<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Methods of Profiling the Behavior of Dynamic Objects of a Critically Important Information Infrastructure*</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Innopolis University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kazan</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Russia s.petrenko@rambler.ru</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>V.I. Vernadsky Crimean Federal University</institution>
          ,
          <addr-line>Yalta</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>According to ISO/IEC TR 18044: 2004, an incident means an undesirable or unexpected event (or a combination of such events) that could compromise the information interaction processes in a critically important infrastructure or threaten its information security and/or cyber resilience. Accordingly, the incident prediction means the identification process of vulnerable object interaction state of the critically important information infrastructure under the disturbances. According to the incident prediction results, it becomes possible to develop a profile of the profile of an observed object, containing information about the exploited vulnerability, the actions of the intruder and possible scenarios of a proactive counteraction against these attacking influences.</p>
      </abstract>
      <kwd-group>
        <kwd>inverse similarity theorem</kwd>
        <kwd>dynamic control of correctness of calculation programs</kwd>
        <kwd>correctness of computing processes</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>We propose a possible way of profiling the behavior of the key IT services and IT
systems of a critically important information infrastructure under perturbation
conditions. Here the dynamic profiles allow identifying the classes of the vulnerable states
of the mentioned infrastructure. In this case, the recognition of the informative signs of
the possible vulnerabilities is carried out in conditions of extremely large amounts of
data monitoring. When selecting information, the dynamic weights of the recognition
signs and the corresponding values of the profiling of the observed objects are
determined; this can significantly reduce the response time to potential incidents and
purposefully select the adequate measures to ensure the required cyber resilience [1, 4].</p>
    </sec>
    <sec id="sec-2">
      <title>Thus, a new method is proposed for profiling the complex dynamic subsystems of</title>
      <p>critically important infrastructure under the incompleteness and competing information
*</p>
    </sec>
    <sec id="sec-3">
      <title>Copyright 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). 177</title>
      <p>on the state of the observed objects. This profiling method is based on the mathematical
apparatus for iteratively diagnosing the potentially dangerous states of the complex
dynamic systems using communication (Pr1), behavioral (Pr2) profiles, as well as profiles,
providing the required cyber resilience (Pr3) of observed objects [2, 5]. It is significant
that the profiling method, mentioned above, makes it possible to model the potential
behavior of an intruder, during the implementation of threats to resilience (security) and
make decisions about the organization of the special scenarios to ensure the required
cyber resilience and prevent serious incidents with the transfer of the critical
information infrastructure to an irreversible catastrophic state.
2</p>
      <p>The problem of profiling the objects’ behavior of
critical information infrastructure
Unlike the well-known cyber resilience approaches, the proposed profiling method is
implemented both at the stages of the primary processing of the monitoring results of
critical information infrastructure objects and at the stages of the analyzing and
summarizing a heterogeneous information concerning the functioning processes of the
observed infrastructure and its individual elements (devices and resources). At the first
stage (analytical description of processes Pr1,…, Prn of interaction of objects of critical
information infrastructure G1) (Figure 1Ошибка! Источник ссылки не найден.) it
is necessary to take into account the structural and functional characteristics of the
observation objects, the composition and specificity of the system and application
software, the characteristics of the operating system [3, 8]. This is necessary to form the
sets of quantitative (B1) and qualitative (B2) signs, reflecting the options for the
development of information technology impact situations on the objects of the critically
important information infrastructure being protected.
Based on the specifics and characteristics of disturbances in the functioning and
composition of the feature set, at the third stage, a set of methods (active ( M GAc1t ) and / or
G1</p>
      <p>G1
passive ( M Pass ) and means ( Sr ) of monitoring the protected infrastructure G1 are
formed. These methods and means should take into account the intruder impact type
and their interconnection with a threat model of the protected infrastructure. At this
stage, the degree of the interconnection between alternative groups of the negative sign
impacts, the consequences (damage) of their manifestation are also determined, and a
list of possible measures to ensure the required cyber resilience is developed. After the
corresponding procedures of iterative diagnostics and primary processing of the
obtained data are carried out, the intruder actions and the corresponding cyber resilience
violation events are verified, and the profiles of the corresponding objects of the
protected infrastructure are developed.</p>
      <p>Thus, the effectiveness of ensuring the required cyber resilience of the protected
infrastructure is ensured by diagnosing the potentially vulnerable states of the observed
infrastructure, determining the type and criticality of vulnerability, and developing the
plan of possible measures to ensure the required cyber resilience. The proposed
approach of profiling the behavior of dynamic objects of the protected infrastructure
required solving the problem of diagnosing complex dynamic cyber systems under the
temporary observability absence of the corresponding interaction processes [6, 7].</p>
    </sec>
    <sec id="sec-4">
      <title>Usually, a typical object of the protected infrastructure is a complex dynamic cyber</title>
      <p>system (both in structure and behavior), operating in the absence of temporal or partial
observability of interaction with other infrastructure objects.</p>
      <p>Here, the diagnosis task of the mentioned cyber systems is to determine the state of
the object and the aggregate of monitored parameters, which can be used to judge the
functional cyber resilience of the infrastructure object, i.e. to determine whether its
current system configuration and application software is currently vulnerable, or whether
the object has no distinguishable vulnerabilities. The desired solution involves the
development of such diagnosis procedures, the content of which depends on the properties
of the protected infrastructure, the priorities and diagnosis direction, as well as the
conditions for its implementation.
 
