Academic literature on the topic 'Attack Resilience'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack Resilience.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Attack Resilience"

1

Podobnik, B., D. Horvatic, T. Lipic, M. Perc, J. M. Buldú, and H. E. Stanley. "The cost of attack in competing networks." Journal of The Royal Society Interface 12, no. 112 (November 2015): 20150770. http://dx.doi.org/10.1098/rsif.2015.0770.

Full text
Abstract:
Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator–prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities.
APA, Harvard, Vancouver, ISO, and other styles
2

Лисенко, Сергій Миколайович, Вячеслав Сергійович Харченко, Кіра Юліївна Бобровнікова, and Роман Володимирович Щука. "РЕЗИЛЬЄНТНІСТЬ КОМП’ЮТЕРНИХ СИСТЕМ В УМОВАХ КІБЕРЗАГРОЗ: ТАКСОНОМІЯ ТА ОНТОЛОГІЯ." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 1 (January 28, 2020): 17–28. http://dx.doi.org/10.32620/reks.2020.1.02.

Full text
Abstract:
The rapid development of information technology has expanded the capabilities of cyberthreads regarding computer systems. Cybercriminals are developing new ways to avoid attack detection, so existing approaches are not able to withstand the growing threat of attacks. Meanwhile, the consequences of cyberattacks are becoming more dangerous and destructive. One of the approaches to solve the problem is the construction of resilient systems that are able to quickly recover and continue to function under attack conditions. The subject of research is the construction process of the resilient computer systems in the face of cyber threats. The goal is to develop a taxonomy and ontology of resilient computer systems under cyberthreats. Results. The article presents the definitions of the resilience from the point of view of cybersecurity, presents the gap between the concepts of resilience and dependability. The paper presents the main elements of the taxonomic scheme of computer system resilience, which include threats (changes in the environment and requirements, network attacks, attacks on software, software and hardware vulnerabilities, errors, failures), information and technical conditions that computer system passes during its operating cycle, the principles on which resilience is based (proactivity, adaptability, resistance, diversity, elasticity, controlled degradation, defense in depth, ability to evolvability), as well as primary and secondary properties. Based on the above elements, a generalized taxonomic scheme of resilience related to information security has been developed. The work presents the operational cycle of a resilient CS as a set of information and technical states that the system goes through (preparation, system protection, threat detection, threat absorption, response to a threat, system recovery after a cyberattack, adaptation.) An ontology scheme of the resilience from the point of view of information security of computer systems in the presence of cyberthreats is developed. Conclusions A taxonomy and ontology of resilient computer systems in the presence of cyberthreats has been developed.
APA, Harvard, Vancouver, ISO, and other styles
3

He, Yao, Yongchun Yang, Meimei Wang, and Xudong Zhang. "Resilience Analysis of Container Port Shipping Network Structure: The Case of China." Sustainability 14, no. 15 (August 2, 2022): 9489. http://dx.doi.org/10.3390/su14159489.

Full text
Abstract:
The increased port outages caused by events such as war and public health emergencies have motivated the study of container port shipping network (CPSN) resilience. This paper proposes a resilience framework, which includes prevention, resistance, restoration, adaption, and optimization. The framework is used to analyze the resilience of the CPSN by detecting changing performance of the network indicators before and after the random attack or one of the deliberate attacks. The indicators include the network resilience index, degree distribution, independent path, cluster coefficient, network efficiency and connectivity. The comparative analysis is based on the statistics of China’s cases in 2005 and 2017. The results indicate that, first, the resilience of the structure of China’s container port shipping network (CCPSN) in 2017 has improved when comparing the 2015 situation. Second, the performance of indicators under betweenness attack (BA) decreases faster than other attacks; the resilience index of deliberate attacks is poorer, when compared with the random attack (RA). Third, network resilience can be improved by protecting and adding hub port nodes. Priority should be given to restoring the hub port nodes during the recovery process. The same network indicator recovers similarly after facing different attacks, while different indicator shows various recovery process. Thus, it is necessary to consider the different recovery performances of network indicators when the damaged CPSN selects recovery mode.
APA, Harvard, Vancouver, ISO, and other styles
4

Ibrahim, Mariam, and Asma Alkhraibat. "Resiliency Assessment of Microgrid Systems." Applied Sciences 10, no. 5 (March 6, 2020): 1824. http://dx.doi.org/10.3390/app10051824.

Full text
Abstract:
Measuring resiliency of smart grid systems is one of the vital topics towards maintaining a reliable and efficient operation under attacks. This paper introduces a set of factors that are utilized for resiliency quantification of microgrid (MG) systems. The level of resilience (LoR) measure is determined by examining the voltage sag percentage, the level of performance reduction (LoPR) as measured by percentage of reduction of load served, recovery time (RT), which is the time system takes to detect and recover from an attack/fault, and the time to reach Power Balance state (Tb) during the islanded mode. As an illustrative example, a comparison based on the resiliency level is presented for two topologies of MGs under an attack scenario.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Yuntao, Michael Zuzak, Yang Xie, Abhishek Chakraborty, and Ankur Srivastava. "Robust and Attack Resilient Logic Locking with a High Application-Level Impact." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (May 11, 2021): 1–22. http://dx.doi.org/10.1145/3446215.

