AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (786.7 KB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Complexity Science and Cyber Operations: A Literature Survey

Technology Department, Florida State College at Jacksonville, Jacksonville, FL 32202, USA
Department of Computer Science, University of Idaho, Moscow, ID 83844, USA
Show Author Information

Abstract

Complexity science is an interdisciplinary scientific field that analyzes systems as holistic entities consisting of characteristics beyond the sum of a system’s individual elements. This paper presents current research across the literature promoting cyber security as a complex adaptive system. We introduce complex systems concepts and fields of study, and deliver historical context, main themes, and current research relevant to cyber operations. Examples of cyber operations research leveraging agent-based modeling demonstrate the power of computational modeling grounded in complex systems principles. We discuss cyber operations as a scientific field, define current shortfalls for scientific rigor, and provide examples of how a complexity science foundation can further research and practice across a variety of cyber-based efforts. We propose standard definitions applicable to complex systems for cyber professionals and conclude with recommendations for future cyber operations research.

References

[1]

A. D. Raju, I. Y. Abualhaol, R. S. Giagone, Y. Zhou, and S. Huang, A survey on cross-architectural IoT malware threat hunting, IEEE Access, vol. 9, pp. 91686–91709, 2021.

[2]

M. Husák, J. Komárková, E. Bou-Harb, and P. Čeleda, Survey of attack projection, prediction, and forecasting in cyber security, IEEE Commun. Surv. Tutor., vol. 21, no. 1, pp. 640–660, 2019.

[3]

W. Wu, R. Li, G. Xie, J. An, Y. Bai, J. Zhou, and K. Li, A survey of intrusion detection for in-vehicle networks, IEEE Trans. Intell. Transport. Syst., vol. 21, no. 3, pp. 919–933, 2020.

[4]

A. Chowdhury, G. Karmakar, J. Kamruzzaman, A. Jolfaei, and R. Das, Attacks on self-driving cars and their countermeasures: A survey, IEEE Access, vol. 8, pp. 207308–207342, 2020.

[5]

S. Mehrban, M. W. Nadeem, M. Hussain, M. M. Ahmed, O. Hakeem, S. Saqib, M. L. M. Kiah, F. Abbas, M. Hassan, and M. A. Khan, Towards secure FinTech: A survey, taxonomy, and open research challenges, IEEE Access, vol. 8, pp. 23391–23406, 2020.

[6]

R. Atat, L. Liu, J. Wu, G. Li, C. Ye, and Y. Yang, Big data meet cyber-physical systems: A panoramic survey, IEEE Access, vol. 6, pp. 73603–73636, 2018.

[7]

D. Bhamare, M. Zolanvari, A. Erbad, R. Jain, K. Khan, and N. Meskin, Cybersecurity for industrial control systems: A survey, Comput. Secur., vol. 89, p. 101677, 2020.

[8]
A. J. Onwuegbuzie and R. Frels, Seven Steps to a Comprehensive Literature Review: A Multimodal and Cultural Approach. Los Angeles, CA, USA: SAGE Publications Ltd, 2016.
[9]
A. B. Downey, Think Complexity: Complexity Science and Computational Modeling, 2nd edition. Boston, MA, USA: O’Reilly Media, 2018.
[10]
B. Castellani and F. W. Hafferty, Sociology and Complexity Science: A New Field of Inquiry. Berlin, Germany: Springer Berlin Heidelberg, 2009.
[11]
L. Von Bertalanffy, General System Theory: Foundations, Development, Applications, Revised edition. New York, NY, USA: George Braziller Inc., 1968.
[12]
N. Wiener, Cybernetics: Or Control and Communication in the Animal and the Machine (Second Edition). Cambridge, MA, USA: MIT Press, 1948.
[13]
B. Macukow, Neural networks–State of art, brief history, basic models and architecture, https://doi.org/10.1007/978-3-319-45378-1_1, 2016.
[14]
G. A. Cowan, Manhattan Project to the Santa Fe Institute: The Memoirs of George A. Cowan. Albuquerque, NM, USA: University of New Mexico Press, 2010.
[15]
S. Xu, Emergent behavior in cybersecurity, in Proc. 2014 Symp. and Bootcamp on the Science of Security, Raleigh, NC, USA, 2014, pp. 1–2.
[16]
H. Sayama, Introduction to the Modeling and Analysis of Complex Systems. Albany, NY, USA: Open SUNY Textbooks, 2015.
[17]

S. Moskal, S. J. Yang, and M. E. Kuhl, Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach, J. Def. Model. Simul. Appl. Methodol. Technol., vol. 15, no. 1, pp. 13–29, 2018.

