A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack

Shinwoo Shim, Ji Won Yoon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Modern military systems operated with a complex of computers and software may have mission failure which is caused by undetected attacks. In such situations, it is important to find out which assets are damaged. After identifying damaged assets, we need to immediately examine the damaged assets to defend against the attacks. However, it is not straightforward to explore the damaged assets because there are the complicated relationships among assets, tasks and missions. In this paper, we propose an effective methodology to infer the damaged assets given observed mission impacts in a Bayesian framework. We used Bayesian networks to model assets, tasks, missions and to set the relationships among them. Our approach visually infers and identifies the damaged assets with the probability. We show that proposed Bayesian framework is practical and useful with the use case experiment.

Original languageEnglish
Title of host publicationInformation Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers
EditorsBrent ByungHoon Kang, JinSoo Jang
PublisherSpringer Verlag
Pages185-196
Number of pages12
ISBN (Print)9783030179816
DOIs
Publication statusPublished - 2019 Jan 1
Event19th World International Conference on Information Security and Application, WISA 2018 - Jeju Island, Korea, Republic of
Duration: 2018 Aug 232018 Aug 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11402 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th World International Conference on Information Security and Application, WISA 2018
CountryKorea, Republic of
CityJeju Island
Period18/8/2318/8/25

Fingerprint

Bayesian networks
Bayesian Approach
Computer systems
Attack
Monitoring
Use Case
Bayesian Networks
Military
Immediately
Experiments
Software
Methodology
Experiment
Framework
Relationships
Model

Keywords

  • Bayesian network
  • Cyber warfare
  • Mission impact assessment

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Shim, S., & Yoon, J. W. (2019). A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack. In B. B. Kang, & J. Jang (Eds.), Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers (pp. 185-196). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11402 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-17982-3_15

A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack. / Shim, Shinwoo; Yoon, Ji Won.

Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. ed. / Brent ByungHoon Kang; JinSoo Jang. Springer Verlag, 2019. p. 185-196 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shim, S & Yoon, JW 2019, A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack. in BB Kang & J Jang (eds), Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11402 LNCS, Springer Verlag, pp. 185-196, 19th World International Conference on Information Security and Application, WISA 2018, Jeju Island, Korea, Republic of, 18/8/23. https://doi.org/10.1007/978-3-030-17982-3_15
Shim S, Yoon JW. A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack. In Kang BB, Jang J, editors, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Springer Verlag. 2019. p. 185-196. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-030-17982-3_15
Shim, Shinwoo ; Yoon, Ji Won. / A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack. Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. editor / Brent ByungHoon Kang ; JinSoo Jang. Springer Verlag, 2019. pp. 185-196 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{bdafd4b067414e78badad45e257ae29a,
title = "A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack",
abstract = "Modern military systems operated with a complex of computers and software may have mission failure which is caused by undetected attacks. In such situations, it is important to find out which assets are damaged. After identifying damaged assets, we need to immediately examine the damaged assets to defend against the attacks. However, it is not straightforward to explore the damaged assets because there are the complicated relationships among assets, tasks and missions. In this paper, we propose an effective methodology to infer the damaged assets given observed mission impacts in a Bayesian framework. We used Bayesian networks to model assets, tasks, missions and to set the relationships among them. Our approach visually infers and identifies the damaged assets with the probability. We show that proposed Bayesian framework is practical and useful with the use case experiment.",
keywords = "Bayesian network, Cyber warfare, Mission impact assessment",
author = "Shinwoo Shim and Yoon, {Ji Won}",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-3-030-17982-3_15",
language = "English",
isbn = "9783030179816",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "185--196",
editor = "Kang, {Brent ByungHoon} and JinSoo Jang",
booktitle = "Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers",

}

TY - GEN

T1 - A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack

AU - Shim, Shinwoo

AU - Yoon, Ji Won

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Modern military systems operated with a complex of computers and software may have mission failure which is caused by undetected attacks. In such situations, it is important to find out which assets are damaged. After identifying damaged assets, we need to immediately examine the damaged assets to defend against the attacks. However, it is not straightforward to explore the damaged assets because there are the complicated relationships among assets, tasks and missions. In this paper, we propose an effective methodology to infer the damaged assets given observed mission impacts in a Bayesian framework. We used Bayesian networks to model assets, tasks, missions and to set the relationships among them. Our approach visually infers and identifies the damaged assets with the probability. We show that proposed Bayesian framework is practical and useful with the use case experiment.

AB - Modern military systems operated with a complex of computers and software may have mission failure which is caused by undetected attacks. In such situations, it is important to find out which assets are damaged. After identifying damaged assets, we need to immediately examine the damaged assets to defend against the attacks. However, it is not straightforward to explore the damaged assets because there are the complicated relationships among assets, tasks and missions. In this paper, we propose an effective methodology to infer the damaged assets given observed mission impacts in a Bayesian framework. We used Bayesian networks to model assets, tasks, missions and to set the relationships among them. Our approach visually infers and identifies the damaged assets with the probability. We show that proposed Bayesian framework is practical and useful with the use case experiment.

KW - Bayesian network

KW - Cyber warfare

KW - Mission impact assessment

UR - http://www.scopus.com/inward/record.url?scp=85065040079&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85065040079&partnerID=8YFLogxK

U2 - 10.1007/978-3-030-17982-3_15

DO - 10.1007/978-3-030-17982-3_15

M3 - Conference contribution

SN - 9783030179816

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 185

EP - 196

BT - Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers

A2 - Kang, Brent ByungHoon

A2 - Jang, JinSoo

PB - Springer Verlag

ER -