Abstract
How to efficiently evaluate the network survivability is a critical issue in nowadays. Hence, we develop a multi-round network attack-defense scenario with dual-role players, who can attack and defend, and establish a mathematical model to optimize resource allocation and then predict the network survivability by the Average DOD. In each round, the players could allocate their attack resources on the nodes of their own network and on another player’s network after updating related information about another player’s. Furthermore, they could reallocate existing defense resources and repair compromised nodes. To solve the problem, the gradient method and the game theory would be adopted to find the optimal resource allocation strategies for both players.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Clarke, R.A.: Cyber War. HarperCollins (2010)
Jiang, W., Fang, B.X., Zhang, H.l., Tian, Z.H.: A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. In: International Conference on Computational Intelligence and Security (2007)
Lin, F.Y.S., Yen, H.H., Chen, P.Y., Wen, Y.F.: Evaluation of Network Survivability Considering Degree of Separation. Hybrid Artificial Intelligence Systems (2011)
Lin, F.Y.S., Chen, P.Y., Chen, Q.T.: Resource Allocation Strategies to Maximize Network Survivability Considering of Average DOD. Advances in Intelligent and Soft Computing 151, 751–758 (2012)
Skaperdas, S.: Contest Success Functions. Economic Theory (1996)
Levitin, G., Hausken, K.: Shield vs. Sword Resource Distribution in K-round Duels. Central European Journal of Operations Research 8, 1–15 (2010)
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A Survey of Game Theory as Applied to Network Security. In: 43rd Hawaii International Conference on System Sciences (January 2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, PY., Chen, YJ., Lin, F.YS. (2014). Resource Allocation Strategies under Attack-Defense Dual-Role and Malicious Attacks. In: Park, J., Pan, Y., Kim, CS., Yang, Y. (eds) Future Information Technology. Lecture Notes in Electrical Engineering, vol 309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55038-6_107
Download citation
DOI: https://doi.org/10.1007/978-3-642-55038-6_107
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55037-9
Online ISBN: 978-3-642-55038-6
eBook Packages: EngineeringEngineering (R0)