= 〈 ( ),</p>
      <p />
      <p>Let some protected critically important information infrastructure S=P&lt;B, L&gt;
(Figure 1 and Figure 2) be consisted of a set of objects B=&lt;B1, B2, B3&gt;, where   =
〈 ( ),  
( ), … ,</p>
      <p>( )〉 are many devices (routers) and web resources (servers),   =
〈 ( +) ,  ( )
+ , … ,  ( )〉 - set of users (data sources) of the mentioned infrastructure,
( ), … ,  ( )〉 - a set of an information, gathering and processing the
means (nodal and network sensors of the cyber-attack detection system) associated with
each other communication channels [12], represented by a connection matrix in the
given units of measurement between points B1 and Bj(I, j =1,…n);</p>
      <p>,   , … ,  

 = ‖  ,   , … ,   … ‖ – the connection matrix between objects (lij≥0, with i≠j, lii=0,
j=1,…n).</p>
      <p>Let the values of the monitoring data collection time (Tcol), the recording time (T0)
(the action  с6) and the processing of the monitoring data be known, with the
 с6 ∈  с6. The cyber attack detection systems allow receiving as a source of multiple
packet streams of the i-th node of the protected infrastructure (b1N) with intensities
 = {   ,    , … ,   } and generate a set of packets i infrastructure node (b1N)

with   = {   ,    , … ,    }.
object according to the “request-response” principle with subsequent response
processing) and passive (based on the analysis of network traffic parameters in the listening
mode of the selected interface) data collection are implemented.</p>
      <p>
        In general, the data processing system using active monitoring methods (i = 1, ..., m)
can be represented by the seven arrays
 ( ) = {  ( ),   ( ),   ( ), 




( )
,  ( ),  ( ),  
( )},
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
where  
( ) = {


( ), 
( ), … ,
      </p>
      <p>( )} – the set of t time values of the protected
infrastructure object observation;
( ), … , 
( )
 
signals) of scan sessions, conducted as regards the infrastructure object;
},   ∈   is the set of parameter values (input
( )} ,  ∈   is the set of values of passive traffic
scanning (output signals) identifying the state of some infrastructure object;
( )},  ∈   is the statespace of the protected
infra  = { 
( )

( ), 
( )


( ), … ,</p>
      <p>( )
structure object during monitoring;</p>
      <p>F(c) - transition operator, reflecting the mechanism of changing the object state of the
protected infrastructure under the action of internal and external cyber-attacks;
Φ(с) is the output operator, describing the mechanism for generating the output signal
as a response of the protected infrastructure object to internal and external disturbances;
 ( ) = { 


( ), 
( ), … ,    },   ∈   is a set of the values, formed by the results of</p>
      <p>( )


monitoring and establishing the truth values of passive scanning of the object of the
protected infrastructure.</p>
    </sec>
    <sec id="sec-5">
      <title>The structure of the process characterizing the dynamics of changes in the properties</title>
      <p>of devices and users of the protected infrastructure, when conducting the passive
monitoring sessions t ∈ [ti, ti +△i), i=1, m), we will present in the form of a chain of
mappings</p>
      <p>
        R〈χB(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ),B(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(t), χB(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )(t)〉 → R〈Bt(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), Bt(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), Bt(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )〉, R〈Bt(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), Bt(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), Bt(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )〉 →
      </p>
      <p>
        Bt(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), R〈Bt(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), Bt(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), Bt(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )〉Bt(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), Bt(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),
B(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), Bt(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) , R〈χB(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ),B(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(t), χB(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )(t)〉 → χB(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ),B(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(t), Bt(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) → χB(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )(t),
      </p>
      <p>
        t
where x(.)(t) - states of devices, users and controlled detection systems КА;
R&lt;x(.), x(.)&gt;R〈x〈.〉, x〈.〉〉 – connections between states;
 〈  (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ),   (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),   (
        <xref ref-type="bibr" rid="ref3">3</xref>
        )〉 - connections between devices, users and sensors of the
cyberattack detection system, which change over time and characterize the above-mentioned
process of monitoring the objects of the protected infrastructure.
      </p>
      <p>Operators implement mappings:
 ( ): 

( )
× 

( )
×   1
( )</p>
      <p>( ) →  
 ( ):  ( )</p>
      <p>
        × 


( )
×   1
( )( ) → 

( )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
      </p>
    </sec>
    <sec id="sec-6">
      <title>Every state of the protected infrastructure object Vi is characterized at each moment</title>
      <p>of time tT by a set of variables</p>
      <p>( ),  ∈   , changing under the influence of cyber
intruder attacks and the internal disturbances caused, for example, by component
vulnerabilities of the system and/or application software.</p>
      <p>Thus, with restrictions on the selected
method of processing observations
u(t)Uadd, on the intensity of the processed information flows (1(t)2), on the
amount of stored information about users and devices of the protected infrastructure
(V1V(t)V2), on the total time of collecting information about infrastructure users
  ∈ доп.
and devices ( 
∑ =1   ( сб.)) need to find:

─ Functional of state identification and control by the complex dynamic systems in the
absence of time observability or partial observability of objects of the protected
infrastructure :TPrsVPrd, ф:PrdT, :PrdTmon, k:TPrdset, :TTmon,
i:TmonPrdset;
─ Management law of the network (node) cyber-attack sensor, which would provide
the total time spent on collecting the monitoring data of the protected infrastructure
objects, not exceeding the directive value with restrictions on the acceptance region
of management programs and a possible list of actions to ensure the required cyber
resilience.</p>
      <p>
        ∗( ) =  ( )∈{   ( )}(∑ =1  ( ( ),  сб) ≤  ∑ ), {  ( )} =   ( )|(  ≤
  ∈{  }
 ( ) ≤   )∩ (  ≤  ( ) ≤   )∩ (  ≤  ≤   ).
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
      </p>
    </sec>
    <sec id="sec-7">
      <title>In the secondary processing of monitoring data, the system for developing scenarios</title>
      <p>
        of proactively countering the cyber-attacks of the intruder and ensuring the required
cyber resilience should assess the situation at t=t0, determined by the dependencies
between the states of the information sources and the sensors of the cyber-attack system.
At the final time moment, the dependencies between the states become different,
therefore the process of achieving the goal is described as a change in the dependencies
  ( ), ( )(  ) &lt;∙&gt;  ( )(  )  ( ), ( )(  ) &lt;∙&gt;  ( )(  )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
moreover, the logical entailment from the initial to the final state is associated with a
set of possible informational actions.
      </p>
    </sec>
    <sec id="sec-8">
      <title>The action list and sequence is determined by the logic of behavior B(3), its settings.</title>
      <p>
        In fact, B(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) performs the functions of a control unit that prepares some decision to
ensure the required cyber resilience.
      </p>
    </sec>
    <sec id="sec-9">
      <title>Working out a solution, it is necessary to consider all possible choices leading to the</title>
      <p>achievement of the goal  (̂req &lt; ̂ &lt; ̂enough) =  PV, where ̂ = ̂ + ̂pass +
̂act + ̂RV,  ≥ ̂req, and when deciding among the possible solutions it should be
chosen the one most preferred choice.</p>
    </sec>
    <sec id="sec-10">
      <title>Choosing the possible solutions and the actions behind them, it is necessary to</title>
      <p>
        choose such chains from them that satisfy the condition (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ).
      </p>
    </sec>
    <sec id="sec-11">
      <title>The emerging information situation at the protected infrastructure is fixed by a set</title>
      <p>
        of decision rules, reflecting the connections between the states B(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), B(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), B(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) with t=tk.
Thus, at the next stage of ensuring the required cyber resilience of the protected
infrastructure, it is necessary to determine the observation parameters, based on the
determining the diagnostic value of signs of a potentially vulnerable critically important
information infrastructure.
3
      </p>
      <p>Selection of observation parameters
In the technical diagnostics of the critically important information infrastructure, it is
very important to describe the object in the system of signs that has a greater diagnostic
value. The use of the non-informative features not only turns out to be useless, but also
reduces the efficiency of the diagnostic process itself, disturbing with recognition. We
assume that the diagnostic sign value is determined by the information significance that
is added by the sign into the observation object state system [9, 13].</p>
      <p>Let there be a system Pr, which is in one of n possible states Pri(i=1,2,…,n).</p>
    </sec>
    <sec id="sec-12">
      <title>Let us call this system - a system of profiles, and each of the states - a profile. Dif</title>
      <p>ferent states of the protected infrastructure at discrete instants of time are represented
by a set of standards (profiles), while the choice of the number of profiles is determined
by the study objectives. Recognition of the Pr system states is carried out by monitoring
the system associated with it - the system of signs. We will call the survey result,
expressed in one of two symbols or a binary number (0 and 1), a simple attribute.</p>
    </sec>
    <sec id="sec-13">
      <title>From the point of information theory view, a simple feature can be considered as a</title>
      <p>system having one of two possible states. If kj is a simple sign, then its two states will
be denoted by kj - the sign presence,   - the sign absence. A simple sign may indicate
the presence or absence of the measured PST in a certain interval; it may also have a
qualitative character (positive or negative test result, etc.) [11, 12].</p>
      <p>The two-digit sign (m=2)) has two possible states. The states of the two-digit sign kj
are denoted by</p>
      <p>and    . Let, for example, the sign kj be related to the measurement
of PST x, for which two diagnostic intervals are established: x10 and x›0. Then   
corresponds to x10, and    denotes x›10. These states are alternative because only</p>
    </sec>
    <sec id="sec-14">
      <title>It is obvious that the two-digit sign can be replaced by the simple sign kj, putting</title>
      <p>one of them is realized.
   =   ,    =   .</p>
      <p>If the survey detect that the sign kj has the value    , for this object, then this value
will be called the implementation of the sign kj. Denoting it by  ∗, we will have
 ∗ =    .for the diagnosis Pri we take
  
