Next Article in Journal
Reliability Inference of Multicomponent Stress–Strength System Based on Chen Distribution Using Progressively Censored Data
Previous Article in Journal
Sustainable Agriculture through the Enhancement of Microbial Biocontrol Agents: Current Challenges and New Perspectives
Previous Article in Special Issue
LHDNN: Maintaining High Precision and Low Latency Inference of Deep Neural Networks on Encrypted Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Perspective

Mathematical Approaches Transform Cybersecurity from Protoscience to Science

1
Faculty of Information Sciences, University of Library Studies and Information Technologies, 1784 Sofia, Bulgaria
2
Cisco Systems, Inc., San Jose, CA 95134, USA
3
Faculty of Mathematics and Natural Sciences, South-West University “Neofit Rilski”, 2700 Blagoevgrad, Bulgaria
*
Author to whom correspondence should be addressed.
Submission received: 29 March 2023 / Revised: 12 May 2023 / Accepted: 12 May 2023 / Published: 26 May 2023
(This article belongs to the Special Issue Advanced Technologies in Data and Information Security II)

Abstract

:
The area of cybersecurity problems has reached the stage of becoming a science. This raises questions about the connection between the mathematical theories used in cybersecurity research and their relation to the methodology for experiments and conceptual models synthesized from the academic community. This research proposes an analytical review of the mathematical ideas used in applied cyber-security and theoretical explorations. This meta viewpoint is dedicated to standard mathematical theories applied in cybersecurity issues. The ground of the work is methodological problems relating to the validation of experiments and models with mathematical ideas in the cybersecurity exploration of digital space. This research emphasizes the application of game theory, catastrophe theory, queuing systems, and Markov chains. The methods are shown without claiming to be exhaustive. The goal is to review the currently established implementation of mathematical approaches to cybersecurity. A spectrum of possibilities for applying mathematical apparatus in future research for cybersecurity is given. After a review of the literature for each presented mathematical approach, we expose a list of problematic areas in which this has already been implemented.

1. Introduction

The digital world is growing at an exponential rate. This process faces regulatory gaps [1,2], staff shortages [3,4], new fields with diversified technologies [5,6], and sophisticated malicious actors. New areas with inherent technological specifics regarding hardware platforms and software applications are being developed. Communication protocols are becoming more and more multifarious. Cloud technologies, containers, virtual reality, augmented reality, and DLT (distributed ledger technology) can be widely applied to develop smart homes, smart cities, smart cars, and intelligent transport systems, and OT (operating technology), which has appeared as a synergy of ICS/SCADA and IoT in critical infrastructures.
Since the development of conventional information systems and networks, malicious actors have extended their cyber-attacks on cloud services and critical infrastructure. Logically, in the coming years, their attention will be focused on intelligent transport systems [7], which have become part of smart cities [8], on developing nanotechnologies that are embedded in clothing and the human body [9], and the next emerging or future cutting-edge technologies.
The cybersecurity product industry, institutional efforts, scientific researchers, and law enforcement are lagging in terms of resisting sophisticated cyber attackers. We share the perception about the superiority of hackers against cyber defenders [10].
Attention to this problem is exacerbated by a lack of transparency, visibility, and understanding when implementing security in developing, integrating, deploying, and using digital technologies. Controlling manufacturers’ decisions makes managing security risks in products and their capabilities and expertise when managing these risks are insufficient [11].
The massive impact of cybersecurity issues on the cyber–physical world confirms the need for research and opens new questions in relation to systematizing scientific approaches in this problem area. An essential component for the development of every scientific area is mathematics.
This review was prompted by our view of the need to establish the body of the mathematical methods that are applied to cybersecurity research and studies. We believe that this is necessary for the emergence of the problematic area of cyber security from the status of a protoscience. This article aims to clarify the issue of the place, scope, and content of mathematical methods applied in cyber security research. It offers theoretical advancement in the systematization of these mathematical methods and theories that are applied in scientific research of the cybersecurity area. It also provides a new perspective on the diversity of the mathematical theories applied and proposes a direction for the next steps in an effort to lift cyber security from the status of a protoscience. A sub-goal of this work is determining the role of mathematical methods in situating the science of cyber security.
In confirmation of our understanding of cyber security as a proto-science, we share the opinion that the basic principles in the problem area of cyber security have not yet been clarified, despite the perceptions that have been expressed in many sources. The increase in the complexity of the cyber–physical world clearly leads to a violation of Occam’s principle, and our empirical experience shows that at the bottom of cyber incidents and risk management are the problems that relate to the organization of continuously growing information systems and networks. Another example of a problematic principle is stealth.
We consider that the foundations for new science in a particular thematic direction of research are laid based on accumulated practical experience and scientific experiments, and if an agreement has been reached within academic circles about:
  • The ground principles;
  • Consistent, complete, and relevant categorical apparatus with definitions of the basic terms covered;
  • A set of scientific methods that are applied to research the problem area;
  • The ability of the methods to predict phenomena and validate conceptual models.
The limitations of this review are as follows: (1) we focus only on the components of scientific methods that concern applicable cybersecurity-specific mathematical techniques, and (2) we only mention an incomplete list of the conventional mathematical domains surrounding information and communication technology, such as combinatorics, statistics, and graph theory. These are also applied in many pieces of cybersecurity research but are well-known and presented in university courses.
Cybersecurity is present in the software engineering family. As a member of the family of engineering sciences in the cybersecurity area, a variety of inherent exploration methods are applied. For example, issues with a categorical apparatus are under the attention of the working groups CWE/CAPEC UEWG, as per [12,13].
Given the efforts to clear the categorical apparatus, the terminology is yet to be adequately explained. We lean on the transitional state of cybersecurity research practice as a protoscience, accepting that this conclusion is also supported by Kotte’s work and the chosen definition of science therein [14]. From there, it can be seen that protoscience can become science and purge itself of the accumulated imperfections that characterize pseudoscience.
Cybersecurity is often associated with finding the needle in the haystack. Computer networks generate large volumes of traffic per day. Detecting small malware pieces causing abnormal traffic is a complicated task. The situation is the same when malicious actions are seen in a server farm, an integrated corporate complex of information systems, or a smart city with many interconnected critical infrastructures with OT. Various mathematical techniques can be used to create methods for analyzing cybersecurity data.
Practitioners work hard against high-profile attacks and vulnerabilities, but threats constantly emerge [15]. Evolving threats include malware, viruses, trojans, spyware, ransomware, adware, botnets [16,17], phishing and social engineering [18]; SQL injection [19]; insider threats [20], Distributed Denial-of-Service (DDoS) attacks [21,22,23]; Advanced Persistent Threats (APTs) [24,25]; Man-in-the-middle attacks [26,27].
The line of information security moves close to that of cybersecurity. At its core, information security has as its subject the organizational problems of protecting information systems and networks at a strategic corporate level. The term cybersecurity is presented in [28,29,30]. According to their conclusions, information security is a sup majority of cyber security [28,29,30]. Although the two terms are often used synonymously in practice, the context usually is clear. Discussions around relations between information and cyber security are presented in [2,3,31].
An example of the efforts to clear up terminology can be found in [32]. It shares the understanding of the difference between security engineering and security intelligence. Cyber-defense can be understood as security engineering with a family of methods. Security science is concerned with detecting the traces of attackers once they are positioned in information systems and networks.
Two main classes of effects are observed in cyberattacks. The first is an anomaly. It is characterized by the deviations in the behavior of software applications and the malicious traffic generated by the malware. The second class covers changes in the state of applications and the system environment due to the impact of exploits and payloads. Based on the techniques applied to the two types of attacks, the detection of cyberattacks can be classified as anomaly-based and signature-based [33]. Methods relating to anomaly detection techniques are effective against unknown types of attacks and signatures that can be applied to known malware [34].
Without entering into an in-depth meta-discussion about the relationships between the categories, our work systemizes mathematical approaches that apply to cybersecurity research.
The following lines comment on the main problems with the contradictions in the terms and the confusion in their conceptions.
A class of problems is associated with the lack of communication between cybersecurity experts and software developers [35] and the need for incorporating security practices into a DevOps software development lifecycle. Those issues led to the concept of DevSecOps related to collaboration between the development and the security teams from the idea of the operations stage [36].
The study of the sources further strengthened our belief about the need for a holistic approach from a science methodology viewpoint to research the existing gaps. This need is also confirmed by [37,38,39,40,41], lessons learned from cybersecurity incidents with SolarWinds [42], unpatched GitHub servers [43], and the need for proactive security [44]. The impact of cyber-attacks on interconnected critical infrastructure can be seen from the incidents with PipeLine [45].
Creating models of large complexes of information systems and networks with real installed platforms is expensive and time-consuming. Even more inefficient is constructing cyber defense testbeds of such laboratory structures. The possibilities of mathematical approaches are effective in these cases. Depending on the expertise of the modelers, they can be applied to model and predict the behavior of cybersecurity systems, validate conceptual models, etc.
Mathematical methods have proven effective in various applications of proactive actions, cybersecurity technologies, security incidents management, and investigations. We believe that these methods need to be systematized, further developed, and enriched in terms of their use for in-depth research in the field of cybersecurity. Such an initiative could support the formation of the content of academic disciplines in doctoral programs and increase opportunities for successful research and development work in companies.
The requirements we have in mind for choosing mathematical methods for this review are the following:
  • Methods that have been successfully applied in the scientific research on cyber security;
  • Methods that have been repeatedly used in different areas of cybersecurity;
  • Methods that are possibly accessible and can find a place in educational courses.
Our research findings from the literature show that such methods are used mainly from 2013–2015.

2. Motivations and Methodology

A system’s mathematical model represents an abstract description of its particular properties. The problems with mathematical modeling are relevancy and scope (range).
Regarding relevance, we believe that choosing an appropriate mathematical approach for modeling and validating certain qualities of cyber defense systems and cyber-attacks depends on the researchers’ heuristics. This empiricism depends on the experience gained. This view correlates with the purpose of this article.
Range capabilities lie between two end states. If the scope describes the problem’s properties, it can extend the model’s complexity with many details and becomes unsolvable. Another extreme is if the mathematical model is straightforward, it cannot predict and study the properties of the system. These mathematical models can be related to cyberattacks which have different goals. This way, victimized systems can be analyzed, system forecasts can be made, system information can be retrieved, verified, and future predictions can be made.
This article reviews the valuable mathematical methods applied in cybersecurity research activities. The task was conducted by checking the literature sources that focus on basic mathematical approaches from different mathematical theories, presenting several examples of the most used mathematical models of information systems and networks’ security, and systematizing the implementations of those theories in cybersecurity research areas.
The literature review covers applications in cybersecurity of the following mathematical approaches: Game theory with dynamic optimization and Bellman’s principle, Catastrophe theory, and the Queue theory of Markov processes with Kolmogorov equations.
The research task of our work was to find a reasonable answer to the next methodological question. Which mathematical methods are already used and validated for research and can be a component in establishing the science of cyber security?
The contributions of this research include justifying the current state of the cyber security problem area as a protoscience: an extension of the latest studies in the domain of cybersecurity science. These contributions have been fulfilled by checking articles with the most commonly applied mathematical methods in cyber security. The assumption of the efficacy of these methods is based on their application in the reviewed literature. A proposal for new terms CyberSecMath and Cyber Security Engineering is made in Section 5: Results and Conclusions of Mathematical Methods Implementation.
The sections are organized as follows. Section 3 focuses on the literature review, and Section 4 presents the most used mathematical methods in cybersecurity research. Section 5 summarizes the usage of mathematical methods in different cyber-security areas, and the conclusions summarize the findings. Finally, Section 6 consists of a discussion and offers possibilities for future research.

3. The Literature Review and Related Activities

The cyber protection of complex integrated information systems and networks is becoming more complicated. Building labs and testbeds to research such scenarios is a high-profile challenge. There is a shortage of cybersecurity expertise. The lack of specialists profiled in cyber defense is particularly noticeable. These are the conditions in which the academic community conducts and publishes research.
This part consists of a simple statistical analysis of related works. We note the achievements in the establishment if basic standard categorical apparatus with the National Vulnerabilities Data Base, Common Vulnerability Scoring System (CVSS) [46], MITRE ATT@CK taxonomy, STIX, TAXII, CyBOX, OpenIOC [47,48,49].
We observed issues with the terminological discrepancy commented on in [15,50,51]. We considered how the developing science of cybersecurity needs a categorical apparatus that is complete, consistent, and correct. The next step was to consolidate a set of appropriate mathematical instruments that would be applicable to suitable cases. Mathematical approaches were our focus. Defining an adequate set of mathematical practices can power and drive intensive research.
Part of the considered mathematical approaches was presented with applicable specifics in the reliability and availability engineering field in the book [52]. The analogy with its problematics gave rise to the proposed cyber security engineering category at the end of the section results and conclusions. This work presents the analytical and modeling techniques currently used. It contains standard approaches to nascent methods: binary decision diagrams, dynamic fault trees, Bayesian belief networks, stochastic Petri nets, non-homogeneous Markov chains, semi-Markov processes, and phase-type expansions [52].
Traditional mathematical approaches to cybersecurity problems include elements of set theory, probability theory, statistics, and graph theory [53,54,55,56,57]. In recent years, researchers have applied ideas from artificial intelligence, neural networks, graphs, game theory, and Markov chains.
The light research from Scopus with a search string “cybersecurity_X”, where X is from the set {game theory, probability, Bayesian} shows {228, 41, 99} the sources respectively. The other sources contain applied approaches from Combinatorial mathematics, probabilities, and statistic [58], graphs theory [59], neural networks [60,61], fuzzy logic and fuzzy sets [62,63], and group theory in cryptography [64,65,66].
The first preliminary research question was about the publications and authors’ use of mathematical approaches. We received the relations between authors using the intersection with the search string “mathematical model cybersecurity” and “mathematical model cyber security” through Scopus services and VOSviewer. The results are presented in the tables in Figure 1 and Figure 2. Five clusters are highlighted with different colors, in which the families of the leading authors are noted. Their research can be found through sections combining the top authors’ surnames with the indicated search string.
Additional proof for this work is a part of articles mentioning mathematical approaches in the cybersecurity area. The search in January 2022 only in Scopus with the terms “cybersecurity” and “cyber security” showed more than 20,000 results for every one of them. The number of articles with mathematical approaches was ~400 for intersections presented in the whole set, which is about 2 percent.

4. Mathematical Approaches to Cybersecurity

We believe that the selected mathematical methods can be considered established in cyber security research. This set is aligned with the view of the requirements for models in applied cybersecurity from [14], the presented literature review, and our accumulated practical experience from building and researching real cyberdefense systems.

