Skip to main content

A Planner for Supporting Countermeasures in Large Scale Cyber Attacks

  • Conference paper
  • First Online:
Complex, Intelligent, and Software Intensive Systems (CISIS 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 611))

Included in the following conference series:

Abstract

We are in a period where Computer Science leads lots of activities in many fields and the number of Cyber activities is growing up every day. Safety and security issues are going to be considered the most important properties in computer systems. But in the age of Cyber lives, Cyber Crimes are an everyday increasing problem. Thinking in large-scale, enacting Cyber attacks, or even countermeasures to attacks involving different Countries, may be compared to war declaration. In this scenario it is clear the problem of scheduling large-scale countermeasures to Cyber attacks. We propose here an automatic way to plan countermeasures to Cyber Attacks, that takes into account International laws and treaties as enabling condition to actions. The planning is based on a formal, multi-agent based, model of Actors in a Cyber scenario and on formal reasoning by counterexamples.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al-Musawi, B., Branch, P., Armitage, G.: Bgp anomaly detection techniques: a survey. IEEE Commun. Surv. Tutorials PP, 1 (2016)

    Google Scholar 

  2. Amato, F., Barbareschi, M., Casola, V., Mazzeo, A.: An fpga-based smart classifier for decision support systems. In: Intelligent Distributed Computing VII, pp. 289–299. Springer (2014)

    Google Scholar 

  3. Amato, F., Moscato, F.: Exploiting cloud and workflow patterns for the analysis of composite cloud services. Future Gener. Comput. Syst. 67, 255–265 (2017)

    Article  Google Scholar 

  4. Baier, J.A., Bacchus, F., McIlraith, S.A.: A heuristic search approach to planning with temporally extended preferences. Artif. Intell. 173(5), 593–618 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  5. Behrmann, G., David, A., Larsen, K.G., Pettersson, P., Yi, W.: Developing uppaal over 15 years. Softw. Pract. Exp. 41(2), 133–142 (2011)

    Article  Google Scholar 

  6. Biancotti, C.: Cyber attacks: preliminary evidence from the bank of Italy’s business surveys (2017)

    Google Scholar 

  7. Burfoot, D., Pineau, J., Dudek, G.: Rrt-plan: a randomized algorithm for strips planning. In: ICAPS, pp. 362–365 (2006)

    Google Scholar 

  8. Di Lorenzo, G., Moscato, F., Mazzocca, N., Vittorini, V.: Automatic analysis of control flow in web services composition processes. In: Proceedings - 15th EUROMICRO International Conference on Parallel, Distributed and Network-Based Processing, PDP 2007, pp. 299–306 (2007)

    Google Scholar 

  9. Fikes, R.E., Nilsson, N.J.: Strips: a new approach to the application of theorem proving to problem solving. Artif. Intell. 2(3), 189–208 (1972)

    MATH  Google Scholar 

  10. Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classification: a survey. J. Inf. Secur. 5, 56–64 (2014)

    Google Scholar 

  11. Gascueña, J.M., Navarro, E., Fernandez-Caballero, A.: Model-driven engineering techniques for the development of multi-agent systems. Eng. Appl. Artif. Intell. 25(1), 159–173 (2012)

    Article  Google Scholar 

  12. Haslum, P., Geffner, H.: Heuristic planning with time and resources. In: Sixth European Conference on Planning (2014)

    Google Scholar 

  13. Heartfield, R., Loukas, G.: A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Comput. Surv. (CSUR) 48(3), 37 (2016)

    Google Scholar 

  14. Hoffmann, J., Nebel, B.: The FF planning system: fast plan generation through heuristic search. J. Artif. Intell. Res. 14, 253–302 (2001)

    MATH  Google Scholar 

  15. Mitchell, R., Chen, I.R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 55 (2014)

    Article  Google Scholar 

  16. Moscato, F.: Exploiting model profiles in requirements verification of cloud systems. Int. J. High Perform. Comput. Networking 8(3), 259–274 (2015)

    Article  Google Scholar 

  17. Moscato, F., Amato, F.: Thermal-aware verification and monitoring of service providers in metamorp(h)osy. In: Proceedings - 2014 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2014, pp. 551–556 (2014)

    Google Scholar 

  18. Moscato, F., Amato, F.: Automatic cloud services composition for big data management. In: Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016, pp. 46–51 (2016)

    Google Scholar 

  19. Rid, T., Buchanan, B.: Attributing cyber attacks. J. Strateg. Stud. 38(1–2), 4–37 (2015)

    Article  Google Scholar 

  20. Schmitt, M.N.: Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, New York (2013)

    Book  Google Scholar 

  21. Uma, M., Padmavathi, G.: A survey on various cyber attacks and their classification. IJ Netw. Secur. 15(5), 390–396 (2013)

    Google Scholar 

  22. Wooldridge, M.: Agent-based software engineering. In: IEE Proceedings on Software Engineering, pp. 26–37 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Flora Amato .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Amato, F., Moscato, F. (2018). A Planner for Supporting Countermeasures in Large Scale Cyber Attacks. In: Barolli, L., Terzo, O. (eds) Complex, Intelligent, and Software Intensive Systems. CISIS 2017. Advances in Intelligent Systems and Computing, vol 611. Springer, Cham. https://doi.org/10.1007/978-3-319-61566-0_91

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61566-0_91

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61565-3

  • Online ISBN: 978-3-319-61566-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics