Network recovery strategies for maximization of network survivability

Frank Yeong Sung Lin, Pei Yu Chen, Yu Shun Wang, Yao Yuan Chang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Although enterprises make profits by satisfying customers' needs, which is most often facilitated by information systems and network infrastructures, it is difficult to keep the systems and the network components regularly operating without any downtime. As a result, it is an important and critical issue for the system administrator or defender to efficiently evaluate network survivability. In this paper, a network optimization problem of attacker and defender behavior is considered. Both actors utilize their resources: the attackers launching attacks try to maximize the damage of the network, while the defenders deploy resources on the nodes and recover the compromised nodes. This problem is considering with survivability with a metric, Degree of Disconnectivity (DOD), which is used to evaluate the damage level of the network. The Lagrangean Relaxation Method is then applied to obtain optimal solutions for the proposed problem.

Original languageEnglish (US)
Title of host publicationIWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference
Pages1130-1134
Number of pages5
DOIs
StatePublished - Sep 12 2011
Externally publishedYes
Event7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011 - Istanbul, Turkey
Duration: Jul 4 2011Jul 8 2011

Publication series

NameIWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference

Other

Other7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011
CountryTurkey
CityIstanbul
Period7/4/117/8/11

Keywords

  • Degree of Disconnectivity
  • Lagrangean Relaxation
  • Network Attack
  • Network Recovery
  • Optimization Problem
  • Resource Allocation
  • Survivability

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Communication

Fingerprint Dive into the research topics of 'Network recovery strategies for maximization of network survivability'. Together they form a unique fingerprint.

Cite this