[18]
A. Attiah, M. Chatterjee, and C. C. Zou, A game theoretic approach to model cyber attack and defense strategies, in Proc. 2018 IEEE Int. Conf. Communications (ICC), Kansas City, MO, USA, 2018, pp. 1–7.
[19]
R. Mitchell and B. Healy, A game theoretic model of computer network exploitation campaigns, in Proc. 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2018, pp. 431–438.
[20]
C. A. Kamhoua, C. D. Kiekintveld, F. Fang, and Q. Zhu, eds., Game Theory and Machine Learning for Cyber Security. Hoboken, NJ, USA: Wiley, 2021.
[21]

A. Zarreh, C. Saygin, H. Wan, Y. Lee, and A. Bracho, A game theory based cybersecurity assessment model for advanced manufacturing systems, Procedia Manuf., vol. 26, pp. 1255–1264, 2018.

[22]

A. Iqbal, L. J. Gunn, M. Guo, M. Ali Babar, and D. Abbott, Game theoretical modelling of network/cybersecurity, IEEE Access, vol. 7, pp. 154167–154179, 2019.

[23]

A. E. Chukwudi, E. Udoka, and I. Charles, Game theory basics and its application in cyber security, Adv. Wirel. Commun. Netw., vol. 3, no. 4, pp. 45–49, 2017.

[24]
A. Mcleod, C. A. Dorantes, and G. B. Dietrich, Modeling security vulnerabilities using chaos theory: Discovering order, structure and patterns from chaotic behavior in complex systems, presented at the 7th Annual Security Conference, Las Vegas, NV, USA, 2008.
[25]
C. A. Dorantes, A. J. McLeod, and G. B. Dietrich, Cyber-emergencies: What managers can learn from complex systems and chaos theory, in Proc. 12th Americas Conference on Information Systems (AMCIS 2006), Acapulco, Mexico, 2006, pp. 1563–1573.
[26]

D. Garrie and M. Simonova, A keystroke causes a tornado: Applying chaos theory to international cyber warfare law, Brooklyn Journal of International Law, vol. 45, no. 2, p. 497, 2020.

[27]

M. Gardner, Mathematical games—The fantastic combinations of John Conway’s new solitaire game “life”, Sci. Am., vol. 223, no. 4, pp. 120–123, 1970.

[28]
H. Qin, D. Liu, and J. Weng, Cellular automata based cyber risk conduction mechanism of cyber physical power systems, in Proc. 2020 IEEE Sustainable Power and Energy Conference (iSPEC), Chengdu, China, 2020, pp. 1672–1677.
[29]
G. Cisotto and L. Badia, Cyber security of smart grids modeled through epidemic models in cellular automata, in Proc. 2016 IEEE 17th Int. Symp. on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Coimbra, Portugal, 2016, pp. 1–6.
[30]
J. Zhang, X. Xiong, Y. Wang, and J. Zhang, Simulation model for cascading failure in complex network: A cellular automata approach, in Proc. 2nd World Symp. on Software Engineering, Chengdu, China, 2020, pp. 274–277.
[31]

K. Shi, J. Wang, S. Zhong, Y. Tang, and J. Cheng, Hybrid-driven finite-time H sampling synchronization control for coupling memory complex networks with stochastic cyber attacks, Neurocomputing, vol. 387, pp. 241–254, 2020.

[32]

R. Pan, Y. Tan, D. Du, and S. Fei, Adaptive event-triggered synchronization control for complex networks with quantization and cyber-attacks, Neurocomputing, vol. 382, pp. 249–258, 2020.

[33]
D. Ionică, N. Popescu, D. Popescu, and F. Pop, Cyber defence capabilities in complex networks, in Internet of Everything, B. Di Martino, K. C. Li, L. T. Yang, and A. Esposito, eds. Singapore: Springer, 2018, pp. 217–231.
[34]

G. Wen, W. Yu, X. Yu, and J. Lü, Complex cyber-physical networks: From cybersecurity to security control, J. Syst. Sci. Complex., vol. 30, no. 1, pp. 46–67, 2017.

[35]
C. R. Shalizi, Methods and techniques of complex systems science: An overview, in Complex Systems Science in Biomedicine, T. S. Deisboeck and J. Y. Kresh, eds. Boston, MA, USA: Springer, 2006, pp. 33–114.
[36]
T. Mary-Huard and S. Robin, Introduction to statistical methods for complex systems, in Handbook of Statistical Systems Biology, M. P. H. Stumpf, D. J. Balding, and M. Girolami, eds. Chichester, UK: John Wiley & Sons, Ltd, 2011, pp. 15–38.
[37]

F. A. Razak and H. J. Jensen, Quantifying ‘causality’ in complex systems: Understanding transfer entropy, PLoS One, vol. 9, no. 6, p. e99462, 2014.

[38]

A. Abbasi, Z. Zhang, D. Zimbra, H. Chen, and J. F. Nunamaker, Detecting fake websites: The contribution of statistical learning theory, MIS Q., vol. 34, no. 3, pp. 435–461, 2010.

[39]

J. Kour, M. Hanmandlu, and A. Q. Ansari, Biometrics in cyber security, Def. Sc. J., vol. 66, no. 6, pp. 600–604, 2016.

[40]

J. Ashraf, M. Keshk, N. Moustafa, M. Abdel-Basset, H. Khurshid, A. D. Bakhshi, and R. R. Mostafa, IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities, Sustain. Cities Soc., vol. 72, p. 103041, 2021.

[41]
K. Pei, Bridging statistical learning and formal reasoning for cyber-attack detection, MS dissertation, Department of Computer Science, Purdue University, West Lafayette, IN, USA, 2016.
[42]

S. de Marchi and S. E. Page, Agent-based models, Annu. Rev. Polit. Sci., vol. 17, pp. 1–20, 2014.

[43]

M. W. Macy and R. Willer, From factors to actors: Computational sociology and agent-based modeling, Annu. Rev. Sociol., vol. 28, pp. 143–166, 2002.

[44]

F. Chávez-Juárez, On the role of agent-based modeling in the theory of development economics, Rev. Dev. Econ., vol. 21, no. 3, pp. 713–730, 2017.

[45]

A. M. El-Sayed, P. Scarborough, L. Seemann, and S. Galea, Social network analysis and agent-based modeling in social epidemiology, Epidemiol. Perspect. Innov., vol. 9, no. 1, p. 1, 2012.

[46]

S. Galea, M. Riddle, and G. A. Kaplan, Causal thinking and complex system approaches in epidemiology, Int. J. Epidemiol., vol. 39, no. 1, pp. 97–106, 2010.

[47]
Ş. Bora and S. Emek, Agent-based modeling and simulation of biological systems, in Modeling and Computer Simulation, D. Cvetković, ed. London, UK: IntechOpen, 2018, pp. 29−43.
[48]

A. Troisi, V. Wong, and M. A. Ratner, An agent-based approach for modeling molecular self-organization, Proc. Natl. Acad. Sci. USA, vol. 102, no. 2, pp. 255–260, 2005.

[49]
CoMSES, Computational model library, https://www.comses.net/codebases/, 2021.
[50]

J. E. Bates and H. K. Shepard, Measuring complexity using information fluctuation, Phys. Lett. A, vol. 172, no. 6, pp. 416–425, 1993.

[51]
J. Bates, Measuring complexity using information fluctuation: A tutorial, https://www.researchgate.net/publication/340284677_Measuring_complexity_using_information_fluctuation_a_tutorial, 2020.
[52]
S. Xu, Cybersecurity dynamics: A foundation for the science of cybersecurity, in Proactive and Dynamic Network Defense, C. Wang and Z. Lu, eds. Cham, Switzerland: Springer, 2019, pp. 1–31.
[53]
S. Xu, The cybersecurity dynamics way of thinking and landscape, in Proc. 7th ACM Workshop on Moving Target Defense, Virtual Event, USA, 2020, pp. 69–80.
[54]
S. Xu, Cybersecurity dynamics, in Proc. 2014 Symp. and Bootcamp on the Science of Security, Raleigh, NC, USA, 2014, pp. 1–2.
[55]
I. Kotenko, A. Konovalov, and A. Shorov, Simulation of botnets: Agent-based approach, in Intelligent Distributed Computing IV, M. Essaaidi, M. Malgeri, and C. Badica, eds. Berlin, Germany: Springer, 2010, pp. 247–252.
[56]

B. Thompson and J. Morris-King, An agent-based modeling framework for cybersecurity in mobile tactical networks, J. Def. Model. Simul. Appl. Methodol. Technol., vol. 15, no. 2, pp. 205–218, 2018.

[57]
I. Kotenko, Simulation of agent teams: Application of a domain independent framework to computer network security, in Proc. 23rd European Conference on Modelling and Simulation (ECMS 2009), Mondragon, Spain, 2009, pp. 1–7.
[58]

F. Cohen, Simulating cyber attacks, defences, and consequences, Comput. Secur., vol. 18, no. 6, pp. 479–518, 1999.

[59]
I. Kotenko and E. Man’kov, Experiments with simulation of attacks against computer networks, in Computer Network Security, V. Gorodetsky, L. Popyack, and V. Skormin, eds. Berlin, Germany: Springer, 2003, pp. 183–194.
[60]
I. Kotenko, Teamwork of hackers-agents: Modeling and simulation of coordinated distributed attacks on computer networks, in Multi-Agent Systems and Applications III, V. Mařík, M. Pěchouček, and J. Müller, eds. Berlin, Germany: Springer, 2003, pp. 464–474.
[61]
I. Kotenko, Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in Internet, in Proc. Simul. Wider Eur. - 19th Eur. Conf. Model. Simul. ECMS 2005, Riga, Latvia, 2005, pp. 533–543.
[62]
I. Kotenko, Multi-agent modelling and simulation of cyber-attacks and cyber-defense for homeland security, in Proc. 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Dortmund, Germany, 2007, pp. 614–619.
[63]

A. M. Konovalov, I. V. Kotenko, and A. V. Shorov, Simulation-based study of botnets and defense mechanisms against them, J. Comput. Syst. Sci. Int., vol. 52, no. 1, pp. 43–65, 2013.

[64]
K. Sycara and M. Lewis, Agent-based approaches to dynamic team simulation, in Navy Personnel Research, Studies, and Technology Division Bureau of Naval Personnel, https://apps.dtic.mil/sti/pdfs/ADA487741.pdf, 2008.
[65]

P. Rajivan, M. A. Janssen, and N. J. Cooke, Agent-based model of a cyber security defense analyst team, Proc. Hum. Factors Ergon. Soc. Annu. Meet., vol. 57, no. 1, pp. 314–318, 2013.

[66]
D. Grunewald, M. Lützenberger, J. Chinnow, R. Bye, K. Bsufka, and S. Albayrak, Agent-based network security simulation, in Proc. 10th Int. Conf. Autonomous Agents and Multiagent Systems, Taipei, China, 2011, pp. 1325–1326.
[67]
Y. Zhao, Y. Wang, H. Zhang, C. Zhang, and C. Yang, Agent-based network security simulator Nessi2,https://api.semanticscholar.org/CorpusID:61933384, 2015.
[68]
A. Kosowski and V. Mosorov, Nessi2 simulator for large-scale DDoS attack analysis, in Proc. Perspective Technologies and Methods in MEMS Design, Polyana, Ukraine, 2011, pp. 157–159.
[69]
M. D. Norman and M. T. K. Koehler, Cyber defense as a complex adaptive system: A model-based approach to strategic policy design, in Proc. 2017 Int. Conf. The Computational Social Science Society of the Americas, Santa Fe, NM, USA, 2017, p. 17.
[70]
G. B. Dobson and K. M. Carley, Cyber-FIT: An agent-based modelling approach to simulating cyber warfare, in Social, Cultural, and Behavioral Modeling, D. Lee, Y. Lin, N. Osgood, and R. Thomson, eds. Cham, Switzerland: Springer International Publishing, 2017, pp. 139–148.
[71]
B. Becote, Defining a cyber operations performance framework via computational modeling, PhD dissertation, Department of Computer and Cyber Sciences, Dakota State University, Madison, SD, USA, 2023.
[72]
U. Wilensky and W. Rand, An Introduction to Agent-Based Modeling: Modeling Natural, Social, and Engineered Complex Systems with NetLogo. Cambridge, MA, USA: MIT Press, 2015.
[73]
NetLogo home page, http://ccl.northwestern.edu/netlogo, 2016.
[74]
Repast Suite documentation, https://repast.github.io/index.html, 2021.
[75]
StarLogo Nova, https://www.slnova.org/, 2022.
[76]
J. Dykstra, Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems. Sebastopol, CA, USA: O’Reilly Media, 2016.
[77]
A. Kott, Towards fundamental science of cyber security, in Network Science and Cybersecurity, R. E. Pino, ed. New York, NY, USA: Springer, 2013, pp. 1–13.
[78]

E. N. Hatleback, The protoscience of cybersecurity, J. Def. Model. Simul. Appl. Methodol. Technol., vol. 15, no. 1, pp. 5–12, 2018.

[79]

A. Kott, The significance of model-driven paradigms in cyber security: An introduction, J. Def. Model. Simul. Appl. Methodol. Technol., vol. 15, no. 1, pp. 3–4, 2018.

[80]
C. Chethana, P. K. Pareek, V. H. Costa de Albuquerque, A. Khanna, and D. Gupta, Deep learning technique based intrusion detection in cyber-security networks, in Proc. 2022 IEEE 2nd Mysore Sub Section Int. Conference (MysuruCon), Mysuru, India, 2022, pp. 1–7.
[81]
H. Ishii and Q. Zhu, Security and Resilience of Control Systems: Theory and Applications. Cham, Switzerland: Springer, 2022.
[82]

H. Benaddi, K. Ibrahimi, A. Benslimane, M. Jouhari, and J. Qadir, Robust enhancement of intrusion detection systems using deep reinforcement learning and stochastic game, IEEE Trans. Veh. Technol., vol. 71, no. 10, pp. 11089–11102, 2022.

[83]
J. R. Rose, M. Swann, K. P. Grammatikakis, I. Koufos, G. Bendiab, S. Shiaeles, and N. Kolokotronis, IDERES: Intrusion detection and response system using machine learning and attack graphs, J. Syst. Archit., vol. 131, p. 102722, 2022.
[84]

B. Dash, M. F. Ansari, P. Sharma, and A. Ali, Threats and opportunities with AI-based cyber security intrusion detection: A review, Int. J. Softw. Eng. Appl., vol. 13, no. 5, pp. 13–21, 2022.

[85]
I. H. Sarker, A. I. Khan, Y. B. Abushark, and F. Alsolami, Internet of Things (IoT) security intelligence: A comprehensive overview, machine learning solutions and research directions, Mob. Netw. Appl.. doi: 10.1007/s11036-022-01937-3.
[86]

T. H. H. Aldhyani and H. Alkahtani, Attacks to automatous vehicles: A deep learning algorithm for cybersecurity, Sensors, vol. 22, no. 1, p. 360, 2022.

[87]

M. A. Alohali, F. N. Al-Wesabi, A. M. Hilal, S. Goel, D. Gupta, and A. Khanna, Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment, Cogn. Neurodyn., vol. 16, no. 5, pp. 1045–1057, 2022.

[88]

I. Ahmed, Y. Zhang, G. Jeon, W. Lin, M. R. Khosravi, and L. Qi, A blockchain- and artificial intelligence-enabled smart IoT framework for sustainable city, Int. J. Intell. Syst., vol. 37, no. 9, pp. 6493–6507, 2022.

[89]

M. Ghiasi, T. Niknam, Z. Wang, M. Mehrandezh, M. Dehghani, and N. Ghadimi, A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future, Electr. Power Syst. Res., vol. 215, p. 108975, 2023.

[90]
G. Apruzzese, M. Andreolini, L. Ferretti, M. Marchetti, and M. Colajanni, Modeling realistic adversarial attacks against network intrusion detection systems, Digit. Threats Res. Pract., vol. 3, no. 3, p. 31, 2022.
[91]
E. Best, Modeling and simulation for security: An overview, in Handbook of Security Science, A. J. Masys, ed. Cham, Switzerland: Springer International Publishing, 2022, pp. 447–458.
[92]
M. Poursoltan, N. Pinède, B. Vallespir, and M. K. Traore, A new modeling framework for cyber-physical and human systems, in Proc. 2022 Annual Modeling and Simulation Conference (ANNSIM), San Diego, CA, USA, 2022, pp. 90–101.
[93]

M. Kianpour, S. J. Kowalski, and H. Øverby, Advancing the concept of cybersecurity as a public good, Simul. Model. Pract. Theory, vol. 116, p. 102493, 2022.

[94]
J. M. Couretas, An Introduction to Cyber Modeling and Simulation. Hoboken, NJ, USA: Wiley, 2018.
[95]
J. Pawlick and Q. Zhu, Game Theory for Cyber Deception: From Theory to Applications. Cham, Switzerland: Springer International Publishing, 2021.
Complex System Modeling and Simulation
Pages 327-342
Cite this article:
Becote B, Rimal BP. Complexity Science and Cyber Operations: A Literature Survey. Complex System Modeling and Simulation, 2023, 3(4): 327-342. https://doi.org/10.23919/CSMS.2023.0018

568

Views

125

Downloads

1

Crossref

0

Scopus

Altmetrics

Received: 16 March 2023
Revised: 04 August 2023
Accepted: 11 August 2023
Published: 07 December 2023
© The author(s) 2023.

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return