
Security concept with cloud and lock in electronic circuit
ICS affiliate helps ward against cyberattacks
Posted on October 18, 2017When a computer system is compromised by a cybercriminal, chaos ensues. Not only have attackers accessed the data they’re after, they could also bring the everyday business processes to a grinding halt.
Thanks to new research from the Penn State College of Information Sciences and Technology (IST), there may be a new way to help organizations mitigate the wave of disruption left in the wake of a cyberattack.
The study, “Building an Active Cyber Defense Toolkit based on Actionable Impact Analysis in Cloud Computing,” is being spearheaded by Peng Liu, professor of IST, and is funded by a grant from the National Institute of Standards and Technology (NIST). Liu is an ICS affiliate.
Liu’s research focuses on identifying an organization’s mission impact, which are the theoretical effects of a cyberattack on everyday business processes. Liu used the example of LionPATH, Penn State’s online student hub for managing tuition payments, grade reporting, and a variety of student services.
“When a hacker is attacking a computer network like LionPATH, the real purpose may not be to affect those business processes,” Liu explained.
The attacker’s primary goal is usually to capture data, but it’s quite likely the business processes would be disrupted from a successful intrusion.
Said Liu, “The motivation of this project is to more quantitatively assess those types of indirect impacts.”
The need for this kind of preparation is heightened, as nearly all organizations across every industry are readily adopting cloud computing technologies.
“A virtual network introduces some new vulnerabilities. Therefore, an attack will exploit them,” Liu said.
This research aims to address an existing gap of knowledge, as the cybersecurity analysts who are trained to identify and thwart cyberattacks aren’t usually familiar with the day-to-day businesses systems and how they could be affected.
“On the other side are the people responsible for those things, like accountants, but they aren’t able to detect a cyberattack themselves,” Liu explained.
However, those managing the daily processes are often the first to know when a disruption occurs, such as a payment system crashing. Liu plans to create a tool that can merge the two priorities to automatically determine which business processes can be affected in the event of a hack and how to quarantine the effects.
In the example of payment systems, Liu notes, the tool could potentially identify that if payment information is contaminated, the overarching system may not be able to accept payments or may invoice incorrect amounts.
This proactive mindset also adds an additional layer of resiliency to an organization, helping them regain control of their systems and resume business as usual.
In an environment where cyberattacks are becoming increasingly prevalent, the application of this tool can help fortify an organization’s security by directly using log data as an input, thus making the impact analysis mostly automatic.”
Concludes Liu, “This research is a critical step forward.”
This article originally appeared on Penn State News and has been modified to clarify Peng Liu’s connection with ICS. Read the original here: http://news.psu.edu/story/488262/2017/10/16/research/ist-research-help-ward-against-cyberattacks
Share
Related Posts
- Featured Researcher: Nick Tusay
- Multi-institutional team to use AI to evaluate social, behavioral science claims
- NSF invests in cyberinfrastructure institute to harness cosmic data
- Center for Immersive Experiences set to debut, serving researchers and students
- Distant Suns, Distant Worlds
- CyberScience Seminar: Researcher to discuss how AI can help people avoid adverse drug interactions
- AI could offer warnings about serious side effects of drug-drug interactions
- Taking RTKI drugs during radiotherapy may not aid survival, worsens side effects
- Cost-effective cloud research computing options now available for researchers
- Costs of natural disasters are increasing at the high end
- Model helps choose wind farm locations, predicts output
- Virus may jump species through ‘rock-and-roll’ motion with receptors
- Researchers seek to revolutionize catalyst design with machine learning
- Resilient Resumes team places third in Nittany AI Challenge
- ‘AI in Action’: Machine learning may help scientists explore deep sleep
- Clickbait Secrets Exposed! Humans and AI team up to improve clickbait detection
- Focusing computational power for more accurate, efficient weather forecasts
- How many Earth-like planets are around sun-like stars?
- Professor receives NSF grant to model cell disorder in heart
- SMH! Brains trained on e-devices may struggle to understand scientific info
- Whole genome sequencing may help officials get a handle on disease outbreaks
- New tool could reduce security analysts’ workloads by automating data triage
- Careful analysis of volcano’s plumbing system may give tips on pending eruptions
- Reducing farm greenhouse gas emissions may plant the seed for a cooler planet
- Using artificial intelligence to detect discrimination
- Four ways scholars say we can cut the chances of nasty satellite data surprises
- Game theory shows why stigmatization may not make sense in modern society
- Older adults can serve communities as engines of everyday innovation
- Pig-Pen effect: Mixing skin oil and ozone can produce a personal pollution cloud
- Researchers find genes that could help create more resilient chickens
- Despite dire predictions, levels of social support remain steady in the U.S.
- For many, friends and family, not doctors, serve as a gateway to opioid misuse
- New algorithm may help people store more pictures, share videos faster
- Head named for Ken and Mary Alice Lindquist Department of Nuclear Engineering
- Scientific evidence boosts action for activists, decreases action for scientists
- People explore options, then selectively represent good options to make difficult decisions
- Map reveals that lynching extended far beyond the deep South
- Gravitational forces in protoplanetary disks push super-Earths close to stars
- Supercomputer cluster donation helps turn high school class into climate science research lab
- Believing machines can out-do people may fuel acceptance of self-driving cars
- People more likely to trust machines than humans with their private info
- IBM donates system to Penn State to advance AI research
- ICS Seed Grants to power projects that use AI, machine learning for common good
- Penn State Berks team advances to MVP Phase of Nittany AI Challenge
- Creepy computers or people partners? Working to make AI that enhances humanity
- Sky is clearing for using AI to probe weather variability
- ‘AI will see you now’: Panel to discuss the AI revolution in health and medicine
- Privacy law scholars must address potential for nasty satellite data surprises
- Researchers take aim at hackers trying to attack high-value AI models
- Girls, economically disadvantaged less likely to get parental urging to study computers
- Seed grants awarded to projects using Twitter data
- Researchers find features that shape mechanical force during protein synthesis
- A peek at living room decor suggests how decorations vary around the world
- Interactive websites may cause antismoking messages to backfire
- Changing how government assesses risk may ease fallout from extreme financial events
- Penn State’s Leadership in AI Research
- Symposium at U.S. Capitol seeks solutions to election security
- ICS co-sponsors Health, Environment Seed Grant Program
- Differences in genes’ geographic origin influence mitochondrial function