( ∗) =   
(   ) =</p>
      <p>
        (    )
  (  )
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
  
where  (
      </p>
      <p>) – profile probability Pri provided that the sign kj received the value
   ; P(Pri)– is the prior profile probability.</p>
      <p>The value   
(  )was met in works on information theory under the name
“infor</p>
      <p>mation value”. From the point of view of information theory, the quantity   
(  ) is

information on the state Pri, which the state of the sign    possesses. The diagnostic
weight of a particular implementation of a sign does not yet give an idea of the
diagnostic value of the examination for this sign. Thus, during a survey on a simple sign, it
may turn out that its value does not have a diagnostic weight, whereas its absence is
extremely important for establishing the profile of the object of the protected
infrastructure.</p>
    </sec>
    <sec id="sec-15">
      <title>We will consider the diagnostic survey value on the m-bit kj sign for the profile Pri the information amount introduced by all implementations of the kj sign to the profile Pri</title>
      <p>(  ) = ∑ =  (    )    (   )</p>
      <p>The diagnostic survey value takes into account all possible implementations of a sign
and represents the amount expectation of information contributed by individual
implementations. Since the value of    (  ) refers to only one profile Pri, we will call it the
private diagnostic survey value based on kj sign.    (  ) determines the independent
diagnostic survey value. It is situation characteristic when the survey is conducted first
or when the results of other surveys are unknown. Write    (  ) in a form convenient
for further calculations
   (  ) = ∑ =  (    )</p>
      <p>(    )]
 [ (  )
The generated attribute space allowed identifying and classifying the symptoms of the
potentially vulnerable states of the protected infrastructure, determine the network
traffic parameters used for communication and behavioral profiling of the protected
infrastructure objects with atypical interaction macroparameters.</p>
    </sec>
    <sec id="sec-16">
      <title>Let us further consider the procedure for determining the diagnostic sign weights of vulnerable states of the protected object infrastructure.</title>
      <p>4</p>
      <sec id="sec-16-1">
        <title>Reference behavior profiling</title>
        <p>We will distinguish three different object states of the protected infrastructure
(profiles), caused by the attacking effects of violators: Pr1 is a profile, characterizing a
vulnerable condition due to an unknown zero-day vulnerability; Pr2 is a profile,
characterizing the vulnerable state, due to the configuration of protection means; Pr3 is a profile,
characterizing a vulnerable condition, due to an impact on a known vulnerability.
Profiling is carried out, according to the nine simple non-specific features: byte-frequency
for TCP (k1), byte-frequency for UDP (k2), hash value (k3), hash-value based on offset
byte (k4), based on the first 4 bytes repeated in packets (k5), the hash value for pairs of
the first 16 bytes of the first 4 packets (k6), the length of the first four packets in one
direction (k7), the nibble number of the first packet from the server to the client (k8),
duplicate pairs of bytes (k9) [14, 15].</p>
        <p>
          For example, the functional state is diagnosed at 414 of the 450 network nodes of
the protected infrastructure (having no known vulnerabilities), 10 of the 36 surveyed
nodes that were attacked by the intruders, were in the first vulnerable state, 12 in the
second, and 14 in the third [10, 16]. The results of profiling by the characteristics are
shown in Table 1. Let us note that the first profile is characterized by the presence of at
least two shaded squares (ones) in the first row and at least two white squares (zeros)
(
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
(
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
        </p>
      </sec>
    </sec>
    <sec id="sec-17">
      <title>Table1.Statisticaldataofprofilinginfrastructureobjectsbyasimplesign</title>
      <sec id="sec-17-1">
        <title>Pri INtem No.   sign Geometricinterpretation</title>
        <p>k1 k2 k3 K4 k5 k6 k7 k8 k9
1 1 1 1 1 0 0 0 0 1 1 N12 3 1 N22 3 1 N32 3
2 1 1 0 0 1 0 0 1 0 4 5 6 4 5 6 4 5 6
3 1 0 1 1 0 0 0 0 1 7 8 9 7 8 9 7 8 9
4 0 1 1 0 0 1 1 0 0 1 N42 3 1 N52 3 1 N62 3
Pr1 56 11 11 11 10 01 00 00 01 10 47 58 69 47 58 69 47 58 69
7 1 1 0 1 0 0 0 0 1
8 1 0 1 0 0 1 1 0 0 1 N72 3 1 N82 3 1 N92 3
9 0 1 1 0 0 1 1 0 0 4 5 6 4 5 6 4 5 6
10 1 1 1 0 0 1 1 0 0 7 8 9 7 8 9 7 8 9
1 0 0 1 0 1 1 0 1 0 1 N12 3 1 N22 3 1 N32 3
2 0 1 0 1 0 1 0 0 1 4 5 6 4 5 6 4 5 6
3 0 0 1 1 1 0 1 0 0 7 8 9 7 8 9 7 8 9
4 1 0 0 1 1 1 0 1 0 1 N42 3 1 N52 3 1 N62 3
5 0 0 1 0 1 1 0 0 1 4 5 6 4 5 6 4 5 6
Pr2 67 0 0 1 1 0 1 1 0 0 1 N72 3 1 N82 3 1 N92 3
0 1 0 1 1 1 0 1 0 7 8 9 7 8 9 7 8 9
8 1 0 0 1 1 1 0 1 0 4 5 6 4 5 6 4 5 6
9 0 1 0 1 1 0 0 0 1 7 8 9 7 8 9 7 8 9
10 1 0 0 1 1 1 1 0 0 1 N120 3 1 N121 3 1 N122 3
11 0 0 1 0 1 1 1 0 0 4 5 6 4 5 6 4 5 6
12 0 1 0 1 1 1 0 0 1 7 8 9 7 8 9 7 8 9
1 1 0 0 0 1 0 1 1 0 1 N12 3 1 N22 3 1 N32 3
2 0 1 0 0 0 1 0 1 1 4 5 6 4 5 6 4 5 6
3 1 0 0 1 0 0 1 1 1 7 8 9 7 8 9 7 8 9
4 0 0 1 0 1 0 1 0 1 1 N42 3 1 N52 3 1 N62 3
5 1 0 0 0 0 1 1 1 0 4 5 6 4 5 6 4 5 6
6 0 1 0 0 1 0 1 1 1 7 8 9 7 8 9 7 8 9
Pr3 78 0 0 1 0 1 0 1 1 1 1 N72 3 1 N82 3 1 N92 3
1 0 0 1 0 0 0 1 1
9 0 1 0 0 0 1 1 0 1 74 85 69 74 85 96 74 85 96
10 0 0 1 1 0 0 1 1 1
11 0 0 1 1 0 0 1 1 1 1 N120 3 1 N121 3 1 N122 3
12 0 1 0 0 1 0 0 1 1 4 5 6 4 5 6 4 5 6
13 0 0 1 1 0 0 1 1 0 7 8 9 7 8 9 7 8 9
14 1 0 0 0 0 1 1 0 1
0,678
0,678
0,83
0,082
0,009
0,006
0,136
0,235</p>
        <p>…
groups in the corresponding infrastructure, it is possible to conduct the selective
monitoring, providing a significant reduction in the response time to potential incidents and
ensuring the required cyber-resilience.
5</p>
        <sec id="sec-17-1-1">
          <title>Procedure for iterative diagnosis</title>
        </sec>
      </sec>
    </sec>
    <sec id="sec-18">
      <title>In the diagnostics tasks of the critically important information infrastructure, the se</title>
      <p>lection of the most informative features for describing the object of the mentioned
infrastructure and the subsequent construction of the diagnostic process is extremely
important. In many cases, this is due both to the difficulty of obtaining the information
itself (the node (network) number sensors of the cyber-attack detection systems, as a
rule, is limited), and with the limited time of diagnostic survey under cyber-attacks.
Imagine the process of diagnostic survey as follows [13, 15]. A system can be with a
certain probability in one of the previously unknown states. If the prior probabilities of
the states P(Pri) can be obtained from a statistical data, then the system entropy is
 ( ) = − ∑ =1  (  )
2  (  )</p>
    </sec>
    <sec id="sec-19">
      <title>As a result of a full diagnostic survey of the complex of features K, the system state</title>
      <p>becomes known (for example, it turns out that the network object is in the state Pr1,
then P(Pr1)=1, P(Pr1)=0(i=2,…n). After a complete diagnostic survey, the system
entropy (uncertainty)</p>
      <p>H(Pr/K)=0</p>
    </sec>
    <sec id="sec-20">
      <title>This information contained in the diagnostic survey, or the diagnostic survey</title>
      <p>
        (
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
(
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )
value is
JPr(K)=ZPr(k)=H(Pr)-H(Pr/K)=H(Pr)
      </p>
    </sec>
    <sec id="sec-21">
      <title>In fact, the condition (10) is far from being always fulfilled. In many cases, a recog</title>
      <p>nition is statistical in nature and it is necessary to know that the probability of one of
the states is quite high (for example, P(Pr1)=0,95. For such situations, the residual
system entropy (Pr/K)≠0.</p>
    </sec>
    <sec id="sec-22">
      <title>In practical cases, the required diagnostic survey value is</title>
      <p>where  is the survey completeness coefficient, 01.</p>
    </sec>
    <sec id="sec-23">
      <title>The coefficient  depends on the recognition reliability and for real diagnostic pro</title>
      <p>cesses should be close to 1. If the prior probabilities of the system states are unknown,
then one can always give an upper assessment for the system entropy H(Pr)log2n,
where n is the number of the system states.</p>
    </sec>
    <sec id="sec-24">
      <title>Under the (12) condition it follows that the amount of information that needs to be</title>
      <p>obtained during a diagnostic survey is given and it is required to make an optimal
process for its accumulation.</p>
      <p>When making a diagnostic process, it is necessary to take into account the difficulty
of obtaining relevant information. Let us call the optimality coefficient of the diagnostic
survey based on kj for the profile Pri value is
  =</p>
      <p>
        (
        <xref ref-type="bibr" rid="ref13">13</xref>
        )
(  )
(
        <xref ref-type="bibr" rid="ref12">12</xref>
        )
(
        <xref ref-type="bibr" rid="ref14">14</xref>
        )
(
        <xref ref-type="bibr" rid="ref15">15</xref>
        )
where ZPr(K(v)) is the diagnostic survey value of the complex of signs.
      </p>
    </sec>
    <sec id="sec-25">
      <title>Thus, the optimality coefficient will be large if a smaller number of the individual</title>
      <p>surveys obtains the required diagnostic value. In the general case, an optimal diagnostic
process should ensure that the maximum value of the optimality coefficient of the entire
survey is obtained (conditions for the diagnostic survey optimality).</p>
      <p>To describe the interaction (information transfer) between the objects of the
protected infrastructure in time, dynamic communication profiles are used. The object
profile of the protected infrastructure will be understood below as a formalized means of
describing and displaying the characteristics of the infrastructure as a whole and its
individual object in terms of the specification of rules (communication protocols,
access to resources) and data exchange procedures at the corresponding observation
interval.</p>
      <p>The interaction features of the network nodes in a given observation interval are
presented in three-dimensional space (Figure 3), where the start and end times of the
where   
general,   
(  ) is the diagnostic survey value based on   for the profile
 . In
(  ) is determined based on the results of previous surveys; cij is the
coefficient of survey complexity based on   for the profile 
 , it characterizes the
laboriousness of the survey, its reliability, duration and other factors. It is assumed that cij
does not depend on the previous surveys.</p>
    </sec>
    <sec id="sec-26">
      <title>The optimality coefficient for the entire profile system is</title>
      <p>When calculating j, information is averaged and the survey complexity is carried out
over all profiles. For survey of complex K of v signs, the optimality coefficient is

  = ∑ =  (  )  

∑ =  (  ) 
(  )
=   
 
(  )</p>
      <p>
        .
 =  
( ( ))

∑ =  
corresponding interaction processes are specified on the X-axis, the identified operating
systems (OS) and applications installed on the network node are specified on the
Yaxis, on the Z axis are the numbers used for TCP/UDP port interaction used by the
corresponding applications. The communication profile (CP) of the network object is
represented as

=  1 = 〈
(  )
1
  , … , 
(  )
  〉
(
        <xref ref-type="bibr" rid="ref16">16</xref>
        )
where Sft is the software type (Operating system or application), SftOsApl, Pt
protocol, Prt- TCP/UDP port number, i=1,2,…65535; k,nN.
      </p>
      <p>For example, the communication profile of a network object, shown in the diagram
in Figure 3, has the following form:
  
( )
= 〈
, 
, 

, 
, 
 , 



,  



, 
, 




, 
, 




〉.</p>
    </sec>
    <sec id="sec-27">
      <title>Behavioral profile (BP)</title>
      <p>where Nm – OS (application) name, V – network object identifier (application
instance name); type - network object type (active or passive), typeActPsv;  -
application version; D - a set of operations; I, k, nN.</p>
    </sec>
    <sec id="sec-28">
      <title>For example, the behavioral profile of a network object represented in the diagram in Figure 3 has the following form:</title>
      <p>BPN(1O)1 </p>
      <p>Apl1 Instagram(IOS);6.0; act; chat ,...,
Apl11 Instagram( Android);5.1; act; chat </p>
    </sec>
    <sec id="sec-29">
      <title>Protection profile (PP)</title>
      <p>BP=Pr3=&lt;Nm1=&lt;I, k, &gt;&gt;
BP=Pr2=&lt;Nm1=&lt;Vi, type, k, Ds&gt;&gt;
(17)
(18)
(19)
(20)
where γ – a security service name; ϕ - version; ψ - operation type (chat, file sharing
(download), use of a web browser, download, file sharing (upload), IP-call); I, k, nN.</p>
    </sec>
    <sec id="sec-30">
      <title>For example, the security profile (SP) of a network object represented in the diagram in Figure 3 has the following form:</title>
      <p>SPN(1O)1 </p>
      <p>Apl 3 OpenSSH(sshd ), 2, Kerberos v5 auth ,...,</p>
      <p>Apl 8 MSCryptoAPI , 6.1, E2EE</p>
      <p>As an example, let us consider the detection of the certificate spoofing at one of the
workplaces when accessing a web resource using the SSL/TLS protocols as a result of
a passive monitoring. This situation has many alternatives in terms of the development
of situations, related to the cyber-resilience violation of the protected infrastructure. If
the destructive actions of the user were deliberate, this event (incident) can be
associated with both previous incidents, and have a high probability of recurrence in the future
(Table 4).
Exploited
vul</p>
      <p>nerability/
vulnerable
protocol or
compo</p>
      <p>nent
CVE-20163213/ NetBIOS,</p>
    </sec>
    <sec id="sec-31">
      <title>ISATAP</title>
    </sec>
    <sec id="sec-32">
      <title>Internet</title>
      <p>plorer,</p>
    </sec>
    <sec id="sec-33">
      <title>HTTP/HTTPS</title>
      <p>Action to prevent
or respond to an incident</p>
    </sec>
    <sec id="sec-34">
      <title>Installing security system updates MS16-063, MS16-077</title>
      <p>No.</p>
      <p>Network
object</p>
    </sec>
    <sec id="sec-35">
      <title>Windowshosts</title>
      <p>System or
application
software
component</p>
    </sec>
    <sec id="sec-36">
      <title>Windows 2018</title>
    </sec>
    <sec id="sec-37">
      <title>Ex- Using Firefox, Opera, Chrome browsers with HPKP technology</title>
      <sec id="sec-37-1">
        <title>TLS tMabultiushalinagutahTenLtSicactoinonnewcthioenn es</title>
      </sec>
      <sec id="sec-37-2">
        <title>2. Client hosts bWroewb-ser Cwoitnhtraoclceosfsatpoptlhiceawtioebn bsoroftwwsaerre</title>
      </sec>
    </sec>
    <sec id="sec-38">
      <title>Use of additional sources or da</title>
    </sec>
    <sec id="sec-39">
      <title>HTTPS, TLS tabases of permitted keys and certificates</title>
    </sec>
    <sec id="sec-40">
      <title>Mutual client and server authen</title>
      <p>tication
- DNS DNS name resolution</p>
    </sec>
    <sec id="sec-41">
      <title>Network traf</title>
      <p>3. fic monitoring SSL name resolution,
maintesystem SSL/TLS nance of a registry of public
server trusted key fingerprints</p>
      <p>In addition, this incident poses a threat to the protected infrastructure from the
intruder’s point of view, gaining an access to the compromised node, as well as
compromising other nodes or the entire infrastructure under study. At the first stage, based on
the reverse data analysis, it will be necessary to verify the events (as well as their
results) with the statistical characteristics are of interest in detecting cause-and-effect
links between the user actions to determine his degree participation in the incident:
certificate with the authentic issuer; certificate with fake issuer; certificate with valid
expiration date; certificate with expired validity; certificate with original issuer, not
expired; certificate with original issuer, expired; certificate with fake issuer, not expired;
certificate with fake issuer, expired. According to the investigation results, the
monitoring system forms a list of preventive (response) actions to the corresponding
incident.</p>
      <sec id="sec-41-1">
        <title>Conclusions</title>
        <p>Further, a set of the qualitative features is formed, based on the results of the secondary
processing of the monitoring results in the form of a decision tree, the interconnection
degree between alternative feature groups, technical and economic consequences
(damage) for the protected infrastructure and its assets during their manifestation is
determined, and a set of possible actions is generated to localize the incident.</p>
      </sec>
    </sec>
    <sec id="sec-42">
      <title>Thus, the proposed method of profiling the behavior of dynamic objects of a critically important information infrastructure allows selecting and putting into a practice (with scientific evidence) the corresponding organizational and technical measures to ensure the required cyber-resilience.</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>B. R.</given-names>
            <surname>Shiller</surname>
          </string-name>
          ,
          <year>2014</year>
          . “
          <article-title>First-Degree Price Discrimination Using Big Data</article-title>
          .
          <source>” April</source>
          <volume>25</volume>
          ,
          <string-name>
            <surname>Brandeis</surname>
            <given-names>University</given-names>
          </string-name>
          , Department of Economics Working Paper 58. [Electronic resource]. - Access mode: http://www.brandeis.edu/departments/economics/RePEc/brd/doc/Brandeis_ WP58R.pdf
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Beraud</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cruz</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hassell</surname>
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Meadows</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <article-title>"Using Cyber Maneuver to Improve Network Resiliency," in MILCOM, Baltimore</article-title>
          ,
          <string-name>
            <surname>MD</surname>
          </string-name>
          ,
          <year>2011</year>
          . DOI:
          <volume>10</volume>
          .1109/milcom.
          <year>2011</year>
          .6127449
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Biryukov</surname>
            ,
            <given-names>D. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lomako</surname>
            ,
            <given-names>A. G.</given-names>
          </string-name>
          <article-title>Approach to Building a Cyber Threat Prevention System. Problems of Information Security</article-title>
          .
          <source>Computer systems</source>
          , Publishing house of Polytechnic University, vol.
          <volume>2</volume>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>19</lpage>
          , St. Petersburg, Russia,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bongard</surname>
            ,
            <given-names>M. M.</given-names>
          </string-name>
          <article-title>The Problem of Recognition, Fizmatgiz</article-title>
          , Moscow, Russia,
          <year>1967</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bostick</surname>
            ,
            <given-names>T. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Connelly</surname>
            ,
            <given-names>E. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lambert</surname>
            ,
            <given-names>J. H.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Linkov</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Resilience Science, Policy and Investment for Civil Infrastructure</article-title>
          .
          <source>Reliability Engineering &amp; System Safety</source>
          <volume>175</volume>
          :
          <fpage>19</fpage>
          -
          <lpage>23</lpage>
          . DOI:
          <volume>10</volume>
          .1016/j.ress.
          <year>2018</year>
          .
          <volume>02</volume>
          .025
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Colbert</surname>
            ,
            <given-names>E. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kott</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Knachel</surname>
            <given-names>III</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            , &amp;
            <surname>Sullivan</surname>
          </string-name>
          ,
          <string-name>
            <surname>D. T.</surname>
          </string-name>
          (
          <year>2017</year>
          ).
          <source>Modeling Cyber Physical War Gaming (Technical Report No. ARL-TR-8079)</source>
          . US Army Research Laboratory, Aberdeen Proving Ground, United States.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Collier</surname>
            ,
            <given-names>Z. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Linkov</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , DiMase,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Walters</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Tehranipoor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            , &amp;
            <surname>Lambert</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
          (
          <year>2014a</year>
          ).
          <article-title>Risk-Based Cybersecurity Standards: Policy Challenges and Opportunities</article-title>
          .
          <source>Computer</source>
          <volume>47</volume>
          :
          <fpage>70</fpage>
          -
          <lpage>76</lpage>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -77492-3
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Bodeau</surname>
          </string-name>
          ,
          <article-title>"Analysis Through a Resilience Lens: Experiences and Lessons-Learned (PR 15-1309) (presentation)," in 5th Annual Secure and Resilient Cyber Architectures Invitational, McLean</article-title>
          ,
          <string-name>
            <surname>VA</surname>
          </string-name>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Dessavre</surname>
            <given-names>D. G.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Ramirez-Marquez</surname>
            <given-names>J. E.</given-names>
          </string-name>
          ,
          <article-title>"Computational Techniques for the Approximation of Total System Resilience,"</article-title>
          <source>in Safety and Reliability of Complex Engineered Systems: ESREL</source>
