Maximization of multi-round network survivability under considerations of the defender's defensive messaging strategies

Pei-yu Chen, I. Ju Shih, Frank Yeong Sung Lin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these dilemmas. The Average DOD is then applied to evaluate damage degree of network to estimate all possible strategies which both cyber attacker and network defender would take. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In the process of problem solving, the 'gradient method' and 'game theory' would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.

Original languageEnglish (US)
Title of host publicationProceedings - 2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013
PublisherIEEE Computer Society
Pages148-155
Number of pages8
DOIs
StatePublished - 2013
Externally publishedYes
Event2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013 - Bologna, Italy
Duration: Nov 11 2013Nov 12 2013

Other

Other2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013
Country/TerritoryItaly
CityBologna
Period11/11/1311/12/13

Keywords

  • Average Degree of Disconnectivity
  • Average DOD
  • Defensive Messaging Strategies
  • Game Theory
  • Gradient Method
  • Incomplete Information
  • Multi-round
  • Network Recovery
  • Optimization
  • Resource Allocation
  • Survivability

ASJC Scopus subject areas

  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'Maximization of multi-round network survivability under considerations of the defender's defensive messaging strategies'. Together they form a unique fingerprint.

Cite this