4.1. Game Theory

Game theory is based on participants known as players. It refers to the clash between malicious individuals and cybersecurity experts in cybersecurity. Each side can choose from various actions, which can be limited or endless. The outcomes or profits depend on the selected strategy of the player. These actions are referred to as strategic games.
A two-player matrix game with zero-sum is a game where the sum of the profits of both players equals zero:
v 1 + v 2 = 0 ,
If both players select a mixed strategy x = x 1 ,   x 2 ,   x 3 ,     ,   x m for y = y 1 ,   y 2 ,   y 3 ,   ,   y m , then, the profit of the first player is the mathematical expectation:
E x , y = i = 1 m j = 1 n a i j x i y j
where E v 1 is the expected value of the first player’s profit, x and y are the mixed strategies of the first and second players, respectively, and a i j is the profit of the first player when choosing strategy i and the second player chooses strategy j . Here, the sums were calculated for i and j and all possible strategies in the game.
Let X and Y represent the sets comprising the mixed strategies for players x and y , respectively.
The inquiry pertains to the presence of optimal strategies x * and y * for the first and second players, respectively, ensuring maximal expected profit (or minimal loss) for the first player while considering the best possible moves by the opponent.
As follows by the Minimax theorem of game theory, there exist optimal strategies for x * and y * i.e., the solution to a zero-sum matrix game is as follows:
m a x m i n E x ϵ X , y ϵ Y x , y = m i n m a x E x ϵ X , y ϵ Y x , y = E x * , y * = v
where xX and yY are fulfilled
E x * , y E x * , y * E x , y * ,
The game’s price is the saddle point number υ = E x * , y * [56]. The presented results are interpreted by one assailant and one guard in a digital environment. There always exists an optimal strategy for defense and a corresponding attack [53].
The processes we considered were dynamic, and they developed over time. For this reason, we specified that all processes started from t = 0 .
We also considered a different approach where L assailants attack N / L digital assets of the defensive players (Figure 3).
Applying the Hamilton-Jacobi-Bellman model,
V L 0 ^ x = max u i L   lim i L   l o g u i + ε V L 0 ^ ε x i L   u i i N \ L   u L 0 ^ α
V L   ^ x = m a x u i   ^ N \ L lim i L l o g u i   ^ + ε V L   ^ ε x i L u i i N \ L u i   ^ α
to solve the equation, we used the following substitution:
V ^ L x = A ^ L l o g x + B ^ L
V ^ i x = A ^ i l o g x + V ^ i
Flow control could be defined as follows:
u i = y i K x , i L
Since we considered all players to be homogeneous, the Bellman equation gave the optimal solution for each player:
u ^ i = y i k ^ x ,
where u i is a class of players using the corresponding strategy x with weight coefficients. We needed to find the following coefficients to obtain the optimal solution:
V i k = 1 a k 1 + n k 1 a δ x
where x t ≥ 0 is the action of the player at time t, α 0 ,   1 , which corresponds to the winning item parameter, 0 < δ < 1 is the discounting coefficient, and i = 0 , , n   а u i t 0 represents the value of the payoff for player i , i = i , , n in moment t. We introduced a = α δ   n as the number of players, with k players in a coalition, and k < n . In the complete Bellman equation, which describes a dynamic process, we used the variable t , which represents time. In our case, we only mentioned that the process was dynamic and could be described more complexly with an integral or a system of differential equations to simplify the equations. For more information, see Mazalov [56]
V L   ^ x = k 1 a l o g x 1 1 δ B L   ^
B L = k 1 1 a l o g δ 1 + n k 1 a + l o g 1 a + a 1 a l o g a l o g k

4.2. Game Theory Use Case and Analysis

An example of game theory is the prisoner’s dilemma [67]. If two suspects were suspected by the police of having committed a serious crime, unfortunately for them, they would only have proof of a slight. They lock the two up in two separate rooms. There are several scenarios:
  • If both are silent, they receive a light fine;
  • If one is silent and the other speaks, the quiet person receives a severe sentence, and the other is released;
  • If they both speak, they will receive a severe sentence.
In many Operations Research (OR) operations [67], it is necessary to solve OR tasks related to decision-making problems in conditions of uncertainty. Uncertainties can be conditions for performing operations or conscious actions of the opponent on which the operation’s success depends. Uncertainties about one degree or another can be related to the procedure’s success. Success does not always depend on the complete exhaustion of one indicator or the effectiveness of the operations.
When solving various practical tasks from the study of operations, it is necessary to analyze situations in which two or more warring parties change their pursued goals on which the success of the process depends. Such operations can be called conflict operations.
Each immediate situation from practice is complex, and the analysis is one of the many insignificant factors. A spiral mathematical apparatus called game theory was developed from the need to analyze such situations. In order to analyze such models, it is necessary to ignore secondary factors on which the games’ success does not depend; this model can be called a game.
We formalized the rules already implemented in games such as checkers, chess, etc.
Suppose we had a game of two participants, A and B, with opposite interests. By game, we mean an event or sequence of actions or moves by A and B. To analyze the game, it is necessary to form the rules of the game, i.e., a system of conditions governing:
  • The possible variants of game actions;
  • The volume of information about each side of the other player’s behavior;
  • The result (exit) from the game, which we could obtain from the specific actions of the players.
There are sharply differentiated opinions regarding the appropriate analysis method of interrupted phenomena in mathematics to study interruption. Additional methods include crash theory, chaos theory, fractal geometry [68], synergistic theory [69], self-organizing criticality [70], rotating glass theory, and emerging complexity [71].
Another aspect of looking at one cyber system is the transition from one state to another.
Many researchers see interruptions as fundamental to the nature of non-linear dynamic systems. In a shared plan, the theory of interruption is a theory of bifurcations, where they appear as a subset. In the context of a dynamic system’s asymptotic behavior, Poincaré posed the question of structural stability. If a slight disturbance is introduced to the system, will its long-term behavior remains approximately consistent, or will a substantial alteration occur? The latter implies that the system is structurally unstable and has encountered a bifurcation point.
In cybersecurity, game theory can be used to model the interaction between hackers (attackers) and users (defenders). In such a scenario, hackers attempt to penetrate the system while users make efforts to protect it.
We considered two players: a hacker (H) and a user (U). They could choose between different strategies. The hacker could choose to attack (A), not attack (NA), and the user could choose to defend (D) or not defend (ND) their system.
The payoff matrix might look similar to this:
U: DU: D
H: A(−CH, −CU)(GH, −LU)
H: NA(0, 0)(0, 0)
Here CH and CU are the costs for the hackers and users, respectively, GH is the gain for hackers upon a successful attack, and LU is the loss of users upon a successful attack.
The goal of the hackers is to maximize their gain, while the purpose of the users is to minimize their loss. Game theory can be used to find the Nash equilibrium between these two parties, indicating the optimal strategies that hackers and users should follow.
A simple example of two bodies is the speed of running a missile traveling far from the ground. This is about 6.9 miles per second: a bit of a before value for this system. The rocket falls back to earth at a speed less than this, while at a greater rate than this one, it can escape into space. It is no exaggeration to say that the bifurcations theory is the mathematics of interruption [72].

