Skip to main content

A Review of Several Optimization Problems Related to Security in Networked System

  • Chapter
  • First Online:
Operations Research, Engineering, and Cyber Security

Part of the book series: Springer Optimization and Its Applications ((SOIA,volume 113))

  • 1175 Accesses

Abstract

Security issues are becoming more and more important to activities of individuals, organizations, and the society in our modern networked computerized world. In this chapter we survey a few optimization frameworks for problems related to security of various networked system such as the internet or the power grid system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A function h of k variables is convex (resp. concave) if and only if, for all x 1, x 2, , x k , y 1, y 2, , y k and for all 0 < λ < 1, \(h\big((1-\lambda )\,\big(x_{1},x_{2},\ldots,x_{k}\big) +\lambda \,\big (y_{1},y_{2},\ldots,y_{k}\big)\big) \geq (1-\lambda )\,h\big(x_{1},x_{2},\ldots,x_{k}\big) +\lambda \, h\big(y_{1},y_{2},\ldots,y_{k}\big)\) (resp. \(h\big((1-\lambda )\,\big(x_{1},x_{2},\ldots,x_{k}\big) +\lambda \,\big (y_{1},y_{2},\ldots,y_{k}\big)\big) \leq (1-\lambda )\,h\big(x_{1},x_{2},\ldots,x_{k}\big) +\lambda \, h\big(y_{1},y_{2},\ldots,y_{k}\big)\,\)). When the objective function and all the constraints are convex (resp. concave), we have a convex (resp. concave) optimization problem. The convexity or concavity property often makes an optimization problem easier to solve as opposed to the general case; see [3] for further details.

  2. 2.

    Okimoto et al. [18] claim that an advantage of finding all trade-off solutions is that agents can dynamically change decisions in case of emergencies. Unfortunately, the number of trade-off solutions may be exponential in the worst case.

References

  1. A. Abur, A. Expósito, Power System State Estimation (Marcel Dekker, Inc., New York, 2004)

    Book  Google Scholar 

  2. R. Bobba, K. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, T. Overbye, Detecting false data injection attacks on dc state estimation, in 1st Workshop on Secure Control Systems (2010)

    Google Scholar 

  3. S. Boyd, L. Vandenberghe, Convex Optimization (Cambridge University Press, Cambridge, 2004)

    Book  MATH  Google Scholar 

  4. K. Bringmann, T. Friedrich, F. Neumann, M. Wagner, Approximation-guided evolutionary multi-objective optimization, 22nd International Joint Conference on Artificial Intelligence, pp. 1198–1203 (2011)

    Google Scholar 

  5. G. Dán, H. Sandberg, Stealth attacks and protection schemes for state estimators in power systems, 1st IEEE International Conference on Smart Grid Communications, pp. 214–219 (2010)

    Google Scholar 

  6. K. Deb, S. Agrawal, A. Pratap, T. Meyarivan, A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evolut. Comput. 6 (2), 182–197 (2002)

    Article  Google Scholar 

  7. D.M. Dunlavy, B. Hendrickson, T.G. Kolda, Mathematical challenges in cybersecurity. Technical Report SAND2009-0805, Sandia National Laboratories (2009)

    Google Scholar 

  8. F.M.D. Fave, R. Stranders, A. Rogers, N.R. Jennings, Bounded decentralised coordination over multiple objectives, 10th International Conference on Autonomous Agents and Multiagent Systems, pp. 371–378 (2011)

    Google Scholar 

  9. S. Floyd, V. Paxson, Difficulties in simulating the Internet. IEEE/ACM Trans. Netw. 9 (4), 392–403 (2001)

    Article  Google Scholar 

  10. D. Fudenberg, J. Tirole, Game Theory (MIT Press, Cambridge, 1991)

    MATH  Google Scholar 

  11. P. Godfrey, R. Shipley, J. Gryz, Algorithms and analyses for maximal vector computation. VLDB J. 16, 5–28 (2006)

    Article  Google Scholar 

  12. H.T. Kung, F. Luccio, F.P. Preparata, On finding the maxima of a set of vectors. J. ACM 22 (4), 469–476 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  13. Y. Liu, M. Reiter, P. Ning, False data injection attacks against state estimation in electric power grids, 16th ACM Conference on Computer and Communication Security, pp. 21–32 (2009)

    Google Scholar 

  14. T. Matsui, M. Silaghi, K. Hirayama, M. Yokoo, H. Matsuo, Distributed search method with bounded cost vectors on multiple objective dcops, in 15th International Conference on Principles and Practice of Multi-Agent Systems, pp. 137–152 (2012)

    Google Scholar 

  15. J. Meza, S. Campbell, D. Bailey, Mathematical and Statistical Opportunities in Cyber Security. Report LBNL-1667E, Lawrence Berkeley National Laboratory (2009)

    Google Scholar 

  16. P. Modi, W.-M. Shen, M. Tambe, M. Yokoo, ADOPT: asynchronous distributed constraint optimization with quality guarantees. Artif. Intell. 161 (1–2), 149–180 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  17. A. Monticelli, State Estimation in Electric Power Systems A Generalized Approach (Kluwer Academic Publishers, Boston, 1999)

    Book  Google Scholar 

  18. T. Okimoto, N. Ikegai, K. Inoue, H. Okada, T. Ribeiro, H. Maruyama, Cyber security problem based on multi-objective distributed constraint optimization technique, in 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, pp. 1–7 (2013)

    Google Scholar 

  19. V. Paxson, Strategies for sound internet measurement, in 4th ACM SIGCOMM Conference on Internet measurement, pp. 263–271 (2004)

    Google Scholar 

  20. H. Sandberg, A. Teixeira, K.H. Johansson, On security indices for state estimators in power networks, in 1st Workshop on Secure Control Systems (2010).

    Google Scholar 

  21. A.J. Slagell, K. Lakkaraju, K. Luo, Flaim: A multi-level anonymization framework for computer and network logs, in 20th USENIX Large Installation System Administration Conference, pp. 63–77 (2006)

    Google Scholar 

  22. K.C. Sou, H. Sandberg, K.H. Johansson, On the exact solution to a smart grid cyber-security analysis problem. IEEE Trans. Smart Grid 4 (2), 856–865 (2013)

    Article  Google Scholar 

  23. K.G. Vamvoudakis, J.P. Hespanha, R.A. Kemmerer, G. Vigna, Formulating cyber-security as convex optimization problems, in Control of Cyber-Physical Systems. Lecture Notes in Control and Information Sciences, vol. 449 (Springer, Berlin, 2013), pp. 85–100

    Google Scholar 

  24. G. Vigna, The 2011 UCSB iCTF: Description of the game (2011), http://ictf.cs.ucsb.edu/

    Google Scholar 

Download references

Acknowledgements

The authors were partially supported by NSF grant IIS-1160995.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhaskar DasGupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

DasGupta, B., Srinivasan, V. (2017). A Review of Several Optimization Problems Related to Security in Networked System. In: Daras, N., Rassias, T. (eds) Operations Research, Engineering, and Cyber Security. Springer Optimization and Its Applications, vol 113. Springer, Cham. https://doi.org/10.1007/978-3-319-51500-7_8

Download citation

Publish with us

Policies and ethics