The Complexity of the Infinity Replacement Problem in the Cyber Security Model

Author(s):  
Supachai Mukdasanit ◽  
Sanpawat Kantabutra
Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Author(s):  
Iqbal H. Sarker ◽  
Yoosef B. Abushark ◽  
Fawaz Alsolami ◽  
Asif Irshad Khan

Cyber security has recently received enormous attention in today’s security concerns, due to the popularity of the Internet-of-Things (IoT), the tremendous growth of computer networks, and the huge number of relevant applications. Thus, detecting various cyber-attacks or anomalies in a network and building an effective intrusion detection system that performs an essential role in today’s security is becoming more important. Artificial intelligence, particularly machine learning techniques, can be used for building such a data-driven intelligent intrusion detection system. In order to achieve this goal, in this paper, we present an Intrusion Detection Tree (“IntruDTree”) machine-learning-based security model that first takes into account the ranking of security features according to their importance and then build a tree-based generalized intrusion detection model based on the selected important features. This model is not only effective in terms of prediction accuracy for unseen test cases but also minimizes the computational complexity of the model by reducing the feature dimensions. Finally, the effectiveness of our IntruDTree model was examined by conducting experiments on cybersecurity datasets and computing the precision, recall, fscore, accuracy, and ROC values to evaluate. We also compare the outcome results of IntruDTree model with several traditional popular machine learning methods such as the naive Bayes classifier, logistic regression, support vector machines, and k-nearest neighbor, to analyze the effectiveness of the resulting security model.


Author(s):  
Calin Ciufudean

Cyber Security Model of Artificial Social System Man-Machine takes advantage of an important chapter of artificial intelligence, discrete event systems applied for modelling and simulation of control, logistic supply, chart positioning, and optimum trajectory planning of artificial social systems. “An artificial social system is a set of restrictions on agents` behaviours in a multi-agent environment. Its role is to allow agents to coexist in a shared environment and pursue their respective goals in the presence of other agents” (Moses & Tennenholtz, n.d.). Despite conventional approaches, Cyber Security Model of Artificial Social System Man-Machine is not guided by rigid control algorithms but by flexible, event-adaptable ones that makes them more lively and available. All these allow a new design of artificial social systems dotted with intelligence, autonomous decision-making capabilities, and self-diagnosing properties. Heuristics techniques, data mining planning activities, scheduling algorithms, automatic data identification, processing, and control represent as many trumps for these new systems analyzing formalism. The authors challenge these frameworks to model and simulate the interaction of man-machine in order to have a better look at the human, social, and organizational privacy and information protection.


Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6747
Author(s):  
Radomir Prodanović ◽  
Dejan Rančić ◽  
Ivan Vulić ◽  
Nenad Zorić ◽  
Dušan Bogićević ◽  
...  

Nowadays, wireless sensor networks (WSN) are widely used in agriculture monitoring to improve the quality and productivity of farming. In this application, sensors gather different types of data (i.e., humidity, carbon dioxide level, and temperature) in real-time scenarios. Thus, data gathering, transmission, and rapid response to new circumstances require a secured data mechanism to avoid malicious adversaries. Therefore, this paper focuses on data security from the data origin source to the end-user, and proposes a general data security model that is independent of the network topology and structure, and can be widely used in the agriculture monitoring application. The developed model considers practical aspects, the architecture of the sensor node, as well as the necessity to save energy while ensuring data security, and optimize the model through the application of organizational and technical measures. The model evaluation is conducted through simulation in terms of energy consumption. The result shows that the proposed model ensures good data security at the cost of a slight increase in energy consumption at receiver and sender nodes, and energy consumption per bit, up to 2%, 7%, and 1.3%, respectively, due to overhead added for authentication in the network.


2015 ◽  
Vol 49 (8) ◽  
pp. 627-633 ◽  
Author(s):  
P. D. Zegzhda ◽  
D. P. Zegzhda ◽  
T. V. Stepanova

2021 ◽  
Vol 5 (3) ◽  
pp. 32
Author(s):  
Peter R.J. Trim ◽  
Yang-Im Lee

In this paper, insights are provided into how senior managers can establish a global cyber security model that raises cyber security awareness among staff in a partnership arrangement and ensures that cyber attacks are anticipated and dealt with in real time. We deployed a qualitative research strategy that involved a group interview involving cyber security and intelligence experts. The coding approach was used to identify the themes in the data and, in addition, a number of categories and subcategories were identified. The mind map approach was utilized to identify the thought processes of senior managers in relation to ensuring that the cyber security management process is effective. The global cyber security model can be used by senior managers to establish a framework for dealing with a range of cyber security attacks, as well as to upgrade the cyber security skill and knowledge base of individuals. In order for a cyber security mentality to be established, senior managers need to ensure that staff are focused on organizational vulnerability and resilience, there is an open and transparent communication process in place, and staff are committed to sharing cyber security knowledge. By placing cyber security within the context of a partnership arrangement, senior managers can adopt a collectivist approach to cyber security and benefit from the knowledge of external experts.


2018 ◽  
Vol 7 (4.15) ◽  
pp. 87
Author(s):  
Sundresan Perumal ◽  
Sakinah Ali Pitchay ◽  
Ganthan Narayana Samy ◽  
Bharanidharan Shanmugam ◽  
Pritheega Magalingam ◽  
...  

The growth of cyberspace world has uprising government agencies in a new way to serve citizen in a proactive, efficient and productive manner. To have an open, stable and vibrant cyberspace, governments should be more resilient to cyber-attacks and able to protect all government agency’s interest in cyberspace. Therefore, the government needs a transformative cyber governance security model to protect valuable government agencies’ information. The model should be able to detect, defend and deter the vulnerabilities, threats and risks that will emerge in the day to day government administration operation. This paper has introduced a study for some existing cyber governance security models. Thus, it helps in determining the main features of the required model.  


Sign in / Sign up

Export Citation Format

Share Document