Show simple item record

dc.contributor.authorZhang, Y
dc.contributor.authorMalacaria, P
dc.date.accessioned2024-10-21T09:39:06Z
dc.date.issued2024-10-19
dc.date.updated2024-10-21T08:54:21Z
dc.description.abstractThe mathematical modeling of cybersecurity decision-making heavily relies on cybersecurity metrics. However, achieving precision in these metrics is notoriously challenging, and their inaccuracies can significantly influence model outcomes. This paper explores resilience to uncertainties in the effectiveness of security controls. We employ probabilistic attack graphs to model threats and introduce two resilient models: minmax regret and min-product of risks, comparing their performance. Building on previous Stackelberg game models for cybersecurity, our approach leverages totally unimodular matrices and linear programming (LP) duality to provide efficient solutions. While minmax regret is a well-known approach in robust optimization, our extensive simulations indicate that, in this context, the lesser-known min-product of risks offers superior resilience. To demonstrate the practical utility and robustness of our framework, we include a multi-dimensional decision support case study focused on home IoT cybersecurity investments, highlighting specific insights and outcomes. This study illustrates the framework’s effectiveness in real-world settings.en_GB
dc.description.sponsorshipEngineering and Physical Sciences Research Council (EPSRC)en_GB
dc.identifier.citationVol. 148, article 104153en_GB
dc.identifier.doihttps://doi.org/10.1016/j.cose.2024.104153
dc.identifier.grantnumberEP/T026596/1en_GB
dc.identifier.urihttp://hdl.handle.net/10871/137735
dc.identifierORCID: 0000-0002-0090-1330 (Zhang, Yunxiao)
dc.language.isoenen_GB
dc.publisherElsevieren_GB
dc.rights© 2024 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)en_GB
dc.subjectRobust optimizationen_GB
dc.subjectDecision supporten_GB
dc.subjectUncertaintyen_GB
dc.subjectCyber-securityen_GB
dc.subjectStackelberg gamesen_GB
dc.subjectSecurity gamesen_GB
dc.subjectAttack graphsen_GB
dc.titleDealing with uncertainty in cybersecurity decision supporten_GB
dc.typeArticleen_GB
dc.date.available2024-10-21T09:39:06Z
dc.identifier.issn0167-4048
exeter.article-number104153
dc.date.dateSubmitted2024-06-10
dc.descriptionThis is the final version. Available on open access from Elsevier via the DOI in this recorden_GB
dc.descriptionData availability: No data was used for the research described in the article.en_GB
dc.identifier.journalComputers and Securityen_GB
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en_GB
dcterms.dateAccepted2024-10-07
rioxxterms.versionVoRen_GB
rioxxterms.licenseref.startdate2024-10-19
rioxxterms.typeJournal Article/Reviewen_GB
refterms.dateFCD2024-10-21T09:36:33Z
refterms.versionFCDVoR
refterms.panelBen_GB
exeter.rights-retention-statementYes


Files in this item

This item appears in the following Collection(s)

Show simple item record

© 2024 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)
Except where otherwise noted, this item's licence is described as © 2024 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)