Resource allocation strategies under attack-defense dual-role and malicious attacks

Pei Yu Chen, Ying Ju Chen, Frank Yeong Sung Lin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

How to efficiently evaluate the network survivability is a critical issue in nowadays. Hence, we develop a multi-round network attack-defense scenario with dual-role players, who can attack and defend, and establish a mathematical model to optimize resource allocation and then predict the network survivability by the Average DOD. In each round, the players could allocate their attack resources on the nodes of their own network and on another player's network after updating related information about another player's. Furthermore, they could reallocate existing defense resources and repair compromised nodes. To solve the problem, the gradient method and the game theory would be adopted to find the optimal resource allocation strategies for both players.

Original languageEnglish (US)
Title of host publicationFuture Information Technology
PublisherSpringer Verlag
Pages689-695
Number of pages7
ISBN (Print)9783642550379
DOIs
StatePublished - 2014
Externally publishedYes
Event9th FTRA InternationalConference on Future Information Technology, FutureTech 2014 - Zhangjiajie, China
Duration: May 28 2014May 31 2014

Publication series

NameLecture Notes in Electrical Engineering
Volume309 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Other

Other9th FTRA InternationalConference on Future Information Technology, FutureTech 2014
Country/TerritoryChina
CityZhangjiajie
Period5/28/145/31/14

Keywords

  • Average DOD
  • Multi-Round
  • Network Attack-Defense Dual-Role
  • Network Survivability
  • Optimization
  • Resource Allocation

ASJC Scopus subject areas

  • Industrial and Manufacturing Engineering

Fingerprint

Dive into the research topics of 'Resource allocation strategies under attack-defense dual-role and malicious attacks'. Together they form a unique fingerprint.

Cite this