4.3. Catastrophe Theory

Catastrophe theory, in mathematics, is a set of methods that are used to study and classify how a system can undergo sudden significant changes in behavior as one or more variables that control it constantly change. Catastrophe theory is generally considered a branch of geometry, as variables and the resulting behavior are depicted as curves or surfaces, and the official development of the theory is attributed mainly to the French topologist Rene Tom.
Many physical systems can be described as potentially dependent on control parameters. If we do not include the time factor, the system must be static, and we must work with the Elementary Catastrophic theory. Otherwise, we must describe a system of dynamic equations that uses gradient methods from the bifurcation theory.
According to Arnold’s book [73], ‘The Change in the Phase Space of a System’, the following variants may arise:
A. When the parameter changes from the equilibrium position, a limit cycle is born (with a radius of the order √ε when the parameter’s value differs from the bifurcation one by ε). Equilibrium stability proceeds into a cycle, while equilibrium itself becomes unstable (Figure 4).
B. In equilibrium, an unstable limit cycle dies; the area of attraction of the equilibrium position decreases to zero, after which the cycle disappears, and its instability is transferred to equilibrium.
A. In equilibrium, an unstable limit cycle dies; the area of attraction that Poincare noticed, alongside A. Andronov and his students, even before the war (in 1939), proved that positions merge with the unstable, as described above, in addition to the loss of stability in the equilibrium. The methods of loss of stability are just as described in type A or B in the ordinary one-parameter families of systems with two-dimensional phase space; no other types of loss in stability occur. It was later proven that in phase space systems with a larger dimension, the loss of stability of the equilibrium positions with a change in one parameter occurred in one of the ways described. In the directions of all additional coordinate axes, the balance remains attractive with a change in the parameter [73].
If the equilibrium position is in a steady state or is a steady state in the real system, then when the parameter changes in cases A and B, the following phenomena can be observed.
B. After the loss of equilibrium stability, the steady state is the oscillatory periodic regime; the amplitude of the vibrations is proportional to the square root of the super-criticality. The difference between the parameter and the critical value is that at which the equilibrium loses its stability [55].
Catastrophe theory is a mathematical approach to studying discontinuities or sudden shifts in behavior in complex systems. One of the most basic models in catastrophe theory is the cusp catastrophe model, represented by the equation V x , a , b = a x b x 2 + x 4 4 .
V x , a , b represents the potential function, x is the system’s state variable, and a and b are control parameters. The potential function exhibits a local minimum, indicating the system’s stable equilibrium state. When control parameters change, the equilibrium state can shift suddenly, leading to catastrophe.
In the context of cybersecurity, x could represent the security level of a system, a could represent the attacker’s capabilities, and b could represent the defender’s efforts to protect the system. By analyzing the behavior of the potential function and its derivatives, it is possible to identify the conditions under which a sudden shift in the security state might occur, potentially leading to a catastrophic security breach.
To make the presentation of catastrophe theory more rigorous, the equations describing the equilibrium points, derivatives, and other relevant properties of the cusp catastrophe model should be included and discussed in the context of cybersecurity.
To continue applying catastrophe theory in cybersecurity, we explored how we could analyze catastrophic changes in the security of a system using the cusp catastrophe model.
A sample model for applying catastrophe theory in cybersecurity:
  • Finding equilibrium points: The equation V x , a , b x = 0 can be solved to find the equilibrium points of a system. This shows at what values of x the system is in equilibrium.
  • Analyzing the stability of equilibrium points: the second derivative 2 V x , a , b x 2 can be examined at the equilibrium points. If the second derivative is positive, the equilibrium point is stable; if it is negative, it is unstable.
  • To study the changes in equilibrium points with changes in control parameters a and b , how the equilibrium points differ as a and b change can be analyzed. This provides information on potential catastrophic system security changes when attackers increase their capabilities or defenders change their protection efforts.
  • Proposing countermeasures or strategies, based on the catastrophe theory analysis, strategies can be suggested for defenders to prevent catastrophic changes in the system’s security or cope with them when they occur.
An anomaly detection method based on the modified catastrophe theory and focusing on accidental change in cloud network traffic is presented in [74]. The model presented illustrates the Swallowtail catastrophe visualization. This is a simple example. To describe a dynamic system, partial differential equations can be used.
The following research concerns the use of catastrophe theory to detect saturation attacks. The cusp catastrophe model for saturation detection can be effectively applied for DoS attacks against SDN (Software Defined Network). Khatibzadeh et al. explored the cusp catastrophe model to reveal anomalies in the traffic, using the distance between the observed point and the Bifurcation set [75]. Analogically from applying the catastrophe theory in the ecological area [76], we proposed the term cyber pollution presented in [10].

4.4. Theory of Queuing

The tail theory is one of the fastest-growing areas of applied mathematics. Any need to perform an activity in queue theory is called a “request” or “customer”. Services should be seen as the performance of some kind of activity aimed at satisfying a need. The object that serves the application is called a service device (apparatus) or “service channel”. The maximum number of requests that can be serviced simultaneously determines the omission of the service system.
A characteristic feature of this system is that requests can be received irregularly. When studying the system, it turns out that due to a number of random reasons and factors, the number of requests in a given time interval is a random variable. The period that covers the beginning and end of the service (i.e., the time during which the request is serviced) is called the service time.
One of the basic concepts of public service theory is the flow of requests entering the service system. In the following statement, we called it a tributary. We could distinguish this flow from the outflow (i.e., the flow of requests leaving the system). Another key feature that determines how a service device processes requests is accessibility. It determines the health of the service device. In practice, we found many examples of different service mechanisms. To successfully deal with these possible situations, researchers do not always need just to know their solution; it is enough to have a more complete set of methods that do not use the queuing theory.
The physical system S has four possible states S1, S2, S3, and S4. Figure 5 shows the graph of states and transitions and their intensities.
This system can be in the following states: S1-upright; S2-faulty stopped, fault sought; S3-the repair is completed; S4 preparations are underway for the launch of the computer.
On the left are the derivatives of the probabilities. There are as many members on the right as arrows to connect the state with other states. If the arrow goes out of state, the corresponding member has a minus sign (Figure 5). If the arrow enters the state, the sign is “plus”. Each term is equal to the product of the density of transition probabilities corresponding to the given arrow multiplied by the probability of the state from which the arrow comes out:
p 1 t t = λ p 12   1 + λ p 13   1   λ p 31     3  
p 2 t t = λ p 12   1 λ p 32   + 3   λ p 24     2  
p 3 t t = λ p 13   1 + λ p 31   3   λ p 32   + 3   λ p 41     4  
p 4 t t = λ p 24   2 + λ p 41     4  
Usually, researchers are focused on traditional aspects of a phenomenon, which are entirely unfettered in detail. An analogy that explains the cybersecurity situation is presented in [77]. In thermodynamics, the behavior of gas in a box, assuming it contains x molecules has been studied. The gas’s state is considered a point of the six-dimensional phase space. They are not intrigued by the accuracy or phase space point that the gas occupies. In case they succeed in determining that with certainty at this point, it brings no benefits. For applications and research, it is sufficient to consider the gas state as a function of three parameters: temperature, volume, and pressure and the study of the relationship between them. This also includes equations of motion in phase rise and the relationship between these parameters.
In the same way, cybersecurity deals with highly complex phenomena. It is a natural characteristic of integrated information systems and networks. Many of these details are not exciting or cannot be observed. Here is a place where mathematical models inherently isolate most exterior details and are constructed appropriately to allow for needed abstractions. We have focused on the most used mathematical theories in the presented work. In essence, these models have the potential to simulate different properties of the studied systems. Processes can also lead to several natural and powerful abstraction operators. The resultant calculations correspond to those observed by an external observer. They serve to validate the model by comparing it with the behavior of the existing system. Successful validation is a prerequisite for conducting large-scale studies of system behavior. The choice of the mathematical approach remains heuristic and depends on the background of the modeler.
Use cases exist for analyzing attack efficiency and validating the model with the queueing theory [78,79]. RESLab analyses the challenges of incorporating MiTM (Man in The Middle) attacks under disparate polling rates and a set of DNP3 (Distributed Network Protocol 3) outstations for a voluminous power grid using the queuing theory [80].

5. Results and Conclusions of Mathematical Methods Implementation

This article presents basic mathematical approaches to computer security analysis and the ability to perform validation, simulations, and predict the behavior of information systems and the communication networks under attack.
The central part of the reviewed articles is dedicated to attacks from the side of hackers. The lack of mathematical models implemented in cyber protection is a common weakness that needs the research community’s attention. The reason for this is the complexity of modern information systems and networks in a rapidly changing cyber-physical environment. A set of sample mathematical theories use cases is presented in Table 1. For example, the first publication is dedicated to the finding of malevolent repeated actions in a massive volume of legal network traffic [81].
Our recommendations for future work include research on the successful application of mathematical approaches in cybersecurity. The hypothesis behind this view is that they can be applied to analogical cases when managing changes in cybersecurity systems of information systems and networks.
We contend that a successful cyber security professional must be skilled with the instruments of the core academic fields of Science, Technology, Engineering, and Maths (STEM) and that the ability to model is essential for designing the cyber defenses of the expanding information systems and networks of today.
We propose introducing these two categories based on our long-term experience implementing large-scale cyber defense schemes and the presented review and interpretation of its results.
The first one is CyberSecMath which relates to the scope of the presented mathematical approaches. The second is a Cyber Security Engineering category. This proposal is related to the clear separation of engineering and research activities achieved in recent years. The content of this category covers all planning, organization, and technical implementation activities incorporating cyber security measures following regulatory measures. We believe that the importance of this category for cybersecurity protoscience lies in clarifying the two-way relationship between research and practice.
According to our vision, the heuristically evolved procedural approaches developed in naturally influenced methods [104] or in quantum computing, for example, fully homomorphic algorithms and software security [105], are positioned within the scope of the term Cyber Security Engineering.
The proposed paper addresses well-established mathematical theories in conventional cybersecurity research. From the perspective of meta-science, cutting-edge technologies are of interest when systematizing mathematical theories applied to the study of cybersecurity problems. In particular, these include quantum computing, quantum networks, and quantum sensors. Use cases include linear algebra over the field of complex numbers, probability theory, mathematical statistics, and information theory. These theories can be applied in models for QKD and quantum threats related to the decryption and the breaking of crypto algorithms when used in pre-quantum digital technologies, as shown in the last row of Table 1.

