Simulating ecosystem-level cybersecurity for the future generation of critical infrastructures

Exploring the impact of cyber-defensive strategies on critical infrastructures through agent-based modelling

Master Thesis (2018)
Author(s)

X.E.J. de Ronde (TU Delft - Technology, Policy and Management)

Contributor(s)

P.H.A.J.M. van Gelder – Mentor

W. Pieters – Mentor

Martijn Warnier – Mentor

Faculty
Technology, Policy and Management
Copyright
© 2018 Xander de Ronde
More Info
expand_more
Publication Year
2018
Language
English
Copyright
© 2018 Xander de Ronde
Graduation Date
07-09-2018
Awarding Institution
Delft University of Technology
Programme
['Complex Systems Engineering and Management (CoSEM)']
Faculty
Technology, Policy and Management
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The increased decentralisation and heterogeneity of critical infrastructure systems pose a threat to the safe and secure operation of critical infrastructures by complicating cybersecurity procedures. The increased frequency and impact of cyberthreats have led to the desire to develop coherent security policies. In order to explore the effects of such policies, an ecosystem-level framework for cyberincidents in critical infrastructure systems has been developed. This framework can be used to explore the effects of conceptual defensive strategy designs. The aggregation of these concepts was operationalised around a central degree of critical infrastructure operability. A practical application of the framework is provided in the form of an agent-based modelling study that is capable of simulating the effects of coherent defensive strategies. The framework by itself is limited to exploratory modelling for the sake of generalisability and requires further specification of concepts based on representative infrastructure scenarios for more advanced analysis and design of tangible security policies.

Files

License info not available
License info not available