• DocumentCode
    3398034
  • Title

    Predicting the impact of cyber-attacks on BMC3 enterprises

  • Author

    Shaw, John J.

  • Volume
    2
  • fYear
    2003
  • fDate
    22-24 April 2003
  • Firstpage
    208
  • Abstract
    Measures to safeguard or respond to a cyber attack against a BMC3 enterprise will invariably disrupt the missions supported by that system. We would like to predict the impacts of those disruptions beforehand and select information assurance measures that minimize the disruptions, especially to key BMC3 functions. In this paper we present an analysis method based on perturbation analysis. We develop a workflow model for the BMC3 functions that an enterprise conducts. We record representative processing histories for those functions under nominal conditions. We evaluate off-nominal conditions using an improved form of Cassandras´ (1993) path reconstruction analysis. Initial computational results are encouraging, and indicate that this method predicts off-nominal performance with a high degree of fidelity, and is substantially faster than discrete-event simulation.
  • Keywords
    command and control systems; perturbation theory; security of data; BMC3 enterprises; battle management command control and communications; cyber-attack impact; off-nominal performance; path reconstruction analysis; perturbation analysis; representative processing histories; workflow model; Calibration; Communication system control; Computer crime; Control systems; Discrete event simulation; High performance computing; History; Military computing; Performance analysis; Time factors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    DARPA Information Survivability Conference and Exposition, 2003. Proceedings
  • Print_ISBN
    0-7695-1897-4
  • Type

    conf

  • DOI
    10.1109/DISCEX.2003.1194967
  • Filename
    1194967