Optimization of Operational Large-Scale (Cyber) Attacks by a Combinational Approach

Optimization of Operational Large-Scale (Cyber) Attacks by a Combinational Approach

Éric Filiol (Operational Cryptology and Virology Laboratory, ESIEA, Laval, France) and Cécilia Gallais (Operational Cryptology and Virology Laboratory, ESIEA, Laval, France)
Copyright: © 2017 |Pages: 15
DOI: 10.4018/IJCWT.2017070103
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Recent attacks against critical infrastructures have shown that it is possible to take down an entire infrastructure by targeting only a few of its components. To prevent or minimize the effects of this kind of attacks, it is necessary to identify these critical components whose disruption, damage or destruction can lead to the paralysis of an infrastructure. This paper shows that the identification of critical components can be made thanks to a particular pattern of the graph theory: the vertex cover. To illustrate how the vertex cover can be useful for the identification of critical components, the electrical power transmission and distribution system of the United States is used as an example. It is shown how it is possible to build an attack scenario against an infrastructure with the results of a vertex cover algorithm.
Article Preview

A Model Of Infrastructure Based On The Graph Theory

As said previously, the identification of critical components can be made thanks to a particular pattern of the graph theory: the vertex cover. In order to use this pattern, a model of infrastructure based on the graph theory has first to be defined.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing