Mathematical Models for New Types of Cyberattack and Associated Defence Strategies
1Guangdong Medical University, Dongguan, China
2Deakin University, Melbourne, Australia
3Jiangsu Normal University, Xuzhou, China
4Chongqing University of Posts and Telecommunications, Chongqing, China
Mathematical Models for New Types of Cyberattack and Associated Defence Strategies
Description
With the rapid development and widespread application of cloud computing, big data, artificial intelligence, blockchain, and the Internet of Things, new types of cyberattacks are emerging, such as cryptominers, ransomware, and advanced persistent threats. Compared with conventional cyberattacks, the intensity and frequency of new cyberattacks have increased dramatically, and the losses caused by the attacks have increased significantly, while the cost of attacks has rapidly decreased. In conclusion, new types of cyberattacks pose a severe threat to modern society. Consequently, how to effectively defend against such attacks is a major concern in the domain of cybersecurity.
Existing approaches for defending against cyberattacks are summarized as follows: 1. Data-driven and AI-driven approach. Using advanced big data and machine learning techniques, effective detection methods for cyberattacks can be developed. 2. Model-driven approach. Based on an in-depth analysis of attack features, propagating dynamics theory is used to construct and analyse a dynamical model capturing the interaction between attack and defence. The obtained theoretical results can provide insights into an effective prediction of the behaviour of the network attacks. Moreover, some heuristic algorithms are developed to effectively defend against cyberattacks. 3. Game-theoretic approach. Based on security economics and game theory, the original problem is modelled as a game where both the attacker and the defender pursue their respective maximum payoffs. Through an in-depth analysis of the proposed game, defensive strategies under different solution concepts (e.g., Nash equilibrium, Stackelberg equilibrium, etc) can be developed to deal with various application scenarios.
This Special Issue aims to focus on the second and third approaches. Towards this direction, the findings can provide reasonable suggestions for the development of next-generation network security software as well as a theoretical basis for building a more secure network environment. This special issue welcomes original research and review articles covering the latest ideas, theoretical analysis, and empirical findings related to new types of cyberattacks, malware propagation, and network rumours.
Potential topics include but are not limited to the following:
- Mathematical models for new types of cyberattack
- Optimal strategies for defending cyber attack
- Saddle point strategies for defending cyberattack
- Heuristic algorithms for defending cyberattack
- Mathematical models for malware propagation
- Numerical simulation of malware propagation
- Mathematical models of network rumours
- Numerical simulation of network rumours
- Application of game theory in cybersecurity
- Latest trends in cyberattack
- Latest trends in cybersecurity