          <year>2015</year>
          , Zurich, Switzerland,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Dorofeev</surname>
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markov</surname>
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            <given-names>V.L. Social</given-names>
          </string-name>
          <article-title>Media in Identifying Threats to Ensure Safe Life in a Modern City</article-title>
          ,
          <source>Communications in Computer and Information Science</source>
          ,
          <year>2016</year>
          , vol.
          <volume>674</volume>
          , pp.
          <fpage>441</fpage>
          -
          <lpage>449</lpage>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -49700-6_
          <fpage>44</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Eisenberg</surname>
            ,
            <given-names>D. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Linkov</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Park</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bates</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fox-Lent</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Seager</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>Resilience metrics: Lessons from military doctrines</article-title>
          .
          <source>Solutions</source>
          ,
          <volume>5</volume>
          (
          <issue>5</issue>
          ),
          <fpage>76</fpage>
          -
          <lpage>87</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. J.
          <string-name>
            <surname>Park</surname>
            ,
            <given-names>T. P.</given-names>
          </string-name>
          <string-name>
            <surname>Seager</surname>
            ,
            <given-names>P. S.</given-names>
          </string-name>
          <string-name>
            <surname>Rao</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Convertino and I. Linkov, "Integrating risk and resilience approaches to catastrophe management in engineering systems,"</article-title>
          <source>Risk Analysis</source>
          , vol.
          <volume>33</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>356</fpage>
          -
          <lpage>367</lpage>
          ,
          <year>2013</year>
          . doi:
          <volume>10</volume>
          .1111/j.1539-
          <fpage>6924</fpage>
          .
          <year>2012</year>
          .
          <year>01885</year>
          .x
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Kelic</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Collier</surname>
            ,
            <given-names>Z. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brown</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beyeler</surname>
            ,
            <given-names>W. E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Outkin</surname>
            ,
            <given-names>A. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vargas</surname>
            ,
            <given-names>V. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ehlen</surname>
            ,
            <given-names>M. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Judson</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaidi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leung</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Linkov</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Decision framework for evaluating the macroeconomic risks and policy impacts of cyber attacks</article-title>
          .
          <source>Environment Systems &amp; Decisions</source>
          ,
          <volume>33</volume>
          (
          <issue>4</issue>
          ),
          <fpage>544</fpage>
          -
          <lpage>560</lpage>
          . DOI:
          <volume>10</volume>
          .1007/s10669-013-9479-9
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Kotenko</surname>
            ,
            <given-names>I. V.</given-names>
          </string-name>
          <article-title>Intellectual mechanisms of cybersecurity management</article-title>
          .
          <source>Proceedings of ISA RAS. Risk Manag. Safety</source>
          ,
          <volume>41</volume>
          , pp.
          <fpage>74</fpage>
          -
          <lpage>103</lpage>
          , Moscow, Russia,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Lomako</surname>
            ,
            <given-names>A. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petrenko</surname>
            ,
            <given-names>S. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petrenko</surname>
            ,
            <given-names>A. S.</given-names>
          </string-name>
          <article-title>Realization of the immune system of the stable computations organization, In: Information systems and technologies in modelling and management, Materials of the All-Russian scientific</article-title>
          and practical conference, pp.
          <fpage>255</fpage>
          -
          <lpage>259</lpage>
          , Russia,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Patrick</surname>
            <given-names>McDaniel</given-names>
          </string-name>
          and
          <string-name>
            <given-names>Ananthram</given-names>
            <surname>Swami</surname>
          </string-name>
          ,
          <source>The Cyber Security Collaborative Research Alliance:Unifying Detection</source>
          , Agility, and
          <article-title>Risk in Mission-Oriented Cyber Decision Making</article-title>
          .
          <source>CSIAC Journal, Army Research Laboratory (ARL) Cyber Science and Technology</source>
          ,
          <volume>5</volume>
          (
          <issue>1</issue>
          ), December,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>