Title :
Predicting the impact of cyber-attacks on BMC3 enterprises
Abstract :
Measures to safeguard or respond to a cyber attack against a BMC3 enterprise will invariably disrupt the missions supported by that system. We would like to predict the impacts of those disruptions beforehand and select information assurance measures that minimize the disruptions, especially to key BMC3 functions. In this paper we present an analysis method based on perturbation analysis. We develop a workflow model for the BMC3 functions that an enterprise conducts. We record representative processing histories for those functions under nominal conditions. We evaluate off-nominal conditions using an improved form of Cassandras´ (1993) path reconstruction analysis. Initial computational results are encouraging, and indicate that this method predicts off-nominal performance with a high degree of fidelity, and is substantially faster than discrete-event simulation.
Keywords :
command and control systems; perturbation theory; security of data; BMC3 enterprises; battle management command control and communications; cyber-attack impact; off-nominal performance; path reconstruction analysis; perturbation analysis; representative processing histories; workflow model; Calibration; Communication system control; Computer crime; Control systems; Discrete event simulation; High performance computing; History; Military computing; Performance analysis; Time factors;
Conference_Titel :
DARPA Information Survivability Conference and Exposition, 2003. Proceedings
Print_ISBN :
0-7695-1897-4
DOI :
10.1109/DISCEX.2003.1194967