Full text
Abstract:
Logic locking is a hardware security technique aimed at protecting intellectual property against security threats in the IC supply chain, especially those posed by untrusted fabrication facilities. Such techniques incorporate additional locking circuitry within an integrated circuit (IC) that induces incorrect digital functionality when an incorrect verification key is provided by a user. The amount of error induced by an incorrect key is known as the effectiveness of the locking technique. A family of attacks known as “SAT attacks” provide a strong mathematical formulation to find the correct key of locked circuits. To achieve high SAT resilience (i.e., complexity of SAT attacks), many conventional logic locking schemes fail to inject sufficient error into the circuit when the key is incorrect. For example, in the case of SARLock and Anti-SAT, there are usually very few (or only one) input minterms that cause any error at the circuit output. The state-of-the-art s tripped functionality logic locking (SFLL) technique provides a wide spectrum of configurations that introduced a tradeoff between SAT resilience and effectiveness. In this work, we prove that such a tradeoff is universal among all logic locking techniques. To attain high effectiveness of locking without compromising SAT resilience, we propose a novel logic locking scheme, called Strong Anti-SAT (SAS). In addition to SAT attacks, removal-based attacks are another popular kind of attack formulation against logic locking where the attacker tries to identify and remove the locking structure. Based on SAS, we also propose Robust SAS (RSAS) that is resilient to removal attacks and maintains the same SAT resilience and effectiveness as SAS. SAS and RSAS have the following significant improvements over existing techniques. (1) We prove that the SAT resilience of SAS and RSAS against SAT attack is not compromised by increase in effectiveness . (2) In contrast to prior work that focused solely on the circuit-level locking impact, we integrate SAS-locked modules into an 80386 processor and show that SAS has a high application-level impact. (3) Our experiments show that SAS and RSAS exhibit better SAT resilience than SFLL and their effectiveness is similar to SFLL.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Mingyu, and Huapu Lu. "Analysis of Transportation Network Vulnerability and Resilience within an Urban Agglomeration: Case Study of the Greater Bay Area, China." Sustainability 12, no. 18 (September 9, 2020): 7410. http://dx.doi.org/10.3390/su12187410.

Full text
Abstract:
Recently, urban agglomerations have become the main platform of China’s economic development. As one of those, the Guangdong-Hong Kong-Macao Greater Bay Area (GBA) has an important strategic position in national blueprints. Its amazing achievement is inseparable from reliable and resilient transportation networks. With the aim of improving the sustainability of the GBA, this paper presents a novel view of vulnerability and resilience of integrated transportation networks within an urban agglomeration. According to complex network theory, the integrated transportation network model of the GBA was established. Various scenarios were considered to improve the overall level of defensive ability, including random failures, targeted attacks and natural hazards. Vulnerability and resilience assessment models were developed to investigate the influences on the whole network. Finally, a simulation analysis was conducted on the GBA to examine the variations in network performance when faced with different attack scenarios. The results indicate that the transportation network of the GBA is more vulnerable and has less resilience to targeted attacks, while natural hazards had little influence on the performance, to a certain extent. Moreover, the betweenness recovery strategy seemed to be the best choice for every attack scenario.
APA, Harvard, Vancouver, ISO, and other styles
7

Afrin, Tanzina, and Nita Yodo. "Resilience-Based Recovery Assessments of Networked Infrastructure Systems under Localized Attacks." Infrastructures 4, no. 1 (March 12, 2019): 11. http://dx.doi.org/10.3390/infrastructures4010011.

Full text
Abstract:
To reduce unforeseen disaster risks, infrastructure systems are expected to be resilient. The impact of many natural disasters on networked infrastructures is often observed to follow a localized attack pattern. The localized attack can be demonstrated by the failures of a group of links concentrated in a particular geographical domain which result in adjacent isolated nodes. In this paper, a resilience-based recovery assessment framework is proposed. The framework aims to find the most effective recovery strategy when subjected to localized attacks. The proposed framework was implemented in a lattice network structure inspired by a water distribution network case study. Three different recovery strategies were studied with cost and time constraints incorporated: preferential recovery based on nodal weight (PRNW), periphery recovery (PR), and localized recovery (LR). The case study results indicated that LR could be selected as the most resilient and cost-effective recovery strategy. This paper hopes to aid in the decision-making process by providing a strategic baseline for finding an optimized recovery strategy for localized attack scenarios.
APA, Harvard, Vancouver, ISO, and other styles
8

Yan, Shu, Shao Ting Tang, Sen Pei, Shi Jin Jiang, Wei Hua Li, Xian Teng, and Zhi Ming Zheng. "Resilience to Intentional Attacks of Complex Networks." Applied Mechanics and Materials 421 (September 2013): 647–51. http://dx.doi.org/10.4028/www.scientific.net/amm.421.647.

Full text
Abstract:
The study of intentional attackshas become an important issue onthe research of complex networks. In this paper, we study the resilience of networks, introducing the parameters that describe the attacks effect and the parameters that measure the priority of intentional attacks. Weestablish analgorithm to analysis the intentional attack phenomenon and present the numerical simulation.
APA, Harvard, Vancouver, ISO, and other styles
9

Yeboah-Ofori, Abel, Cameron Swart, Francisca Afua Opoku-Boateng, and Shareeful Islam. "Cyber resilience in supply chain system security using machine learning for threat predictions." Continuity & Resilience Review 4, no. 1 (February 9, 2022): 1–36. http://dx.doi.org/10.1108/crr-10-2021-0034.

Full text
Abstract:
PurposeCyber resilience in cyber supply chain (CSC) systems security has become inevitable as attacks, risks and vulnerabilities increase in real-time critical infrastructure systems with little time for system failures. Cyber resilience approaches ensure the ability of a supply chain system to prepare, absorb, recover and adapt to adverse effects in the complex CPS environment. However, threats within the CSC context can pose a severe disruption to the overall business continuity. The paper aims to use machine learning (ML) techniques to predict threats on cyber supply chain systems, improve cyber resilience that focuses on critical assets and reduce the attack surface.Design/methodology/approachThe approach follows two main cyber resilience design principles that focus on common critical assets and reduce the attack surface for this purpose. ML techniques are applied to various classification algorithms to learn a dataset for performance accuracies and threats predictions based on the CSC resilience design principles. The critical assets include Cyber Digital, Cyber Physical and physical elements. We consider Logistic Regression, Decision Tree, Naïve Bayes and Random Forest classification algorithms in a Majority Voting to predicate the results. Finally, we mapped the threats with known attacks for inferences to improve resilience on the critical assets.FindingsThe paper contributes to CSC system resilience based on the understanding and prediction of the threats. The result shows a 70% performance accuracy for the threat prediction with cyber resilience design principles that focus on critical assets and controls and reduce the threat.Research limitations/implicationsTherefore, there is a need to understand and predicate the threat so that appropriate control actions can ensure system resilience. However, due to the invincibility and dynamic nature of cyber attacks, there are limited controls and attributions. This poses serious implications for cyber supply chain systems and its cascading impacts.Practical implicationsML techniques are used on a dataset to analyse and predict the threats based on the CSC resilience design principles.Social implicationsThere are no social implications rather it has serious implications for organizations and third-party vendors.Originality/valueThe originality of the paper lies in the fact that cyber resilience design principles that focus on common critical assets are used including Cyber Digital, Cyber Physical and physical elements to determine the attack surface. ML techniques are applied to various classification algorithms to learn a dataset for performance accuracies and threats predictions based on the CSC resilience design principles to reduce the attack surface for this purpose.
APA, Harvard, Vancouver, ISO, and other styles
10

Mennink, Bart, and Samuel Neves. "On the Resilience of Even-Mansour to Invariant Permutations." Designs, Codes and Cryptography 89, no. 5 (February 23, 2021): 859–93. http://dx.doi.org/10.1007/s10623-021-00850-2.

Full text
Abstract:
AbstractSymmetric cryptographic primitives are often exposed to invariances: deterministic relations between plaintexts and ciphertexts that propagate through the primitive. Recent invariant subspace attacks have shown that these can be a serious issue. One way to mitigate invariant subspace attacks is at the primitive level, namely by proper use of round constants (Beierle et al., CRYPTO 2017). In this work, we investigate how to thwart invariance exploitation at the mode level, namely by assuring that a mode never evaluates its underlying primitive under any invariance. We first formalize the use of invariant cryptographic permutations from a security perspective, and analyze the Even-Mansour block cipher construction. We further demonstrate how the model composes, and apply it to the keyed sponge construction. The security analyses exactly pinpoint how the presence of linear invariances affects the bounds compared with analyses in the random permutation model. As such, they give an exact indication how invariances can be exploited. From a practical side, we apply the derived security bounds to the case where the Even-Mansour construction is instantiated with the 512-bit ChaCha permutation, and derive a distinguishing attack against Even-Mansour-ChaCha in $$2^{128}$$ 2 128 queries, faster than the birthday bound. Comparable results are derived for instantiation using the 200-bit Keccak permutation without round constants (attack in $$2^{50}$$ 2 50 queries), the 1024-bit CubeHash permutation (attack in $$2^{256}$$ 2 256 queries), and the 384-bit Gimli permutation without round constants (attack in $$2^{96}$$ 2 96 queries). The attacks do not invalidate the security of the permutations themselves, but rather they demonstrate the tightness of our bounds and confirm that care should be taken when employing a cryptographic primitive that has nontrivial linear invariances.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Attack Resilience"

1

Chen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.

Full text
Abstract:
The tremendous success of various wireless applications operating in unlicensed bands has resulted in the overcrowding of those bands. Cognitive radio (CR) is a new technology that enables an unlicensed user to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent communications. This technology can significantly alleviate the spectrum shortage problem and improve the efficiency of spectrum utilization. Networks consisting of CR nodes (i.e., CR networks)---often called dynamic spectrum access networks or NeXt Generation (XG) communication networks---are envisioned to provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access techniques. In recent years, the operational aspects of CR networks have attracted great research interest. However, research on the security aspects of CR networks has been very limited. In this thesis, we discuss security issues that pose a serious threat to CR networks. Specifically, we focus on three potential attacks that can be launched at the physical or MAC layer of a CR network: primary user emulation (PUE) attack, spectrum sensing data falsification (SSDF) attack, and control channel jamming (CCJ) attack. These attacks can wreak havoc to the normal operation of CR networks. After identifying and analyzing the attacks, we discuss countermeasures. For PUE attacks, we propose a transmitter verification scheme for attack detection. The scheme utilizes the location information of transmitters together with their signal characteristics to verify licensed users and detect PUE attackers. For both SSDF attacks and CCJ attacks, we seek countermeasures for attack mitigation. In particular, we propose Weighted Sequential Probability Ratio Test (WSPRT) as a data fusion technique that is robust against SSDF attacks, and introduce a multiple-rendezvous cognitive MAC (MRCMAC) protocol that is robust against CCJ attacks. Using security analysis and extensive numerical results, we show that the proposed schemes can effectively counter the aforementioned attacks in CR networks.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
2

Klaus, Christian. "Network design for reliability and resilience to attack." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41406.

Full text
Abstract:
Approved for public release; distribution is unlimited.
We define and solve two network-design problems. In the first, (1) a defender uses limited resources to select a portfolio of paths or design a sub-network; (2) an attacker then uses limited attack resources to destroy network arcs, and then (3) the defender operates the damaged network optimally by ending a shortest path. The solution identifies a network design that minimizes post-attack path length. We show how the tri-level problem is equivalent to a single-level mixed integer program (MIP) with an exponential number of rows and columns, and solve that MIP using simultaneous row and column generation. Methods extend to network operations denied through general now constructs. The second problem considers a stochastic logistics network where arcs are present randomly and independently. Shipping from a source to a destination may be delayed until a path connecting the two is available. In the presence of storage capacity, cargo can be shipped partway. The problem's solution identifies the storage locations that minimize the cargo's waiting time for shipment. We develop and demonstrate practical methods to solve this #P-complete problem on a model instance derived from a Department of Defense humanitarian shipping network.
APA, Harvard, Vancouver, ISO, and other styles
3

Suraev, Maxim. "Denial-of-service attack resilience of the GSM access network." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13313.

Full text
Abstract:
GSM network capable of connecting to any operator providing SIP trunk has beenconstructed to serve as a target for controlled experiment on DoS attacks againstGSM. The usage of this network as a tool to perform DoS attack against mobilephones was also investigated and documented.Open source implementation of testing tool to check DoS resilience of any GSMbase station against RACH flood attack was developed as part of this thesis.Additionally, the analysis of the GSM flaws which opened the possibility for DoSattacks, and the analysis of potential countermeasures is presented.
APA, Harvard, Vancouver, ISO, and other styles
4

Oguz, Saziye Deniz. "Protein Domain Networks: Analysis Of Attack Tolerance Under Varied Circumstances." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612518/index.pdf.

Full text
Abstract:
Recently, there has been much interest in the resilience of complex networks to random failures and intentional attacks. The study of the network robustness is particularly important by several occasions. In one hand a higher degree of robustness to errors and attacks may be desired for maintaining the information flow in communication networks under attacks. On the other hand planning a very limited attack aimed at fragmenting a network by removal of minimum number of the most important nodes might have significant usage in drug design. Many real world networks were found to display scale free topology including WWW, the internet, social networks or regulatory gene and protein networks. In the recent studies it was shown that while these networks have a surprising error tolerance, their scale-free topology makes them fragile under intentional attack, leaving the scientists a challenge on how to improve the networks robustness against attacks. In this thesis, we studied the protein domain co-occurrence network of yeast which displays scale free topology generated with data from Biomart which links to Pfam database. Several networks obtained from protein domain co-occurrence network having exactly the same connectivity distribution were compared under attacks to investigate the assumption that the different networks with the same connectivity distribution do not need to have the same attack tolerances. In addition to this, we considered that the networks with the same connectivity distribution have higher attack tolerance as we organize the same resources in a better way. Then, we checked for the variations of attack tolerance of the networks with the same connectiviy distributions. Furthermore, we investigated whether there is an evolutionary mechanism for having networks with higher or lower attack tolerances for the same connectivity distribution. As a result of these investigations, the different networks with the same connectivity distribution do not have the same attack tolerances under attack. In addition to this, it was observed that the networks with the same connectivity distribution have higher attack tolerances as organizing the same resources in a better way which implies that there is an evolutionary mechanism for having networks with higher attack tolerance for the same connectivity distribution.
APA, Harvard, Vancouver, ISO, and other styles
5

Craft, LaMesha Lashal. "Perceived Threats to Food Security and Possible Responses Following an Agro-Terrorist Attack." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3289.

Full text
Abstract:
The September 11, 2001 terrorist attacks exposed vulnerabilities to U.S. homeland security and defense, leading U.S. officials to analyze threats to domestic and international interests. Terrorist attacks against food and water supplies (agro-terrorism), were deemed a national security threat because of the assessed fear, economic instability, and social instability that could occur following a food shortage. Research indicated a comprehensive response plan does not exist across the federal, state, and local levels of government to mitigate the public's possible responses to a perceived threat to food security and food shortages following an agro-terrorist attack. This ethnographic case study analyzed the perceived threats to food security and the possible responses to food shortages in Yuma, Arizona (the 'winter lettuce capitol of the world'). Coleman and Putnam's theories of social capital served as the theoretical framework for this study. Data were collected through semistructured interviews of nine residents and six experts from Yuma's departments of government to examine the relative atmospherics between the citizens and government officials. Findings indicated that a comprehensive plan does not exist, and perceived fears and the lack of knowledge about emergency preparedness in a society with high social capital and community resilience can still create the conditions for chaos and anomie. Recommendations include improving communication, education, and expectation management of citizens. Implications for social change include improving public awareness and individual responsibility for preparedness, as well as assisting policymakers in maintaining social capital to deter social disorganization and anomie during disasters.
APA, Harvard, Vancouver, ISO, and other styles
6

Branlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.

Full text
Abstract:
Social engineering (SE) attacks are one of the most common cyber attacks and frauds, which causes a large economical destruction to individuals, companies and governments alike. The attacks are hard to protect from, since SE-attacks is based on exploiting human weaknesses. The goal of this study is to identify indicators of resilience against SE-attacks from individual computer space data, such as network settings, social media profiles, web browsing behaviour and more. This study is based on qualitative methods to collect information, analyse and evaluate data. Resilience is evaluated with models such as theory of planned behaviour and the big five personality traits, as well as personal and demographic information. Indicators of resilience were found in network settings such as service set identifiers (SSID) and routers, web history, social media use and more. The framework developed in this study could be expanded with more aspect of individual data and different evaluation criteria. Further studies can be done about this subject with tools such as artificial intelligence and machine learning.
Sociala manipulationer är bland de vanligaste cyber attackerna och bedrägerierna som orsakar enorma ekonomiska skador varje år för individer, företag och myndigheter. Dessa attacker är svåra att skydda ifrån då sociala manipulationer utnyttjar mänskliga svagheter som ett medel till att stjäla pengar eller information. Målet med studien är att identifiera indikatorer av motstånd mot sociala manipulationsattacker, vilket ska göras med hjälp av individuell data, som kan bestå av nätverksinställningar, sociala medieprofiler, webbaktivitet bland annat. Denna studie är baserat på kvalitativa metoder för att samla, analysera och utvärdera data. Motstånd mot social manipulation utvärderas med hjälp av relevanta teorier och modeller som har med beteende och personligheter att göra, sedan används även personlig och demografisk information i utvärderingen. De indikatorer som identifierades var bland annat inställningar i routrar, webbhistorik och social medianvändning. Det teoretiska ramverket som utvecklades för att utvärdera motstånd mot sociala manipulationsattacker kan utökas med fler aspekter av individuell data. Viktiga samhällshändelser och sammanhang kan vara en intressant faktor som är relaterat till ämnet. Framtida studier skulle kunna kombinera detta ramverk med tekniker som maskinlärning och artificiell intelligens.
APA, Harvard, Vancouver, ISO, and other styles
8

Capps, Hannah Patricia. "AFTER THE ATTACK: POLICE PERSPECTIVES ON PROMOTING RESILIENCY FOLLOWING THE 2015 SAN BERNARDINO ATTACK." CSUSB ScholarWorks, 2019. https://scholarworks.lib.csusb.edu/etd/853.

Full text
Abstract:
The purpose of this study was to provide an exploration of the experiences and perceptions of law enforcement officers who responded to the December 2nd, 2015 San Bernardino Attacks, specifically addressing what interventions and factors they found helpful in promoting their well-being following the attack. To do this, eight semi-structured interviews were held with officers who either were involved in the scene at the Inland Regional Center or were involved in the shoot-out with the attackers later that day. From these interviews several themes emerged, including: the importance of social support, critique of department responses, unique characteristics of law enforcement culture, and stigma against seeking mental health treatment among law enforcement officers. Recommendations based on these findings for social work practice, law enforcement departments, and further research were discussed.
APA, Harvard, Vancouver, ISO, and other styles
9

Fischer, Benjamin. "Vehicular Group Membership Resilient to Malicious Attacks." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086.

Full text
Abstract:
There is a range of tools and techniques in the realm of information security that can be used to enhance the security of a distributed network protocol and some of them introduce new problems. A security analysis of the distributed network protocol SLMP is made and three vulnerabilities are identified; messages can be intercepted and tampered with, nodes can fake id, and leader nodes can do a lot of harm if they are malicious. Three versions of SLMP that aims to remedy these vulnerabilities are implemented and the results show that while they remedy the vulnerabilities some of them introduce new problems.
APA, Harvard, Vancouver, ISO, and other styles
10

Jevtić, Ana Ph D. Massachusetts Institute of Technology. "Cyber-attack detection and resilient state estimation in power systems." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127025.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, May, 2020
Cataloged from the official PDF of thesis.
Includes bibliographical references (pages 99-108).
Many critical infrastructures, such as transportation and electric energy networks, and health care, are now becoming highly integrated with information and communication technology, in order to be more efficient and reliable. These cyber-physical systems (CPS) now face an increasing threat of cyber-attacks. Intelligent attackers can leverage their knowledge of the system, disruption, and disclosure resources to critically damage the system while remaining undiscovered. In this dissertation, we develop a defense strategy, with the ability to uncover malicious and intelligent attacks and enable resilient operation of cyber-physical systems. Specifically, we apply this defense strategy to power systems, described by linear frequency dynamics around the nominal operating point. Our methodology is based on the notion of data aggregation as a tool for extracting internal information about the system that may be unknown to the attacker. As the first step to resilience and security, we propose several methods for active attack detection in cyber-physical systems. In one approach we design a clustering-based moving-target active detection algorithm and evaluate it against stealthy attacks on the 5-bus and 24-bus power grids. Next, we consider an approach based on Interaction Variables (IntVar), as another intuitive way to extract internal information in power grids. We evaluate the eectiveness of this approach on Automatic Generation Control (AGC), a vital control mechanism in today's power grid. After an attack has been detected, mitigation procedures must be put in place to allow continued reliable operation or graceful degradation of the power grid. To that end, we develop a resilient state estimation algorithm, that provides the system operator with situational awareness in the presence of wide-spread coordinated cyber-attacks when many system measurements may become unavailable.
by Ana Jevtić.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Attack Resilience"

1

E, Martin Courtney, ed. Survival and the strength of the human spirit from 9/11 survivors. New York: Dutton, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Unmeasured strength. New York: Henry Holt and Co., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bromfield, Richard. Living with the boogeyman: Helping your child cope with fear, terrorism, and living in a world of uncertainty. Roseville, CA: Prima Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

The resilient homeland: How DHS intelligence should empower America to prepare for, prevent, and withstand terrorist attacks : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, May 15, 2008. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Department of Defense. 2017 Cyber Attack Deterrence: Defense Science Board Task Force on Cyber Deterrence - Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U. S. Nuclear Weapons, Attribution. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Government, U. S., U. S. Military, and Department of Defense. Cyber War: The Next Frontier for NATO - Cyber Attack Response Readiness, Invoking Article 5, Discussion of the Tallinn Manual, Distributed Denial of Service , Resilience Management Model. Independently Published, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Falco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.

Full text
Abstract:
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident’s potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro level (people, networks, systems and data) and the macro level (the organization). Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking about hardware and software while also extending beyond to address operational, reputational and litigation risk. This book both provides the reader with a solid grounding in important prevention-focused technologies—such as cloud-based security and intrusion detection—and emphasizes the important role of incident response. By implementing an Embedded Endurance strategy, you can guide your team to blunt major cyber incidents with preventative and resilience measures engaged systematically across your organization.
APA, Harvard, Vancouver, ISO, and other styles
8

Zou, Bo, Pooria Choobchian, and Julie Rozenberg. Cyber Resilience of Autonomous Mobility Systems: Cyber Attacks and Resilience-Enhancing Strategies. World Bank, Washington, DC, 2020. http://dx.doi.org/10.1596/1813-9450-9135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Watson, Daniel, and Henry Campbell. Emotional Intelligence 2. 0: 2 in 1 Social Anxiety Solution and Mental Toughness a Guide to Stop Fear, Stress, Anxiety, Panic Attack, Shyness, Low Self-Esteem. Build Your Resilience and Discover Stoicism. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dickens, Charles. Bleak House. Edited by Stephen Gill. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199536313.001.0001.

Full text
Abstract:
Bleak House, Dickens’s most daring experiment in the narration of a complex plot, challenges the reader to make connections —between the fashionable and the outcast, the beautiful and the ugly, the powerful and the victims. Nowhere in Dickens’s later novels is his attack on an uncaring society more imaginatively embodied, but nowhere either is the mixture of comedy and angry satire more deftly managed. Bleak House defies a single description. It is a mystery story, in which Esther Summerson discovers the truth about her birth and her unknown mother’s tragic life. It is a murder story, which comes to a climax in a thrilling chase, led by one of the earliest detectives in English fiction, Inspector Bucket. And it is a fable about redemption, in which a bleak house is transformed by the resilience of human love.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Attack Resilience"

