelberg (2001). http://www.ece.cmu.edu/~ece732/readings/mathematical-models-of-computer-security.pdf
Saini, D.K.: Cyber defense: mathematical modeling and simulation. Int. J. Appl. Phys. Math. 2(5), 312–315 (2012)
Shen, D., Chen, G., Cruz, J.B. Jr., Blasch, E., Pham, K.: An adaptive Markov game model for cyber threat intent inference. In: Theory and Novel Applications of Machine Learning, pp. 376. I-Tech, Vienna (2009). ISBN 978-3-902613-55-4. http://cdn.intechweb.org/pdfs/6200.pdf
Subil, A., Suku, N.: Cyber security analytics: a stochastic model for security quantification using absorbing Markov chains. J. Commun. 9(12), 899–907 (2014)
Wendelberger, J., Griffin, C., Wilder, L., Jiao, Y., Kolda T.: A mathematical basis for science-based cyber-security (with alternate title “Mathematical Underpinnings for Science-Based Cyber-Security”), February 2008, Sandia National Laboratories, Chad Scherrer, Pacific Northwest National Laboratory. https://wiki.cac.washington.edu/download/attachments/7479040/doecybermath25feb08.doc
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Daras, N.J., Alexopoulos, A. (2018). Modeling Cyber-Security. In: Daras, N., Rassias, T. (eds) Modern Discrete Mathematics and Analysis . Springer Optimization and Its Applications, vol 131. Springer, Cham. https://doi.org/10.1007/978-3-319-74325-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-74325-7_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-74324-0
Online ISBN: 978-3-319-74325-7
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)