Abstract
We are in a period where Computer Science leads lots of activities in many fields and the number of Cyber activities is growing up every day. Safety and security issues are going to be considered the most important properties in computer systems. But in the age of Cyber lives, Cyber Crimes are an everyday increasing problem. Thinking in large-scale, enacting Cyber attacks, or even countermeasures to attacks involving different Countries, may be compared to war declaration. In this scenario it is clear the problem of scheduling large-scale countermeasures to Cyber attacks. We propose here an automatic way to plan countermeasures to Cyber Attacks, that takes into account International laws and treaties as enabling condition to actions. The planning is based on a formal, multi-agent based, model of Actors in a Cyber scenario and on formal reasoning by counterexamples.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al-Musawi, B., Branch, P., Armitage, G.: Bgp anomaly detection techniques: a survey. IEEE Commun. Surv. Tutorials PP, 1 (2016)
Amato, F., Barbareschi, M., Casola, V., Mazzeo, A.: An fpga-based smart classifier for decision support systems. In: Intelligent Distributed Computing VII, pp. 289–299. Springer (2014)
Amato, F., Moscato, F.: Exploiting cloud and workflow patterns for the analysis of composite cloud services. Future Gener. Comput. Syst. 67, 255–265 (2017)
Baier, J.A., Bacchus, F., McIlraith, S.A.: A heuristic search approach to planning with temporally extended preferences. Artif. Intell. 173(5), 593–618 (2009)
Behrmann, G., David, A., Larsen, K.G., Pettersson, P., Yi, W.: Developing uppaal over 15 years. Softw. Pract. Exp. 41(2), 133–142 (2011)
Biancotti, C.: Cyber attacks: preliminary evidence from the bank of Italy’s business surveys (2017)
Burfoot, D., Pineau, J., Dudek, G.: Rrt-plan: a randomized algorithm for strips planning. In: ICAPS, pp. 362–365 (2006)
Di Lorenzo, G., Moscato, F., Mazzocca, N., Vittorini, V.: Automatic analysis of control flow in web services composition processes. In: Proceedings - 15th EUROMICRO International Conference on Parallel, Distributed and Network-Based Processing, PDP 2007, pp. 299–306 (2007)
Fikes, R.E., Nilsson, N.J.: Strips: a new approach to the application of theorem proving to problem solving. Artif. Intell. 2(3), 189–208 (1972)
Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classification: a survey. J. Inf. Secur. 5, 56–64 (2014)
Gascueña, J.M., Navarro, E., Fernandez-Caballero, A.: Model-driven engineering techniques for the development of multi-agent systems. Eng. Appl. Artif. Intell. 25(1), 159–173 (2012)
Haslum, P., Geffner, H.: Heuristic planning with time and resources. In: Sixth European Conference on Planning (2014)
Heartfield, R., Loukas, G.: A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Comput. Surv. (CSUR) 48(3), 37 (2016)
Hoffmann, J., Nebel, B.: The FF planning system: fast plan generation through heuristic search. J. Artif. Intell. Res. 14, 253–302 (2001)
Mitchell, R., Chen, I.R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 55 (2014)
Moscato, F.: Exploiting model profiles in requirements verification of cloud systems. Int. J. High Perform. Comput. Networking 8(3), 259–274 (2015)
Moscato, F., Amato, F.: Thermal-aware verification and monitoring of service providers in metamorp(h)osy. In: Proceedings - 2014 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2014, pp. 551–556 (2014)
Moscato, F., Amato, F.: Automatic cloud services composition for big data management. In: Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016, pp. 46–51 (2016)
Rid, T., Buchanan, B.: Attributing cyber attacks. J. Strateg. Stud. 38(1–2), 4–37 (2015)
Schmitt, M.N.: Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, New York (2013)
Uma, M., Padmavathi, G.: A survey on various cyber attacks and their classification. IJ Netw. Secur. 15(5), 390–396 (2013)
Wooldridge, M.: Agent-based software engineering. In: IEE Proceedings on Software Engineering, pp. 26–37 (1997)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Amato, F., Moscato, F. (2018). A Planner for Supporting Countermeasures in Large Scale Cyber Attacks. In: Barolli, L., Terzo, O. (eds) Complex, Intelligent, and Software Intensive Systems. CISIS 2017. Advances in Intelligent Systems and Computing, vol 611. Springer, Cham. https://doi.org/10.1007/978-3-319-61566-0_91
Download citation
DOI: https://doi.org/10.1007/978-3-319-61566-0_91
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61565-3
Online ISBN: 978-3-319-61566-0
eBook Packages: EngineeringEngineering (R0)