DocumentCode
3398034
Title
Predicting the impact of cyber-attacks on BMC3 enterprises
Author
Shaw, John J.
Volume
2
fYear
2003
fDate
22-24 April 2003
Firstpage
208
Abstract
Measures to safeguard or respond to a cyber attack against a BMC3 enterprise will invariably disrupt the missions supported by that system. We would like to predict the impacts of those disruptions beforehand and select information assurance measures that minimize the disruptions, especially to key BMC3 functions. In this paper we present an analysis method based on perturbation analysis. We develop a workflow model for the BMC3 functions that an enterprise conducts. We record representative processing histories for those functions under nominal conditions. We evaluate off-nominal conditions using an improved form of Cassandras´ (1993) path reconstruction analysis. Initial computational results are encouraging, and indicate that this method predicts off-nominal performance with a high degree of fidelity, and is substantially faster than discrete-event simulation.
Keywords
command and control systems; perturbation theory; security of data; BMC3 enterprises; battle management command control and communications; cyber-attack impact; off-nominal performance; path reconstruction analysis; perturbation analysis; representative processing histories; workflow model; Calibration; Communication system control; Computer crime; Control systems; Discrete event simulation; High performance computing; History; Military computing; Performance analysis; Time factors;
fLanguage
English
Publisher
ieee
Conference_Titel
DARPA Information Survivability Conference and Exposition, 2003. Proceedings
Print_ISBN
0-7695-1897-4
Type
conf
DOI
10.1109/DISCEX.2003.1194967
Filename
1194967
Link To Document