skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Towards a Multiscale Approach to Cybersecurity Modeling

Abstract

We propose a multiscale approach to modeling cyber networks, with the goal of capturing a view of the network and overall situational awareness with respect to a few key properties--- connectivity, distance, and centrality--- for a system under an active attack. We focus on theoretical and algorithmic foundations of multiscale graphs, coming from an algorithmic perspective, with the goal of modeling cyber system defense as a specific use case scenario. We first define a notion of \emph{multiscale} graphs, in contrast with their well-studied single-scale counterparts. We develop multiscale analogs of paths and distance metrics. As a simple, motivating example of a common metric, we present a multiscale analog of the all-pairs shortest-path problem, along with a multiscale analog of a well-known algorithm which solves it. From a cyber defense perspective, this metric might be used to model the distance from an attacker's position in the network to a sensitive machine. In addition, we investigate probabilistic models of connectivity. These models exploit the hierarchy to quantify the likelihood that sensitive targets might be reachable from compromised nodes. We believe that our novel multiscale approach to modeling cyber-physical systems will advance several aspects of cyber defense, specifically allowing for a more efficientmore » and agile approach to defending these systems.« less

Authors:
; ; ; ; ;
Publication Date:
Research Org.:
Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1123248
Report Number(s):
PNNL-SA-96793
DOE Contract Number:  
AC05-76RL01830
Resource Type:
Conference
Resource Relation:
Conference: IEEE International Conference on Technologies for Homeland Security (HST 2013), November 12-14, 2013, Waltham, MA, 80-85
Country of Publication:
United States
Language:
English
Subject:
Cybersecurity; Graph Theory; Multiscale; Modeling; Network security

Citation Formats

Hogan, Emilie A., Hui, Peter SY, Choudhury, Sutanay, Halappanavar, Mahantesh, Oler, Kiri J., and Joslyn, Cliff A. Towards a Multiscale Approach to Cybersecurity Modeling. United States: N. p., 2013. Web. doi:10.1109/THS.2013.6698980.
Hogan, Emilie A., Hui, Peter SY, Choudhury, Sutanay, Halappanavar, Mahantesh, Oler, Kiri J., & Joslyn, Cliff A. Towards a Multiscale Approach to Cybersecurity Modeling. United States. doi:10.1109/THS.2013.6698980.
Hogan, Emilie A., Hui, Peter SY, Choudhury, Sutanay, Halappanavar, Mahantesh, Oler, Kiri J., and Joslyn, Cliff A. Tue . "Towards a Multiscale Approach to Cybersecurity Modeling". United States. doi:10.1109/THS.2013.6698980.
@article{osti_1123248,
title = {Towards a Multiscale Approach to Cybersecurity Modeling},
author = {Hogan, Emilie A. and Hui, Peter SY and Choudhury, Sutanay and Halappanavar, Mahantesh and Oler, Kiri J. and Joslyn, Cliff A.},
abstractNote = {We propose a multiscale approach to modeling cyber networks, with the goal of capturing a view of the network and overall situational awareness with respect to a few key properties--- connectivity, distance, and centrality--- for a system under an active attack. We focus on theoretical and algorithmic foundations of multiscale graphs, coming from an algorithmic perspective, with the goal of modeling cyber system defense as a specific use case scenario. We first define a notion of \emph{multiscale} graphs, in contrast with their well-studied single-scale counterparts. We develop multiscale analogs of paths and distance metrics. As a simple, motivating example of a common metric, we present a multiscale analog of the all-pairs shortest-path problem, along with a multiscale analog of a well-known algorithm which solves it. From a cyber defense perspective, this metric might be used to model the distance from an attacker's position in the network to a sensitive machine. In addition, we investigate probabilistic models of connectivity. These models exploit the hierarchy to quantify the likelihood that sensitive targets might be reachable from compromised nodes. We believe that our novel multiscale approach to modeling cyber-physical systems will advance several aspects of cyber defense, specifically allowing for a more efficient and agile approach to defending these systems.},
doi = {10.1109/THS.2013.6698980},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2013},
month = {11}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share: