Abstract
Security issues are becoming more and more important to activities of individuals, organizations, and the society in our modern networked computerized world. In this chapter we survey a few optimization frameworks for problems related to security of various networked system such as the internet or the power grid system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
A function h of k variables is convex (resp. concave) if and only if, for all x 1, x 2, …, x k , y 1, y 2, …, y k and for all 0 < λ < 1, \(h\big((1-\lambda )\,\big(x_{1},x_{2},\ldots,x_{k}\big) +\lambda \,\big (y_{1},y_{2},\ldots,y_{k}\big)\big) \geq (1-\lambda )\,h\big(x_{1},x_{2},\ldots,x_{k}\big) +\lambda \, h\big(y_{1},y_{2},\ldots,y_{k}\big)\) (resp. \(h\big((1-\lambda )\,\big(x_{1},x_{2},\ldots,x_{k}\big) +\lambda \,\big (y_{1},y_{2},\ldots,y_{k}\big)\big) \leq (1-\lambda )\,h\big(x_{1},x_{2},\ldots,x_{k}\big) +\lambda \, h\big(y_{1},y_{2},\ldots,y_{k}\big)\,\)). When the objective function and all the constraints are convex (resp. concave), we have a convex (resp. concave) optimization problem. The convexity or concavity property often makes an optimization problem easier to solve as opposed to the general case; see [3] for further details.
- 2.
Okimoto et al. [18] claim that an advantage of finding all trade-off solutions is that agents can dynamically change decisions in case of emergencies. Unfortunately, the number of trade-off solutions may be exponential in the worst case.
References
A. Abur, A. Expósito, Power System State Estimation (Marcel Dekker, Inc., New York, 2004)
R. Bobba, K. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, T. Overbye, Detecting false data injection attacks on dc state estimation, in 1st Workshop on Secure Control Systems (2010)
S. Boyd, L. Vandenberghe, Convex Optimization (Cambridge University Press, Cambridge, 2004)
K. Bringmann, T. Friedrich, F. Neumann, M. Wagner, Approximation-guided evolutionary multi-objective optimization, 22nd International Joint Conference on Artificial Intelligence, pp. 1198–1203 (2011)
G. Dán, H. Sandberg, Stealth attacks and protection schemes for state estimators in power systems, 1st IEEE International Conference on Smart Grid Communications, pp. 214–219 (2010)
K. Deb, S. Agrawal, A. Pratap, T. Meyarivan, A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evolut. Comput. 6 (2), 182–197 (2002)
D.M. Dunlavy, B. Hendrickson, T.G. Kolda, Mathematical challenges in cybersecurity. Technical Report SAND2009-0805, Sandia National Laboratories (2009)
F.M.D. Fave, R. Stranders, A. Rogers, N.R. Jennings, Bounded decentralised coordination over multiple objectives, 10th International Conference on Autonomous Agents and Multiagent Systems, pp. 371–378 (2011)
S. Floyd, V. Paxson, Difficulties in simulating the Internet. IEEE/ACM Trans. Netw. 9 (4), 392–403 (2001)
D. Fudenberg, J. Tirole, Game Theory (MIT Press, Cambridge, 1991)
P. Godfrey, R. Shipley, J. Gryz, Algorithms and analyses for maximal vector computation. VLDB J. 16, 5–28 (2006)
H.T. Kung, F. Luccio, F.P. Preparata, On finding the maxima of a set of vectors. J. ACM 22 (4), 469–476 (1975)
Y. Liu, M. Reiter, P. Ning, False data injection attacks against state estimation in electric power grids, 16th ACM Conference on Computer and Communication Security, pp. 21–32 (2009)
T. Matsui, M. Silaghi, K. Hirayama, M. Yokoo, H. Matsuo, Distributed search method with bounded cost vectors on multiple objective dcops, in 15th International Conference on Principles and Practice of Multi-Agent Systems, pp. 137–152 (2012)
J. Meza, S. Campbell, D. Bailey, Mathematical and Statistical Opportunities in Cyber Security. Report LBNL-1667E, Lawrence Berkeley National Laboratory (2009)
P. Modi, W.-M. Shen, M. Tambe, M. Yokoo, ADOPT: asynchronous distributed constraint optimization with quality guarantees. Artif. Intell. 161 (1–2), 149–180 (2005)
A. Monticelli, State Estimation in Electric Power Systems A Generalized Approach (Kluwer Academic Publishers, Boston, 1999)
T. Okimoto, N. Ikegai, K. Inoue, H. Okada, T. Ribeiro, H. Maruyama, Cyber security problem based on multi-objective distributed constraint optimization technique, in 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, pp. 1–7 (2013)
V. Paxson, Strategies for sound internet measurement, in 4th ACM SIGCOMM Conference on Internet measurement, pp. 263–271 (2004)
H. Sandberg, A. Teixeira, K.H. Johansson, On security indices for state estimators in power networks, in 1st Workshop on Secure Control Systems (2010).
A.J. Slagell, K. Lakkaraju, K. Luo, Flaim: A multi-level anonymization framework for computer and network logs, in 20th USENIX Large Installation System Administration Conference, pp. 63–77 (2006)
K.C. Sou, H. Sandberg, K.H. Johansson, On the exact solution to a smart grid cyber-security analysis problem. IEEE Trans. Smart Grid 4 (2), 856–865 (2013)
K.G. Vamvoudakis, J.P. Hespanha, R.A. Kemmerer, G. Vigna, Formulating cyber-security as convex optimization problems, in Control of Cyber-Physical Systems. Lecture Notes in Control and Information Sciences, vol. 449 (Springer, Berlin, 2013), pp. 85–100
G. Vigna, The 2011 UCSB iCTF: Description of the game (2011), http://ictf.cs.ucsb.edu/
Acknowledgements
The authors were partially supported by NSF grant IIS-1160995.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
DasGupta, B., Srinivasan, V. (2017). A Review of Several Optimization Problems Related to Security in Networked System. In: Daras, N., Rassias, T. (eds) Operations Research, Engineering, and Cyber Security. Springer Optimization and Its Applications, vol 113. Springer, Cham. https://doi.org/10.1007/978-3-319-51500-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-51500-7_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51498-7
Online ISBN: 978-3-319-51500-7
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)