6. Discussion

This proto-scientific state leads toward two directions for development. The first direction can be further spread in the capacities for observation, collection, and the design of model-based experiments, and according to Popper [106] and Kott [14], to build the necessary qualities for actual science. Or it can remain protoscience in a mystique state. The last one is characterized as pseudoscience. Its techniques and practices are “neither fundamentally understood nor rigorously reliable”.
Looking at cyber security through the lens of the literature review, we can conclude that it is necessary to consolidate knowledge and (1) the revision of the basic principles, (2) outline the theoretical framework with consistency, correctness, and completeness of terminology, (3) aggregate methodological approaches about experiments, and (4) systematize mathematical methods. This conclusion includes not only technical sides and does not exclude the physiological and social issues related to adversaries and cybersecurity incidents. It outlines further directions for future research.

Author Contributions

Conceptualization, W.D. and I.T.; methodology, W.D.; mathematic formulations, I.T.; validation, I.T. and M.T.; literature investigation, systematizing mathematical theories use cases, T.O. and M.T.; writing and original draft preparation, W.D.; writing, review and editing, visualization, and supervision I.T. and G.D. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the NSP SD program, which has received funding from the Ministry of Education and Science of the Republic of Bulgaria under the grant agreement no. D01-74/19.05.2022.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Fuster, G.G.; Jasmontaite, L. Cybersecurity Regulation in the European Union: The Digital, the Critical and Fundamental Rights. In The Ethics of Cybersecurity; Christen, M., Gordijn, B., Loi, M., Eds.; The International Library of Ethics, Law and Technology; Springer International Publishing: Cham, Switzerland, 2020; Volume 21, pp. 97–115. ISBN 978-3-030-29052-8. [Google Scholar]
  2. Kenneally, E. Cyber Risk Economics Capability Gaps Research Strategy. 2018. Available online: https://www.dhs.gov/publication/cyrie-capability-gaps-research-strategy (accessed on 7 January 2022).
  3. European Union Agency for Cybersecurity. Addressing the EU Cybersecurity Skills Shortage and Gap through Higher Education; Publications Office: Luxemburg, 2021. [Google Scholar]
  4. Goupil, F.; Laskov, P.; Pekaric, I.; Felderer, M.; Dürr, A.; Thiesse, F. Towards Understanding the Skill Gap in Cybersecurity. In Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education, Dublin, Ireland, 7 July 2022; Volume 1, pp. 477–483. [Google Scholar]
  5. Alzahrani, N.M.; Alfouzan, F.A. Augmented Reality (AR) and Cyber-Security for Smart Cities—A Systematic Literature Review. Sensors 2022, 22, 2792. [Google Scholar] [CrossRef]
  6. Ryznar, P. Cybersecurity and the Explosion of Augmented Reality. Forbes 2019. Available online: https://www.forbes.com/sites/forbestechcouncil/2019/09/06/cybersecurity-and-the-explosion-of-augmented-reality/ (accessed on 3 February 2022).
  7. Mecheva, T.; Kakanakov, N. Cybersecurity in Intelligent Transportation Systems. Computers 2020, 9, 83. [Google Scholar] [CrossRef]
  8. Ma, C. Smart City and Cyber-Security; Technologies Used, Leading Challenges and Future Recommendations. Energy Rep. 2021, 7, 7999–8012. [Google Scholar] [CrossRef]
  9. Al-Turjman, F. Internet of Nano-Things and Wireless Body Area Networks (WBAN); CRC Press/Taylor & Francis Group: Boca Raton, FL, USA, 2019; ISBN 978-0-429-24370-7. [Google Scholar]
  10. Dimitrov, W.; Dimitrov, G.; Spassov, K.; Petkova, L. Vulnerabilities Space and the Superiority of Hackers. In Proceedings of the 2021 International Conference Automatics and Informatics (ICAI), Islamabad, Pakistan, 5–7 September 2021. [Google Scholar]
  11. Luo, Y. A General Framework of Digitization Risks in International Business. J. Int. Bus Stud. 2022, 53, 344–361. [Google Scholar] [CrossRef]
  12. CAPEC—Related Activities 2022. Available online: https://capec.mitre.org/community/related.html (accessed on 11 February 2022).
  13. Kanakogi, K.; Washizaki, H.; Fukazawa, Y.; Ogata, S.; Okubo, T.; Kato, T.; Kanuka, H.; Hazeyama, A.; Yoshioka, N. Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques. Information 2021, 12, 298. [Google Scholar] [CrossRef]
  14. Kott, A. Towards Fundamental Science of Cyber Security. In Network Science and Cybersecurity; Pino, R.E., Ed.; Advances in Information Security; Springer: New York, NY, USA, 2014; Volume 55, pp. 1–13. ISBN 978-1-4614-7596-5. [Google Scholar]
  15. Li, Y.; Liu, Q. A Comprehensive Review Study of Cyber-Attacks and Cyber Security; Emerging Trends and Recent Developments. Energy Rep. 2021, 7, 8176–8186. [Google Scholar] [CrossRef]
  16. Namanya, A.P.; Cullen, A.; Awan, I.U.; Disso, J.P. The World of Malware: An Overview. In Proceedings of the 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, Spain, 6–8 August 2018; pp. 420–427. [Google Scholar]
  17. Megira, S.; Pangesti, A.R.; Wibowo, F.W. Malware Analysis and Detection Using Reverse Engineering Technique. J. Phys. Conf. Ser. 2018, 1140, 012042. [Google Scholar] [CrossRef]
  18. Petkova, L. Security’s Leaks in Seo Spamming. Knowl. Int. J. 2019, 35, 987–991. [Google Scholar]
  19. Abikoye, O.C.; Abubakar, A.; Dokoro, A.H.; Akande, O.N.; Kayode, A.A. A Novel Technique to Prevent SQL Injection and Cross-Site Scripting Attacks Using Knuth-Morris-Pratt String Match Algorithm. EURASIP J. Infor. Secur. 2020, 2020, 14. [Google Scholar] [CrossRef]
  20. Greitzer, F.L. Insider Threats: It’s the Human, Stupid! In Proceedings of the Northwest Cybersecurity Symposium, Richland, WA, USA, 8 April 2019; pp. 1–8. [Google Scholar]
  21. Gupta, B.B.; Dahiya, A. Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges, and Countermeasures, 1st ed.; CRC Press: Boca Raton, FL, USA, 2021; ISBN 978-1-00-310735-4. [Google Scholar]
  22. Rahamathullaha, U.; Karthikeyanb, E. Distributed Denial of Service Attacks Prevention, Detection and Mitigation—A Review. SSRN J 2021. Available online: https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3852902_code4708996.pdf?abstractid=3852902&mirid=1 (accessed on 17 February 2022).
  23. Wani, S.; Imthiyas, M.; Almohamedh, H.; Alhamed, K.M.; Almotairi, S.; Gulzar, Y. Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight. Symmetry 2021, 13, 227. [Google Scholar] [CrossRef]
  24. Xuan, C.D.; Van, L.; Victor, T. Detecting C&C Server in the APT Attack Based on Network Traffic Using Machine Learning. IJACSA 2020, 11, 22–27. [Google Scholar] [CrossRef]
  25. Brandao, P.R. Advanced Persistent Threats (APT)-Attribution-MICTIC Framework Extension. J. Comput. Sci. 2021, 17, 470–479. [Google Scholar] [CrossRef]
  26. Mallik, A.; Ahsan, A.; Shahadat, M.M.Z.; Tsou, J.-C. Man-in-the-middle-attack: Understanding in simple words. Int. J. Data Netw. Sci. 2019, 3, 77–92. [Google Scholar] [CrossRef]
  27. Ahmad, F.; Adnane, A.; Franqueira, V.; Kurugollu, F.; Liu, L. Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies. Sensors 2018, 18, 4040. [Google Scholar] [CrossRef]
  28. Martin, A.; Rashid, A.; Chivers, H.; Danezis, G.; Schneider, S.; Lupu, E. The Cyber Security Body of Knowledge; University of Bristol: Bristol, UK, 2019. [Google Scholar]
  29. Dimitrov, W. ICT Security Model. Cyber Security; Avangard Prima: Sofia, Bulgaria, 2018; 262p, ISBN 978-619-160-950-5. [Google Scholar]
  30. Von Solms, R.; van Niekerk, J. From Information Security to Cyber Security. Comput. Secur. 2013, 38, 97–102. [Google Scholar] [CrossRef]
  31. Cains, M.G.; Flora, L.; Taber, D.; King, Z.; Henshel, D.S. Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context Using Expert Elicitation. Risk Anal. 2021, 42, 1643–1669. [Google Scholar] [CrossRef]
  32. Pavlovic, D. On Bugs and Elephants: Mining for Science of Security. In Developing a Blueprint for a Science of Cybersecurity; The Next Wave; The National Security Agency’s Review of emerging technologies; Department of Defense: Richmond, VI, USA, 2012; Volume 19. [Google Scholar]
  33. Almseidin, M.; Alzubi, M.; Kovacs, S.; Alkasassbeh, M. Evaluation of Machine Learning Algorithms for Intrusion Detection System 2018. Available online: https://arxiv.org/ftp/arxiv/papers/1801/1801.02330.pdf (accessed on 28 March 2023).
  34. Chandola, V.; Banerjee, A.; Kumar, V. Anomaly Detection: A Survey. ACM Comput. Surv. 2009, 41, 1–58. [Google Scholar] [CrossRef]
  35. Ashenden, D.; Ollis, G. Putting the Sec in DevSecOps: Using Social Practice Theory to Improve Secure Software Development. In Proceedings of the NSPW ’20: New Security Paradigms Workshop, Online, 26–29 October 2020. [Google Scholar]
  36. Mohan, V.; Othmane, L.B. SecDevOps: Is It a Marketing Buzzword?-Mapping Research on Security in DevOps. In Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 31 August–2 September 2016; pp. 542–547. [Google Scholar]
  37. Anid, N.M. A Highly Trained And College-Educated Workforce Is Needed To Fill Cybersecurity Jobs. Cybercrime Magazine, 15 October 2018. Available online: https://cybersecurityventures.com/a-highly-trained-and-college-educated-workforce-is-needed-to-fill-cybersecurity-jobs/(accessed on 11 February 2022).
  38. Kannavara, R.; Vangore, J.; Roberts, W.; Lindholm, M.; Shrivastav, P. A Threat Intelligence Tool for the Security Development Lifecycle. In Proceedings of the 12th Innovations on Software Engineering Conference (formerly known as India Software Engineering Conference), Pune, India, 14–16 February 2019. [Google Scholar]
  39. Dimitrov, W. Analysis of the Need for Cyber Security Components in the Study of Advanced Technologies. In Proceedings of the INTED 2020 Proceedings IATED, Valencia, Spain, 2 March 2020; pp. 5259–5268. [Google Scholar]
  40. Alchinov, A.I.; Yalovenko, O.V.; Sygotina, M.V. Main Architectural Patterns of Web Applications and Web Services Using the Example of Banking Systems. J. Phys. Conf. Ser. 2021, 2032, 012116. [Google Scholar] [CrossRef]
  41. Analyst program SANS, D.S. Integrating Security into Development, No Pain Required. Spons. IBM 2011. Available online: https://scholars.huji.ac.il/sites/default/files/hujitest/files/ral14044usen.pdf (accessed on 21 March 2022).
  42. Peisert, S.; Schneier, B.; Okhravi, H.; Massacci, F.; Benzel, T.; Landwehr, C.; Mannan, M.; Mirkovic, J.; Prakash, A.; Michael, J.B. Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 2021, 19, 7–13. [Google Scholar] [CrossRef]
  43. Tudor, D. More than 30,000 GitLab Servers Remain Unpatched. Heimdal Secur. Blog 2021. Available online: https://heimdalsecurity.com/blog/more-than-30000-gitlab-servers-remain-unpatched/ (accessed on 28 March 2023).
  44. Werner, M. Proactive Security: Apps, Environments, and Messaging-DZone Research Guides, Executive Summary. Dzone 2017. Available online: https://dzone.com/guides/proactive-security-apps-environments-and-messaging (accessed on 28 March 2023).
  45. The Evolving Cybersecurity Landscape: Industry Perspectives on Securing the Nation’s Infrastructure; House of Representatives, Committee on Transportation and Infrastructure: Washington, DC, USA, 2021.
  46. Franklin, J.; Wergin, C.; Booth, H. CVSS Implementation Guidance; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2014; p. NIST IR 7946.
  47. Fransen, F.; Smulders, A.; Kerkdijk, R. Cyber Security Information Exchange to Gain Insight into the Effects of Cyber Threats and Incidents. E I Elektrotechnik Und Inf. 2015, 132, 106–112. [Google Scholar] [CrossRef]
  48. Liao, X.; Yuan, K.; Wang, X.; Li, Z.; Xing, L.; Beyah, R. Acing the IOC Game. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016. [Google Scholar]
  49. Amaro, L.J.B.; Azevedo, B.W.P.; de Mendonca, F.L.L.; Giozza, W.F.; de Oliveira Albuquerque, R.; Villalba, L.J.G. Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data. Appl. Sci. 2022, 12, 1205. [Google Scholar] [CrossRef]
  50. Althonayan, A.; Andronache, A. Shifting from Information Security towards a Cybersecurity Paradigm. In Proceedings of the 2018 10th International Conference on Information Management and Engineering-ICIME 2018, Salford, UK, 22–24 September 2018. [Google Scholar]
  51. Wang, W.; Guo, L. Cyber Security Training in Europe and America and Its Enlightenment to China. In Proceedings of the 2020 6th International Conference on Social Science and Higher Education (ICSSHE 2020), Xiamen, China, 27–29 November 2020; Atlantis Press: Amsterdam, The Netherlands, 2020. [Google Scholar]
  52. Trivedi, K.S.; Bobbio, A. Reliability and Availability Engineering: Modeling, Analysis, and Applications; Cambridge University Press: New York, NY, USA, 2017; ISBN 978-1-107-09950-0. [Google Scholar]
  53. Vito Game Theory. Solve Nonantagonistic Games (Bimatrix Game). File Exchange-MATLAB CentralFile Exchange-MATLAB Central. 2015. Available online: https://in.mathworks.com/matlabcentral/fileexchange/51601-game-theory (accessed on 28 March 2023).
  54. Lei, M.; Yang, Y.; Niu, X.; Yang, Y.; Hao, J. An Overview of General Theory of Security. China Commun. 2017, 14, 1–10. [Google Scholar] [CrossRef]
  55. Morgan, J. Ricci Flow and the Poincaré Conjecture; Donaldson, S., Wiles, A., Eds.; American Mathematical Society Clay Mathematics Institute: Providence, RI, USA, 2007; ISBN 978-0-8218-4328-4. [Google Scholar]
  56. Mazalov, V. Mathematical Game Theory and Applications; Paperbackshop UK Import: London, UK, 2014; ISBN 1-118-89962-8. [Google Scholar]
  57. Nedyalkov, I.; Georgiev, G. Comparison between Different Topologies of IP Networks Using MPLS. In Proceedings of the 2021 29th National Conference with International Participation (TELECOM), Sofia, Bulgaria, 28 October 2021; pp. 65–68. [Google Scholar]
  58. Kuhn, D.; Kacker, R.; Feldman, L.; Witte, G. Combinatorial Testing for Cybersecurity and Reliability. 2016. Available online: https://csrc.nist.gov/publications/detail/itl-bulletin/2016/05/combinatorial-testing-for-cybersecurity-and-reliability/final (accessed on 28 March 2023).
  59. Leigh Metcalf, W.C. Cybersecurity and Applied Mathematics; Syngress Media: Rockland, MA, USA, 2016; ISBN 0-12-804452-7. [Google Scholar]
  60. Podder, P.; Bharati, S.; Mondal, M.R.H.; Paul, P.K.; Kose, U. Artificial Neural Network for Cybersecurity: A Comprehensive Review. J. Inf. Assur. Secur. 2021, 16, 10–23. [Google Scholar]
  61. Sarker, I.H. Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective. SN Comput. Sci. 2021, 2, 154. [Google Scholar] [CrossRef]
  62. Chauhan, K. Fuzzy Approach for Designing Security Framework 2021. pp. 173–195. Available online: https://www.researchgate.net/publication/353813826_Fuzzy_Approach_for_Designing_Security_Framework (accessed on 28 March 2023).
  63. Amro, S.A.; Chiclana, F.; Elizondo, D.A. Application of Fuzzy Logic in Computer Security and Forensics. In Computational Intelligence for Privacy and Security; Springer: Berlin/Heidelberg, Germany, 2012; pp. 35–49. [Google Scholar]
  64. Maria Isabel Gonzalez Vasco, R.S. Group Theoretic Cryptography; Chapman & Hall: London, UK, 2015; ISBN 1-58488-836-9. [Google Scholar]
  65. Bassino, F.; Kapovich, I.; Lohrey, M.; Miasnikov, A.; Nicaud, C.; Nikolaev, A.; Rivin, I.; Shpilrain, V.; Ushakov, A.; Weil, P. Complexity and Randomness in Group Theory; De Gruyter: Berlin, Germany, 2020. [Google Scholar]
  66. Bohli, J.-M.; González Vasco, M.I.; Steinwandt, R. Building Group Key Establishment on Group Theory: A Modular Approach. Symmetry 2020, 12, 197. [Google Scholar] [CrossRef]
  67. Kostyuk, N. The Digital Prisoner’s Dilemma: Challenges and Opportunities for Cooperation. In Proceedings of the 2013 World Cyberspace Cooperation Summit IV (WCC4), Silicon Valley, CA, USA, 4–6 November 2013. [Google Scholar]
  68. Blahova, M.; Mikulicova, M.; Hromada, M. Utilization of Fractal Geometry Possibilities for Information Systems Security. In DAAAM Proceedings; DAAAM International Vienna: Vienna, Austria, 2020; pp. 619–625. [Google Scholar]
  69. Yevseiev, S.; Ponomarenko, V.; Laptiev, O.; Milov, O.; Korol, O.; Milevskyi, S.; Pohasii, S.; Tkachov, A.; Shmatko, O.; Melenti, Y.; et al. Synergy of Building Cybersecurity Systems; Privat Company Technology Center: Hong Kong, China, 2021. [Google Scholar]
  70. Holloway, E.M.; Lamont, G.B. Self Organized Multi-Agent Entangled Hierarchies for Network Security. In Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference-GECCO ’09, Montreal, QC, Canada, 8–12 July 2009. [Google Scholar]
  71. Tisdale, S. Cybersecurity: Challenges from A Systems, Complexity, Knowledge Management and business in℡Ligence Perspective. Issues Inf. Syst. 2015, 16, 191–198. [Google Scholar] [CrossRef]
  72. Rosser, J.B. From Catastrophe to Chaos: A General Theory of Economic Discontinuities: Volume I: Mathematics, Microeconomics, Macroeconomics, and Finance, 2nd ed.; Springer: Dordrecht, The Netherlands, 2000; ISBN 978-94-017-1613-0. [Google Scholar]
  73. Arnold, V.I. Catastrophe Theory; Department of Mathematics University of Moscow, Moscow, Ed.; Springer: Berlin/Heidelberg, Germany, 1984; ISBN 978-3-642-96799-3. [Google Scholar]
  74. Khatibzadeh, L.; Bornaee, Z.; Ghaemi Bafghi, A. Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic. Secur. Commun. Netw. 2019, 2019, 5306395. [Google Scholar] [CrossRef]
  75. Ran, L.; Cui, Y.; Guo, C.; Qian, Q.; Shen, G.; Xing, H. Defending Saturation Attacks on SDN Controller: A Confusable Instance Analysis-Based Algorithm. Comput. Netw. 2022, 213, 109098. [Google Scholar] [CrossRef]
  76. Zhou, W.; Ma, T.; Chen, L.; Wu, L.; Luo, Y. Application of Catastrophe Theory in Comprehensive Ecological Security Assessment of Plastic Greenhouse Soil Contaminated by Phthalate Esters. PLoS ONE 2018, 13, e0205680. [Google Scholar] [CrossRef]
  77. Ryan, P.Y.A. Mathematical Models of Computer Security. In Foundations of Security Analysis and Design; Focardi, R., Gorrieri, R., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2171, pp. 1–62. ISBN 978-3-540-42896-1. [Google Scholar]
  78. Wang, Y.; Lin, C.; Li, Q.-L.; Fang, Y. A Queueing Analysis for the Denial of Service (DoS) Attacks in Computer Networks. Comput. Netw. 2007, 51, 3564–3573. [Google Scholar] [CrossRef]
  79. Institute of Information Technology of Azerbaijan National Academy of Sciences; Imamverdiyev, Y.; Nabiyev, B. Queuing Model for Information Security Monitoring Systems. JPIT 2016, 07, 28–32. [Google Scholar] [CrossRef]
  80. Sahu, A.; Wlazlo, P.; Mao, Z.; Huang, H.; Goulart, A.; Davis, K.; Zonouz, S. Design and Evaluation of a Cyber-physical Testbed for Improving Attack Resilience of Power Systems. IET Cyber-Phy. Sys. Theory Ap. 2021, 6, 208–227. [Google Scholar] [CrossRef]
  81. Gove, R.; Deason, L. Visualizing Automatically Detected Periodic Network Activity. In Proceedings of the 2018 IEEE Symposium on Visualization for Cyber Security (VizSec), Berlin, Germany, 22 October 2018; pp. 1–8. [Google Scholar]
  82. Niu, W.; Xiao, J.; Zhang, X.; Zhang, X.; Du, X.; Huang, X.; Guizani, M. Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation. IEEE Internet Things J. 2021, 8, 9905–9919. [Google Scholar] [CrossRef]
  83. Luo, Z.; Pei, Z.; Wang, X.; Li, Y.; Zou, B. Polarization Filtering and WFRFT-Based Secure Transmission Scheme for Wireless Communications. Math. Probl. Eng. 2020, 2020, 6045976. [Google Scholar] [CrossRef]
  84. Liu, S.; You, S.; Yin, H.; Lin, Z.; Liu, Y.; Yao, W.; Sundaresh, L. Model-Free Data Authentication for Cyber Security in Power Systems. IEEE Trans. Smart Grid. 2020, 11, 4565–4568. [Google Scholar] [CrossRef]
  85. Orojloo, H.; Abdollahi Azgomi, M. Modelling and Evaluation of the Security of Cyber-physical Systems Using Stochastic Petri Nets. IET Cyber-Phys. Syst. 2019, 4, 50–57. [Google Scholar] [CrossRef]
  86. Fanti, M.P.; Nolich, M.; Simic, S.; Ukovich, W. Modeling Cyber Attacks by Stochastic Games and Timed Petri Nets. In Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Budapest, Hungary, 9–12 October 2016; pp. 002960–002965. [Google Scholar]
  87. Lounis, K. Stochastic-Based Semantics Of Attack-Defense Trees For Security Assessment. Electron. Notes Theor. Comput. Sci. 2018, 337, 135–154. [Google Scholar] [CrossRef]
  88. Lv, M.; Yu, W.; Lv, Y.; Cao, J.; Huang, W. An Integral Sliding Mode Observer for CPS Cyber Security Attack Detection. Chaos 2019, 29, 043120. [Google Scholar] [CrossRef] [PubMed]
  89. Xu, L.; Xiong, W.; Zhou, M.; Chen, L. A Continuous Terminal Sliding-Mode Observer-Based Anomaly Detection Approach for Industrial Communication Networks. Symmetry 2022, 14, 124. [Google Scholar] [CrossRef]
  90. Han, F.; Xu, L.; Yu, X.; Tari, Z.; Feng, Y.; Hu, J. Sliding-Mode Observers for Real-Time DDoS Detection. In Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), Hefei, China, 5–7 June 2016; pp. 825–830. [Google Scholar]
  91. Li, Y.; Zhang, F.; Sun, Y. Lightweight Certificateless Linearly Homomorphic Network Coding Signature Scheme for Electronic Health System. IET Inf. Secur. 2021, 15, 131–146. [Google Scholar] [CrossRef]
  92. Esfahani, A.; Nascimento, A.; Yang, D.; Rodriguez, J. A Mathematical Model for Improving Lightweight Security with Network Coding. In Proceedings of the IARIA International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies-UBICOMM, Florence, Italy, 25–29 October 2013; Volume 2308–4278, pp. 159–162. [Google Scholar]
  93. Yang, E.; Parvathy, V.S.; Selvi, P.P.; Shankar, K.; Seo, C.; Joshi, G.P.; Yi, O. Privacy Preservation in Edge Consumer Electronics by Combining Anomaly Detection with Dynamic Attribute-Based Re-Encryption. Mathematics 2020, 8, 1871. [Google Scholar] [CrossRef]
  94. Pawlicki, M.; Kozik, R.; Choraś, M. A Survey on Neural Networks for (Cyber-) Security and (Cyber-) Security of Neural Networks. Neurocomputing 2022, 500, 1075–1087. [Google Scholar] [CrossRef]
  95. Wang, D.; Lu, Y.; Gan, J. An Information Security Evaluation Method Based on Entropy Theory and Improved TOPSIS. In Proceedings of the 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), Shenzhen, China, 26–29 June 2017; pp. 595–600. [Google Scholar]
  96. Husari, G.; Niu, X.; Chu, B.; Al-Shaer, E. Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence. In Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), Miami, FL, USA, 9–11 November 2018; pp. 1–6. [Google Scholar]
  97. Okutan, A.; Yang, S.J. ASSERT: Attack Synthesis and Separation with Entropy Redistribution towards Predictive Cyber Defense. Cybersecurity 2019, 2, 15. [Google Scholar] [CrossRef]
  98. Menéndez, H.D.; Bhattacharya, S.; Clark, D.; Barr, E.T. The Arms Race: Adversarial Search Defeats Entropy Used to Detect Malware. Expert Syst. Appl. 2019, 118, 246–260. [Google Scholar] [CrossRef]
  99. Clivati, C.; Meda, A.; Donadello, S.; Virzì, S.; Genovese, M.; Levi, F.; Mura, A.; Pittaluga, M.; Yuan, Z.; Shields, A.J.; et al. Coherent Phase Transfer for Real-World Twin-Field Quantum Key Distribution. Nat. Commun. 2022, 13, 157. [Google Scholar] [CrossRef]
  100. Maeda, K.; Sasaki, T.; Koashi, M. Repeaterless Quantum Key Distribution with Efficient Finite-Key Analysis Overcoming the Rate-Distance Limit. Nat. Commun. 2019, 10, 3140. [Google Scholar] [CrossRef] [PubMed]
  101. Gu, J.; Cao, X.-Y.; Fu, Y.; He, Z.-W.; Yin, Z.-J.; Yin, H.-L.; Chen, Z.-B. Experimental Measurement-Device-Independent Type Quantum Key Distribution with Flawed and Correlated Sources. Sci. Bull. 2022, 67, 2167–2175. [Google Scholar] [CrossRef] [PubMed]
  102. Xie, Y.-M.; Lu, Y.-S.; Weng, C.-X.; Cao, X.-Y.; Jia, Z.-Y.; Bao, Y.; Wang, Y.; Fu, Y.; Yin, H.-L.; Chen, Z.-B. Breaking the Rate-Loss Bound of Quantum Key Distribution with Asynchronous Two-Photon Interference. PRX Quantum 2022, 3, 020315. [Google Scholar] [CrossRef]
  103. Das, S.; Bäuml, S.; Winczewski, M.; Horodecki, K. Universal Limitations on Quantum Key Distribution over a Network. Phys. Rev. X 2021, 11, 041016. [Google Scholar] [CrossRef]
  104. Ganguli, C.; Shandilya, S.K.; Nehrey, M.; Havryliuk, M. Adaptive Artificial Bee Colony Algorithm for Nature-Inspired Cyber Defense. Systems 2023, 11, 27. [Google Scholar] [CrossRef]
  105. Alyami, H.; Nadeem, M.; Alharbi, A.; Alosaimi, W.; Ansari, M.T.J.; Pandey, D.; Kumar, R.; Khan, R.A. The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective. Appl. Sci. 2021, 11, 11784. [Google Scholar] [CrossRef]
  106. Popper, K.R. Philosophy of Science: A Personal Report. In British Philosophy in the Mid-Century; Muirhead, J.H., Ed.; George Allen and Unwin: Crows Nest, NSW, Australia, 1957; pp. 182–183. [Google Scholar]
Figure 1. The authors applied mathematics to cybersecurity models.
Figure 1. The authors applied mathematics to cybersecurity models.
Applsci 13 06508 g001
Figure 2. Connections between authors who applied mathematics to cybersecurity models.
Figure 2. Connections between authors who applied mathematics to cybersecurity models.
Applsci 13 06508 g002
Figure 3. Solution to a matrix game using Pareto.
Figure 3. Solution to a matrix game using Pareto.
Applsci 13 06508 g003
Figure 4. Visualization of Swallowtail catastrophe (a,b) two minima and one maximum are replaced by one minimum; beyond them the fold bifurcations disappear; (c)—Butterfly catastrophe.
Figure 4. Visualization of Swallowtail catastrophe (a,b) two minima and one maximum are replaced by one minimum; beyond them the fold bifurcations disappear; (c)—Butterfly catastrophe.
Applsci 13 06508 g004
Figure 5. Cyber-physical system states during a hacker attack.
Figure 5. Cyber-physical system states during a hacker attack.
Applsci 13 06508 g005
Table 1. Mathematical theories use cases.
Table 1. Mathematical theories use cases.
Mathematical
Approach
Cybersecurity
Area
Scientific
Publications
Fourier transformation for periodicity detectionNetwork security, anomaly detection, discovering APT malware [81,82,83,84]
Stochastic Petri Nets Cyber-physical systems security evaluation[85,86,87]
Terminal sliding-mode (TSM) theoryCyber-attack detection[88,89,90]
Group theory, number theory, algorithm complexityEncryption[66,91,92]
GWO based on MANNNeural networks[82,93,94]
Information theory, entropy Information security evaluation method[95,96,97,98]
Set theory, probability theory, statistics, and graph theory Common cybersecurity issues[53,54,55,56],
linear algebra over the field of complex numbers, probability theory, information theoryQuantum key distribution (QKD) and quantum supremacy[99,100,101,102,103]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Trenchev, I.; Dimitrov, W.; Dimitrov, G.; Ostrovska, T.; Trencheva, M. Mathematical Approaches Transform Cybersecurity from Protoscience to Science. Appl. Sci. 2023, 13, 6508. https://0-doi-org.brum.beds.ac.uk/10.3390/app13116508

AMA Style

Trenchev I, Dimitrov W, Dimitrov G, Ostrovska T, Trencheva M. Mathematical Approaches Transform Cybersecurity from Protoscience to Science. Applied Sciences. 2023; 13(11):6508. https://0-doi-org.brum.beds.ac.uk/10.3390/app13116508

Chicago/Turabian Style

Trenchev, Ivan, Willian Dimitrov, Georgi Dimitrov, Tanya Ostrovska, and Miglena Trencheva. 2023. "Mathematical Approaches Transform Cybersecurity from Protoscience to Science" Applied Sciences 13, no. 11: 6508. https://0-doi-org.brum.beds.ac.uk/10.3390/app13116508

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop