Some Methods for Nonlinear Multi-objective Optimization
EMO '01 Proceedings of the First International Conference on Evolutionary Multi-Criterion Optimization
Two Formal Analys s of Attack Graphs
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Automated Generation and Analysis of Attack Graphs
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Authorization and Account Management in the Open Science Grid
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms
IEEE Transactions on Dependable and Secure Computing
Active Cyber Attack Model for Network System's Vulnerability Assessment
ICISS '08 Proceedings of the 2008 International Conference on Information Science and Security
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Computer Communications
A New Susceptible-Infected Model of Malware Propagation in the Internet
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
A Quasi-Species Model for the Propagation and Containment of Polymorphic Worms
IEEE Transactions on Computers
Virus Propagation and Immunization Strategies in Email Networks
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
A Distributed Immunization Strategy Based on Autonomy-Oriented Computing
ISMIS '09 Proceedings of the 18th International Symposium on Foundations of Intelligent Systems
From gridmap-file to VOMS: managing authorization in a Grid environment
Future Generation Computer Systems - Special issue: High-speed networks and services for data-intensive grids: The DataTAG project
A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks
IEEE Network: The Magazine of Global Internetworking
Globus toolkit version 4: software for service-oriented systems
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
A Science Driven Production Cyberinfrastructure--the Open Science Grid
Journal of Grid Computing
Hi-index | 0.00 |
Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.