1

Ganter, Sarah Anne, and Fernando Oliveira Paulino. "Between Attack and Resilience." In Digital Journalism in Latin America, 106–25. New York: Routledge, 2023. http://dx.doi.org/10.4324/9781003370383-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ibrahim, Mariam, and Ahmad Alsheikh. "Determining Resiliency Using Attack Graphs." In Recent Developments on Industrial Control Systems Resilience, 117–33. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shim, Hyungbo, Juhoon Back, Yongsoon Eun, Gyunghoon Park, and Jihan Kim. "Zero-Dynamics Attack, Variations, and Countermeasures." In Security and Resilience of Control Systems, 31–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-83236-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Latif, Mohammad Ayub, Muhammad Naveed, and Faraz Zaidi. "Resilience of Social Networks under Different Attack Strategies." In Lecture Notes in Computer Science, 16–29. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03260-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ibrahim, Mariam, Ahmad Alsheikh, and Qays Al-Hindawi. "Automatic Attack Graph Generation for Industrial Controlled Systems." In Recent Developments on Industrial Control Systems Resilience, 99–116. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmad, H. M. Sabbir, Nader Meskin, and Mohammad Noorizadeh. "Cyber-Attack Detection for a Crude Oil Distillation Column." In Security and Resilience in Cyber-Physical Systems, 323–46. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97166-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khajenejad, Mohammad, and Sze Zheng Yong. "Resilient State Estimation and Attack Mitigation in Cyber-Physical Systems." In Security and Resilience in Cyber-Physical Systems, 149–85. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97166-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ravikumar, Gelli, and Manimaran Govindarasu. "Machine Learning-Based and Physics-Based Attack Resilient Wide-Area Monitoring, Protection and Control Systems." In Security and Resilience of Control Systems, 203–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-83236-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Abhishek, P. Shanthi Thilagam, Alwyn R. Pais, Vishwas Sharma, and Kunal M. Sadalkar. "Towards Evaluating Resilience of SIP Server under Low Rate DoS Attack." In Information Technology and Mobile Communication, 336–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20573-6_58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pungila, Ciprian, and Viorel Negru. "A Fast Heterogeneous Approach to Enhanced Blockchain Attack Resilience and Mitigation." In 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 3–12. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87872-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Attack Resilience"

1

Hill, Zachary, William M. Nichols, Mauricio Papa, John C. Hale, and Peter J. Hawrylak. "Verifying attack graphs through simulation." In 2017 Resilience Week (RWS). IEEE, 2017. http://dx.doi.org/10.1109/rweek.2017.8088649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Soule, Nathaniel, Borislava Simidchieva, Fusun Yaman, Ronald Watro, Joseph Loyall, Michael Atighetchi, Marco Carvalho, David Last, David Myers, and Bridget Flatley. "Quantifying & minimizing attack surfaces containing moving target defenses." In 2015 Resilience Week (RWS). IEEE, 2015. http://dx.doi.org/10.1109/rweek.2015.7287449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xie, Tian, Ting He, Patrick McDaniel, and Namitha Nambiar. "Attack Resilience of Cache Replacement Policies." In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications. IEEE, 2021. http://dx.doi.org/10.1109/infocom42981.2021.9488697.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ashok, Aditya, Siddharth Sridhar, A. David McKinnon, Pengyuan Wang, and Manimaran Govindarasu. "Testbed-based performance evaluation of Attack Resilient Control for AGC." In 2016 Resilience Week (RWS). IEEE, 2016. http://dx.doi.org/10.1109/rweek.2016.7573319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gourisetti, Sri Nikhil Gupta, Michael Mylrea, Travis Ashley, Roger Kwon, Jerry Castleberry, Quinn Wright-Mockler, Penny McKenzie, and Geoffrey Brege. "Demonstration of the Cybersecurity Framework through Real-World Cyber Attack." In 2019 Resilience Week (RWS). IEEE, 2019. http://dx.doi.org/10.1109/rws47064.2019.8971822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Foster, Rita, Zach Priest, and Michael Cutshaw. "Infrastructure eXpression for Codified Cyber Attack Surfaces and Automated Applicability." In 2021 Resilience Week (RWS). IEEE, 2021. http://dx.doi.org/10.1109/rws52686.2021.9611807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Biswas, Rajorshi, Jie Wu, and Avinash Srinivasan. "Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack." In 2019 Resilience Week (RWS). IEEE, 2019. http://dx.doi.org/10.1109/rws47064.2019.8972008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Biswas, Rajorshi, Jie Wu, and Yang Chen. "Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter." In 2019 Resilience Week (RWS). IEEE, 2019. http://dx.doi.org/10.1109/rws47064.2019.8972010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fard, Amin Y., Mohammad B. Shadmand, and Sudip K. Mazumder. "Holistic Multi-timescale Attack Resilient Control Framework for Power Electronics Dominated Grid." In 2020 Resilience Week (RWS). IEEE, 2020. http://dx.doi.org/10.1109/rws50334.2020.9241270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Falco, Gregory. "When Satellites Attack: Satellite-to-Satellite Cyber Attack, Defense and Resilience." In ASCEND 2020. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2020. http://dx.doi.org/10.2514/6.2020-4014.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Attack Resilience"

1

Nuqui, Reynaldo. Cyber Attack Resilient HVDC System (CARDS) (Final Scientific/Technical Report). Office of Scientific and Technical Information (OSTI), December 2019. http://dx.doi.org/10.2172/1810571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gasparotto, Thatyanne, and Julia Ambrosano. Opportunities for Sustainable Infrastructure Investments at City Level in Brazil. Inter-American Development Bank, August 2020. http://dx.doi.org/10.18235/0002639.

