Maximization of multi-round network survivability under considerations of the defender's defensive messaging strategies

Pei-yu Chen, I. Ju Shih, Frank Yeong Sung Lin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these dilemmas. The Average DOD is then applied to evaluate damage degree of network to estimate all possible strategies which both cyber attacker and network defender would take. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In the process of problem solving, the 'gradient method' and 'game theory' would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.

Original languageEnglish (US)
Title of host publicationProceedings - 2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013
PublisherIEEE Computer Society
Pages148-155
Number of pages8
DOIs
StatePublished - 2013
Externally publishedYes
Event2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013 - Bologna, Italy
Duration: Nov 11 2013Nov 12 2013

Other

Other2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013
CountryItaly
CityBologna
Period11/11/1311/12/13

Fingerprint

Gradient methods
Game theory
Resource allocation
Mathematical models
Industry

Keywords

  • Average Degree of Disconnectivity
  • Average DOD
  • Defensive Messaging Strategies
  • Game Theory
  • Gradient Method
  • Incomplete Information
  • Multi-round
  • Network Recovery
  • Optimization
  • Resource Allocation
  • Survivability

ASJC Scopus subject areas

  • Computer Science Applications
  • Software

Cite this

Chen, P., Shih, I. J., & Lin, F. Y. S. (2013). Maximization of multi-round network survivability under considerations of the defender's defensive messaging strategies. In Proceedings - 2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013 (pp. 148-155). [6775063] IEEE Computer Society. https://doi.org/10.1109/Mobilware.2013.27

Maximization of multi-round network survivability under considerations of the defender's defensive messaging strategies. / Chen, Pei-yu; Shih, I. Ju; Lin, Frank Yeong Sung.

Proceedings - 2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013. IEEE Computer Society, 2013. p. 148-155 6775063.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chen, P, Shih, IJ & Lin, FYS 2013, Maximization of multi-round network survivability under considerations of the defender's defensive messaging strategies. in Proceedings - 2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013., 6775063, IEEE Computer Society, pp. 148-155, 2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013, Bologna, Italy, 11/11/13. https://doi.org/10.1109/Mobilware.2013.27
Chen P, Shih IJ, Lin FYS. Maximization of multi-round network survivability under considerations of the defender's defensive messaging strategies. In Proceedings - 2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013. IEEE Computer Society. 2013. p. 148-155. 6775063 https://doi.org/10.1109/Mobilware.2013.27
Chen, Pei-yu ; Shih, I. Ju ; Lin, Frank Yeong Sung. / Maximization of multi-round network survivability under considerations of the defender's defensive messaging strategies. Proceedings - 2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013. IEEE Computer Society, 2013. pp. 148-155
@inproceedings{308a252dfdcb4f7f84b60874d771e3d1,
title = "Maximization of multi-round network survivability under considerations of the defender's defensive messaging strategies",
abstract = "Nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these dilemmas. The Average DOD is then applied to evaluate damage degree of network to estimate all possible strategies which both cyber attacker and network defender would take. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In the process of problem solving, the 'gradient method' and 'game theory' would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.",
keywords = "Average Degree of Disconnectivity, Average DOD, Defensive Messaging Strategies, Game Theory, Gradient Method, Incomplete Information, Multi-round, Network Recovery, Optimization, Resource Allocation, Survivability",
author = "Pei-yu Chen and Shih, {I. Ju} and Lin, {Frank Yeong Sung}",
year = "2013",
doi = "10.1109/Mobilware.2013.27",
language = "English (US)",
pages = "148--155",
booktitle = "Proceedings - 2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013",
publisher = "IEEE Computer Society",

}

TY - GEN

T1 - Maximization of multi-round network survivability under considerations of the defender's defensive messaging strategies

AU - Chen, Pei-yu

AU - Shih, I. Ju

AU - Lin, Frank Yeong Sung

PY - 2013

Y1 - 2013

N2 - Nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these dilemmas. The Average DOD is then applied to evaluate damage degree of network to estimate all possible strategies which both cyber attacker and network defender would take. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In the process of problem solving, the 'gradient method' and 'game theory' would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.

AB - Nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these dilemmas. The Average DOD is then applied to evaluate damage degree of network to estimate all possible strategies which both cyber attacker and network defender would take. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In the process of problem solving, the 'gradient method' and 'game theory' would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.

KW - Average Degree of Disconnectivity

KW - Average DOD

KW - Defensive Messaging Strategies

KW - Game Theory

KW - Gradient Method

KW - Incomplete Information

KW - Multi-round

KW - Network Recovery

KW - Optimization

KW - Resource Allocation

KW - Survivability

UR - http://www.scopus.com/inward/record.url?scp=84898807364&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84898807364&partnerID=8YFLogxK

U2 - 10.1109/Mobilware.2013.27

DO - 10.1109/Mobilware.2013.27

M3 - Conference contribution

SP - 148

EP - 155

BT - Proceedings - 2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013

PB - IEEE Computer Society

ER -