By Topic

Predicting the impact of cyber-attacks on BMC3 enterprises

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)

Measures to safeguard or respond to a cyber attack against a BMC3 enterprise will invariably disrupt the missions supported by that system. We would like to predict the impacts of those disruptions beforehand and select information assurance measures that minimize the disruptions, especially to key BMC3 functions. In this paper we present an analysis method based on perturbation analysis. We develop a workflow model for the BMC3 functions that an enterprise conducts. We record representative processing histories for those functions under nominal conditions. We evaluate off-nominal conditions using an improved form of Cassandras' (1993) path reconstruction analysis. Initial computational results are encouraging, and indicate that this method predicts off-nominal performance with a high degree of fidelity, and is substantially faster than discrete-event simulation.

Published in:

DARPA Information Survivability Conference and Exposition, 2003. Proceedings  (Volume:2 )

Date of Conference:

22-24 April 2003