Evaluating damage from cyber attacks: A model and analysis

Authors
Citation
C. Lala et B. Panda, Evaluating damage from cyber attacks: A model and analysis, IEEE SYST A, 31(4), 2001, pp. 300-310
Citations number
20
Categorie Soggetti
AI Robotics and Automatic Control
Journal title
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS
ISSN journal
10834427 → ACNP
Volume
31
Issue
4
Year of publication
2001
Pages
300 - 310
Database
ISI
SICI code
1083-4427(200107)31:4<300:EDFCAA>2.0.ZU;2-G
Abstract
Accurate recovery from a cyber attack depends on fast and perfect damage as sessment. For damage assessment, traditional recovery methods require that the log of an affected database must be scanned starting from the attacking transaction until the end. This is a time- consuming task. Our objective i n this research is to provide techniques that can be used to accelerate dam age appraisal process and produce correct result. In this paper, we have pr esented a damage assessment model and four data structures associated with the model. Each of these structures uses dependency relationships among tra nsactions, which update the database. These relationships are later used to determine exactly which transactions and exactly which data items are affe cted by the attacker. A performance comparison analysis obtained using simu lation is provided to demonstrate the benefit of our model.