首页> 外文会议>Future Mobile Radio Trunking and Data Systems >Predicting the impact of cyber-attacks on BMC3 enterprises
【24h】

Predicting the impact of cyber-attacks on BMC3 enterprises

机译:预测网络攻击对BMC 3 企业的影响

获取原文
获取原文并翻译 | 示例

摘要

Measures to safeguard or respond to a cyber attack against a BMC3 enterprise will invariably disrupt the missions supported by that system. We would like to predict the impacts of those disruptions beforehand and select information assurance measures that minimize the disruptions, especially to key BMC3 functions. In this paper we present an analysis method based on perturbation analysis. We develop a workflow model for the BMC3 functions that an enterprise conducts. We record representative processing histories for those functions under nominal conditions. We evaluate off-nominal conditions using an improved form of Cassandras' (1993) path reconstruction analysis. Initial computational results are encouraging, and indicate that this method predicts off-nominal performance with a high degree of fidelity, and is substantially faster than discrete-event simulation.
机译:维护或响应针对BMC 3 企业的网络攻击的措施将不可避免地破坏该系统支持的任务。我们希望事先预测这些中断的影响,并选择能够最大限度地减少中断的信息保证措施,尤其是对关键的BMC 3 功能。在本文中,我们提出了一种基于扰动分析的分析方法。我们为企业执行的BMC 3 功能开发了工作流模型。我们记录了名义条件下这些功能的代表性加工历史。我们使用改进形式的Cassandras(1993)路径重构分析来评估非标称条件。最初的计算结果令人鼓舞,并且表明该方法可以高度保真地预测名义上的性能,并且比离散事件模拟要快得多。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号