Resource Allocation Strategies under Attack-Defense Dual-Role and Malicious Attacks

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 309)

Abstract

How to efficiently evaluate the network survivability is a critical issue in nowadays. Hence, we develop a multi-round network attack-defense scenario with dual-role players, who can attack and defend, and establish a mathematical model to optimize resource allocation and then predict the network survivability by the Average DOD. In each round, the players could allocate their attack resources on the nodes of their own network and on another player’s network after updating related information about another player’s. Furthermore, they could reallocate existing defense resources and repair compromised nodes. To solve the problem, the gradient method and the game theory would be adopted to find the optimal resource allocation strategies for both players.

Keywords

Network Attack-Defense Dual-Role Multi-Round Average DOD Network Survivability Resource Allocation Optimization 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Clarke, R.A.: Cyber War. HarperCollins (2010)Google Scholar
  2. 2.
    Jiang, W., Fang, B.X., Zhang, H.l., Tian, Z.H.: A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. In: International Conference on Computational Intelligence and Security (2007)Google Scholar
  3. 3.
    Lin, F.Y.S., Yen, H.H., Chen, P.Y., Wen, Y.F.: Evaluation of Network Survivability Considering Degree of Separation. Hybrid Artificial Intelligence Systems (2011)Google Scholar
  4. 4.
    Lin, F.Y.S., Chen, P.Y., Chen, Q.T.: Resource Allocation Strategies to Maximize Network Survivability Considering of Average DOD. Advances in Intelligent and Soft Computing 151, 751–758 (2012)CrossRefGoogle Scholar
  5. 5.
    Skaperdas, S.: Contest Success Functions. Economic Theory (1996)Google Scholar
  6. 6.
    Levitin, G., Hausken, K.: Shield vs. Sword Resource Distribution in K-round Duels. Central European Journal of Operations Research 8, 1–15 (2010)Google Scholar
  7. 7.
    Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A Survey of Game Theory as Applied to Network Security. In: 43rd Hawaii International Conference on System Sciences (January 2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Pei-Yu Chen
    • 1
    • 2
  • Ying-Ju Chen
    • 1
  • Frank Yeong-Sung Lin
    • 1
  1. 1.Department of Information ManagementNational Taiwan UniversityTaipeiTaiwan, R.O.C
  2. 2.Institute for Information IndustryTaipeiTaiwan, R.O.C

Personalised recommendations