Distributed Online Risk Assessment in the National Cyberspace
Abstract
:1. Introduction
2. Distributed Calculation of Iterated Possible-Failure Scenarios
3. LE Working Mode
4. Convergence of the Algorithm
- We have here:
- We have here:
- We have here:
- We have here:
5. An Illustrative Example
- Power company responsible for both a local power plant and the distribution grid (E);
- Railway transport company (T);
- Hospital (H);
- Data center (D).
6. Conclusions
Funding
Conflicts of Interest
Abbreviations
CNT | Operations Center |
LE | local entity delivering a service |
i-th local entity in the system | |
PFS | possible failure scenario |
time of calculation of the c-th set of possible failure scenarios | |
for the whole system | |
time of the k-th iteration of calculation of the PFS of the service s | |
number of subintervals of the PFSs issued by the service (node) s | |
the possible failure scenario (PFS) of the service s estimated at time | |
p-th element of the scenario (sequence) | |
time interval of the PFSs issued by the s-th LE | |
p-th subinterval of | |
set of vulnerabilities of the s -th LE information system | |
set of cyber threats affecting the service s | |
likelihood that the m-th threat may exploit vulnerability of the service s | |
risk activation function of a threat for the service s | |
in the p-th subinterval of its PFS | |
aggregated risk activation function for the service s | |
in the p-th subinterval of its PFS | |
impact factor of the vulnerability on the failure/degradation | |
of the service provided by the s-th LE | |
set of the external services influencing s-th LE | |
impact factor of the failure of the service u on the service s | |
the subinterval of relevant for the estimation of | |
time from which the image of PFS of the service u possessed by the s-th LE | |
at time stems | |
the maximal likelihood of failure of a service |
References
- Yadav, R. Cyber Security Threats During COVID-19 Pandemic. Int. Trans. J. Eng. Manag. Appl. Sci. Technol. 2021, 12, 12A3Q. [Google Scholar]
- Shah, A.; Ganesan, R.; Jajodia, S.; Samarati, P.; Cam, H. Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning. IEEE Trans. Parallel Distr. Syst. 2020, 31, 16–33. [Google Scholar] [CrossRef]
- Baz, M.; Alhakami, H.; Agrawal, A.; Baz, A.; Khan, R.A. Impact of COVID-19 Pandemic: A Cybersecurity Perspective. Intell. Autom. Soft Comput. 2021, 27, 641–652. [Google Scholar] [CrossRef]
- European Commission, Joint Research Centre. Recommendations for National Risk Assessment for Disaster Risk Management in EU; Publications Office of the European Union: Luxembourg, 2021. [Google Scholar]
- Malinowski, K.; Karbowski, A. Real-Time Hierarchical Predictive Risk Assessment at National Level; Mutually Agreed Predicted Service Disruption Profiles. Int. J. Appl. Math. Comput. Sci. 2020, 30, 597–609. [Google Scholar]
- Karbowski, A.; Malinowski, K. Two-Level System of on-Line Risk Assessment in the National Cyberspace. IEEE Access 2020, 8, 181404–181410. [Google Scholar] [CrossRef]
- Bertsekas, D.P.; Tsitsiklis, J.N. Parallel and Distributed Computation: Numerical Methods; Athena Scientific: Belmont, MA, USA, 2015. [Google Scholar]
- Karbowski, A. Distributed, Asynchronous Algorithms for Data Networks Control—A State of the Art Review. In Artificial Intelligence and Computer Science; Shannon, S., Ed.; Nova Science Publishers, Inc.: Commack, NY, USA, 2005; pp. 59–82. [Google Scholar]
- Karbowski, A. Comments on Optimization Flow Control, I: Basic Algorithm and Convergence. IEEE/ACM Trans. Netw. 2003, 11, 338–339. [Google Scholar] [CrossRef]
- Mirzaei, O.; de Fuentes, J.M.; González Manzano, L. Dynamic Risk Assessment in IT Environments: A Decision Guide. In Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution; Fields, Z., Ed.; IGI Global: Hershey, PA, USA, 2018; pp. 234–261. [Google Scholar]
- Pirbhulal, S.; Gkioulos, V.; Katsikas, S. A Systematic Literature Review on RAMS analysis for critical infrastructures protection. Int. J. Crit. Infrastruct. Prot. 2021, 33, 100427. [Google Scholar] [CrossRef]
- Brændelanda, G.; Refsdal, A.; Stølen, K. Modular analysis and modelling of risk scenarios with dependencies. J. Syst. Softw. 2010, 83, 1995–2013. [Google Scholar] [CrossRef]
- Theoharidou, M.; Kotzanikolaou, P.; Gritzalis, D. Risk assessment methodology for interdependent critical infrastructures. Int. J. Risk Assess. Manag. 2011, 15, 128–148. [Google Scholar] [CrossRef]
- Gonzalez-Granadillo, G.; Dubus, S.; Motzek, A.; Garcia-Alfaro, J.; Alvarez, E.; Merialdo, M.; Papillon, S.; Debar, H. Dynamic risk management response system to handle cyber threats. Future Gener. Comput. Syst. 2018, 83, 535–555. [Google Scholar] [CrossRef]
- Bhuiyan, T.H.; Medal, H.R.; Nandi, A.K.; Halappanavar, M. Risk-averse bi-level stochastic network interdiction model for cyber-security risk management. Int. J. Crit. Infrastruct. Prot. 2021, 32, 100408. [Google Scholar] [CrossRef]
- Naumov, S.; Kabanov, I. Dynamic framework for assessing cyber security risks in a changing environment. In Proceedings of the 22nd International Conference on Information and Software Technologies ICIST 2016, Druskininkai, Lithuania, 13–15 October 2016. [Google Scholar]
- Amin, M.T.; Khan, F.; Ahmed, S.; Imtiaz, S. A novel data-driven methodology for fault detection and dynamic risk assessment. Can. J. Chem. Eng. 2020, 98, 2397–2416. [Google Scholar] [CrossRef]
- Ye, N.; Zhang, Y.; Borror, C.M. Robustness of the Markov-Chain Model for Cyber-Attack Detection. IEEE Trans. Reliab. 2004, 53, 116–123. [Google Scholar] [CrossRef]
- Karbowski, A.; Malinowski, K.; Szwaczyk, S.; Jaskóła, P. Critical Infrastructure Risk Assessment Using Markov Chain Model. J. Telecommun. Inf. Technol. 2019, 2019, 15–20. [Google Scholar] [CrossRef]
- Hu, B.; Zhou, C.; Tian, Y.-C.; Hu, X.; Junping, X. Decentralized Consensus Decision-Making for Cybersecurity Protection in Multimicrogrid Systems. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 2187–2198. [Google Scholar] [CrossRef]
- European Union Agency for Network and Information Security. National-level Risk Assessments an Analysis Report—Executive Summary Nov. 2013; ENISA: Heraklion, Greece, 2013.
- Kure, H.I.; Islam, S.; Razzaque, M.A. An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System. Appl. Sci. 2018, 8, 898. [Google Scholar] [CrossRef] [Green Version]
- Riesco, R.; Villagrá, V.A. Leveraging cyber threat intelligence for a dynamic risk framework. Int. J. Inf. Secur. 2019, 18, 715–739. [Google Scholar] [CrossRef]
- Kavallieratos, G.; Spathoulas, G.; Katsikas, S. Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems. Sensors 2021, 21, 1691. [Google Scholar] [CrossRef] [PubMed]
- National Institute of Standards and Technology, U.S. Department of Commerce. Guide for Conducting Risk Assessments, Information Security. NIST Special Publication 800—30 Revision 1; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2012.
- Gbikpi-Benissan, G.; Magoulèsb, F. Protocol-free asynchronous iterations termination. Adv. Eng. Softw. 2020, 146, 102827. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Karbowski, A. Distributed Online Risk Assessment in the National Cyberspace. Electronics 2022, 11, 741. https://doi.org/10.3390/electronics11050741
Karbowski A. Distributed Online Risk Assessment in the National Cyberspace. Electronics. 2022; 11(5):741. https://doi.org/10.3390/electronics11050741
Chicago/Turabian StyleKarbowski, Andrzej. 2022. "Distributed Online Risk Assessment in the National Cyberspace" Electronics 11, no. 5: 741. https://doi.org/10.3390/electronics11050741
APA StyleKarbowski, A. (2022). Distributed Online Risk Assessment in the National Cyberspace. Electronics, 11(5), 741. https://doi.org/10.3390/electronics11050741