Full text
Abstract:
This policy brief was developed in order to identify preliminary green /sustainable infrastructure opportunities for cities in Brazil. The rapidly growing green bond market can help local authorities to attract new sources of capital for financing subnational infrastructure. Water and sanitation, waste to energy and urban mobility were the sectors selected for an inicial assessment, given the investment needs in Brazilian municipalities and their alignment with low carbon development and resilience. This brief was also used to raise awareness across key infrastructure stakeholders in Brazil, and build a number of market education activities in the second semester of 2018.
APA, Harvard, Vancouver, ISO, and other styles
3

Belcher, Scott, Terri Belcher, Kathryn Seckman, Brandon Thomas, and Homayun Yaqub. Aligning the Transit Industry and Their Vendors in the Face of Increasing Cyber Risk: Recommendations for Identifying and Addressing Cybersecurity Challenges. Mineta Transportation Institute, July 2022. http://dx.doi.org/10.31979/mti.2022.2113.

Full text
Abstract:
Public transit agencies in the United States depend on external vendors to help deliver and maintain many essential services and to provide critical technologies, from ticket purchases to scheduling to email management. While the integration of new, advanced technologies into the public transit industry brings important advancements to U.S. critical transportation infrastructure, the application of digital technologies also brings with it a new assortment of digital risks. Transit agencies of all sizes are finding themselves subject to cyber incidents—most notably ransomware attacks—like those experienced by larger, more prominent companies and critical infrastructure providers. The findings in this report focus on helping all parties involved improve in three key areas: cyber literacy and procurement practices, the lifecycle of technology vis-à-vis transit hardware, and the importance of embracing risk as a road to resiliency.
APA, Harvard, Vancouver, ISO, and other styles
4

In Hot Water? The Growing Threat of Cyber Attacks to Water Distribution Systems. American Society of Civil Engineers, March 2022. http://dx.doi.org/10.1061/infographic.000003.

Full text
Abstract:
rsecurity into the current practices of the public water infrastructure sector? ASCE collection on cybersecurity in water distribution networks Overview of smart water networks, their advantages and weaknesses, and growing challenges in securing resilience Lessons learned from past cybersecurity incidents AI-based algorithms for detecting and localizing cyber attacks Integrating cyber attacks into resilience and risk assessment procedures and emergency response measures Analyzing different types of cyber-physical attacks and their effects Modeling and simulation methodologies for managing water distribution security Understanding cybersecurity from the perspective of different stakeholders Cyber attacks will become a more serious and recurring threat the more we transition into smart water distribution systems—we must remain vigilant! This collection will help engineers and decision makers become familiar with the state-of-the-art in cybersecurity for water infrastructure networks, leading to: •Resilient and reliable drinking water infrastructure •Better guidelines and protocols C − In ASCE’s 2021 Report Card for America’s Infrastructure, the Drinking Water category got a ‘C −’ The Infrastructure Investment and Jobs Act supports cybersecurity for the public water system •Clean Water Resiliency and Sustainability Program: Grants to increase resiliency of public treatment systems and distribution networks to cyber attacks and natural hazards •$25 million annually for five years T
APA, Harvard, Vancouver, ISO, and other styles
5

EXPERIMENTAL STUDY OF HYSTERETIC BEHAVIOR OF RESILIENT PREFABRICATED STEEL FRAMES WITH AND WITHOUT INTERMEDIATE COLUMNS. The Hong Kong Institute of Steel Construction, September 2022. http://dx.doi.org/10.18057/ijasc.2022.18.3.9.

Full text
Abstract:
The research innovatively proposed a seismic resilient structural system including a prefabricated self-centering steel frame (PSC) and an intermediate column with a friction damper (CD). The CD, installed in the mid-span beam of the PSC, was expected to provide additional stiffness and damping, The seismic performance of the newly-developed resilient structural system thus can be greatly improved. This paper stated the experimental study on the hysteretic behaviors of the newly-developed system. Comparative pseudo-dynamic tests were conducted for the validation where two systems, a PSC with CD and a PSC without CD, were tested respectively. The testing results indicated that a PSC with CD has better seismic performance for long-span structures under catastrophic earthquakes’ attack. The CD overall provided additional stiffness for requirements of earthquake fortification criteria. The friction damper, part of CD greatly improves the damping effect together with the energy-dissipation bolts. The small residual rotations of beam-column connections on the PSC subsystem provides a satisfactory self-centering mechanism. Moreover, the steel strands of the resilient structural system can maintain the elasticity even after the highest-intensity earthquake. In turn, the satisfactory seismic performance of the proposed PSC with CD structural system validated. This research developed a series of design formula for the T-plate and L-plate friction damper in the CD to guarantee the designed seismic performance of the proposed seismic resilient structural system. The theoretical hysteresis curve of the system was proposed for the future design specification.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography