MODELING CYBER ATTACKS AND THEIR EFFECTS ON DECISION PROCESS

被引:0
|
作者
Cayirci, Erdal [1 ]
Ghergherehchi, Reyhaneh [1 ]
机构
[1] Univ Stavanger, Elect Engn & Comp Sci Dep, N-4036 Stavanger, Norway
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber attacks are designed to affect human behavior by creating confusion and information overload. Although cyber attacks mainly aim to stimulate irrational behavior, there is limited work in the literature on modeling their human behavior effects. Instead most of the studies are focused on the simulation of attacks and technical solutions or counter measures to prevent, detect and recover from an attack. Taxonomies for attacks, attackers and human behavior effects of cyber attacks are provided, and the relation between cyber attacks and decision making process are modeled. Live simulation techniques for stimulating the expected behavior, specifically effects of cyber attacks on decision making are presented.
引用
收藏
页码:2627 / 2636
页数:10
相关论文
共 50 条
  • [31] Cyber Situation Awareness: Modeling Detection of Cyber Attacks With Instance-Based Learning Theory
    Dutt, Varun
    Ahn, Young-Suk
    Gonzalez, Cleotilde
    HUMAN FACTORS, 2013, 55 (03) : 605 - 618
  • [32] Effects of Cyber Attacks on Islanded Microgrid Frequency Control
    Liu, Shichao
    Liu, Peter X.
    Wang, Xiaoyu
    2016 IEEE 20TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2016, : 461 - 464
  • [33] Incorporating Attacks Modeling into Safety Process
    Surkovic, Amer
    Hanic, Dzana
    Lisova, Elena
    Causevic, Aida
    Lundqvist, Kristina
    Wenslandt, David
    Falk, Carl
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2018, 2018, 11094 : 31 - 41
  • [34] Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
    Adam M. Bossler
    American Journal of Criminal Justice, 2021, 46 : 911 - 934
  • [35] Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
    Bossler, Adam M.
    AMERICAN JOURNAL OF CRIMINAL JUSTICE, 2021, 46 (06) : 911 - 934
  • [36] Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources
    Yan, Dingyu
    Liu, Feng
    Zhang, Yaqin
    Jia, Kun
    Zhang, Yuantian
    SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 65 - 80
  • [37] Likelihood Analysis of Cyber Data Attacks to Power Systems With Markov Decision Processes
    Hao, Yingshuai
    Wang, Meng
    Chow, Joe H.
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) : 3191 - 3202
  • [38] Modeling and Detection of Future Cyber-Enabled DSM Data Attacks
    Hatalis, Kostas
    Zhao, Chengbo
    Venkitasubramaniam, Parv
    Snyder, Larry
    Kishore, Shalinee
    Blum, Rick S.
    ENERGIES, 2020, 13 (17)
  • [39] Petri Net Modeling of Cyber-Physical Attacks on Smart Grid
    Chen, Thomas M.
    Carlos Sanchez-Aarnoutse, Juan
    Buford, John
    IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) : 741 - 749
  • [40] A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid
    Liu, Shan
    Mashayekh, Salman
    Kundur, Deepa
    Zourntos, Takis
    Butler-Purry, Karen
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2013, 1 (02) : 273 - 285